#9: 5G Voice Security (3/3) – Operational Requirements and Tools to Secure Critical Voice Services
As an operator you must allow and encourage signalling across your network, yet filter out unwanted traffic. In this third session in a series of the Webinars on 5G Voice Security, BlueTC recommends that you add forensic analytics capabilities to