Core Network

Peter Snygg

Protection of Critical Telecom Network Resources

Sophisticated attacks require real time intrusion detection and analytics Mobile network security is on top of the operators’ agenda and is discussed extensively at network security conferences and other industry events. This is partly due to the fact that security

Antonio Rodríguez

The Need for End-to-End Network Visibility

As the telecommunication services evolve with the subscribers’ applications in today’s networks, there is a growing disconnection between the perception of quality of the services the operators provide, and the actual quality perceived by their customers. As Ericsson points out

Scroll to Top