IP Multimedia Subsystem

Peter Snygg

Protection of Critical Telecom Network Resources

Sophisticated attacks require real time intrusion detection and analytics Mobile network security is on top of the operators’ agenda and is discussed extensively at network security conferences and other industry events. This is partly due to the fact that security

Scroll to Top