Menu
Third-year-in-a-row signalling security firewall Tier-1 vendor: Positive Technologies!

Third-year-in-a-row signalling security firewall Tier-1 vendor: Positive Technologies!
Premium

April 29, 2021
For the third consecutive year, Positive Technologies has been ranked a Tier 1 signaling firewall provider in the annual ROCCO Signalling Firewall Vendor Performance Report for 2021.
5G SA Core Security Research

5G SA Core Security Research
Premium

December 16, 2020
Successfully deploying 5G networks around the globe and delivering the functionality customers expect will create security challenges for mobile network operators.
Migrating mobile networks to 5G: a smooth and secure approach

Migrating mobile networks to 5G: a smooth and secure approach

September 23, 2020
Download our new whitepaper "Migrating mobile networks to 5G: a smooth and secure approach" to learn about security flaws lurking in 5G NSA configurations during the transition period.
Threat vector: GTP. Vulnerabilities in LTE and 5G networks 2020

Threat vector: GTP. Vulnerabilities in LTE and 5G networks 2020
Premium

June 10, 2020
With new 5G networks, mobile operators face numerous challenges. One of them is the GTP protocol, used alongside SS7 and Diameter on core networks to transmit user and control traffic. Stay ahead of the curve with knowledge and preparation. Download the «Threat vector: GTP. Vulnerabilities in LTE and 5G networks 2020» report now!
Security assessment of Diameter networks

Security assessment of Diameter networks

March 26, 2020
Research into diameter reveals the underpinning protocol’s biggest threat to 4G users is denial of service.
Telecom Attack Discovery is the most well-rated signaling firewall 2020

Telecom Attack Discovery is the most well-rated signaling firewall 2020

March 24, 2020
For the second time in a row, Positive Technologies has been ranked the number 1 signaling firewall provider in the bi-annual ROCCO Signalling Firewall Vendor Performance Report.
SS7 network security analysis report

SS7 network security analysis report

February 18, 2020
Whilst the industry is distracted by 5G, Positive Technologies experts lift the lid on the vulnerabilities and threats which plague the 2G/3G networks. The SS7 protocol which is actively used in these previous generation networks can potentially open the floodgates for hackers to exploit - from tracking user location to listening in on calls. Positive Technologies’ SS7 network security analysis report is a deep-dive analysis of the SS7 network threats and recommendations of how telecom operators can protect themselves from this issue which will be a part of the telecoms ecosystems in years to come. The report monitored these vulnerabilities throughout 2019. Companies can use this insight to help them navigate the challenges throughout 2020.
5G security issues

5G security issues

July 11, 2019
New-generation 5G networks will be based on existing technologies such as SS7 and Diameter—both of which contain plenty of vulnerabilities. The flexibility of 5G networks means a higher likelihood of configuration mistakes. Making things even more urgent is the growing number of vulnerable IoT devices. Achieving durable security will require concerted efforts by telecom vendors and operators.
5G signaling networks: blast from the past

5G signaling networks: blast from the past

December 18, 2018
Each generation of mobile networks must interoperate with previous ones. As a result, newer generations inherit the weaknesses of their predecessors. In the first of a series of four reports on telecom security, we look to tackle the misconception that 5G will not be affected by existing security vulnerabilities in mobile networks.
Diameter vulnerabilities in the spotlight

Diameter vulnerabilities in the spotlight

June 13, 2018
Despite all the protection mechanisms in the Diameter protocol, networks and subscribers are still at risk. Attackers can exploit numerous SS7 vulnerabilities to successfully track subscriber location, cause denial of service, disconnect thousands of users, or downgrade connections to 3G. Here is our list of recommendations to mitigate security risks both for end users and operators.