Menu

Gain a full insight to your telecom network

TNAD identifies over 70 protocols and parses the 30 most common ones up to and including the layer 7. This provides a complete picture of activity within your telecom network, identifying security flaws and threats from your existing infrastructure, through virtualization, non-standalone 5G (NSA-5G) and all the way to a standalone 5G (SA-5G) network.

Detect hidden threats

The system automatically detects attacker attempts to penetrate the OSS network and identifies hacker presence on virtualized infrastructure based on multiple indicators, including use of hacker tools and backdoor transmission of data to attackers’ servers. So, nullifying advanced persistent threats (APT).

Maintain network availability

DoS attacks strike telecom operators harder than any other sector. Denial of service degrades network capacity, disrupts customer services, pushes subscribers to find alternative providers, and leads to costly fines. Reduce exposure to DoS attacks by discovering exploitable flaws and enabling effective response.

HOW IT WORKS

Telecom Network Attack Discovery

TNAD captures and analyzes traffic on the external telecom perimeter and in both virtualized (NFV) and hardware-based infrastructure. This allows detection of the hackers activity to deny the initial network penetration, as well proactive exposure of intruders attempts to get a foothold in the network and pursue their attack.

WHAT TNAD FINDS IN NETWORK

Identified 5G specific security threat including new risks in vectors such as Network Exposure Function (NEF)

Abuse of remote OSS/BSS access

API exploitation & abnormalities from MEC to third party API connectivity

SDN & NFV network threats

Anomalies in user plane GTP-U traffic

Exploitation of misconfiguration & existing vulnerabilities in Core/IT networks

USAGE SCENARIOS

Monitoring of policy compliance

TNAD detects misconfigurations and instances of security policy non-compliance that can pave the way for attackers. Examples include OSS and Orchestrator credentials stored in clear-text, unencrypted messages and management/control plane protocols, remote access utilities, and tools that hide network activity.

Detection of attacks

Thanks to embedded machine learning technologies, advanced analytics, unique threat detection rules, indicators of compromise, and retrospective analysis, TNAD detects attacks both at the earliest stages and after attackers may have already penetrated the infrastructure.

Investigation of attacks

With TNAD, security teams can localize an attack, trace its chain, detect vulnerabilities in infrastructure, and implement countermeasures to prevent future incidents, for instance abuse of legitimate remote access for vendors, value added services, or mobile device management. This is particularly relevant during the extended network transition to a full standalone 5G infrastructure.

Threat hunting

TNAD delivers exceptional threat hunting. MNOs can test hypotheses about their security to detect the hidden threats that slip by ordinary cybersecurity solutions. Such as the detection of silent APT threats, and complex protection of the core network and its interfaces.

GET FREE DEMO

Check your network and perimeter. Contact us to get a free trial and find hidden threats: