Monitoring of policy compliance
TNAD detects misconfigurations and instances of security policy non-compliance that can pave the way for attackers. Examples include OSS and Orchestrator credentials stored in clear-text, unencrypted messages and management/control plane protocols, remote access utilities, and tools that hide network activity.
Detection of attacks
Thanks to embedded machine learning technologies, advanced analytics, unique threat detection rules, indicators of compromise, and retrospective analysis, TNAD detects attacks both at the earliest stages and after attackers may have already penetrated the infrastructure.
Investigation of attacks
With TNAD, security teams can localize an attack, trace its chain, detect vulnerabilities in infrastructure, and implement countermeasures to prevent future incidents, for instance abuse of legitimate remote access for vendors, value added services, or mobile device management. This is particularly relevant during the extended network transition to a full standalone 5G infrastructure.
Threat hunting
TNAD delivers exceptional threat hunting. MNOs can test hypotheses about their security to detect the hidden threats that slip by ordinary cybersecurity solutions. Such as the detection of silent APT threats, and complex protection of the core network and its interfaces.