TNAD captures and analyzes traffic on the external telecom perimeter and in both virtualized (NFV) and hardware-based infrastructure. This allows detection of the hackers activity to deny the initial network penetration, as well proactive exposure of intruders attempts to get a foothold in the network and pursue their attack.
Gain a full insight to your telecom network
TNAD identifies over 70 protocols and parses the 30 most common ones up to and including the layer 7. This provides a complete picture of activity within your telecom network, identifying security flaws and threats from your existing infrastructure, through virtualization, non-standalone 5G (NSA-5G) and all the way to a standalone 5G (SA-5G) network.
Detect hidden threats
The system automatically detects attacker attempts to penetrate the OSS network and identifies hacker presence on virtualized infrastructure based on multiple indicators, including use of hacker tools and backdoor transmission of data to attackers’ servers. So, nullifying advanced persistent threats (APT).
Maintain network availability
DoS attacks strike telecom operators harder than any other sector. Denial of service degrades network capacity, disrupts customer services, pushes subscribers to find alternative providers, and leads to costly fines. Reduce exposure to DoS attacks by discovering exploitable flaws and enabling effective response.
HOW IT WORKS
WHAT TNAD FINDS IN NETWORK
Identified 5G specific security threat including new risks in vectors such as Network Exposure Function (NEF)
Abuse of remote OSS/BSS access
API exploitation & abnormalities from MEC to third party API connectivity
SDN & NFV network threats
Anomalies in user plane GTP-U traffic
Exploitation of misconfiguration & existing vulnerabilities in Core/IT networks
Monitoring of policy compliance
TNAD detects misconfigurations and instances of security policy non-compliance that can pave the way for attackers. Examples include OSS and Orchestrator credentials stored in clear-text, unencrypted messages and management/control plane protocols, remote access utilities, and tools that hide network activity.
Detection of attacks
Thanks to embedded machine learning technologies, advanced analytics, unique threat detection rules, indicators of compromise, and retrospective analysis, TNAD detects attacks both at the earliest stages and after attackers may have already penetrated the infrastructure.
Investigation of attacks
With TNAD, security teams can localize an attack, trace its chain, detect vulnerabilities in infrastructure, and implement countermeasures to prevent future incidents, for instance abuse of legitimate remote access for vendors, value added services, or mobile device management. This is particularly relevant during the extended network transition to a full standalone 5G infrastructure.
TNAD delivers exceptional threat hunting. MNOs can test hypotheses about their security to detect the hidden threats that slip by ordinary cybersecurity solutions. Such as the detection of silent APT threats, and complex protection of the core network and its interfaces.
GET FREE DEMO
Check your network and perimeter. Contact us to get a free trial and find hidden threats: