SECURING YOUR NETWORK
FROM EDGE TO CORE

In the 21st century, the mobile network operator’s role is changing and expanding. In the security domain, you need to be able to detect and defend against advanced threats targeting your network’s integrity. You are expected to stop fraud and cyber attacks in their tracks before they will have an impact on your network’s reliability and reputation. Your subscribers expect you to provide end-to-end communications security that needs to be easy to use while offering the highest grade of security. Privacy issues are at the center of the Internet of Things, and in the IoT debate regarding handling of data there will be winners and losers. What kind of network security you can guarantee to your industrial customers who are taking their service and manufacturing processes mobile is a critical point for these clients.

GSMK is there to assist you in handling the mobile security, privacy and safety issues of the 21st century: The GSMK Oversight® and GSMK Overwatch® network security systems allow mobile network operators to defend themselves against illegal interception, user tracking, manipulation and fraud on the network level, covering the entire signal chain from edge to core. The GSMK CryptoPhone® Modular system offers you the ability to offer end-to-end mobile communications security and mobile device protection as an operator-provided service, providing a unique differentiation opportunity in response to current developments.

SIGNALING PROTECTION

Recently publicized security vulnerabilities in the Signaling System 7 (“SS7”) and Diameter communications protocols that form the foundation of most inter-operator traffic exchange compromise the integrity of your mobile network, subject your company to multiple variants of billing fraud, and expose your customers’ privacy. The scope and impact of these vulnerabilities demand immediate attention to protect your network and prevent loss of revenue and the integrity of your service. Having researched the security of SS7 telephony signaling protocols since 2008, GSMK is uniquely positioned to assist you in responding to these vulnerabilities threatening your core network and compromising the security and integrity of inter-operator signaling.

Find out how GSMK can assist you in identifying and mitigating SS7 and Diameter related vulnerabilities in your network, and protecting your network against these attacks:

SERVICE > SS7 & DIAMETER VULNERABILITY TESTING AND CONSULTING

PRODUCT > GSMK OVERSIGHT® SS7 INTRUSION DETECTION SYSTEM AND FIREWALL

 

AIR INTERFACE SECURITY

GSMK OVERWATCH®: IMSI CATCHER DETECTION

Rogue base stations, including so-called “IMSI Catchers”, have become a common threat. Their increasing deployment by state and non-state actors thanks to falling costs associated with the massive proliferation of the underlying technology poses significant concerns about the security of the air interface. Attackers’ goals typically include registration, interception, and manipulation of mobile devices ranging from executives’ smartphones to industrial automation systems.

Mobile underground offerings include premium service numbers, SMS spamming services and devices, all used for nefarious purposes including but not limited to billing and online payment fraud. Multi-slot GSM modems capable of sending tens of thousands of text messages per hour are common tools deployed by criminals in many countries. These criminals have quickly adapted to technological developments, current trends, and changing user behavior. As your subscribers’ trusted mobile network operator, you are expected to protect your subscribers’ mobile devices as well as the information stored on them.

Read more about how GSMK’s unique system for distributed detection, localization, and neutralization of malicious mobile base stations allows you to find and combat threats to your network and your subscribers’ mobile devices before they can result in fraud, industrial espionage, and abuse:

PRODUCT > GSMK OVERWATCH®: REGAIN SOVEREIGNTY OVER YOUR AIRSPACE

 

MOBILE SECURITY AS A SERVICE

The risk of telephone calls and text messages being intercepted is higher than ever. Your subscribers are expecting you to provide a solution for their high-value calls and messages that takes into account that the true value of an important telephone call far exceeds the arithmetics of per-minute pricing. GSMK CryptoPhone® Modular offers a solution for this problem: An extension of the existing telecoms infrastructure by secure, tap-proof components that are easy to roll out and fully adaptable to your business processes.

Packaged as a premium subscription service, your customers benefit from trustworthy end-to-end voice and message encryption in an easy-to-use package supplied by you as the service provider. As the service provider, you can add value for your most valuable corporate customers with a custom-branded software solution available for all major smartphone platforms and operating systems.

GSMK CryptoPhone® Modular is a robust and highly scalable solution designed for fast roll-outs across large corporate fleets of mobile devices. With a solid track record earned in deployments by leading multi-national mobile network operators, it combines field-proven technology in use in over 50 countries worldwide with a carrier-grade IP server infrastructure based on Erlang. Highly scalable provisioning and deployment systems allow fast, easy roll-outs across OS boundaries. Contact us to discuss how GSMK CryptoPhone® Modular can help you meet your subscribers’ secure communication needs:

 PRODUCT > GSMK CRYPTOPHONE® MODULAR