Page 9 - Telecom Reseller FebMar 2016
P. 9




February/March 2016
Telecom Reseller 9 

SAUNDERS
continued from page 3

Unfortunately, the past few years have also A:  e height of most telecom operators’ to gain access to a SS7 network through a remote, solution requires global threat intelligence and 
brought attention to the new ways hackers attention is on vulnerabilities associated with
unauthorized host. Updates to allow SS7 to run advanced analytics versus blocking suspicious 
intercept personal information through these SS7 and signaling. SS7 is assumed to be a trusted over IP, however, provided some pros and cons. tra c on the network. As there are multiple 
mobile devices. It is therefore important to be network as it is widely used by cellular companies Pro: greater bandwidth and reliability. Con: new entry points in a Signaling network, there are 
wary of the vulnerabilities that hackers might to enable mobile subscribers to communicate points of vulnerability for private information to also several layers of protection that can be 
take advantage of that would jeopardize mobile with others. With the ongoing accelerated become exposed beyond the original closed circle incorporated in order to prevent attacks. Such 
operators and customers alike.
evolution of advanced technology such as the of mobile operators.
layers include:
To delve into these vulnerabilities, here Internet of  ings (IoT) and mobile volume, Telecom engineers began warning of possible ● Filter and control incoming MAP/CAP 
are some of the highest priority industry hackers have found ways to take advantage of this risks because the IP transport layer was not request received
considerations and security concerns for seemingly “safe” technology and are able to gain designed to detect acceptable versus unacceptable ● Active validation of the originating entity 
operators heading into the New Year:
unauthorized access to private information.
tra c and in 2008 this vulnerability was openly ● VLR/MSC update validation
Such access has been viewed as a massive discussed for the  rst time. During the 2008 ● Detection of the unusual MSU sequences 
Q: What is the greatest concern for telecom security  aw by telecom operators because
Chaos Computer Club Conference, German ● O ine data analytics
operators in 2016?
it gives hackers access to mobile subscriber’s Researchers demonstrated how the location of a 
identities, locations and also provides hackers mobile phone could be determined in an attempt  ese layers are more advanced than a regular 
A:  e greatest concern for many industries with the ability to intercept texts and block to bring the issue to light. SS7 vulnerabilities IP  rewall and are preferred in order to screen 
and certainly top of mind for telecom operators calls. Most concerning is the fact that there are a again entered the spotlight in 2013, and continue tra c.  ey allow telecom operators to recognize 
is mobile security. Almost every week a new number of entry points in a signaling network, to be an issue, but solutions are now being put threats easily and prevent attacks.
company announces some sort of data breach. which can be exposed at various levels. Telecom forth in order to protect personal information Protecting the network and our mobile devices 
Many of us keep personal information on our operators are now actively looking for these from entering the wrong hands.
will only continue to grow in importance as each 
phones, so it’s important that our mobile devices threats to protect their networks in order to new mobile app makes it easier to keep the world 
do not become susceptible to these hacks. prevent attacks.
Q: What can be done to protect against SS7 at our  ngertips.
Telecom operators are most concerned not only fraud?
Protecting bank numbers and emails may
about invasions of privacy, but also revenue loss Q: Are SS7 vulnerabilities a new concern?
be top of mind, but hackers have found a way
and general dissatisfaction from customers, if A:  ere are a few ways providers can protect to be even more intrusive by  nding real-time 
networks are hacked.
A: No, it’s not a new concern. SS7 originally the network against fraud. One of the most information on subscriber location and status. It’s 
dates back to the 1970s and started as simply a important strategies to consider when protecting encouraging to see operators utilizing these layer 
Q: For telecom operators, what are the network speci c to mobile operators. It required customers from hacks is to provide a solution protections to keep hackers at bay. ■
biggest mobile security laws to be aware of?
specialized equipment to even connect with the that is easily deployable and overlays onto the 
closed circle of users, making it nearly impossible
existing network architecture.  is type of
More at www.xura.com
Get the WebRTC Plugin 




for IE and Safari






















Now IE and Safari users can get on board the WebRTC Revolution. Temasys offers you a plugin that 

enables WebRTC on two of the world’s most widely distributed browsers, until now not WebRTC supported.


Visit us today and let’s get started.

Temasys is leading the innovation in real 
time communications with a full stack 

solution based on the new standard for 
video, audio, and data interactivity,
Web Real Time Communications (WebRTC).
https://www.temasys.com.sg/solution/webrtc-plugin



introducing
Let Softel take your enterprise to Skype

Soia

Microsoft Skype for Business integration with Active Directory, Uniied Communication, 
Ofice 365, UCMA Application Development, Legacy Voice Systems, and Contact Center
A kiosk reception 

solution exclusively 
from Softel





   7   8   9   10   11