EthicalHat provides a range of telecom and network security assessment solutions to detect and address weaknesses in your mobile network infrastructure, data flow, physical environment, third-party vendor security and standards compliance.
Our Assessment Includes:
Gateway Security Audits
As part of our gateway security audit, we review your URL filtering, data leak prevention, and malware code detection tools and processes and make sure the web gateway you are using fulfills all security compliance requirements relevant to your business.
GSM Network Security Review
GSM network security usually involves checking the client’s mobile network for data and voice interception and eavesdropping attacks and making sure there is no unauthorized usage of the service. As part of our security review, we check your GSM security solution for weaknesses and configuration errors with a particular focus on access control and authentication, encryption and location confidentiality.
LTE Architecture Audit
The switch to LTE in mobile wireless technology has while taking care of some security concerns, also introduced new vulnerabilities in mobile networks. The focus on data and 4G means a flatter network architecture which increases the number of security vulnerabilities that mobile operators and users have to deal with. Our LTE architecture audit focuses on the following areas (1) confidentiality protection for user traffic, (2) defenses against jamming attacks, (3) vulnerabilities in the OAM network, and (4) a security analysis of IMS.
Internet Penetration Testing
We also conduct internet penetration testing with the aid of a variety of pen-testing tools and web application firewalls (WAFs). Our tests can be tailored to your IT environment and specific needs, and include blind tests, double-blind tests, and targeted tests.
We also conduct Signalling System 7 (SS7) security assessments to check if the defenses you have in place adequately address threats such as subscriber information disclosure, network information disclosure, fraud and denial of service (DoS) attacks.