intiGrow

 

Telecom

Telecom

Market View
Corporations are typically connected to two public, un-trusted networks: the Public Switched Telephone Network (PSTN); and Wide Area Networks (WANs) or the Internet. An array of vulnerabilities in internal data networks, the traditional phone environment, and other critical corporate infrastructure are accessible through an enterprise's unsecured traditional phone network. Although attacks against an enterprise's Internet connection receive the most public attention, attacks against an enterprise through the traditional voice network are common. Telecom industry has evolved significantly over the last five years and during this period there has been an increased requirement to have robust information security environment. Also, with the industry having stringent legal and regulatory information security requirement, there is an enhanced focus on the subject across telecom operators. Some of the growing concerns of Telecom organizations continue to be:

  • Comprehensive information security risk assessment covering the entire organization
  • Understanding and addressing legal & regulatory requirements
  • Focus on information security in holistic manner covering telecom network, equipments and IT systems
  • Strengthening internal organization security with changing threats and operational requirements of business
  • Third party security being part of the Information Security Framework
  • Defining an operations control framework for maintaining privacy of sensitive information
  • Continuous assessment of risks emerging from new technologies and defining controls to mitigate them

How to protect your organization?
Telecom operators are governed by the regulations laid down by regulatory bodies such as Telecom Regulatory Authority of India (TRAI), Department of Telecom (DoT), Telecom Dispute Settlement Appellate Tribunal (TDSAT), Group on Telecom & IT (GOTIT), Wireless Planning Commission (WPC) and Telecom commission which also include information security requirements . Further, the recent Unified Access Service License (UASL) amendment extends information security to the telecom networks and also to the third parties of the operators. Effective implementation measures should include an Information security governance framework that spans across the organization. While most of the telecom operators in their current operations have been able to formalize an Information security governance framework in the Information Security (IS)/IT function, it would be imperative to have this extended to the telecom networks.

intiGrow's Energy and Utilities Security Solutions and Services

  • Specialized information security groups to recognize and resolve emerging threats and challenges
  • Periodic vulnerability assessment and classification of information
  • Experts team looking at various attacks and have a continuous security improvement plan
  • Data encryption for providing content services to the customers

 

Offerings

Access Management
Data Loss Prevention
Database Security
Email Security
Federated Identity Management
Identity Management
Intrusion Detection and Prevention
Multifactor Authentication
Privileged Account Management
Secure Enterprise Mobile Management
Single Sign On
Static and Dynamic Code Analysis
Vulnerability Assessment & Scanning

Access Management

Data Loss Prevention

Database Security

Email Security

End Point Protection

Federated Identity Management

Identity Management

Intrusion Detection and Prevention

Multifactor Authentication

Privileged Account Management

Single Sign On

Static and Dynamic Code Analysis

Vulnerability Assessment & Scanning