iBASIS, the leading provider of communications solutions for operators and digital players worldwide, today announced the integration of the cutting-edge multi-protocol signaling firewall of telecom security expert jtendo to its Managed Cloud-Based Security Portfolio, iBASIS Security iQ360.
The increase in the number of network protocols (also covering 5G), technologies, and roaming traffic creates a greater complexity requiring advanced features for testing and cross-protocol correlation to monitor, analyze, detect, and prevent security breaches. The strategic partnership combines jtendo security audit experience, deep technical knowledge of telco protocols, and cross-protocol correlation expertise with iBASIS’ unique international and managed cloud-based skills, with dedicated security centers in Americas, Europe, and Asia.
“The growing threat trend around today’s telecom networks drives the need for innovative security management solutions that can adapt quickly to new threats,” says Guillaume Klein, iBASIS Vice President, Product Management. “We are thrilled to collaborate with jtendo to achieve effective threat management and be able to leverage their unique auditing and multiprotocol expertise to raise the level of protection even further.”
“We are very proud to partner with one of the largest international signaling, voice, and data networks and complement iBASIS’ 360-degree intelligence-based solution,” adds Piotr Szymański, jtendo CEO. “Mobile operators are increasingly searching for threat management that continuously adapts to their ever-changing network landscape, offering a flexible managed solution hosted on the IPX network is an effective way to secure their signaling network as an ongoing process. We are always there to support our customers in keeping their network safe in all areas.”
The iBASIS Security iQ360 platform provides MNOs with a high level of process automation to assess vulnerability and address security risks with advanced auditing. The solution relies on in-depth visibility, monitoring, and attack detection complemented with automatic rule updates against continuously evolving threats.