Are You Sure Your Mobile Network is Secure?

NOTE: This is Part 2 of a 2 Part series covering the vulnerabilities in today’s mobile networks and how service providers can address them.

In the first part of this blog, I discussed the pervasiveness of mobile devices and some of the security vulnerabilities facing mobile service providers. In Part 2, I will describe in more detail the security challenges that many mobile network operators face and offer practical solutions regarding how they can address them.

Are You Sure Your Mobile Network is Secure?

NOTE: This is Part 1 of a 2 Part series covering the vulnerabilities in today’s mobile networks.

GSMA Intelligence estimates there are 8.6 billion mobile connections, including licensed cellular IoT devices in the world today. Moreover, there are approximately 5 billion unique mobile subscribers, or over two-thirds of the world’s population.  All of this equates to 1.7 devices per unique subscriber and this figure is growing every day. Wow!

Scaling Secure Communications When They Matter Most

This is a story we at Ribbon are proud to share.

With our partner Verizon, we’ve completed one of the largest VoIP deployments in the history of the US Department of Defense (DOD)’s , leveraging Ribbon’s Joint Interoperability Test Command (JITC)-certified Application Server.

With over 50,000 end-users connected and supported, the DOD team can communicate in a secure, mission-critical manner.

In an Increasingly Interconnected World a Rosetta Stone for Messaging Makes all the Difference

As communications networks evolve, interconnects tend to grow in numbers and complexity. Carriers and enterprises are converting core networks to IP, and are using IP to con­nect with peering entities. For the network core to deal with the emerging universe of applications, networks and devices, those elements must first be normalized at the edge.