Security Solutions
Though IP-based networks have been tremendously successful, constant vigilance is required to combat denial of service, hacker attacks, viruses, worms and fraud. Now that voice and data services are being delivered more and more across IP-based communications networks, systems need to be protected against new threats. As a result, security is gaining greater
attention and a premium is now placed on risk management. And for good reason – experience has shown that loopholes in security policies can cost a company its revenue and tarnish its image. Nokia Siemens Networks has earned a world-class reputation as an expert in voice and data network convergence. We also specialize in providing security solutions for these networks. A study conducted by the CERT Coordination Center Pittsburgh has shown that effective security management can preclude more than 95% of potential security hazards.
We can help you attain this level of security. – Take advantage of our extensive experience from over 70 security projects globally, comprehensive knowledge on billing/OSS and mediation domains and our strong local presence.
Security is becoming
one of the major business concerns for
telecommunications around the globe. In the past, security in
voice communication has not been a top priority.
By contrast
, protecting data in IP-based networks such as
the Internet has been a concern since their introduction.
Charting a safe path
to the future
How much money would
you loose if your network
was hacked, down for
three hours and your
customers could not make
calls? What would happen
to your image?
02/08
Nokia Siemens Networks is a leading global enabler of
communications services. The company provides a complete,
well-balanced product portfolio of mobile and fixed network
infrastructure solutions and addresses the growing demand for
services with 20,000 service professionals worldwide. Nokia
Siemens Networks has operations in some 150 countries. We are
headquartered in Espoo, Finland. www.nokiasiemensnetworks.com
Most network component vendors offer proprietary security technologies and products. Unfortunately, these point-product solutions address only individual aspects of security, don’t offer comprehensive protection and are rarely
cost-efficient. For effective security management,
all aspects of the different organizational and network layers must be considered and synchronized.
Nokia Siemens Networks Security Solutions are
geared specifically to the needs of wireline and
wireless network operators. Customers may opt for individual service packages, commission us
to provide a specific turnkey security solution
or, alternatively, we will be delighted to propose a solution tailored to your network, point out potential savings, and calculate your return on investment.
Our Security Solutions are geared
specifically to the needs of wireline
and wireless network operators. The
choice is all yours – you may opt for
our security services commission us
to provide a turnkey solution or benefit
from our end-to-end solutions for the
entire life-cycle.
Security Solutions
Consulting Architectureand Design Developmentand Testing Implementation Life-cycleSupport
Security Services Turnkey Security Solutions Fraud Management Solution, Revenue Assurance Processes Network People
Information Security Management System, Policy Development Business Continuity Management, Disaster Recovery Planning Risk Analysis
Technical Audit Vulnerability Scanning
Security Design
Integration Managed SecurityCare Security Training and Certification
Security Solutions
Enhanced Security for FMC NGN, IP-Address, GRX-Roaxing ... Security Consolidation and unified Threat Management Bundles of best-of-breed products and services
Diagnostics and
Professional Service Systems IntegrationRoll-out Managed ServicesCare
Our security portfolio covers the complete lifecycle from consulting on both process and technical levels to the 24 x 7 operation and maintenance of your security solutions.
04/08
A comprehensive range
establish, implement, operate, monitor, review, maintain and improve information security
Disaster Recovery Planning: defining and
documenting procedures and plans required to minimize the impact of potentially
disastrous events
Business Continuity Management (BCM), managing risks and ensuring that organizations can continue operating to a minimum, pre-determined level at all times. It comprises risk reduction measures, lowering the impact prior to an incident; and resumption planning, which ensures an adequate response and recovery after an event
Developing security policies in accordance with corporate governance
Security services at network level
On the technical network level, each operator has
its own specific security solution requirements.
To identify them, an analysis of security threats
to the overall system is the first step to build up
a customized and optimized security solution. These services include Risk Analysis to ISO/ IEC TR 13335 standard, Security Audit to the provisions set by ISACA and NIST Publication 800.42 and Vulnerability Scanning.
Once your solution is conceptualized, our security design delivers a detailed plan of necessary safeguards, covering performance, capacity and high availability, in line with your design principles and an agreed security roadmap. We scale protective and precautionary measures
according to your network’s expected traffic load,
and chart its migration course according to your new security concept. The focus of these efforts is on ensuring maximum availability of your services and rapid recovery from security incidents. •
•
•
identifies security problems and frees you from
the burden of dedicating your resources whilst ensuring your network has the round-the-clock security it needs to make your company prosper.
Security training and certification
Security training and certifications, both at
process and product level, support your in-house resources and complement the service offer. Our training programs focus on security management as well as the operation and maintenance of
specific security systems. Service engineers
and project managers can develop their security management know-how. We offer training sessions tailored to the individual requirements of your network and workforce. You can, for
example, opt to obtain security certifications, improve qualification levels or prepare your
security teams to master assigned tasks with customized training programs.
Security Solutions
Hardware and software care for security systems
The first escalation stage (Level 1) offers helpdesk
support with staff trained to respond immediately to your inquiries and provide fast answers. The
next stage (Level 2) solves security problems
that your personnel cannot handle on their own, analyzing alarm reports and eliminating technical
faults. Level 3 deals with issues related to OEM
products and third-party manufacturers. We troubleshoot these problems, contacting the given vendor when necessary.
We keep your security solution up-to-date by providing the latest maintenance patches and upgrades. And we keep your workforce up-to-date too, by providing the training necessary for your network’s security.
Turnkey Security Solutions
In addition to our security services, we offer Turnkey Security Solutions to cover
operator-specific security problems: a bundle of
pre-integrated, secure network elements, both hardware and software, best-of-breed products from world-class, trusted partners and a
pre-defined set of services at a fixed price.
Examples of Turn- key Solutions are: Enhanced Mobile Core Security Enhanced Fixed-Mobile Convergence (FMC) Security
Enhanced Next Generation Network (NGN) Security
Security consolidation and Unified Threat
Management (UTM) Solutions
Plus, there’s our modular and flexible service
portfolio and complete turnkey solutions for Revenue Assurance and Fraud Management. Fraud management Solution and Revenue Assurance
These solutions address concern of revenue leakage (on average 5-15% of an operator’s annual revenue) due to several reasons e.g. fraud, mismatch between switch, bill and order entry
data, configuration errors, etc. in the operational
environment. Our solutions consist of a framework of consultancy and integration services together with support from comprehensive and fully automated analysis tools to detect, analyze and recover the revenue leakage.
• • • •
We keep your security solution up to
date by providing the latest maintenance
patches and upgrades. And we keep
your workforce up-to-date by providing
all information related to your network’s
security.
Security investment Potential loss Economically balanced security level high low none maximum Security level
Nokia Siemens Networks
helps you define and
implement the security solution that perfectly matches your unique situation and strikes the best balance between diminished risk and cost-effective investment.
Security challenges and threats in networks: Denial of service eg GGSN downtime
Theft of services eg loading prepaid cards without charge
Hacking eg overbilling attack Industrial espionage
‡ Image damage, loss of customers and revenue, unnecessary high OPEX
Operator benefits
Preventing downtime caused by security breaches guards against revenue loss
Satisfied customers decreases churn and
increases revenues
Tight security prevents malicious attacks, deliberate malfunctions, data manipulation and resource piracy
One-stop shopping cuts costs by using one source for all security services, from assessment through to maintenance and for all security products
Freedom of choice: our offering includes
flexible and cost-effective security management
and outsourcing models • • • • • • • • •
Copyright 2007 Nokia Siemens Networks. All rights reserved.
Other company and product names mentioned herein may be trademarks or trade names of their respective owners. Product code 11493. Nokia Siemens Networks Corporation P.O. Box 1 FI-02022 NOKIA SIEMENS NETWORKS Finland www.nokiasiemensnetworks.com Visiting address: Karaportti 3, ESPOO, Finland Switchboard +358 71 400 4000 (Finland) +49 89 5159 01 (Germany)