Overview
5Gsting security software detects and protects edge devices against access layer attacks (OTA). We are the only security company focused on protection/detection of Layer 1 and 2 attacks. Our solution can be used to protect any cellular, IOT or edge nodes.
Attacks include:
Trusting Unicast and Broadcast messages Protection for the UE Capability Transfer Protection for the RRC and NAS vulnerabilities
Security protection of system information Node to Node measurement report Node to multi-node measurement reports
Network and Device detection of false base stations Server Side detection for false base station Edge Device detection for false base station
Protection against SON poisoning attempts Manipulating HO algorithms, effecting ML and AI datasets
Mitigation against the authentication relay attack Leaking Location
Protection against Man-in-the-Middle false eNb / gNB attacks
Sold by | 5Gsting |
Categories | |
Fulfillment method | Professional Services |
Pricing Information
This service is priced based on the scope of your request. Please contact seller for pricing details.
Support
5Gsting assessment service provide customers with a complete actionable report on Access Edge security vulnerabilities. Further, report goes in depth to divulge datasets exposed, prevention and detection mechanisms.
For more details, please email support@5gsting.com or visit https://www.5gsting.com