Sign in
Your Saved List Partners Sell in AWS Marketplace Amazon Web Services Home Help


5Gsting security software detects and protects edge devices against access layer attacks (OTA). We are the only security company focused on protection/detection of Layer 1 and 2 attacks. Our solution can be used to protect any cellular, IOT or edge nodes.

Attacks include:

Trusting Unicast and Broadcast messages Protection for the UE Capability Transfer Protection for the RRC and NAS vulnerabilities

Security protection of system information Node to Node measurement report Node to multi-node measurement reports

Network and Device detection of false base stations Server Side detection for false base station Edge Device detection for false base station

Protection against SON poisoning attempts Manipulating HO algorithms, effecting ML and AI datasets

Mitigation against the authentication relay attack Leaking Location

Protection against Man-in-the-Middle false eNb / gNB attacks

Sold by 5Gsting
Fulfillment method Professional Services

Pricing Information

Dimension Cost
Standard Excercise Contact seller for rate


5Gsting assessment service provide customers with a complete actionable report on Access Edge security vulnerabilities. Further, report goes in depth to divulge datasets exposed, prevention and detection mechanisms.

For more details, please email or visit