Identity Protection for Telecoms

With the development of technology, the threat landscape of the telecom industry has also changed. This has caused a surge in cyber-attacks specifically targeting the industry in recent years.

Ransomware is one of telecom operators’ greatest concerns. As shown by the recent number of attacks on this sector, this is a concern that affects the entire industry. Telecom’s most serious concern is the outage of their network servers and services. When it comes to telecom companies, their security implications can either affect a particular company, its third-party providers, or its subscribers.
 

Challenge 1

 
Authentication to Legacy Servers Doesn’t Support MFA

Legacy servers’ Active Directory authentications with NTLM and Kerberos do not support MFA. This leaves legacy servers exposed to malicious access with compromised credentials.

Challenge 2

 
Visibility into Service Accounts

Despite the critical role service accounts play in multiple processes, programs, and applications, they suffer from extremely low visibility, exposing them to compromise and lateral movement.

Challenge 3

 
M&A Creates Inconsistency in Protection

Mergers and acquisitions involve connecting environments that differ in security standards and practices, downgrading the overall security posture of the connected environment.

 

How Silverfort helps telecommunications companies overcome these challenges

Secure Authentication to Legacy Servers

Silverfort’s integration with AD enables it to forward all user access requests to Silverfort including over NTLM and Kerberos, enabling it to extend MFA to protect access to legacy servers.

Full Visibility and Protection of Service Accounts

Silverfort automatically identifies and protects all service accounts within the environment and secures them with pre-made policies, tailored to each account’s behavior.

Consistent Protection Across Merged Environments

Silverfort’s integration with all the identity providers across the original and merged environments enables it to easily enforce uniform identity protection policies across all environments.

Identity-based attacks are really important to us. Silverfort’s end-to-end risk-based authentication enables us to respond efficiently and in a timely manner.

Rusdi Rachim
Play video

Protect your telecommunications organization today