Listing Thumbnail

    5G and LTE Access Security Client (Reqd. for SaaS service)

     Info
    Sold by: 5Gsting 
    Each Radio chipset behaves differently to Fake Base Station attacks. We use this assessment to compile a configuration file that could be used in a sandbox environment or to leverage SaaS service (optional).

    Overview

    5Gsting security software detects and protects edge devices against access layer attacks (OTA). We are the only security company focused on protection/detection of Layer 1 and 2 attacks. Our solution can be used to protect any cellular, IOT or edge nodes.

    Attacks include:

    Trusting Unicast and Broadcast messages Protection for the UE Capability Transfer Protection for the RRC and NAS vulnerabilities

    Security protection of system information Node to Node measurement report Node to multi-node measurement reports

    Network and Device detection of false base stations Server Side detection for false base station Edge Device detection for false base station

    Protection against SON poisoning attempts Manipulating HO algorithms, effecting ML and AI datasets

    Mitigation against the authentication relay attack Leaking Location

    Protection against Man-in-the-Middle false eNb / gNB attacks

    Highlights

    • Complete OTA attack report Detailed Analysis on Data Exposed Prevention Mechanism Denial of Service (DOS), Bill Fraud, Location History Poisoning, Limited Network Service Data Integrity

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    5Gsting assessment service provide customers with a complete actionable report on Access Edge security vulnerabilities. Further, report goes in depth to divulge datasets exposed, prevention and detection mechanisms.

    For more details, please email support@5gsting.com  or visit

    Software associated with this service