TelecommunicationsProtecting Your Telephone Calling Records
According to the FCC, major security breaches between February 2005 and April 2007 resulted in the compromise of over 54 million Americans' Customer Proprietary Network Information (CPNI).
CPNI is highly sensitive, private information that includes consumer call detail information, billing information, and other personally identifiable information (PII). CPNI is often illegally obtained and sold for a profit.
These breaches represent a growing and concerning trend for telecommunications carriers.
The result: The FCC strengthened its regulations pertaining to the access of targeted data - in particular, CPNI. Section 222 of the Communications Act, requires telecommunications carriers to take specific steps to ensure that CPNI is discovered and protected from unauthorized disclosure. In the event that this information is released or accessed by unauthorized parties, organizations must publicly disclose the loss of this data. While the financial repercussion of announcing any sort of data breach can be devastating, organizations may also face legal penalties as well. As a partner to the premier provider of security solutions, we have the necessary products and services telecommunications carriers need to be CPNI compliant and ultimately protect their business and their customers.
DLP Suite - enables telecommunications carriers to discover CPNI across the infrastructure and prevent CPNI from leaking out of the organization.
DLP Risk Advisor Service - leverages the DLP Suite for automated discovery of unprotected sensitive information, providing a snapshot of potential exposure.
Pre-Assessment and Gap Analysis Service - identifies gaps in the telecommunications carrier's compliance infrastructure.
Adaptive Authentication - enables telecommunications carriers to protect online CPNI with additional mechanisms such as a risk assessment, invisible device profiling, and policy management that go beyond simple usernames and passwords.
Identity Verification - provides a means to ensure that customer requesting CPNI via the phone or internet, are who they claim to be.
Key Manager - enables organizations to deliver application-level encryption so that CPNI may be protected at the point of capture.
SecurID and Authentication Manger - ensure the protection of CPNI by requiring strong, two factor authentication prior to enabling access to protected systems.
enVision - collects log files throughout the enterprise, understands and correlates event associated with CPNI, helps telecommunications carriers to prove compliance by maintaining records and reports.