Check out all of our upcoming events


Latest cybersecurity news, insights and commentary by Telesoft engineers and specialists

What to Expect from MWC 2019, from Folding Smartphones to Cyber Security

Written by Sarah Chandley on Wednesday, 20 February 2019. Posted in Cyber, Events

Less than a week to go until MWC19 Barcelona, one of the largest mobile industry events in the world, bringing together the latest innovations and cutting-edge technology from more than 2,400 organisations. The majority of the buzz at the show will be centred on the latest smartphones and innovations from the giants of the industry like Samsung, LG and ZTE. I am particularly excited to see foldable smartphones, which are likely to dominate the press cycle and social media feeds.

Photo Credit:

In addition to the headline grabbing smartphone tech, MWC also offers a huge platform from which vendors like Telesoft can demonstrate their new technology, servicing every facet of the telecommunications industry. In today’s world, communications and those organisations who provide always on, available anywhere services like Internet Service Providers (ISP’s), Network Service Providers (NSP’s), Content Delivery Providers (CDN’s) and Carriers are categorised as part of our Critical National Infrastructure (CNI). Which means they are deemed by governments as essential to the smooth running of a society and its economy.

Cyber Security and the protection of CNI is at the forefront of every communication service providers mind, and a quick scan of the exhibitors list and of recent investments and acquisitions such as AT&T’s purchase of security vendor Alien Vault and the release of their cyber threat intelligence platform only reinforces this point. Another factor to consider is the imminent arrival of 5G and the innovations and challenges that will bring for CNI providers and networking giants such as Huawei and Ericsson, both showcasing at MWC, no doubt to show how they plan to dominate this space. The continued evolution of IoT, OT and Smart Everything and you have a cyber security firestorm and some very attractive targets for criminals.

Telesoft will be in Hall 7, on stand 7C64, talking about how we work with global communications providers, solving their unique cyber security challenges and protecting their large scale digital assets.  Any network is vulnerable if not properly secured, but as already discussed, for network and mobile operators, ISP’s, NSP’s, CDN’s and carriers who possess millions of users that generate huge amounts of sensitive data, the stakes are much higher.

If you have a network running at multiples of 10Gbps or multi-100Gbps, M’s of endpoints or terabytes of valuable data moving between sites  and need help in understanding the volume of threats and potential impact, book a meeting or visit Telesoft in Hall 7, 7C64. The team will be showing how Telesoft’s suite of network security monitoring tools like FlowProbe (NetFlow Probe), FlowStash, TDAC and CERNE work together to leverage unsampled flow monitoring to provide total network visibility, multi-layer threat detection and mitigation, and forensics for networks carrying multi-terabytes worth of data...This email address is being protected from spambots. You need JavaScript enabled to view it.

About the Author

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.