Skip links

SigWall Solution


Multiprotocol Signaling Security platform with cross-protocol and cross-operator correlation.


Includes analytics engine for threat detection and intelligence acquisition.


Optimized for multi-layer deployment with isolation of critical information
to be available only on an agency level.

Various integration options

Various Integration options for operator networks – SigWall can be integrated in every operator environment.


Open for integration with other security systems/solutions.

Compliant with GSMA

Compliant with GSMA recommendations augmented by continuous internal research
and Security Operating Center incident management and threat hunting.



  • Diameter
  • GTP (v0/v1/v2)
  • SIP

Processing Modes

  • Active:
    Loop mode,
    Gateway mode, Transparent mode,
    Mixed mode
  • Passive:
    IDS mode with or without active queries

Processing Layer

  • Based on Erlang technology
  • Flexible rules-based engine
  • Open to build real-time detection and correlation rules using any parameter from
    all protocol layers
  • Allows cross-protocol correlation (e.g. GTP+SS7, SIP+SS7, SS7+Diameter, Diameter+SS7)
  • Allows external queries
    as a part of rules logic (internal/external DB, SS7, Diameter, Web Services)

Deployment Types

  • Operator – focused on a single operator, managed
    by the operator
  • Group-level – multi-operator deployments – manager
    on the group level as well as locally
  • Country-level – where homeland security is the highest priority Multi-operator deployment managed on country level by State Security

Support Services

  • 24x7x365 Support team ready to provide incident response.
  • Periodical and on-demand analysis of the signaling traffic
  • Open for product customizations and integration with external incident management (SIEM) systems.

Focused on State Security

Delivers State Security incident management and threat hunting.

Complete Solution

Integrated system for country-wide deployment with State Security level management.

Offensive capabilities

Innovative feature which can be used for internal security testing.


Contains counter-intelligence algorithms (honeypot, decoy features, fake answers).


Long list of references

High experience in Signaling penetration testing.

Proven quality

Dozens of successful projects on 3 continents without causing any network disruption.

Created by the best

International team of passionate experts.


Developed by experts with wide portfolio of security products and services.

Security Threats

VIP SMS and calls inception

Faking VIP communication

(fake sender identification)

Bank account takeover

Serviceunavailability for VIPs or large groups

Mobile phone infection with virus and trojans

VIP tracking

Social media / email account takeover

Massive scale fraud

Spamming with fake sender identity

Mobile Network Operators became a strategic asset in the world economy.

Security of the operator’s Network is crucial to the homeland defense.

From technical point of view signaling networks inherit a lot of vulnerabilities being a major vector of attacks.

Without an additional layer of protection the operator is exposed to attacks leading to obtaining subscriber location, interception of calls and messages, service denial, phone infection and many others.

It is a threat to security of citizens, enterprises and governments.


With developments in communication, the four dimensionsare constantly connected. Based on this constant data flow being prone to abuse, fifth dimension has emerged –
cyber warfare, permeating all of the domains

Until the early 20th Century, warfare was a three-domain act,
Involving sea, land and air. Late 20th century has moved wars into space.



Network protection

All operators should have a Network Protection Solution installed.
SigWall is a unique Multiprotocol Firewall with cross-protocol correlation

Limited trust

Operators cannot be treated as trusted parties – they are usually owned by external (often foreign) entities.

Government supervisory

The Network Protection Solution should be governed by State Security Agency.
The Agency should be a decisive entity regarding exact security policy applied.

Protection strategy

Firewall is a security solution, as well as a source of a very important intelligence data.
It is of highest importance to apply and maintain an appropriate protection strategy based on reliable tools.

State Security is managing the security and intelligence gathering for all operators.