Author: Lee-Anne van Harte
A few of the most important factors of our organization is based on hard work, dedication, and trust. All of our stakeholders must rely on the fact that there interests are covered by us in a professional and secured matter.
Author: Richard Coppens
Over the previous generations of mobile networks, we have seen a steady increase in bandwidth, and a move from traditional circuit-switched technology to an all-IP network. The 5G network takes this massive step further in various aspects. 5G is much, much more than the common perspective of mobile “ users” “just like 4G, but faster”!
Author: Richard Coppens
Everybody working in Telecom and IT knows that developments are going faster and faster. We have only just gotten used to 4G and then the auction for 5G is on the doorstep and the technology for 6G with speeds that literally make us dizzy is already partly conceived. We live in a fantastic era where new applications and the convenience of these applications, as a result of the removal of the “bandwidth barrier”, is or will be accessible to everyone.
Author: Marcel Hylkema
To fulfill legal obligations, Telecommunication network operators are obliged to handle legal warrants for Lawful Intercepts and Lawful Disclosures. With increasing numbers of warrants and the use of electronic handover interfaces, network operators may come in the situation where they feel that they are losing control over the process.
Author: John Smit
Lawful Interception is a powerful tool for Police and Intelligence Services to fight crime and terrorism. Obviously, the availability of lawful interception is of paramount importance and even a short downtime of this service could have disastrous consequences for ongoing investigations.
Author: Max Posthuma de Boer
Mobile telephony and data transfer are indispensable in society, not just residents, but entire industries nowadays depend on the correct, thus unperturbed, functioning of telecom networks. Failure of these networks due to calamities or targeted cyber-attacks can have major social disruption and economic consequences and harms the confidence of citizens, businesses, and governments in the vital (cyber) infrastructure.
Author: Gerko Koppelman
Lawful Interception (LI) architectures deployed in telecommunication networks consist of many complex building blocks which are connected and integrated together. If one of these building blocks fails for whatever reason, potential important and often crucial intercepted data can be lost. The result: insufficient proof in court and more important non-compliance with local regulation.
Author: René Luers
Group 2000 is a company with years of experience in Network Management Solutions. Group 2000 needs to update and maintain their Network Management product suite constantly in order to keep up with the technology innovations and the security related items. Next to the impact on our existing products, these market movements also hold the possibility for new products.