Trusted by telecom operators and industry leaders to secure next-generation infrastructure.

20+

Networks Audited

icon

50%

Faster Detection

icon

40+

Years of Experience

icon

Prevent data breaches and reputational damage that can cost you up to $350M

Simulate real-world attacks on your CI/CD pipelines, orchestration layers, & APIs to expose hidden vulnerabilities.

Uncover hidden vulnerabilities in your telecom infrastructure

Trusted expertise with cutting-edge experience

iconcircle

See how we help our clients succeed

Explore real use cases showing how Ethon Shield secures networks and ensures compliance with global industry standards

Strengthening wireless network security

We uncovered weak Wi-Fi encryption and poor authentication practices, reducing the attack surface of the client’s OT infrastructure by 60%.

Fortifying the IT and OT infrastructure

We discovered unencrypted VoIP traffic exposing sensitive conversations, enabling the client to secure communications and protect business continuity from potential eavesdropping and disruptions.

Shielding operations: Securing a Tier-One Mobile Network’s OSS Infrastructure Against Systemic Threats

We uncovered weak access controls- specially in legacy systems -, significantly reducing the client's attack surface.

How we developed a 5G security blueprint

We provided a customized 5G and Kubernetes security plan that protected our client's NFV/CaaS infrastructure end-to-end, from containers to virtualization.

How we secured a 2G, 3G, 4G and 5G RAN network

In a Tier-1 RAN audit, we exposed weak authentication and outdated encryption across multiple vendors, eliminating key vulnerabilities across legacy and modern generations.

How we secured a 5G CORE network

In a recent audit of a leading European operator, we uncovered multiple vulnerabilities that provided a great insight into their IDS/IPS implementation, highlighting the need for immediate, actionable improvements.

Our extensive experience in security audits, pentesting, and ethical hacking for telecom networks has allowed us to refne our methodology, which we actively share through research and participation in international conferences.

We consistently report vulnerabilities to the GSMA and 3GPP, taking responsibility for enhancing the security measures within telecom networks.

Why Choose Us?

Backed by over 40 years of accumulated experience in the telecom field

icon
Specialization

We specialize in telecom security, with deep infrastructure knowledge and proven methods to protect your business, services and customers.

icon
Experience

With over 40 years of experience in the telecom field, Ethon Shield has conducted risk assessments for major operators in Spain, Italy, the UK, Norway, and Sweden, covering various network types.

icon
Research, Development and Innovation

Ethon Shield is dedicated to cybersecurity research, recognized as a research and development organization by the French MESRI, and has presented at major international cybersecurity events like Blackhat and DEF CON.

icon
Neutrality

Our independence from manufacturers and mobile network operators ensures objective reports free from third-party influences, fostering trust and transparency in our auditing process to enhance clients' security and operational effectiveness.

text-circleinner-icon