This resource is no longer available

Protecting CPNI - Top Four Tips for a Successful Security Program Deployment

Cover

Telecommunication service providers operate in a rapidly changing environment. They need to stay competitive, constantly improve ROI, and meet regulatory challenges. One regulation of particular importance to telecommunication service providers is the need to protect Customer Proprietary Network Information (CPNI) including call detail records (CDRs), services purchased, and type of usage. Whether as part of larger government regulation compliance or smaller partners' IT security requirements, deploying a security solution is no simple matter. To succeed, service providers need to follow four critical steps.

 

  • Discover CPNI Data Across the IT Infrastructure
  • Conduct a Compliance Gap Analysis
  • Enact Security Controls to Meet FCC Requirements for Protecting CPNI
  • Submit Signed Compliance Certificate Annually on or by March 1st

 

RSA provides a solution to help telecommunication service providers protect CPNI while complying with FCC 47 CFR Part 64 requirements. The RSA CPNI solution offers a set of market-leading, information-centric security services and technology controls. The RSA solution covers authentication, authorization, data loss prevention, encryption and encryption key management, reporting and monitoring among others to help service providers address most aspects of CPNI compliance in a more consistent, cost-effective manner.

Vendor:
RSA, The Security Division of EMC
Posted:
10 Dec 2008
Published:
10 Dec 2008
Format:
PDF
Length:
5 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.