Protecting CPNI - Top Four Tips for a Successful Security Program Deployment
sponsored by RSA, The Security Division of EMC

Telecommunication service providers operate in a rapidly changing environment. They need to stay competitive, constantly improve ROI, and meet regulatory challenges. One regulation of particular importance to telecommunication service providers is the need to protect Customer Proprietary Network Information (CPNI) including call detail records (CDRs), services purchased, and type of usage. Whether as part of larger government regulation compliance or smaller partners' IT security requirements, deploying a security solution is no simple matter. To succeed, service providers need to follow four critical steps.


  • Discover CPNI Data Across the IT Infrastructure
  • Conduct a Compliance Gap Analysis
  • Enact Security Controls to Meet FCC Requirements for Protecting CPNI
  • Submit Signed Compliance Certificate Annually on or by March 1st


RSA provides a solution to help telecommunication service providers protect CPNI while complying with FCC 47 CFR Part 64 requirements. The RSA CPNI solution offers a set of market-leading, information-centric security services and technology controls. The RSA solution covers authentication, authorization, data loss prevention, encryption and encryption key management, reporting and monitoring among others to help service providers address most aspects of CPNI compliance in a more consistent, cost-effective manner.

Available Resources from RSA, The Security Division of EMC
See what other users are reading via our Daily Top 50 Report

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement