As the world goes digital, digital society is becoming the open platform of innovation serving business, society and mission-critical use cases. Ericsson Nikola Tesla has a long history of systematically incorporating security and privacy considerations into all relevant aspects and phases of our products and solutions. Our efforts in this area follow a well-established internal control framework known as Secure by Design. The Secure by Design framework enables a managed, risk-based approach to security and privacy implementation where requirements are tailored to the target environment and demands. This approach helps us meet stakeholders’ expectations and cater for the rapid evolution of technology and the continuous changes in legislation.

The next generation of security products and solutions improves your organization’s data protection and securing of centrally stored data, clients’ data and data in transit.
Cybersecurity protection starts with threat intelligence, which includes classic firewalls and next-generation firewalls, web security, mail security, endpoint security, XDR platform, sandbox solutions and management of mobile devices. While firewalls, which are the basis of a corporate network security strategy, have been around for quite some time, they have evolved significantly as the cyber threat landscape has changed. A next-generation firewall is a firewall designed to protect against the modern cyber threats that companies face. In addition to the core functions of a firewall, Next Generation Firewalls (NGFWs) integrate a range of other capabilities to protect against advanced cyber threats.

Endpoint detection and response (EDR) is a cybersecurity technology that continuously monitors endpoints for evidence of threats and performs automatic actions to help mitigate them. Endpoints are physical devices connected to a network, such as mobile phones, desktops, laptops, virtual machines, and Internet of Things (IoT) technology devices give malicious actors multiple points of entry for an attack on an organization. EDR solutions help security analysts detect and remediate threats on endpoints before they can spread throughout your network.

The protection of confidential data and intellectual property, conditioned by the regulatory framework (NIS, GDPR or other regulation) or business needs, is a prerequisite for business sustainability, integrity and development of all companies and organizations. Data classification is an important prerequisite for data management. We help customers with tools and trusted advice on how to classify data optimally.

Companies today protect data with software that guards on-premises and cloud data stores through features such as data activity monitoring and analytics, near real-time threat response workflows and automated compliance auditing and reporting. Our clients can easily discover and classify sensitive data across major data repositories, from cloud databases and unstructured data in files to on-premise mainframes and structured data environment. These solutions can automate data compliance workflows using pre-built templates for regulations including PCI DSS, SOX, GDPR, NIS2 and others.

Many software companies learned the importance of supply chain security solutions. Security teams must adapt to new and expansive attack vectors and surfaces, commonly needing to go a step further than software composition analysis (SCA) tools to be protected from highly targeted, sophisticated supply chain attacks, rather than being protected from just vulnerabilities. We can offer and deliver a supply chain security platform that scans hundreds of file formats to identify embedded threats and integrate with CI/CD, cloud, and ITSM tools to automate testing, enforce policies, and establish security guardrails. It supports continuous, customized and extensive coverage for third-party software and open-source components.

After adopting a software supply chain management, it is easy to find threats in the environment and review executables, components and dependencies to monitor behaviors and detect suspicious changes in build systems, workflows and large packages. Discover threats by scanning them from one of the world’s largest private repository of goodware and malware.