Managed and cloud services

Lawful interpretation and retrievel of traffic- and inventory-data

Syserso Networks offers support, hardware and software, as well as services for outsourced lawful interceptions pursuant to article 110 of the German Telecommunications Act (TKG) (now: article 170 TKG). It can also offer traffic and inventory data reporting as specified in articles 96/113 TKG (now: article 174 TKG) for network providers who mandated to do so.
The law requires compliance with a number of organisational, technical and legal conditions.

An important aspect of our services is to take into account and comply with all the relevant reference documents. This is one of our specialisms and we’ve created infrastructure to deal with any queries by the authorities. From the InterCeption Center (ICC), our security-vetted staff can offer an end-to-end solution, from a customised operator concept to LI (lawful interception) 24/7. We look after LI and VDA/BDA operations with all the organisational, technical and legal requirements they entail. And our network operator customers can focus on their core business.

Data retention

The German Data Retention Act of June 2017 requiring data to be retained, as specified in article 113b of the German Telecommunications Act, has currently been suspended following court rulings. However, the demand for data retention is still highly relevant (2021 TKG amendment). Therefore, a new bill by the German Ministry of Justice, which reflects the principles of the ECJ, is to be expected.

To help meet the exceptionally stringent requirements for data storage and retrieval, Syserso Networks can offer a multi-client-capable infrastructure, approved by the Federal Network Agency (BNetzA), that meets all the requirements set out in article 113f.

This is one of our specialist areas and we can offer an end-to-end concept, starting with a customer-driven operator and security concept all the way to LI 24/7 by our security-vetted staff.
As soon as the statutory requirements have been amended to ensure they are legally watertight and depending on future judicial rulings by the new coalition, we’ll relaunch our InterCeption Center (ICC) to reflect all the organisational, technical and legal stipulations.

We’ll continue to monitor developments so that our service portfolio can the organisations concerned time to focus on what they do best.

Anomaly detection monitoring

Anomaly detection monitoring allows organisations to carry out remote monitoring. As a result, they know whether there’s a malfunction and can keep track of what’s going on in their networks at all times. Sudden changes can be detected, such as when a system’s response times alter, data traffic increases or decreases unexpectedly, or servers no longer respond in compliance with the quality of service level. As a result, malfunctions can be localised more easily.

Syserso Networks offers its anomaly detection monitoring service in the shape of the Rhebo industrial protector for customers.

This includes daily remote monitoring of the Rhebo industrial protector installed on the customer’s premises by the Security Operations Centre. Notifications from the system are analysed, processed according to an initial processing plan and escalated if necessary. The service includes weekly reports and monthly status meetings.

Syserso Networks offers customised anomaly detection systems for any size of network.

Federal Office for Information Security (BSI) point of contact

Under article 8b (3) of the Act to Strengthen the Security of Federal Information Technology (BSIG), operators of critical infrastructure must specify a point of contact the Federal Office for Information Security (BSI) through which they can be reached around the clock.

BSI point of contact (source: BSI.)
The point of contact registered is a functional mailbox, i.e. not a personal e-mail address of a particular employee, which must ensure availability 24/7. Operators must be able to respond to the BSI (which might send cyber security alerts, or require up-to-date information etc.) via the contact point and to view and evaluate these without delay (process information on demand). The BSI words cyber security warnings so that urgency and (potential) need for action are (automatically) indicated in the e-mail’s subject line. In this way, anybody in the organisation who can be reached at all times, e.g. staff manning the gates, security teams and other on-call service staff, can spot urgent need for action and, if necessary, issue an alert or forward the matter to suitable contacts. These contacts have the right skills to assess any incident and are involved in the organisation’s incident management procedures.

Our security-vetted staff contacts the BSI and, based on a defined reporting process, forwards critical notifications to you. Our ISO27001 certification for information security by the BSI proves you can trust us to do the job well.