Securing Operators and Nation-states Critical Mobile Infrastructure

Rely on world renown OT security expertise to optimize the security of your mobile infrastructure.

About P1 Security

World leader in mobile network security

We help operators, governments and enterprises to defend against all network cybersecurity threats and attacks. Founded in 2009, P1 Security is one of the most trusted companies in network security with proven experience on all major technologies and network protocols.


Products and services dedicated to enhancing the level of safety on all major telecom protocols standards

Upscale your security stack

We provide software to automate the identification and detection of potential threats in your signalling protocols and help you remediate their consequences to provide increase security to your subscribers.

  • ASM (PTA) - Attack Surface Management - Identify vulnerabilities on your network and get correction recommendation.
  • IDS (PTM) - Intrusion Detection System - Detect malicious activity on your different protocols and take action to remediate the threat.
  • VKB - Vulnerability Knowledge Base - Unique database of 2000+ telecom vulnerabilities from all protocols and major equipment vendors.
Upscale your security stack

Surround yourself with specialists

Our experts have been advising the most critical infrastructure for almost 15 years on topics going from security audits to full security architecture review through vendor management

  • Passion - We are a group of engineers truly fascinated by telecom security.
  • Expertise - Our research, our missions, our trainings makes us as the top experts currently.
  • Exhaustivity - With experts in all protocols or disciplines, we can cover your every needs.
Surround yourself with specialists

Some example of P1 Security's intervention

We work throughout the world for some of the most demanding clients on the planet.

Some example of P1 Security's intervention
Protocol expertise

From legacy signalling protocols deployed for tens of millions to virtualized network functions in private environment

2G-3G SS7

Fortify your network with our specialized 2G-3G SS7 portfolio. Unparalleled expertise in securing signaling protocols for robust telecom defense.

4G LTE Diameter

Diameter is everywhere, 4G is actually 5G... And its risks need to be assessed and monitored to ensure better safety for everyone.


Comprehensive IMS, VoLTE, VoWiFi solutions for telecom security. Elevate your network defense with our specialized expertise.

5G and Private 5G

Explore specialized solutions for 5G and Private 5G network security. Benefit from our expertise in defense.


The radio access network needs at least as much focus as the core, the radio or the UE.

Enterprise Security & Mobile

Enterprises need to get in the security conversation with their network service providers to ensure the safety of their stakeholders.

Infrastructure Security (NFV)

Network virtualization comes with as much risk as it comes with opportunities. Both are massive.


What our customers say

"Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat."

Gabriel Chabot

Program Manager

P1 has been a true partner in upgrading our security capabilities, skills and understanding on our mobile network scopes. I am eager to work on 5G with the team.


Asian MNO

P1's expertise in telecom security is truly unique and allows our company to adress the specificity of mobile networks to better serve our customers.

Partnership director

Top cybersecurity firm

P1's provided in-depth expertise on security architecture that we used to draft our security recommendations for the service providers operating in our country.

Network Governance

Asian regulatory agency

Dense, intense but so eye opening and hands-on. I loved the training.

Security Engineer

North american MNO

P1's unique approach of merging technology and really senior expertise allows for a really impactful blend for our security measures after the vulnerability assessments performed on all our protocols.

Security Manager

Middle East MNO