Your trusted telco platform.
wgtwo is GDPR compliant and provides Data Processing Agreements (DPAs) with our all of our customers to outline how and where your data is processed.
AWS Well Architected
wgtwo is committed to adopting AWS key concepts, design principles, and architectural best practices for designing and running workloads in the cloud.
Security is at the forefront of how wgtwo builds its mobile core network.
Every person, team, customer, and organization deserves and expects their data to be secure and confidential. wgtwo continues to work hard to ensure the safeguarding of this data by focusing on implementing security controls across various domains.
wgtwo performs threat modeling across its telco services to understand the threats/risks and implement countermeasures to reduce the risk of an event. Additionally, wgtwo leverages best practices identified by GSMA to implement additional controls. wgtwo has implemented an SS7 firewall that will block/reject SS7 signaling based on security best practices outlined by GSMA (FS.11 and FS.19).Learn more
wgtwo holds an Advanced Certified Partner with AWS. In doing so, we have demonstrated the leading best practices for operating a reliable, scalable, and secure infrastructure in the cloud. For example, we have implemented policies to prevent publicly exposing data and built tools to identify exposed services and misconfigurations as it impacts the security of our products. wgtwo has completed the AWS Well-Architected Best Practices assessment, which the report can be provided upon request.Learn more
wgtwo leverages DevSecOps and has built a robust and secure development lifecycle, which identifies security threats early in the development process to protect our APIs and services.We use security threat modeling and automated configuration static analysis to identify 3rd party vulnerabilities within our code and infrastructure misconfigurations that impact the security or privacy of our resources. If identified, all critical issues are quickly remediated. All code is peer-reviewed and checked into a code revision system.Learn more
Least-privilege, need-to-know basis, RBAC, centralized IAM, and individual accounts are just a few of the controls Working Group Two has in place to monitor and secure our core platform. wgtwo has a 24/7 level 3 on-call program to quickly identify and remediate operational and security incidents. Dedicated security playbooks have been established to facilitate the proper handling of all security incidents. In the event of a security incident, all affected parties will be informed within 72 hours. Incident response procedures are tested and updated at least annually.Learn more
You still have a question in mind?
We love to tell you more!