INNOVATION in a wireless world

What we do

jtendo turn-key solutions
  • Analysis, functional specification
  • Development
  • Hardware delivery
  • Integration of jtendo software and 3rd party components
  • Testing: Functional / Non-Functional / Security
  • Migration of services and subscribers
  • Maintenance (24/7/365 or 8/5 support and enhancements)

We are experts in network signaling (SS7 and IMS), network security, application development,
integration, deployment and solution support. We are focused on system integration,
product development and security solutions/services.

jIN: jtendo Intelligent Network

Open jtendo IN platform – Service Logic Execution Environment with additional service/subscriber profile database,
provisioning gateway, operations and management tools, OSS-integration ready, statistics and reporting engine (ELK-based).

jUCC: jtendo Unified Communications & Cooperation

jUCC is a Virtual PBX designed to handle corporate and SME/SOHO customers with unique set of features. Covers special call handling, calendars, announcements, web-based attendant, conference calling, SIP trunking and many more!

Real-Time Charging Suite

Network front-end for OCS for Call/SMS/MMS/Data charging with additional legacy services support such as USSD/SMS/IVR self-care, USSD-callback, USSD gateway, B-Party-Pays, CLIR Block and many others.

jLOW: Low Balance Assistance

A set of functions which can be applied for pre-paid with zero balance. Complete solution which fulfills all possible scenarios starting from offering IVR-based recharge, through money transfer, B-party pays, up to credit money with eligibility evaluation.

Other services

Multi-MSISDN, Home Zone, Number Translation Services, Virtual Private Network, Selective Home Routing, Late Call Forwarding, Anti-Tromboning, Anonymous Call Rejection, Call Firewall.

Core Network Components

Solutions to extend customer network components with additional features and tools to create additional revenue stream.


Equipment Identity Register is a feature-full platform which can use external or internal DB to check for IMSI/MSISDN/IMEI/location consistency rules. Easily integrated with centralized databases of stolen terminals (country or region-based), includes web-services triggering for defined conditions (e.g. IMEI change for IMSI, location update, etc).

CRIN: Least Cost Routing

Least cost routing solution for carriers wholesale traffic to optimize call routing based on static and dynamic criteria.

Web Services Gateway

Network capabilities exposure over Web Services – OMA/OneAPI gateway covering call notification and call control over SS7/SIP, Messaging, Location, Terminal Location/Status and many more. In addition Web Service Exposure Layer provides exposure management and security, so the operator is able to expose the capabilities for their partners in the Internet.

Telco Security Solutions

Security solutions suite of platforms, also automated, to secure operator’s SS7, Diameter and GTP network vulnerabilities.


Signaling firewall covering SS7/Diameter/SIP/GTP with cross protocol correlation and extremely flexible rules engine allowing to execute queries to external DBs and custom functional modules (e.g. honey-pots, custom VIP handling, etc.)


Automated penetration tool for mobile networks which provides unique fully automated daily scanning capabilities – security monitoring tool for mobile networks. Also covers terminal-side interactions for vulnerability exposure confirmation.


GTP protocol processing platform which can be used to manage and manipulate GTP-C and GTP-U traffic for Packet Core based on subscriber database profile, location, APN, RAT, date/time, etc. Supports Gn, Gp, S5, S8, S1u, S11, S4 interfaces. Sea of opportunities to build mobile-data services such as IoT security, Security-as-a-service for subscribers, mvno-support, custom routing, content adaptation, and many more!

Security Services

jtendo’s security portfolio is designed to provide complete set of cybersecurity services that
address challenges our customers are facing in their IT environments.

Penetration Test

As a part of penetration testing, we exploit known and unknown vulnerabilities of specific resources, such as internet and mobile applications, infrastructure resources exposed to the Internet, and more. Usually we define the purpose of the tests at the beginning of the process but it can also be a subject of the recognition phase we carry out. Tests can be delivered as a black box, gray box or white box scenario.

Implementation of Security Systems

We help our customers to develop cybersecurity strategy and processes for monitoring and incidents response. We support them in the process of implementation of specific security systems:

  • We develop SIEM playbooks adapted to the business specifics of monitored IT environments.
  • We adapt workflows in dedicated security incident management tools.
  • We create appropriate integration elements for monitoring custom business applications and industrial automation systems.
Security Awareness Training

We deliver security trainings at various levels of advancement and for different target groups (programmers, analysts, sales representatives). As required by the group, we focus on issues specific to their daily tasks, e.g. programmers, knowing the security breach methods could create properly secured applications, which would decrease the number of vulnerabilities identified in the last stage of the application development cycle.

Secure Remote Workplace

We support our clients in development of multi-level security that enables ease to access and secure remote workplace. We provide a holistic approach by review and optimization of configurations, implementation of policies and procedures as well as implementation of dedicated DLP (Data Loss Prevention) tools. We verify the effectiveness of existing solutions using penetration tests and simulated hacker attacks such as social engineering, phishing campaigns, Red Teaming.

Configuration Review

We verify current configuration of security systems and individual components to make them secured against specific threats.

SOC/SIOC Services

We support clients at every stage of SOC implementation – from solution selection to the design of operational procedures and training of SOC teams. We provide services in the scope of SOC maturity assessment as well as comprehensive management of the Security Operation Center.

Looking for more information
about jtendo services & solutions?

Telecommunication. Security. Intelligent Network. SS7. Diameter.