{"id":53968,"date":"2023-10-04T22:20:00","date_gmt":"2023-10-04T22:20:00","guid":{"rendered":"https:\/\/www.darkreading.com\/operations\/nokia-selected-by-brazil-s-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams"},"modified":"2023-10-04T22:20:00","modified_gmt":"2023-10-04T22:20:00","slug":"nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/","title":{"rendered":"Nokia Selected by Brazil&#8217;s K2 Telecom As Partner to Strengthen its Security and Create Revenue Streams"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong>PRESS RELEASE<\/strong><\/p>\n<p><strong>04 October 2023 \u2014 S\u00e3o Paulo, Brazil \u2013<\/strong> Nokia today announced that it has been selected with partner DPR by K2 Telecom Brazil to provide solutions that will help the ISP to strengthen its network security and create new revenue streams. Nokia will deploy its unique and innovative BNG\/CGNAT wholesale solution, enabling K2 Telecom to provide all IP infrastructure and ISP requirements as-a-service, as well as providing cloud-based DDoS defense as-a-service.<\/p>\n<p>K2 Telecom decided to strengthen its security capabilities with network-embedded DDoS security, and selected Nokia Deepfield Defender, a software-based DDoS detection and mitigation solution that combines network data (telemetry, DNS, BGP, etc.) with Nokia\u2019s patented Deepfield Secure Genome\u00ae &#8211; a cloud-based, continuously updated data feed that tracks the security context of the internet. With its industry-leading DDoS protection capabilities, Deepfield Defender will be instrumental in helping K2 Telecom keep its services running and customers safe at all times.<\/p>\n<p>Through Secure Genome technology, Deepfield Defender delivers detailed visibility into over 5 billion IPv4 and IPv6 addresses, tracking internet traffic over 30 categories and deploying more than 100 Machine Learning rules (ML) for automatic classification and precise allocation of applications and flows into security-related traffic types and categories. This detailed security context of the internet traffic (e.g., details about prior attacks, insecure servers, and compromised IoT devices that can be used for DDoS attacks) is used for the fast and accurate DDoS detection (e.g., the latest generation of botnet-originated DDoS) and rapid mitigation of the most complex attacks. This is the first Nokia Deepfield Defender deployment in a regional ISP in this part of the world.<\/p>\n<p>For the BNG combined with CGNAT, Nokia will deploy its Multi-Access Gateway hosted on its market-leading 7750 Service Router based solution, which will support the scale, performance, capacity and reliability needed for K2 Telecom to deliver secure wholesale broadband services. Nokia Deepfield Defender\u2019s capabilities will also contribute to the creation of new revenue streams coming from new wholesale services.<\/p>\n<p><strong>Leandro Garcia, Chief Technology Officer at K2 Telecom, said:<\/strong><span>&nbsp;<\/span>\u201cCurrently, in the market, there are companies that offer DDoS mitigation and protection services. However, these companies often redirect unwanted traffic to external clouds, which in turn causes disruptions for end customers. Our customers should not be affected by internal processes and with Nokia&#8217;s solution, mitigation is performed internally, directly in the routers&#8217; chipset, in real-time, and without causing unavailability for our customers.\u201d<\/p>\n<p><strong>Carlos Barroso, IP Leader for Latin America at Nokia, said:<\/strong><span>&nbsp;<\/span>\u201cThis project is further proof of Nokia\u2019s increasing footprint in the ISP market. We thank K2 Telecom for their trust and confidence in Nokia, and we are looking forward to collaborating on other projects as they continue to expand in Brazil with innovative B2B ISP services.\u201d<\/p>\n<p>Nokia has a comprehensive and growing portfolio of Network Security products, solutions and services, including endpoint security and IoT security, access security and digital identity management, security orchestration, DDoS defense, network encryption, firewalls and self-defending network infrastructure.<\/p>\n<p>According to the latest<span>&nbsp;<\/span><a href=\"https:\/\/www.globenewswire.com\/Tracker?data=UbstuISCdGsfLQkpZFKRudrQYMflshP44_wGyIthPrd6BW8Ngd-4csLIkK2rhR1THprsexeS9TqMSGXmFu2cs0uG-iyz6bb66n9gy3AVtPQpjv9umgrBSJkYKuYplu5uCwPxNT4Z2TxBiFYuR5Ix6JHHA9MPY8yiKsLu29UR8O4=\" target=\"_blank\" rel=\"noopener\">Nokia Threat Intellig<\/a><a href=\"https:\/\/www.globenewswire.com\/Tracker?data=A8k4W4ioo-cNA7liOP-vkirura2kjX9wrZev9q3jyL-qVOqKlTEIWQnOCq0TdjGxbHvNyeGIAGUceE5jS6r5rt8vxkUlzheVZqLb0VKGC99p2VZmfJpxj1Q0iWL-4l0qsBfWSzBsiX2BVTL7G5IeuQ==\">e<\/a><a href=\"https:\/\/www.globenewswire.com\/Tracker?data=R_NPpK3LQ_mXn2b6owT-46txpdAPcrhpTZ8sCzdkWDnLWGsJstHjTbRiVMYlaWJTW9QY6zTbnBzXGEsbjhrLQuDhgpJhTZ1o-Y7DM7cP-Io0AwPIpcCFJmIKwhbDsAln9UucEHAYNat8k91kSiuATfX6yJRt-sMExKIr4JrJEXI=\">nce Report 2023<\/a>, IoT botnet DDoS (Distributed Denial of Service) traffic increased fivefold over the past year. This traffic originates from insecure IoT devices with the aim of disrupting telecom network services for millions of users.<\/p>\n<p><strong>Resources and additional information<\/strong><\/p>\n<p>Nokia Security Portfolio:<span>&nbsp;<\/span><a href=\"https:\/\/www.globenewswire.com\/Tracker?data=UbstuISCdGsfLQkpZFKRuVmEIRUlc-G32-zX2uAWnprEIOcmJhYGl9wfkfg2qHCd1PkTEyVnZWdbiGUkNIXWBZqyraq4dP_h6ODpTSzQWUFWHXTjv8-w1Teck9FXDKHD\" target=\"_blank\" rel=\"noopener\">Nokia Networks<\/a><span>&nbsp;<\/span><a href=\"https:\/\/www.globenewswire.com\/Tracker?data=xC27kzXkg8U_SuTY6psSlylLWg78fKF6Rv9QPyuXhRZpBg_KPTPMJop3UvWJL6XR-VdF3s8np-YR1NPNlRgzlqXs9ggRwzvgMrcfquFBtnc=\">Security<\/a><\/p>\n<p>Nokia Solution:<span>&nbsp;<\/span><a href=\"https:\/\/www.globenewswire.com\/Tracker?data=UbstuISCdGsfLQkpZFKRuT3yo0hgGR9WDGcEeunlZ1U0OZxPkG6VZak1jFaqSDoBycIkk4tlIW2WLTd66FPF8mK-OqQ3_f5qtE-Ol4H6QEjORv2UtiFc9SwIkQWTxkwF\">Nokia<span>&nbsp;<\/span><\/a><a href=\"https:\/\/www.globenewswire.com\/Tracker?data=sK04r91utlc7fv6UPz-Ri5PsUSZ3RJdr1xft7T-NKZXebArrLYzv6D0e_z4ah5hVRZzOXoOsmhhJMNYfBAOJP6FU6Ne9m7AS6FWZdxD9rpz12-5kKnrqZKBybWX56E-vaS3SX8v-sC02olS__1zWyQ==\">Deepfield<\/a><a href=\"https:\/\/www.globenewswire.com\/Tracker?data=16YRb_hIVgFs3tH_vzX1Lliq1ACpVzQHjpEfBLN3cljObLFYVLkzQqs-FO9nqFa8PygVTATLRueWZx8UOYD2sF-5_-xIZktWbooXmFOopnJ5hj7QgXGYAt5zAXkMvcDAYQYpt51fE89WhuymIY_Yig==\" target=\"_blank\" rel=\"noopener\">&nbsp;Defender<\/a><\/p>\n<p>Nokia Solution:<span>&nbsp;<\/span><a href=\"https:\/\/www.globenewswire.com\/Tracker?data=UbstuISCdGsfLQkpZFKRuXh8hxQVEqeqrngRtbY86WCN8sQ_P94a8YAIaTGOhrYxt1iI0aDw0xatUVUv-dio1SbY6Yo4PrIHqJ2dm_CO7UFCa_ZHhgb_QFFoHYEPLCZFvB0cVjq4vzveKgO5YMTeBw5uzyRE9oX4ItbIWG7yxyE=\" target=\"_blank\" rel=\"noopener\">Nokia Multi-Access Gateway<\/a><\/p>\n<p>Nokia Solution:<span>&nbsp;<\/span><a href=\"https:\/\/www.globenewswire.com\/Tracker?data=UbstuISCdGsfLQkpZFKRuVma1tXmUbvOoF6ftbHNytDSUNH_ULQsUn-hW9pxgHN6KjFIvfrkyQ2AEXfbvSo530fYr8LD5JCmyfEhsXZF_zGi_SPLOFNM0uL8ebuE_V0fdZwzlqPj3DAuFhNfaWo0htYk9I-GMp2vXQg83r1jwps=\" target=\"_blank\" rel=\"noopener\">Nokia 7750 Service Router<\/a><\/p>\n<p>Nokia Report:<span>&nbsp;<\/span><a href=\"https:\/\/www.globenewswire.com\/Tracker?data=UbstuISCdGsfLQkpZFKRudrQYMflshP44_wGyIthPreH7-g4vsCQ5Pq6xnIILgZGt9qJ0t1oK2qY_olbZVwhebTJLURFXURr_v7nCj3iTAOru8HIvEC1vB-Wbb3WQkhbArH84I_jb0Z_DhDL1F6c17Utls0q89u781eF1rC52YSPqZYArmBInumTc60eTFGs\" target=\"_blank\" rel=\"noopener\">Nokia Threat Intelligence Report 2023<\/a><\/p>\n<p>Customer website:<span>&nbsp;<\/span><a href=\"https:\/\/www.globenewswire.com\/Tracker?data=QMiUl-o-6InF567uzkkxOfzCKs0AbhHz17LvuHyb0hYbHsEBlSahthMD94JThjhGElrHEcqts_lyTp9KBCq3FNnJSvohvX-D4vvK9iP9xPA=\" target=\"_blank\" rel=\"noopener\">K2 Telecom Brazil<\/a><\/p>\n<p>Partner Website:<span>&nbsp;<\/span><a href=\"https:\/\/www.globenewswire.com\/Tracker?data=O6tPegVIpOwOAiD1qUvXAky73g6L-ALEX71SI_lXYrNtcuyRyZ9FY0IprFgHn3NMsE6I6O60gPBaa2Jd29Ne3g==\" target=\"_blank\" rel=\"noopener\">DPR<\/a><u><\/u><\/p>\n<p><strong>About Nokia<\/strong><\/p>\n<p>At Nokia, we create technology that helps the world act together.<\/p>\n<p>As a B2B technology innovation leader, we are pioneering networks that sense, think and act by leveraging our work across mobile, fixed and cloud networks. In addition, we create value with intellectual property and long-term research, led by the award-winning Nokia Bell Labs.<\/p>\n<p>Service providers, enterprises and partners worldwide trust Nokia to deliver secure, reliable and sustainable networks today \u2013 and work with us to create the digital services and applications of the future.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/operations\/nokia-selected-by-brazil-s-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Read More <a href=\"https:\/\/www.darkreading.com\/operations\/nokia-selected-by-brazil-s-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-53968","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nokia Selected by Brazil&#039;s K2 Telecom As Partner to Strengthen its Security and Create Revenue Streams 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nokia Selected by Brazil&#039;s K2 Telecom As Partner to Strengthen its Security and Create Revenue Streams 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-04T22:20:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Nokia Selected by Brazil&#8217;s K2 Telecom As Partner to Strengthen its Security and Create Revenue Streams\",\"datePublished\":\"2023-10-04T22:20:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\\\/\"},\"wordCount\":694,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\\\/\",\"name\":\"Nokia Selected by Brazil's K2 Telecom As Partner to Strengthen its Security and Create Revenue Streams 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"datePublished\":\"2023-10-04T22:20:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\\\/#primaryimage\",\"url\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"contentUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nokia Selected by Brazil&#8217;s K2 Telecom As Partner to Strengthen its Security and Create Revenue Streams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nokia Selected by Brazil's K2 Telecom As Partner to Strengthen its Security and Create Revenue Streams 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/","og_locale":"en_US","og_type":"article","og_title":"Nokia Selected by Brazil's K2 Telecom As Partner to Strengthen its Security and Create Revenue Streams 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-10-04T22:20:00+00:00","og_image":[{"url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Nokia Selected by Brazil&#8217;s K2 Telecom As Partner to Strengthen its Security and Create Revenue Streams","datePublished":"2023-10-04T22:20:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/"},"wordCount":694,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/","url":"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/","name":"Nokia Selected by Brazil's K2 Telecom As Partner to Strengthen its Security and Create Revenue Streams 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","datePublished":"2023-10-04T22:20:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/#primaryimage","url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","contentUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nokia-selected-by-brazils-k2-telecom-as-partner-to-strengthen-its-security-and-create-revenue-streams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Nokia Selected by Brazil&#8217;s K2 Telecom As Partner to Strengthen its Security and Create Revenue Streams"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53968"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53968\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}