Considering our modern world depending so heavily on Telecommunication connectivity. Because of the vast amount of sensitive information available, security systems for telecommunications companies are primarily threatened by cyber-attacks. In a few cases, telecom companies will act as intermediaries in the chain from supplier to subscriber, which opens even more vulnerabilities to the security of the architecture. Businesses often seek optimal security for all aspects within their IT sector including physical or virtual components, data, applications, networks, servers, or desktops.