Next-Generation Security means safety through all layers for both, business and recreation – and all ages!

Controlling access to infrastructures and services, managing user sessions and service experiences as well as protecting infrastructure assets and customer services from disruption are key functions of every communications network.

The technology area SESSION CONTROL & PROTECTION delivers hardware and software based solutions to implement fundamental regulation, control and prevention functions provided on the network layer – to optimise the security, performance and reliability of the network and applications required.

SESSION CONTROL & PROTECTION – TECHNOLOGY SYSTEMS

  • Firewalls
    Network firewalls to the incoming and outgoing traffic based on predefined security and protection rules reliably at line rate with carrier-grade scalability.

  • DDoS MITIGATION SYSTEMS:
    Monitoring and mitigation solutions to ensure the availability of high capacity core and access networks as well as applications and services by identification of all kind of Distributed Denial of Service (DDoS) attacks and appropriate traffic filtering – from first technical steps to start with up to a fully integrated solution with multiple mechanisms and services.

  • BNG / BRAS
    Broadband Network Gateways (BNG) or rather Broadband Remote Access Server (BRAS) to establish subscriber sessions, route traffic to and from access devices at the network edge, and effectively manage data flow and functions such as Authentication, Authorization and Accounting (AAA), Security, Quality of Service (QoS) etc.

  • APPLICATION DELIVERY CONTROLLER
    Systems offloading applications by load balancing, caching and controlling content to maximise throughput and optimise the quality of experience, application/service response times, and to improve resilience.

  • SESSION BORDER CONTROLLER (SBC):
    Control of the signaling to set up, manage, monitor and terminate the connections for IP based communications sessions within subscriber/end user voice, video and other data applications.

DEDICATED SECURITY SERVICES

  • Security Verification
    Review of security designs (paper audits), conduction of hands-on tests of infrastructures (penetration testing) or single components like CPEs.

  • Incident Detection
    Monitoring, analysing and responding to security incidents, providing real-time and forensic information.

Session Control & Protection Technology Partners