Digital Edition

SYS-CON.TV
Reef Point Has Massively Scalable Gateway
Designed for Converged UMA Networks

Reef Point Systems has developed a massively scalable, multiservice UMA Security Gateway, providing comprehensive security for Unlicensed Mobile Access (UMA) network, the company says.. Unlike other solutions, such as session border controllers, the Reef Point solution is massively scalable, securing up to half a million simultaneous connections. The gateway enables secure WiFi roaming and provides subscribers with confidentiality by encapsulating the call and signaling data in secure IPSec tunnels.

"With so many new security threats potentially plaguing wireless operators today, relying on just traffic management to protect their network and services is no longer enough. What operators need are extremely scalable, comprehensive, carrier-class security capabilities built right into the network to make certain new services such as Voice-over-IP calls are safe and confidential,"  said Roger Entner, vice president of wireless telecom at Ovum.

By deploying UMA technology, operators can enable users to roam and handover between cellular networks and public and private unlicensed wireless networks (WiFi and Bluetooth). The user, equipped with a dualmode cellular/WLAN handset, can make calls across any generic wireless LAN and IP network, with the call and signaling data encapsulated in secure IP tunnels. These tunnels encrypt data ensuring privacy for voice calls over the public Internet. Mobile operators view UMA as a cost-effective method to improve residential coverage and keep churn down with minimal infrastructure
investments.

"UMA is a pre-cursor to IMS networks and enables operators to easily expand their coverage and introduce new mobile data services. More than 10 operators worldwide have already announced their intent to deploy UMA technology," said Stephen Diamond, CEO of Reef Point Systems. "These new services will not be widely adopted if there is a threat to the availability or integrity of the service. Reef Point offers a complete security solution and understands that these new services are critical to operators' profitability. "

The Reef Point UMA Security Gateway features:

· Massive Scalability - The Reef Point solution supports up to half a
million simultaneous IPsec connections; significantly reducing capital and
operating costs.

· Comprehensive Multiservice Security - The gateway provides robust threat
defense including stateful firewalls with Denial of Service attack
prevention, intrusion detection services, custom firewall filtering, dynamic
virtual routing with Network Address Translation, and session limiting to
protect against external threats.

· Purpose-built, Carrier-class Design - Uncompromising high-performance &
reliability is provided through Reef Point's patented Flow Application
Streaming TechnologyT and optimum mix of custom ASICs/FPGAs and network
processors.

· Robust Wireless Standards Support - Reef Point supports Internet Key
Exchange v2 (IKEv2) and Extensible Authentication Protocol Method for GSM
Subscriber Identity Modules (EAP-SIM) to provide scalable mutual
authentication, encryption and data integrity safeguards for signaling,
voice, and data


About Wireless News Desk
WBT News Desk brings you all the latest and greatest news from the world of wireless business and technology, including breaking news, technical articles and feature stories written by the world's leading experts of mBusiness.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

The new Reef Point UMA Security Gateway provides comprehensive security for Unlicensed Mobile Access (UMA) networks, the company says, and unlike other solutions, such as session border controllers, is massively scalable, securing up to half a million simultaneous connections.




ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

"Akvelon is a software development company and we also provide consultancy services to folks who are...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity tra...
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-O...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it r...
The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and ...
The next XaaS is CICDaaS. Why? Because CICD saves developers a huge amount of time. CD is an especia...
One of the biggest challenges with adopting a DevOps mentality is: new applications are easily adapt...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use ...
HyperConvergence came to market with the objective of being simple, flexible and to help drive down ...
Deep learning has been very successful in social sciences and specially areas where there is a lot o...
In his session at 21st Cloud Expo, James Henry, Co-CEO/CTO of Calgary Scientific Inc., introduced yo...
For better or worse, DevOps has gone mainstream. All doubt was removed when IBM and HP threw up thei...
Your homes and cars can be automated and self-serviced. Why can't your storage? From simply asking q...
Containers are rapidly finding their way into enterprise data centers, but change is difficult. How ...
I think DevOps is now a rambunctious teenager - it's starting to get a mind of its own, wanting to g...
"MobiDev is a software development company and we do complex, custom software development for everyb...
The “Digital Era” is forcing us to engage with new methods to build, operate and maintain applicatio...
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his ...
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at clou...
"This week we're really focusing on scalability, asset preservation and how do you back up to the cl...