Digital Edition

SYS-CON.TV
Reef Point Has Massively Scalable Gateway
Designed for Converged UMA Networks

Reef Point Systems has developed a massively scalable, multiservice UMA Security Gateway, providing comprehensive security for Unlicensed Mobile Access (UMA) network, the company says.. Unlike other solutions, such as session border controllers, the Reef Point solution is massively scalable, securing up to half a million simultaneous connections. The gateway enables secure WiFi roaming and provides subscribers with confidentiality by encapsulating the call and signaling data in secure IPSec tunnels.

"With so many new security threats potentially plaguing wireless operators today, relying on just traffic management to protect their network and services is no longer enough. What operators need are extremely scalable, comprehensive, carrier-class security capabilities built right into the network to make certain new services such as Voice-over-IP calls are safe and confidential,"  said Roger Entner, vice president of wireless telecom at Ovum.

By deploying UMA technology, operators can enable users to roam and handover between cellular networks and public and private unlicensed wireless networks (WiFi and Bluetooth). The user, equipped with a dualmode cellular/WLAN handset, can make calls across any generic wireless LAN and IP network, with the call and signaling data encapsulated in secure IP tunnels. These tunnels encrypt data ensuring privacy for voice calls over the public Internet. Mobile operators view UMA as a cost-effective method to improve residential coverage and keep churn down with minimal infrastructure
investments.

"UMA is a pre-cursor to IMS networks and enables operators to easily expand their coverage and introduce new mobile data services. More than 10 operators worldwide have already announced their intent to deploy UMA technology," said Stephen Diamond, CEO of Reef Point Systems. "These new services will not be widely adopted if there is a threat to the availability or integrity of the service. Reef Point offers a complete security solution and understands that these new services are critical to operators' profitability. "

The Reef Point UMA Security Gateway features:

· Massive Scalability - The Reef Point solution supports up to half a
million simultaneous IPsec connections; significantly reducing capital and
operating costs.

· Comprehensive Multiservice Security - The gateway provides robust threat
defense including stateful firewalls with Denial of Service attack
prevention, intrusion detection services, custom firewall filtering, dynamic
virtual routing with Network Address Translation, and session limiting to
protect against external threats.

· Purpose-built, Carrier-class Design - Uncompromising high-performance &
reliability is provided through Reef Point's patented Flow Application
Streaming TechnologyT and optimum mix of custom ASICs/FPGAs and network
processors.

· Robust Wireless Standards Support - Reef Point supports Internet Key
Exchange v2 (IKEv2) and Extensible Authentication Protocol Method for GSM
Subscriber Identity Modules (EAP-SIM) to provide scalable mutual
authentication, encryption and data integrity safeguards for signaling,
voice, and data


About Wireless News Desk
WBT News Desk brings you all the latest and greatest news from the world of wireless business and technology, including breaking news, technical articles and feature stories written by the world's leading experts of mBusiness.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

The new Reef Point UMA Security Gateway provides comprehensive security for Unlicensed Mobile Access (UMA) networks, the company says, and unlike other solutions, such as session border controllers, is massively scalable, securing up to half a million simultaneous connections.




ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

Dynatrace is an application performance management software company with products for the informatio...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empa...
CloudEXPO New York 2018, colocated with DevOpsSUMMIT and DXWorldEXPO New York 2018 will be held Nove...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism...
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience w...
A traditional way of software development efforts reimbursing is pay by the hour, which in case of r...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are rep...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and...
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer...
CI/CD is conceptually straightforward, yet often technically intricate to implement since it require...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22n...
Adding public cloud resources to an existing application can be a daunting process. The tools that y...
The now mainstream platform changes stemming from the first Internet boom brought many changes but d...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (No...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As au...
A valuable conference experience generates new contacts, sales leads, potential strategic partners a...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with e...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple ...
SYS-CON Events announced today that DatacenterDynamics has been named “Media Sponsor” of SYS-CON's 1...