31.03.2014 Views

Mobile Carrier Solutions Intelligent Mobile Internet Service Delivery

Mobile Carrier Solutions Intelligent Mobile Internet Service Delivery

Mobile Carrier Solutions Intelligent Mobile Internet Service Delivery

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Mobile</strong> <strong>Carrier</strong> <strong>Solutions</strong><br />

<strong>Intelligent</strong> <strong>Mobile</strong> <strong>Internet</strong> <strong>Service</strong> <strong>Delivery</strong><br />

Smart Network. Smart Business.


<strong>Mobile</strong> <strong>Carrier</strong> <strong>Solutions</strong><br />

<strong>Intelligent</strong> <strong>Mobile</strong> <strong>Internet</strong> <strong>Service</strong> <strong>Delivery</strong><br />

Radware provides mobile carriers with an intelligent mobile internet service overlay, extending IP service visibility<br />

and control for optimized, high-performance and programmable mobile <strong>Internet</strong> service delivery. With Radware<br />

mobile operators gain user, service and content awareness and granular policy-based IP traffic management,<br />

providing the tools needed to effectively ‘open’ mobile networks to the <strong>Internet</strong>:<br />

+<br />

*<br />

<br />

<br />

<br />

•<br />

Optimized <strong>Internet</strong> <strong>Service</strong> <strong>Delivery</strong> over the Radio Access Network (RAN)<br />

Radware enables optimized and seamless <strong>Internet</strong> service delivery over the RAN. Coupling on-the-fly traffic classification,<br />

with network TCP (W/TCP) optimization, content compression, acceleration and caching, Radware<br />

overcomes mobile network service and handset bandwidth constraints, enabling adapted, reliable, high<br />

performance mobile <strong>Internet</strong> service delivery.<br />

•<br />

Granular Traffic Control and <strong>Mobile</strong> <strong>Internet</strong> <strong>Service</strong> Programming<br />

Radware lets carriers extend VAS/content offerings and new business models based on managing mobile <strong>Internet</strong><br />

traffic by any user, application, or service criteria. With Radware, carriers can take control, differentiate and bill<br />

users exploiting RAN resources (extending the carrier ‘Walled Garden’ model to <strong>Internet</strong> traffic to charge for<br />

bandwidth hungry ‘freeware’) and enable new premium VAS services for differentiated programming and tiered<br />

delivery to end-users.<br />

•<br />

<strong>Mobile</strong> <strong>Internet</strong> Gateway Security and <strong>Service</strong> Integrity<br />

Radware multi-Gig Intrusion Prevention and Adaptive Behavioral DoS detect and mitigate attacks in real-time,<br />

immediately protecting network resources from Ingress and Egress (‘misbehaving customers’) attack traffic to<br />

ensure service integrity and continuity. Utilizing advanced ’zero minute’ behavioral detection and attack mitigation<br />

and bandwidth management (BWM), Radware’s MIG affords robust, high performance mobile <strong>Internet</strong> security.<br />

2


‘Open’ <strong>Mobile</strong>-<strong>Internet</strong> Networks:<br />

Optimized, Programmable, Secured.<br />

<strong>Carrier</strong>-Grade Visibility, Control & Performance<br />

T A B L E O F C O N T E N T S<br />

Radware enhances the network's ability to identify, classify,<br />

ensure QoS and charge for differentiated services, letting<br />

mobile operators leverage their investments in 3G/4G<br />

networks and capitalize on <strong>Internet</strong> service models and<br />

business opportunities.<br />

O P T I M I Z E D M O B I L E I N T E R N E T D E L I V E R Y 4<br />

M O B I L E I N T E R N E T T R A F F I C C O N T R O L 8<br />

M O B I L E N E T W O R K S E C U R I T Y 1 2<br />

Radware <strong>Mobile</strong> <strong>Internet</strong> <strong>Solutions</strong> are built on-top of multi-<br />

Gigabit, carrier-grade Content Inspection Director, AppXcel<br />

and DefensePro APSolute Application Switches to meet<br />

even the most demanding carrier networking environments.<br />

The system is designed for 99.999% uptime and supports<br />

fully redundant configurations for fault tolerance and<br />

immediate disaster recovery.<br />

.<br />

3


Radware Optimized <strong>Mobile</strong> <strong>Internet</strong> <strong>Delivery</strong> Solution<br />

Radware Content Inspection Director (CID) and AppXcel optimize mobile <strong>Internet</strong> service delivery, managing all mobile <strong>Internet</strong><br />

traffic to ensure reliable and high-speed mobile data services and QoS for end-users, while reducing mobile carrier operating<br />

costs.<br />

Located within the Gi/Pi Network, CID and AppXcel eliminate the key operational and performance obstacles to delivering fullfeatured,<br />

rich-media <strong>Internet</strong> services over mobile networks, while affording the scalability to support a subscriber base into<br />

the millions.<br />

Coupling on-the-fly traffic classification, with network transport adaption, service acceleration, content compression and<br />

caching, Radware lets operators overcome mobile network service and handset bandwidth constraints, enabling 1000% X<br />

mobile <strong>Internet</strong> performance over the Radio Access Network.<br />

CID transparently intercepts and inspects and performs wire-speed classification by Layer 2-7 criteria. Employing subscriber<br />

handset, application and content classification and service attributes (Radius sniffing), CID makes it possible to intelligently<br />

route traffic to relevant compression, acceleration or caching services. By identifying granular mobile data service needs,<br />

M O B I L E I N T E R N E T D E L I V E R Y C H A L L E N G E S<br />

<strong>Mobile</strong> data services account for a significant and growing percentage of mobile service provider ARPU.<br />

The proliferation of data enabled mobile devices coupled with mobile-broadband convergence are transforming the way mobile users<br />

communicate with each other, obtain information and interact with <strong>Internet</strong> content and rich media. With the growth of mobile <strong>Internet</strong> services<br />

comes the need to ensure effective service delivery to meet subscriber expectations for high-quality user experiences and reliable services.<br />

Wireless operators are struggling to guarantee the quality of multi-media messaging and new data services over mobile broadband networks.<br />

While wireless broadband networks provide the connectivity for mobile <strong>Internet</strong> services, end-to-end service responsiveness depends on<br />

resolving high packet loss and latency that characterize data networking protocols, primarily TCP - the underlying transport for most mobile<br />

<strong>Internet</strong> applications.<br />

Wide-spread mobile <strong>Internet</strong> service adoption depend on the ability to control service quality to eliminate messaging failures and address<br />

sluggish media delivery and IP application latencies. This includes ensuring TCP reliability, which is particularly significant for mobile operators,<br />

since TCP was not designed for wireless networks. Characterized by high bit-error rates (BER), random loss, bursty traffic and disconnections<br />

wireless networks increase TCP retransmission rates, time-outs and congestion in comparison with wired networks.<br />

<strong>Mobile</strong> <strong>Internet</strong> services depend on operator ability to ensure mobile data networking QoS to support increasingly richer content across a<br />

growing number of subscribers.<br />

4


<strong>Mobile</strong> <strong>Internet</strong> Optimization<br />

5


R A D W A R E M O B I L E I N T E R N E T O P T I M I Z A T I O N K E Y F E A T U R E S & B E N E F I T S<br />

Wire-speed traffic inspection and<br />

granular classification for differentiated<br />

mobile <strong>Internet</strong> data acceleration<br />

CID enables differentiated traffic handling and ‘best-fit’ mobile <strong>Internet</strong> data service<br />

acceleration.<br />

Operating as a WTCP-TCP gateway, Radware’s solution dramatically accelerates TCP<br />

transmission across the mobile RAN. By splitting end-to-end TCP connections into two<br />

parts AppDirector ‘shields’ the problems of the wireless link from the wire-line <strong>Internet</strong><br />

path and vice versa, making it possible to address key differences in TCP latencies,<br />

packet loss and congestions across networks.<br />

WTCP - TCP Gateway for adapted and<br />

truly convergent mobile <strong>Internet</strong><br />

CID-AppXcel WTCP-TCP Gateway makes TCP ‘aware’ of service loss across the RAN.<br />

By managing end-to-end TCP packet transmissions across wire-line and wireless<br />

links CID-AppXcel WTCP-TCP gateway controls TCP service reliability and transmission<br />

integrity.<br />

CID WTCP-TCP Gateway also affords full support of Transactional TCP (T/TCP),<br />

extending the benefits of T/TCP’s from wire-line to wireless networks. These include<br />

enhanced reliability and speed along with reduced bandwidth consumption for short<br />

transactional sessions including World Wide Web, Remote Procedure Calls and DNS<br />

requests.<br />

TCP network transport optimization<br />

for consistent QoS and accelerated<br />

performance<br />

AppXcel optimizes TCP protocol transmission over wireless networks employing<br />

multiple techniques to overcome TCP inefficiencies. AppXcel manages TCP<br />

session initiation eliminating the negative impact of slow session starts, controls<br />

TCP handshakes and TCP transmission window size, including increased initial<br />

window size, packet reordering, maximum transmission unit and packet size<br />

definition to eliminate congestion and service latencies. By managing TCP session<br />

acknowledgement, error handling and retransmission decisions AppXcel further<br />

increases TCP session efficiency and reliability. AppXcel TCP header compression and<br />

IP payload compression coupled with active queuing management are also employed<br />

to accelerate TCP transmission and reduce bandwidth consumption. With AppXcel,<br />

mobile carriers can mitigate inherent TCP transmission inefficiencies, eliminating<br />

their negative impact on mobile data services for faster subscriber access, QoS while<br />

improving link bandwidth utilization loss, to reduce the cost per bit of information<br />

delivered, reducing OpEx.<br />

Advanced Web compression for<br />

improved response times and reduced<br />

data flow bandwidth consumption<br />

AppXcel employs industry leading compression techniques for on-the-fly compression<br />

of mobile data traffic. AppXcel uses loss-less compression techniques to handle<br />

plain text, HTML, Javascript and Content Style Sheets (CSS) mail attachments and<br />

HTTP/SMTP headers, reducing the amount of data being transferred for up to 700%<br />

improvement in mobile <strong>Internet</strong> web page loading times.<br />

Image compression and manipulation<br />

for best end-user performance<br />

To expedite image retrieval, AppXcel image compression employs industry-leading<br />

image manipulation algorithms for up to 90% file size reduction for already<br />

compressed graphic formats, such as JPEG and GIF, enabling these for mobile devices.<br />

AppXcel’s built-in caching further accelerates media retrieval for frequently requested<br />

images, boosting delivery speeds, while significantly reducing bandwidth requirements<br />

to cut mobile network rich media service scaling and operating costs.<br />

6


Smart caching for optimal delivery of<br />

frequently retrieved content<br />

CID analyzes subscriber application and content requests by layer 4-7 information<br />

including URLs and selectively directs subscribers to AppXcel units for the serving<br />

of cached content. By extending caching services from within the Gi network, closer<br />

to users, CID dramatically reduces delivery times across subsequent user requests<br />

for the same content. CID and AppXcel eliminate the need to fetch content from<br />

the <strong>Internet</strong> or recompress, for excellent user response times while reducing overall<br />

bandwidth consumption by eliminating unnecessary network congestion. CID’s unique<br />

smart traffic routing capability makes it possible maximize storage of cached content<br />

in each AppXcel farm, while ensuring highly accurate caching services, preventing<br />

caching overlap, for the best end user experience and highly economical cache<br />

service growth.<br />

Scalable, best-of-breed service growth<br />

through seamless component addition<br />

CID enables the redirection of traffic to any new compression component by any<br />

Layer 2-7 criteria, for seamless addition and full interoperability of best-of-breed<br />

acceleration tools. Affording a unified service delivery platform CID’s flexible<br />

component addition lets carriers economically grow their content security services to<br />

match new business models, or meet growth in customer demand, without requiring<br />

investment in new infrastructure, for CapEx savings and ROI.<br />

Full end-user transparency<br />

Radware mobile acceleration does not require any client installation or plug-in, for<br />

fully transparent operation. This simplifies carrier acceleration service management,<br />

reduces carrier OpEx and delivers immediate mobile data acceleration across all end<br />

user mobile devices.<br />

<strong>Carrier</strong> grade performance, network<br />

transparency and fault tolerance<br />

CID and AppXcel are designed for carrier grade performance, availability and<br />

scalability requirements, capable of handling up to 2,000,000 concurrent sessions<br />

for unlimited service scaling to handle growth in mobile data and subscribers.<br />

CID Multi-Gigabit performance is realized via a 3-tier ASIC and network processing<br />

switching architecture capable extending unprecedented performance. CID, dual<br />

Power Supplies and fully redundant topologies ensure fault tolerance and 99.999%<br />

uptime for uninterrupted smart routing service availability even under the most<br />

demanding application processing and high volume networking environments.<br />

CID supports multi-GGSN configurations for seamless integration in mixed vendor<br />

environments. CID may be installed as either a bridge or a router and operates as a<br />

transparent device, supporting all network tunneling protocols and encapsulations<br />

including MPLS, L2TP, GRE, GTP and PPP, for seamless operation across any carrier<br />

network.<br />

7


<strong>Mobile</strong> <strong>Internet</strong> Traffic Control & Differentiated <strong>Service</strong> <strong>Delivery</strong><br />

Radware Content Inspection Director (CID) enables transparent interception, wire-speed DPI/DFI and smart application traffic<br />

routing across the mobile carrier core, providing the service intelligence needed to optimize traffic to control RAN bandwidth<br />

and enable premium IP service delivery.<br />

With CID, mobile operators can classify traffic by any subscriber, application and content criteria including <strong>Internet</strong> ‘Freeware’<br />

and redirect traffic to relevant network resources including value-added/premium services, content caching, content<br />

acceleration and security processing, or direct traffic to the carrier peering edge for <strong>Internet</strong> applications. With CID operators<br />

can control the off-net traffic as well as the Ingress <strong>Internet</strong> based streaming traffic.<br />

Most importantly CID drives mobile carrier profitability by enabling dynamic service selection and premium value added service<br />

delivery, based on any granular Layer 2-7 service criteria. With Radware, carriers can extend of value of their mobile <strong>Internet</strong><br />

network, delivering the service intelligence needed to identify subscribers and extend a new generation of premium content<br />

<strong>Internet</strong> services.<br />

M O B I L E I N T E R N E T T R A F F I C C O N T R O L C H A L L E N G E S<br />

The market for mobile operators is well poised to introduce new premium <strong>Internet</strong> based subscriber offerings. However the lack of traffic<br />

visibility and the absence of application and subscriber awareness across the mobile network’s data plane make it impossible for operators to<br />

gain control and create differentiated <strong>Internet</strong> business models and proprietary content services.<br />

In addition, when opening mobile networks to the <strong>Internet</strong> bandwidth-hungry ‘freeware’ (eg. Slingbox, YouTube) consume mobile networks<br />

critical RAN resources, negatively impacting the quality of mobile <strong>Internet</strong> ‘walled garden’ services. As a result, mobile operators require tools<br />

capable of controlling and prioritizing all <strong>Internet</strong> traffic, along with the ability to bill by subscriber, service and bandwidth consumption to<br />

support new <strong>Internet</strong> business models<br />

R A D W A R E M O B I L E I N T E R N E T T R A F F I C C O N T R O L K E Y F E A T U R E S & B E N E F I T S<br />

CID transparent ‘edge’ interception,<br />

wire-speed visibility and on-the-fly<br />

provisioning<br />

CID operates as a transparent, multi-gigabit, in-line device capable of intercepting,<br />

identifying and classifying all mobile carrier traffic at wire speeds. CID detects<br />

subscriber, application and content directly from the data-stream, at the carrier<br />

edge and ‘understands’ application semantics, affording the visibility needed to<br />

distinguish and intelligently route traffic to any resource within the carrier core, or<br />

to/from the <strong>Internet</strong>.<br />

8<br />

CID makes it possible to intelligently route traffic across the mobile carrier<br />

core based on any Layer 2-7 policy (Including Web, SIP/SDP and XML based<br />

redirection, along with RADIUS parameters) and any requisite traffic flow enabling<br />

programmable services.


DPI/DFI in the Gi Network<br />

Flow 1- ‘Regular’ open web access<br />

Flow 2- Content monitoring, caching and acceleration (CMA) for <strong>Internet</strong> ‘Freeware’<br />

Flow 3- Premium, differentiated and billable <strong>Internet</strong> services (based on ‘Walled Garden’ policy)<br />

<strong>Mobile</strong> <strong>Internet</strong> Control<br />

9


R A D W A R E M O B I L E I N T E R N E T T R A F F I C C O N T R O L K E Y F E A T U R E S & B E N E F I T S<br />

Smart traffic routing for new revenue<br />

generating services<br />

Capture incremental market share and<br />

increased ARPU by moving beyond<br />

commodity transport, to premium value<br />

added services<br />

Fastest service delivery to subscribers<br />

for best user experience, high mobile<br />

data service responsiveness and<br />

reduced subscriber churn<br />

On-the-fly, self provisioning reducing<br />

time-to-market and management<br />

overhead for new service deployment<br />

•<br />

Premium Walled Garden Content <strong>Service</strong>s: CID ‘captures’ users from the<br />

network edge and selectively routes subscribers to dedicated mobile content<br />

services including Third Party Trans-coding Servers adapting MMS, Presence, On-line<br />

Gaming, Music and any other dedicated content service. With CID mobile carriers<br />

can distinguish between paying and non- paying customers and direct users to<br />

dedicated premium services, letting operators participate in the content service<br />

value chain.<br />

•<br />

Value Added Content Security: CID inspects and selectively redirects relevant<br />

traffic to dedicated scanning services including URL filtering, Anti-Virus services,<br />

Anti-SPAM, among others. CID inspects traffic from both the subscriber and peering<br />

edge affording granular control over all scanning flows, for best-of-breed, multi-step<br />

content security services. <strong>Carrier</strong>s can easily provide a wide set of value added<br />

content security services to their residential and business customers using any<br />

combination of security tools - eg, Symantec, Trend Micro, McAfee etc.- for fully<br />

flexible content security architectures.<br />

•<br />

Value Added Acceleration: CID enables the redirection of traffic to acceleration<br />

services to boost response times for end-users. By using application, content and<br />

destination information, CID can intelligently direct requests to AppXcel accelerators<br />

along with 3rd party products, for web compression, wireless protocol conversion<br />

for acceleration, image download acceleration and TCP optimization, dramatically<br />

improving delivery speeds over fixed and mobile networks.<br />

•<br />

Radius-Based Self Provisioning: CID enables on-the-fly, real-time subscriber<br />

service provisioning, without requiring static, manual reconfiguration. Based on<br />

real-time sniffing of Radius replies, CID enables dynamic subscriber profiling to<br />

match subscribers with relevant services. With CID operators can provision services<br />

to users with dynamic IP addresses, eliminating the need to update and populate<br />

static network policies. CID’s self-provisioning enables the rapid introduction of new<br />

services, dramatically reducing time to- market constraints for mobile data service<br />

rollout along with automated management of subscriber growth for reduced IT<br />

complexity.<br />

<strong>Carrier</strong> grade performance, network<br />

transparency and fault tolerance<br />

Smart application routing availability and<br />

seamless integration<br />

CID is designed for carrier grade performance, availability and scalability<br />

requirements. CID’s Multi-Gigabit performance is realized via a 3-tier ASIC and<br />

network processing switching architecture extending industry leading processing<br />

power and throuput speeds. CID’s dual PS and fully redundant topologies ensure<br />

fault tolerance and 99.999% uptime for uninterrupted service availability even<br />

under the most demanding application processing and high volume networking<br />

environments.<br />

CID supports multi-GGSN/PDSN configurations for seamless integration in mixed<br />

vendor environments. CID may be installed as either a bridge or a router and<br />

operates as a transparent device, supporting all network tunneling protocols and<br />

encapsulations including MPLS, L2TP, GRE, GTP and PPP.<br />

10


Radware <strong>Mobile</strong> <strong>Internet</strong> Security and <strong>Service</strong> Integrity Solution<br />

DefensePro detects and blocks security attacks at wire-speeds, cleaning all mobile <strong>Internet</strong> Gateway traffic from malicious<br />

intrusions and mitigating Denial of <strong>Service</strong> attacks in real-time.<br />

DefensePro couples deep packet inspection/deep flow inspection (DPI/DFI) capabilities with network-based IPS and Behavioral<br />

DoS security to ensure the integrity of mobile <strong>Internet</strong> networks, all the while guaranteeing service continuity and enforcing<br />

mobile <strong>Internet</strong> bandwidth policies to meet customer SLAs:<br />

DefensePro <strong>Internet</strong> Gateway ‘zero minute, zero-touch, zero-false positives’ Network-based IPS and DoS Security<br />

DefensePro affords complete visibility, blocking and rate limiting of all inbound and transit traffic to extend a first line of<br />

defense at the mobile carrier <strong>Internet</strong> Gateway. Operating at multi-gigabit speeds as a transparent in-line device, DefensePro<br />

network IPS blocks malicious content, worms and prevents network scanning/probing to secure Bots and servers against<br />

known attacks. In addition, DefensePro adaptive behavioral DoS/DDoS security delivers and ‘zero minute, zero-touch, zero<br />

false positives’ detection and blocking of even the most aggressive service floods while preventing illicit RAN bandwidth<br />

consumption, safeguarding mobile network infrastructure and subscriber service integrity.<br />

Traffic Shaping for <strong>Mobile</strong> <strong>Internet</strong> <strong>Service</strong> Continuity and SLAs<br />

‘Opening’ the mobile network to the <strong>Internet</strong> introduces uncontrolled traffic that can cause service bottlenecks and degrade<br />

end-user service performance. DefensePro multi-level, proactive, real-time behavioral traffic shaping extends full control over<br />

mobile <strong>Internet</strong> bandwidth, moderating and prioritizing traffic to guarantee service QoS for end users. By cleaning all attack<br />

traffic and rate limiting uncontrolled traffic DefensePro lets mobile carriers ensure end-user SLAs and optimize bandwidth<br />

utilization for additional OpEx savings.<br />

M O B I L E I N T E R N E T S E C U R I T Y C H A L L E N G E S<br />

<strong>Mobile</strong> <strong>Internet</strong> networks are exposed to new security and service integrity challenges brought on by carrying uncontrolled <strong>Internet</strong> and peering<br />

traffic that contain growing volumes of malicious attacks. DoS attacks, worms and malware aimed at critical mobile network infrastructure<br />

throughout the Gi/Pi network can negatively impact ‘high-touch’ servers including DNS, DHCP, Radius among others such as over-theair<br />

servers, causing service disruptions and failures as well as compromising network elements by attacking the control plane and the<br />

management plane through targeted exploits. <strong>Mobile</strong> <strong>Internet</strong> network threats include new forms of compound DDoS/DoS-worm attacks that<br />

consume huge volumes of bandwidth, while propagating aggressively across mobile networks and subscribers in minutes rather than days.<br />

Other forms of attacks include low-scale traffic scanning/probing as well as targeted Bot attacks. In addition, new ‘low rate’ battery draining<br />

attacks have emerged as an effective means of exploiting mobile handsets as well as the mobile network itself through Paging attacks.<br />

Thus in addition to threatening mobile <strong>Internet</strong> service continuity, uncontrolled attack traffic causes severe service disruptions that degrade<br />

service and prevent carriers from meeting customer SLAs.<br />

11


12<br />

<strong>Mobile</strong> <strong>Internet</strong> Security


R A D W A R E M O B I L E S E C U R I T Y K E Y F E A T U R E S & B E N E F I T S<br />

Wire-speed, in-line DPI/DFI, security<br />

classification<br />

DefensePro operates as an in-line, transparent device, supporting all network tunneling<br />

protocols and encapsulations including MPLS, L2TP, GRE, GTP and PPP and IPV6 for<br />

wire-speed traffic inspection, security classification and integrity across all mobile carrier<br />

environments and peering points.<br />

Zero minute flood protection through<br />

unique behavioral anomaly detection<br />

<strong>Carrier</strong> network service continuity,<br />

ensuring customer SLAs and<br />

eliminating costs associated with<br />

security attacks (including DNS, DHCP,<br />

Radius, SIP service integrity)<br />

DefensePro behavioral IPS and DoS modules deliver ‘zero-minute, zero-touch’ security<br />

protecting against network attacks ensuring carrier and subscriber service integrity while<br />

preventing service failures to guarantee SLAs:<br />

- DefensePro adaptive, behavioral DoS/DDoS delivers wire-speed mitigation of<br />

network floods including TCP Syn floods, other TCP floods (Psh+Ack, Reset, FIN...), UDP<br />

floods, DNS floods, ICMP floods, IGMP floods and aggressive self-propagating worms<br />

(TCP and UDP worms). Applying fuzzy logic algorithms for analysis and correlation of<br />

anomalies DefensePro immediately detects any form of DoS attack and creates a filter<br />

‘on-the-fly’ to mitigate it.<br />

- DefensePro worm propagation protection algorithms immediately block the spread of<br />

attacks and identify mis-behaving users, to pre-empt attack outbreaks.<br />

- DefensePro server protection algorithms protect against server DoS, application<br />

vulnerability scanning and brute force attacks.<br />

IPS signature based protection, for service<br />

integrity<br />

DefensePro signature based protection is designed to block over 1,500 signature<br />

attacks and known DoS attacks in real time. Based on a patented ASIC based<br />

StringMatch Engine, DefensePro inspects traffic to identify malicious content, known<br />

worms, viruses and other attack signatures, immediately blocking known attacks.<br />

Radware attack database, profile-based policies and pre-defined signature groups are<br />

dedicated to preventing mass volume customer oriented attacks, affording protection<br />

for SIP applications, DNS, web applications, messaging etc. ensuring the integrity of<br />

all mission critical carrier infrastructure. In addition, Radware Security Update <strong>Service</strong><br />

(SUS) delivers ongoing protection from new and emergent threats.<br />

Traffic shaping and infrastructure<br />

protection<br />

Bandwidth optimization to ensure<br />

customer SLAs for mission critical<br />

applications and optimize carrier OPEX<br />

DefensePro Bandwidth Management (BWM) module lets carriers rate limit and shape<br />

traffic to further protect mobile carrier mission critical resources against attacks and<br />

surges. By limiting the number of sessions for critical resources per end user (SIP<br />

registrars, DHCP requests etc.) or limiting total bandwidth to a critical resource (total<br />

DNS requests for example) DefensePro BWM normalizes traffic to prevent flooding,<br />

SLAs, eliminate congestions and preventing uncontrolled worm propagation on top of<br />

P2P traffic, all the while guaranteeing bandwidth to meet SLAs.<br />

Attack visibility & understanding<br />

Enables effective security management<br />

and streamlines security reporting<br />

APSolute Insite provides comprehensive attack visibility and reporting, enabling<br />

immediate identification of attack sources, attack analysis over time and full reporting<br />

of attack scope. With APSolute Insite, mobile carriers can gain understanding of mobile<br />

<strong>Internet</strong> service vulnerabilities to better manage network and service security.<br />

<strong>Carrier</strong>-grade reliability and performance<br />

<strong>Mobile</strong> <strong>Internet</strong> security availability and<br />

continuity<br />

DefensePro delivers unmatched, carrier-grade 6Gbps security processing performance<br />

and reliability. Built on top of a 4-tier ASIC switching architecture —with a 44 GB<br />

wire-speed non-blocking backplane, dual network processors, RISC processor and<br />

a hardware ASIC StringMatch Engine for 1000X accelerated inspection speeds.<br />

DefensePro’s internal bypasses, dual PS and fully redundant topologies ensure fault<br />

tolerance and 99.99 % uptime.<br />

13


International Headquarters<br />

Americas Headquarters<br />

APAC Headquarters<br />

EMEA Headquarters<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Au s tra lia<br />

Belgium<br />

B ra zil<br />

G e rm a n y<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

H o n g K on g<br />

In d ia<br />

Ita ly<br />

Ja p a n<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Ko re a<br />

Netherlands<br />

R u ssi a<br />

S in ga p o re<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

S o u th Africa<br />

Sp a in<br />

Taiw a n<br />

Th a il a n d<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

U n it ed K ingd o m

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!