Investment protection and flexibility
The BorderNet Session Border Controller (SBC) leverages virtualized computing environments to help make networks easier to connect. Example applications for the BorderNet Session Border Controller (SBC) include:
Reliably and securely extract, process and visualize real-time operational data and media and signaling traffic
Enables better insight into commercial services and technical issues through increased understanding and anticipation of the trends in usage, session performance, and service quality Real-time dashboard and business intelligence reporting
Advanced security built inProtect network integrity and service quality from being compromised:
- Common software across all deployment options
- Easy transition between deployment models
- Light-weight software footprint
- Current deployment models
- Public cloud – Amazon Web Service (AWS), Microsoft Azure
- Private cloud – VMware, KVM, Hyper-V
- COTS – HP DL380, HP DL20
- Scales to over 100,000 sessions and 1,000 sessions per second per single instance
- Easily deployed and operated through RESTful API to manage all SBC features and functions
- State-of-the-art EMS and local management GUI
- Native software or hardware transcoding
- High availability & geo-redundancy
- Flexible network-wide licensing and progressive commercial models
The BorderNet Session Border Controller (SBC) leverages virtualized computing environments to help make networks easier to connect. Example applications for the BorderNet Session Border Controller (SBC) include:
- Interconnecting diverse mobile and fixed networks - IP Multimedia Subsystem (IMS), Voice over LTE (VoLTE), IPX networks, NGN SIP and H.323 networks
- Enterprise SIP trunks
- Residential and business VoIP services
- Hosted Unified Communications (UC) and contact center services
- Distributed SIP peering leveraging virtualized environments
- Detecting and reducing fraud
- IPv4 to IPv6 migration initiatives
- Managing multiple peering partners
- Traffic cost optimization and service quality improvement
- Data center provider Infrastructure as a Service (IaaS) applications
Reliably and securely extract, process and visualize real-time operational data and media and signaling traffic
Enables better insight into commercial services and technical issues through increased understanding and anticipation of the trends in usage, session performance, and service quality Real-time dashboard and business intelligence reporting
Advanced security built inProtect network integrity and service quality from being compromised:
- Topology hiding
- Built-in firewall
- Dynamic access control lists and black lists
- Protection against DoS attacks
- Real-time message syntax and semantics inspection
- Protection against malformed messages
- Encryption, including TLS, IPsec, SRTP pass-through and HTTPS
- Message flood protection
- Rogue RTP detection and bandwidth control
- Adaptive overload and traffic prioritization