SlideShare uma empresa Scribd logo
1 de 19
Friendly TR-069 Device Management
Solution Cloud Version
January 2016
Start
The IoT & Device Management Company
Smart Home
Open Platform
Internet of Things/M2M
Management
Device Management
for Fixed & Mobile
Friendly Technologies Mission
www.friendly-tech.com
2
Friendly Technologies is a leading provider of carrier-class device management
software for IoT/M2M, Smart Home and Triple Play services. Our best-of-breed
approach enables service providers to avoid device dependency and manage
multiple types of devices on a single platform.
Friendly’s platform enables customers to automatically connect and provision
new devices, monitor QoE, configure and update firmware remotely, and
streamline their support services, while its server and cloud-based solutions
offer analytical insights to service providers.
Partial List of Our Customers
wwww.friendly-tech.com
3
Friendly Technologies at a Glance
www.friendly-tech.com
4
Software solution developer, serving Carrier and xSP market since 1997
The most installed Unified Device Management solution in the world
Focused on Device Management since 2006
Strong global network of local channels, distributors and system
integrators acting as local partners
Member of Broadband Forum and Open Mobile Alliance
Offices in Israel, USA, Colombia and Ukraine
Friendly Technologies at a Glance
Friendly Technologies is a winner of
Frost & Sullivan’s 2015 Best Practices Award
for the Best Customer Value in
Unified Device & Smart Home Management
Friendly Technologies Line of Products
www.friendly-tech.com
6
 Device Management
TR-069, OMA-DM & SNMP device
management to streamline the support of Data,
VoIP and IPTV services.
 Smart Home Management
Open platform for full Smart Home
management.The solution includes
management server and white label Smart
Home mobile app for increased ARPU.
 Internet ofThings
Friendly's Internet ofThings/M2M product line
is a white-label device management platform
for Utilities, Health Care, Industrial M2M,
Transportation & Smart City verticals. Friendly
offers both management server and embedded
clients.
 4G LTE & WiMAX Device Management
TR-069 and OMA-DM device management to
accelerate the deployment and support of
fixed and mobile devices for the LTE world.
 QoE Monitoring
Advanced QoE monitoring and analysis of
Data,VoIP & IPTV services from the
subscriber’s end.
 OMA-DM Mobile Device Management
OMA-DM based mobile device management
targeted to xSPs and enterprise for managing
and supporting mobile devices including
BYOD.The solution includes also an OMA-DM
client for the BYOD market.
The Solution
www.friendly-tech.com
7
 Multi-Tenant Hosted / Cloud ACS solution
 Robust and scalable at all modules and features level
 Modularity and easy per -tenant adaptations and management
 Separation of management / monitoring and provisioning tasks
 Separation and easy adaptation of tenant Northbound API towards back office
applications
Friendly’s Multi-Tenant HLD Architecture
www.friendly-tech.com
8
NBI/API
Admin Console
Self-Support
Portal
QoE Monitoring.
Support Center
Provisioning
Portal
Events Managt..
Friendly’s Multi-Tenant
SaaS ACS
Tenant1.com
Tenant2.org
ISP “South.net”
OSS/BSS
TR-69/OMA-
DM Devices
OSS/BSS
OSS/BSS
TR-69/OMA-
DM Devices
TR-69/OMA-
DM Devices
Friendly Technologies Architecture
www.friendly-tech.com
9
ISP/Tenant A ISP/Tenant BRG/IAD / Routers
/STB/IP Phones/ Smart
Phones/ Femto / MiFi /
USB Dongle / M2M/
Android Devices
RG/IAD / Routers
/STB/IP Phones/ Smart
Phones/ Femto / MiFi /
USB Dongle / M2M/
Android Devices
Each tenant has a full-featured portfolio with a total separation
Association Methods
www.friendly-tech.com
10
 Association via Device ACS username
 Association via Domain suffix towards
“location” user info field at ACS
Database can be performedVIA API
calls
 Secured isolation between Domains
 Multi-level operator’s rights within
each tenant
Device-to-tenant & Device-to-operator
Individual User Adaption of Views
www.friendly-tech.com
11
In Call Center Portal
Per-tenant &
per- username
and level display
settings
Adaptation of
information element
box location,
contents and
technical depth
Individual Tenant & User Level
www.friendly-tech.com
12
Activity and Log Action Reports
ACS Security Aspects
www.friendly-tech.com
13
 The Broadband Forum designed theTR-069 security model to provide a high
degree of security in the interactions that use it.
 The CPE WAN Management Protocol is designed to prevent tampering with the
transactions that take place between a CPE and ACS, provide confidentiality for
these transactions, and allow various levels of authentication.
 The protocol includes additional security mechanisms associated with the
optional Signed Voucher mechanism and the Signed Package Format, described
in Annex C and Annex E, respectively.
General
Security Highlights of ACS Transactions
www.friendly-tech.com
14
WAN- Internet
or ISP VPN domain
HTTP/
HTTPSHTTP
TR-069 Device TR-069 Device
ACS Server
SSL Offload Device
(recommended)
If the ACS URL has been
specified as an HTTPS URL,
the CPE MUST establish
connections to the ACS using
SSL/TLS
Support for CPE authentication
using client-side certificate is
OPTIONAL for both the CPE
and ACS. Such client-side
certificate MUST be signed by
an appropriate chain
The “host” portion of the ACS
URL is used by the CPE for
validating the certificate from
the ACS when using certificate-
based authentication
https://acs.friendly-
tech.com:8080/ftacs-digest/ACS
https://acs.friendly-
tech.com:8080/ftacs-basic/ACS
https://acs.friendly-
tech.com:8080/ftacs-digest/ACS
ACS to Southbound and Northbound Security
www.friendly-tech.com
15
WAN- Internet
or ISP VPN domain
TR-069 Device
HTTP/HTTPS security +
specific URL domain +
SSL/TLS options and
additional certificate
security options
Secured firewalled
(application and ports
ACL) and user
privileged activity lists
OSS/BSS/CRM
and web servers
Admins/CSR
users
Authentication of
ACS devices +
ACS server side
certificate
options/white-
black list filters
ACS Server
WAN corporate firewall-
specific domain/protocol/
port protection
External
storage
devices
Friendly’s Extensive Security Measures
www.friendly-tech.com
16
Friendly has introduced the following additional security enhancements to cover the
main vulnerabilities stated bellow.These are explained in more detail in “Friendly’s
TR69 security aspects” document.
 SECURITY ZONES
 ACS WS authentication
 NBIWS obscured
 DB connection details encrypted
 Users Management
 PathTraversalVulnerability
 Cross Site Scripting Vulnerability
 Unprotected Management Interface
Vulnerability
 Insecure HTTP MethodsVulnerability
 Insufficient Anti-Automation Vulnerability
 Information Leak Vulnerability
Why Us?
www.friendly-tech.com
17
 Software solution developer, serving Carrier and xSP market since 1997
 The most installed Unified Device Management Solution in the world
 Carrier-class, scalable solution to manage millions of devices
 Feature-rich solution to support Any Device on Any Network over Any
Protocol
 Unique “Smart Layer”Technology - automated integration and management
of any types of devices without a need for manual intervention.
 Fastest and easiest installation and deployment –minimum professional
services required
 We Are Friendly! Friendly to deploy, integrate, use (Friendly GUI) and receive
professional support from
 Our Call Center Portal is known to be the #1 solution in the world for dramatic
reduction of operational costs ( up to 70%).
QUESTIONS TIME!
ThankYou forYourTime!
Start
The IoT & Device Management Company
Smart Home
Open Platform
Internet of Things/M2M
Management
Device Management
for Fixed & Mobile

Mais conteúdo relacionado

Mais procurados

Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriElmarkPlusTurkiye
 
New H3 C Enterprise Portfolio May 15
New H3 C Enterprise Portfolio   May 15New H3 C Enterprise Portfolio   May 15
New H3 C Enterprise Portfolio May 15embeijlen
 
Alcatel Lucent 5780 Dynamic Services Controller (DSC) Product Highlights
Alcatel Lucent 5780 Dynamic Services Controller (DSC) Product HighlightsAlcatel Lucent 5780 Dynamic Services Controller (DSC) Product Highlights
Alcatel Lucent 5780 Dynamic Services Controller (DSC) Product HighlightsRay Sharma
 
Manufacturing IoT - OPC UA Information Revolution
Manufacturing IoT - OPC UA Information RevolutionManufacturing IoT - OPC UA Information Revolution
Manufacturing IoT - OPC UA Information RevolutionBill Lydon
 
Meru Presentation
Meru PresentationMeru Presentation
Meru Presentationmacmillant
 
TrueView/32 Enterprise - Network Management Software
TrueView/32 Enterprise - Network Management SoftwareTrueView/32 Enterprise - Network Management Software
TrueView/32 Enterprise - Network Management SoftwareRonald Bartels
 
WP1402 - Harris LTE_Portfolio
WP1402 - Harris LTE_PortfolioWP1402 - Harris LTE_Portfolio
WP1402 - Harris LTE_PortfolioSatyajit Adhyapak
 
Industrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesStephane Potier
 
B03504008012
B03504008012B03504008012
B03504008012theijes
 
Unified Security Architectures for Web and WAP
Unified Security Architectures for Web and WAPUnified Security Architectures for Web and WAP
Unified Security Architectures for Web and WAPOliver Pfaff
 
Enea Element On-Device Management Datasheet
Enea Element On-Device Management DatasheetEnea Element On-Device Management Datasheet
Enea Element On-Device Management DatasheetEnea Software AB
 
IoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway MarketIoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway MarketEurotech
 
OSN Bay Area Feb 2019 Meetup: Intel, Dynamic Device Personalization - Journey...
OSN Bay Area Feb 2019 Meetup: Intel, Dynamic Device Personalization - Journey...OSN Bay Area Feb 2019 Meetup: Intel, Dynamic Device Personalization - Journey...
OSN Bay Area Feb 2019 Meetup: Intel, Dynamic Device Personalization - Journey...Lumina Networks
 

Mais procurados (19)

Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router Çözümleri
 
New H3 C Enterprise Portfolio May 15
New H3 C Enterprise Portfolio   May 15New H3 C Enterprise Portfolio   May 15
New H3 C Enterprise Portfolio May 15
 
Alcatel Lucent 5780 Dynamic Services Controller (DSC) Product Highlights
Alcatel Lucent 5780 Dynamic Services Controller (DSC) Product HighlightsAlcatel Lucent 5780 Dynamic Services Controller (DSC) Product Highlights
Alcatel Lucent 5780 Dynamic Services Controller (DSC) Product Highlights
 
Manufacturing IoT - OPC UA Information Revolution
Manufacturing IoT - OPC UA Information RevolutionManufacturing IoT - OPC UA Information Revolution
Manufacturing IoT - OPC UA Information Revolution
 
CIMCO MPLS
CIMCO MPLSCIMCO MPLS
CIMCO MPLS
 
Meru Presentation
Meru PresentationMeru Presentation
Meru Presentation
 
IMS presentation
IMS presentationIMS presentation
IMS presentation
 
TrueView/32 Enterprise - Network Management Software
TrueView/32 Enterprise - Network Management SoftwareTrueView/32 Enterprise - Network Management Software
TrueView/32 Enterprise - Network Management Software
 
WP1402 - Harris LTE_Portfolio
WP1402 - Harris LTE_PortfolioWP1402 - Harris LTE_Portfolio
WP1402 - Harris LTE_Portfolio
 
Industrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologies
 
B03504008012
B03504008012B03504008012
B03504008012
 
Huawei 6 month industrail training program
Huawei 6 month industrail training programHuawei 6 month industrail training program
Huawei 6 month industrail training program
 
Unified Security Architectures for Web and WAP
Unified Security Architectures for Web and WAPUnified Security Architectures for Web and WAP
Unified Security Architectures for Web and WAP
 
Enea Element On-Device Management Datasheet
Enea Element On-Device Management DatasheetEnea Element On-Device Management Datasheet
Enea Element On-Device Management Datasheet
 
IMS Presentation
IMS PresentationIMS Presentation
IMS Presentation
 
IoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway MarketIoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway Market
 
OSN Bay Area Feb 2019 Meetup: Intel, Dynamic Device Personalization - Journey...
OSN Bay Area Feb 2019 Meetup: Intel, Dynamic Device Personalization - Journey...OSN Bay Area Feb 2019 Meetup: Intel, Dynamic Device Personalization - Journey...
OSN Bay Area Feb 2019 Meetup: Intel, Dynamic Device Personalization - Journey...
 
LTE MTC evolution
LTE MTC evolutionLTE MTC evolution
LTE MTC evolution
 
CentralizedSerialWP
CentralizedSerialWPCentralizedSerialWP
CentralizedSerialWP
 

Destaque

More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)William Lee
 
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies
 
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2Axiros
 
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1Axiros
 
CWMP TR-069 Training (Chinese)
CWMP TR-069 Training (Chinese)CWMP TR-069 Training (Chinese)
CWMP TR-069 Training (Chinese)William Lee
 
Canadian automotive tour core narrative
Canadian automotive tour core narrativeCanadian automotive tour core narrative
Canadian automotive tour core narrativeBen Kelly
 
Ostinato FOSS.IN 2010
Ostinato FOSS.IN 2010Ostinato FOSS.IN 2010
Ostinato FOSS.IN 2010pstavirs
 
Cablenet Company Presentation
Cablenet Company PresentationCablenet Company Presentation
Cablenet Company Presentationptheodoridis
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069William Lee
 
Dpdk accelerated Ostinato
Dpdk accelerated OstinatoDpdk accelerated Ostinato
Dpdk accelerated Ostinatopstavirs
 

Destaque (13)

More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)
 
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
 
Tr 069
Tr 069Tr 069
Tr 069
 
Tr 069
Tr 069Tr 069
Tr 069
 
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
 
Cablenet Company Presentation
Cablenet Company PresentationCablenet Company Presentation
Cablenet Company Presentation
 
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
 
CWMP TR-069 Training (Chinese)
CWMP TR-069 Training (Chinese)CWMP TR-069 Training (Chinese)
CWMP TR-069 Training (Chinese)
 
Canadian automotive tour core narrative
Canadian automotive tour core narrativeCanadian automotive tour core narrative
Canadian automotive tour core narrative
 
Ostinato FOSS.IN 2010
Ostinato FOSS.IN 2010Ostinato FOSS.IN 2010
Ostinato FOSS.IN 2010
 
Cablenet Company Presentation
Cablenet Company PresentationCablenet Company Presentation
Cablenet Company Presentation
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
 
Dpdk accelerated Ostinato
Dpdk accelerated OstinatoDpdk accelerated Ostinato
Dpdk accelerated Ostinato
 

Semelhante a TR-069 Device Management Solution Cloud Version

Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain
 
[Solace] Open Data Movement for Connected Vehicles
[Solace] Open Data Movement for Connected Vehicles[Solace] Open Data Movement for Connected Vehicles
[Solace] Open Data Movement for Connected VehiclesTomo Yamaguchi
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009
EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009
EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009Manuela Moroncini
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected CarAngel Villar Garea
 
OPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationOPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationAVEVA
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Communication Devices Inc
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT GatewayEurotech
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityBrian Kesecker
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Xirrus
 
The enterprise differentiator of mq on zos
The enterprise differentiator of mq on zosThe enterprise differentiator of mq on zos
The enterprise differentiator of mq on zosMatt Leming
 
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Marketing Team
 
Customer Highleveloverview
Customer HighleveloverviewCustomer Highleveloverview
Customer Highleveloverviewrehanf5
 

Semelhante a TR-069 Device Management Solution Cloud Version (20)

Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
 
[Solace] Open Data Movement for Connected Vehicles
[Solace] Open Data Movement for Connected Vehicles[Solace] Open Data Movement for Connected Vehicles
[Solace] Open Data Movement for Connected Vehicles
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009
EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009
EMC - Bruno Melandri, Cloud Computing, Milano 2 luglio 2009
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected Car
 
OPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationOPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC Foundation
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
 
Embrace network
Embrace networkEmbrace network
Embrace network
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
Forti os ngfw
Forti os ngfwForti os ngfw
Forti os ngfw
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
 
The enterprise differentiator of mq on zos
The enterprise differentiator of mq on zosThe enterprise differentiator of mq on zos
The enterprise differentiator of mq on zos
 
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix company brochure 2012
Cellnetrix company brochure 2012
 
ACTAtek unique features
ACTAtek unique featuresACTAtek unique features
ACTAtek unique features
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus
 
Customer Highleveloverview
Customer HighleveloverviewCustomer Highleveloverview
Customer Highleveloverview
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
 

Último

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

TR-069 Device Management Solution Cloud Version

  • 1. Friendly TR-069 Device Management Solution Cloud Version January 2016 Start The IoT & Device Management Company Smart Home Open Platform Internet of Things/M2M Management Device Management for Fixed & Mobile
  • 2. Friendly Technologies Mission www.friendly-tech.com 2 Friendly Technologies is a leading provider of carrier-class device management software for IoT/M2M, Smart Home and Triple Play services. Our best-of-breed approach enables service providers to avoid device dependency and manage multiple types of devices on a single platform. Friendly’s platform enables customers to automatically connect and provision new devices, monitor QoE, configure and update firmware remotely, and streamline their support services, while its server and cloud-based solutions offer analytical insights to service providers.
  • 3. Partial List of Our Customers wwww.friendly-tech.com 3
  • 4. Friendly Technologies at a Glance www.friendly-tech.com 4 Software solution developer, serving Carrier and xSP market since 1997 The most installed Unified Device Management solution in the world Focused on Device Management since 2006 Strong global network of local channels, distributors and system integrators acting as local partners Member of Broadband Forum and Open Mobile Alliance Offices in Israel, USA, Colombia and Ukraine
  • 5. Friendly Technologies at a Glance Friendly Technologies is a winner of Frost & Sullivan’s 2015 Best Practices Award for the Best Customer Value in Unified Device & Smart Home Management
  • 6. Friendly Technologies Line of Products www.friendly-tech.com 6  Device Management TR-069, OMA-DM & SNMP device management to streamline the support of Data, VoIP and IPTV services.  Smart Home Management Open platform for full Smart Home management.The solution includes management server and white label Smart Home mobile app for increased ARPU.  Internet ofThings Friendly's Internet ofThings/M2M product line is a white-label device management platform for Utilities, Health Care, Industrial M2M, Transportation & Smart City verticals. Friendly offers both management server and embedded clients.  4G LTE & WiMAX Device Management TR-069 and OMA-DM device management to accelerate the deployment and support of fixed and mobile devices for the LTE world.  QoE Monitoring Advanced QoE monitoring and analysis of Data,VoIP & IPTV services from the subscriber’s end.  OMA-DM Mobile Device Management OMA-DM based mobile device management targeted to xSPs and enterprise for managing and supporting mobile devices including BYOD.The solution includes also an OMA-DM client for the BYOD market.
  • 7. The Solution www.friendly-tech.com 7  Multi-Tenant Hosted / Cloud ACS solution  Robust and scalable at all modules and features level  Modularity and easy per -tenant adaptations and management  Separation of management / monitoring and provisioning tasks  Separation and easy adaptation of tenant Northbound API towards back office applications
  • 8. Friendly’s Multi-Tenant HLD Architecture www.friendly-tech.com 8 NBI/API Admin Console Self-Support Portal QoE Monitoring. Support Center Provisioning Portal Events Managt.. Friendly’s Multi-Tenant SaaS ACS Tenant1.com Tenant2.org ISP “South.net” OSS/BSS TR-69/OMA- DM Devices OSS/BSS OSS/BSS TR-69/OMA- DM Devices TR-69/OMA- DM Devices
  • 9. Friendly Technologies Architecture www.friendly-tech.com 9 ISP/Tenant A ISP/Tenant BRG/IAD / Routers /STB/IP Phones/ Smart Phones/ Femto / MiFi / USB Dongle / M2M/ Android Devices RG/IAD / Routers /STB/IP Phones/ Smart Phones/ Femto / MiFi / USB Dongle / M2M/ Android Devices Each tenant has a full-featured portfolio with a total separation
  • 10. Association Methods www.friendly-tech.com 10  Association via Device ACS username  Association via Domain suffix towards “location” user info field at ACS Database can be performedVIA API calls  Secured isolation between Domains  Multi-level operator’s rights within each tenant Device-to-tenant & Device-to-operator
  • 11. Individual User Adaption of Views www.friendly-tech.com 11 In Call Center Portal Per-tenant & per- username and level display settings Adaptation of information element box location, contents and technical depth
  • 12. Individual Tenant & User Level www.friendly-tech.com 12 Activity and Log Action Reports
  • 13. ACS Security Aspects www.friendly-tech.com 13  The Broadband Forum designed theTR-069 security model to provide a high degree of security in the interactions that use it.  The CPE WAN Management Protocol is designed to prevent tampering with the transactions that take place between a CPE and ACS, provide confidentiality for these transactions, and allow various levels of authentication.  The protocol includes additional security mechanisms associated with the optional Signed Voucher mechanism and the Signed Package Format, described in Annex C and Annex E, respectively. General
  • 14. Security Highlights of ACS Transactions www.friendly-tech.com 14 WAN- Internet or ISP VPN domain HTTP/ HTTPSHTTP TR-069 Device TR-069 Device ACS Server SSL Offload Device (recommended) If the ACS URL has been specified as an HTTPS URL, the CPE MUST establish connections to the ACS using SSL/TLS Support for CPE authentication using client-side certificate is OPTIONAL for both the CPE and ACS. Such client-side certificate MUST be signed by an appropriate chain The “host” portion of the ACS URL is used by the CPE for validating the certificate from the ACS when using certificate- based authentication https://acs.friendly- tech.com:8080/ftacs-digest/ACS https://acs.friendly- tech.com:8080/ftacs-basic/ACS https://acs.friendly- tech.com:8080/ftacs-digest/ACS
  • 15. ACS to Southbound and Northbound Security www.friendly-tech.com 15 WAN- Internet or ISP VPN domain TR-069 Device HTTP/HTTPS security + specific URL domain + SSL/TLS options and additional certificate security options Secured firewalled (application and ports ACL) and user privileged activity lists OSS/BSS/CRM and web servers Admins/CSR users Authentication of ACS devices + ACS server side certificate options/white- black list filters ACS Server WAN corporate firewall- specific domain/protocol/ port protection External storage devices
  • 16. Friendly’s Extensive Security Measures www.friendly-tech.com 16 Friendly has introduced the following additional security enhancements to cover the main vulnerabilities stated bellow.These are explained in more detail in “Friendly’s TR69 security aspects” document.  SECURITY ZONES  ACS WS authentication  NBIWS obscured  DB connection details encrypted  Users Management  PathTraversalVulnerability  Cross Site Scripting Vulnerability  Unprotected Management Interface Vulnerability  Insecure HTTP MethodsVulnerability  Insufficient Anti-Automation Vulnerability  Information Leak Vulnerability
  • 17. Why Us? www.friendly-tech.com 17  Software solution developer, serving Carrier and xSP market since 1997  The most installed Unified Device Management Solution in the world  Carrier-class, scalable solution to manage millions of devices  Feature-rich solution to support Any Device on Any Network over Any Protocol  Unique “Smart Layer”Technology - automated integration and management of any types of devices without a need for manual intervention.  Fastest and easiest installation and deployment –minimum professional services required  We Are Friendly! Friendly to deploy, integrate, use (Friendly GUI) and receive professional support from  Our Call Center Portal is known to be the #1 solution in the world for dramatic reduction of operational costs ( up to 70%).
  • 19. ThankYou forYourTime! Start The IoT & Device Management Company Smart Home Open Platform Internet of Things/M2M Management Device Management for Fixed & Mobile

Notas do Editor

  1. READ PLEASE! Before you open this template be sure that you have installed these fonts: OpenSans-Light.ttf, OpenSans-Semibold.ttf and OpenSans-Extrabold.ttf from: http://www.fontsquirrel.com/fonts/open-sans All fonts are free for use in commercial projects! If you have any problems with this presentation, please contact with me from this page: http://graphicriver.net/user/Bandidos?ref=bandidos In this slide there is a background placeholder. Click to the small icon on the center of the slide and choose an image from computer. When add an image, you must sent it to back with Right Click on Image -> Send to Back -> Send to Back.