SlideShare uma empresa Scribd logo
1 de 8
SpearHead TechServ CONNECT
MOBILE MPLS-LAN ANYWHERE
100% ENTERPRISE SECURITY-NOTHING BEYOND THIS
ENTERPRISE MOBILITY IS A MUST
Mobility is a must for Employees & executives of all kinds of organizations as
their business reach and markets spread to Enterprise levels.
Executives when mobile have to be equipped with access to data compulsorily
that goes beyond just mail access.
As of today the only available option is to provide executives with an internet
access facility mostly using a data card or a cellular modem. The executives
connect to Internet & then connect to their corporate networks using a dial up
VPN like L2TP, PPTP etc.
With the presence of internet channel, no matter what kind of VPN, encryption is used,
no matter using whatever methods to secure logins like 2 factor authentications with
OTP deployments etc, the organizational data on the hosts is exposed to internet.
Whatever end point security is deployed the risk of data loss is
predominant as there is no way the usage of the mobile host can
be controlled. Maximum it can be logged & later retrieved.
SECURITY IMPLICATIONS EXTERNAL
Whenever a user connect to a corporate network for resources, even if using a
highly encrypted dial up VPN due to the internet connectivity being the main access
source, the connected host can easily become a gateway for internet hackers to
get onto the corporate LAN network
CORPORATE DATA SECURITY IS EITHER 100% OR ITS JUST 0%
Corporates deploy various kinds of DLP systems, but these also don’t provide control
over corporate data existing on hosts like laptops of mobile executives.
Assessing a risk factor for any corporate network having mobile hosts, its always found
that there are enough security risks. The risk factor remains the same even if the
assessment is done taking into consideration the multi firewalls deployed, Intrusion
Prevention, Filtering, End Point security, DLP, VPN’s with strong encryption etc.
A NEW CONCEPT : MANAGED CONNECTIVITY & SERVICES
Private MPLS VPLS & no INTERNET
SOLUTION : EXTEND LAN TO FOLLOW MOBILE
USERS USING MPLS PVT CONECTIVITY
Spearhead TechServ provides a unique state of art solution wherein IT HAS ITS
OWN APN IN THE SPECTRUM SPACE OF NATIONAL CELLULAR PROVIDERS.
And TechServ connects to the National Cellular Provider Central DC by a PPP link
in burst bandwidth mode. On the service provider end it connects directly to the
CGSN port dedicated to the private APN
At the other DC the link terminates on an Advanced L3 Switch with every port being
capable of working as an independent collision domain.
The Private APN of TechServ is broadcasted across all the circles of the cellular
provider all over India. Any subscriber of TechServ no matter where he is his
device connects to the Private APN & in the next hop lands at Data Center to
which its to be connected.
END TO END PRIVATE MPLS LINK
INTEGRATION OF GSM & MPLS CORE
First & the only solution for 100% Security
Private APN is created and a solution is configured on a National GSM
network.
• Private APN service is activated on a Mobile Numbers data card provided for
data connectivity.
• Private APN Name is configured in GSM device (data card or
phone), terminal, module or modem to be used for data connectivity using the
corporate SIM card.
• When GSM device connects using Private APN it does not connect to Internet at
all. A direct secured connection MPLS connection is established to the corporate
network as desired by enterprise.
ANY EXISTING END POINT SECURITY PLATFORM CAN BE USED TO LOCK
A HOST or a LAPTOP TO THE FOLLOWING VARIABLES:
User name, password, mobile number, IMSI, IMEI, SIM Number etc
Even the static IP address can be permanently mapped to a host.
KEY HIGHLIGHTS
Secured Private MPLS Connection
Reduce total cost of ownership & running costs
Ensure Compliance with Company’s IT LAN policy to all
Prevent & Control Internet Usage. User access internet
through the Internet gateway at the organizational DC
 0 Data loss possibilities. Link speeds from 3.5 mbps to 9
mbps. Performance at a latency that is lower than 60
to 70 % achieved over a dial up VPN.
 CLOSE TO 0 CAPITAL COSTS. For all mobile users its just
corp data network that is being made available, not Internet +
VPN + NAC for authentication & authorization + End point
logs analysis for investigations

Mais conteúdo relacionado

Mais procurados

12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
AamirAziz
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
Sowmia Sathyan
 

Mais procurados (20)

Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Top vpn interview question and answer
Top vpn  interview question and answerTop vpn  interview question and answer
Top vpn interview question and answer
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
V P N
V P NV P N
V P N
 
Virtual private network, vpn presentation
Virtual private network, vpn presentationVirtual private network, vpn presentation
Virtual private network, vpn presentation
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)
 
4ipnet Centralized AP Management
4ipnet Centralized AP Management4ipnet Centralized AP Management
4ipnet Centralized AP Management
 
LAN Security
LAN Security LAN Security
LAN Security
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 
VPN
VPNVPN
VPN
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 

Destaque

Complete Comprehensive Converged Connectivity ite.biz -final
Complete Comprehensive Converged Connectivity   ite.biz -finalComplete Comprehensive Converged Connectivity   ite.biz -final
Complete Comprehensive Converged Connectivity ite.biz -final
Syed S Ahmed
 

Destaque (20)

World's First High & multi specialty healthcare quadrangle for Tele Medical O...
World's First High & multi specialty healthcare quadrangle for Tele Medical O...World's First High & multi specialty healthcare quadrangle for Tele Medical O...
World's First High & multi specialty healthcare quadrangle for Tele Medical O...
 
Introducing ANYWHERE, the book
Introducing ANYWHERE, the bookIntroducing ANYWHERE, the book
Introducing ANYWHERE, the book
 
Complete Comprehensive Converged Connectivity ite.biz -final
Complete Comprehensive Converged Connectivity   ite.biz -finalComplete Comprehensive Converged Connectivity   ite.biz -final
Complete Comprehensive Converged Connectivity ite.biz -final
 
Digital Future: Trends & Opportunities You Need to Know About
Digital Future: Trends & Opportunities You Need to Know AboutDigital Future: Trends & Opportunities You Need to Know About
Digital Future: Trends & Opportunities You Need to Know About
 
Asian Carriers' Conference: The Changing Face Of Communication Acc Rob Van De...
Asian Carriers' Conference: The Changing Face Of Communication Acc Rob Van De...Asian Carriers' Conference: The Changing Face Of Communication Acc Rob Van De...
Asian Carriers' Conference: The Changing Face Of Communication Acc Rob Van De...
 
Evaluating a Sluggish Economy with Bruce Yandle
Evaluating a Sluggish Economy with Bruce YandleEvaluating a Sluggish Economy with Bruce Yandle
Evaluating a Sluggish Economy with Bruce Yandle
 
IT Business Models & The 4 Faces of the CIO
IT Business Models & The 4 Faces of the CIOIT Business Models & The 4 Faces of the CIO
IT Business Models & The 4 Faces of the CIO
 
Understanding the U.S. Health Care System
Understanding the U.S. Health Care SystemUnderstanding the U.S. Health Care System
Understanding the U.S. Health Care System
 
Capitol Hill Campis March 2016
Capitol Hill Campis March 2016Capitol Hill Campis March 2016
Capitol Hill Campis March 2016
 
ACA Has Worsened Medicaid's Structural Problems
ACA Has Worsened Medicaid's Structural ProblemsACA Has Worsened Medicaid's Structural Problems
ACA Has Worsened Medicaid's Structural Problems
 
Redefining Boundaries - Total Telecom Festival 1 Dec 2015
Redefining Boundaries -  Total Telecom Festival 1 Dec 2015Redefining Boundaries -  Total Telecom Festival 1 Dec 2015
Redefining Boundaries - Total Telecom Festival 1 Dec 2015
 
CIO Agenda Insights 2016
CIO Agenda Insights 2016CIO Agenda Insights 2016
CIO Agenda Insights 2016
 
Outthinking disruption - Adapt to the fast-moving digital world or risk irrel...
Outthinking disruption - Adapt to the fast-moving digital world or risk irrel...Outthinking disruption - Adapt to the fast-moving digital world or risk irrel...
Outthinking disruption - Adapt to the fast-moving digital world or risk irrel...
 
Affordable Care Act's 6 Year Anniversary
Affordable Care Act's 6 Year AnniversaryAffordable Care Act's 6 Year Anniversary
Affordable Care Act's 6 Year Anniversary
 
The Digital Revolution: Impact on Educational Innovation, Reform and Governance
The Digital Revolution: Impact on Educational Innovation, Reform and GovernanceThe Digital Revolution: Impact on Educational Innovation, Reform and Governance
The Digital Revolution: Impact on Educational Innovation, Reform and Governance
 
An Economic Situation Update with Bruce Yandle
An Economic Situation Update with Bruce YandleAn Economic Situation Update with Bruce Yandle
An Economic Situation Update with Bruce Yandle
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
 
What Should We Do about Cyber Attacks?
What Should We Do about Cyber Attacks?What Should We Do about Cyber Attacks?
What Should We Do about Cyber Attacks?
 
How to innovate your ICT business
How to innovate your ICT businessHow to innovate your ICT business
How to innovate your ICT business
 
Future Technology Trends and Predictions
Future Technology Trends and PredictionsFuture Technology Trends and Predictions
Future Technology Trends and Predictions
 

Semelhante a Spearhead mpls over 3 g with national mobility

White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
Christopher Lietz
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
Christopher Lietz
 
Netbiter solutions to m2m problems with ethernet and gprs 3g
Netbiter solutions to m2m problems with ethernet and gprs  3gNetbiter solutions to m2m problems with ethernet and gprs  3g
Netbiter solutions to m2m problems with ethernet and gprs 3g
netbiter
 
Wdvpn presentation
Wdvpn presentationWdvpn presentation
Wdvpn presentation
rel comm
 
Introduction April 22
Introduction April 22Introduction April 22
Introduction April 22
Nick Kovacic
 
AUST_Permaconn Catalogue_v3_Email
AUST_Permaconn Catalogue_v3_EmailAUST_Permaconn Catalogue_v3_Email
AUST_Permaconn Catalogue_v3_Email
Andrew Lee
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
Brian Kesecker
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
Chandan Jha
 
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
RAJASHREE B
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
HirazNor
 

Semelhante a Spearhead mpls over 3 g with national mobility (20)

White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
vpn
vpnvpn
vpn
 
Netbiter solutions to m2m problems with ethernet and gprs 3g
Netbiter solutions to m2m problems with ethernet and gprs  3gNetbiter solutions to m2m problems with ethernet and gprs  3g
Netbiter solutions to m2m problems with ethernet and gprs 3g
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
Wdvpn presentation
Wdvpn presentationWdvpn presentation
Wdvpn presentation
 
Take the hype out of hybrid
Take the hype out of hybridTake the hype out of hybrid
Take the hype out of hybrid
 
Introduction April 22
Introduction April 22Introduction April 22
Introduction April 22
 
AUST_Permaconn Catalogue_v3_Email
AUST_Permaconn Catalogue_v3_EmailAUST_Permaconn Catalogue_v3_Email
AUST_Permaconn Catalogue_v3_Email
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
 
GETTING YOUR BUSINESS ULTRA-CONNECTED
GETTING YOUR BUSINESS ULTRA-CONNECTEDGETTING YOUR BUSINESS ULTRA-CONNECTED
GETTING YOUR BUSINESS ULTRA-CONNECTED
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
iZone Presentation
iZone PresentationiZone Presentation
iZone Presentation
 
Ranks ITT Profile Presentation
Ranks ITT Profile PresentationRanks ITT Profile Presentation
Ranks ITT Profile Presentation
 
cisco security training
cisco security trainingcisco security training
cisco security training
 
Dial up security
Dial up securityDial up security
Dial up security
 
Telus - Network as a service
Telus - Network as a serviceTelus - Network as a service
Telus - Network as a service
 
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Spearhead mpls over 3 g with national mobility

  • 1. SpearHead TechServ CONNECT MOBILE MPLS-LAN ANYWHERE 100% ENTERPRISE SECURITY-NOTHING BEYOND THIS
  • 2. ENTERPRISE MOBILITY IS A MUST Mobility is a must for Employees & executives of all kinds of organizations as their business reach and markets spread to Enterprise levels. Executives when mobile have to be equipped with access to data compulsorily that goes beyond just mail access. As of today the only available option is to provide executives with an internet access facility mostly using a data card or a cellular modem. The executives connect to Internet & then connect to their corporate networks using a dial up VPN like L2TP, PPTP etc. With the presence of internet channel, no matter what kind of VPN, encryption is used, no matter using whatever methods to secure logins like 2 factor authentications with OTP deployments etc, the organizational data on the hosts is exposed to internet. Whatever end point security is deployed the risk of data loss is predominant as there is no way the usage of the mobile host can be controlled. Maximum it can be logged & later retrieved.
  • 3. SECURITY IMPLICATIONS EXTERNAL Whenever a user connect to a corporate network for resources, even if using a highly encrypted dial up VPN due to the internet connectivity being the main access source, the connected host can easily become a gateway for internet hackers to get onto the corporate LAN network CORPORATE DATA SECURITY IS EITHER 100% OR ITS JUST 0% Corporates deploy various kinds of DLP systems, but these also don’t provide control over corporate data existing on hosts like laptops of mobile executives. Assessing a risk factor for any corporate network having mobile hosts, its always found that there are enough security risks. The risk factor remains the same even if the assessment is done taking into consideration the multi firewalls deployed, Intrusion Prevention, Filtering, End Point security, DLP, VPN’s with strong encryption etc.
  • 4. A NEW CONCEPT : MANAGED CONNECTIVITY & SERVICES Private MPLS VPLS & no INTERNET
  • 5. SOLUTION : EXTEND LAN TO FOLLOW MOBILE USERS USING MPLS PVT CONECTIVITY Spearhead TechServ provides a unique state of art solution wherein IT HAS ITS OWN APN IN THE SPECTRUM SPACE OF NATIONAL CELLULAR PROVIDERS. And TechServ connects to the National Cellular Provider Central DC by a PPP link in burst bandwidth mode. On the service provider end it connects directly to the CGSN port dedicated to the private APN At the other DC the link terminates on an Advanced L3 Switch with every port being capable of working as an independent collision domain. The Private APN of TechServ is broadcasted across all the circles of the cellular provider all over India. Any subscriber of TechServ no matter where he is his device connects to the Private APN & in the next hop lands at Data Center to which its to be connected.
  • 6. END TO END PRIVATE MPLS LINK
  • 7. INTEGRATION OF GSM & MPLS CORE First & the only solution for 100% Security Private APN is created and a solution is configured on a National GSM network. • Private APN service is activated on a Mobile Numbers data card provided for data connectivity. • Private APN Name is configured in GSM device (data card or phone), terminal, module or modem to be used for data connectivity using the corporate SIM card. • When GSM device connects using Private APN it does not connect to Internet at all. A direct secured connection MPLS connection is established to the corporate network as desired by enterprise. ANY EXISTING END POINT SECURITY PLATFORM CAN BE USED TO LOCK A HOST or a LAPTOP TO THE FOLLOWING VARIABLES: User name, password, mobile number, IMSI, IMEI, SIM Number etc Even the static IP address can be permanently mapped to a host.
  • 8. KEY HIGHLIGHTS Secured Private MPLS Connection Reduce total cost of ownership & running costs Ensure Compliance with Company’s IT LAN policy to all Prevent & Control Internet Usage. User access internet through the Internet gateway at the organizational DC  0 Data loss possibilities. Link speeds from 3.5 mbps to 9 mbps. Performance at a latency that is lower than 60 to 70 % achieved over a dial up VPN.  CLOSE TO 0 CAPITAL COSTS. For all mobile users its just corp data network that is being made available, not Internet + VPN + NAC for authentication & authorization + End point logs analysis for investigations