Cross-vendor Network Analytics, Active CyberSecurity, and Monetization Opportunities

redborder's Big Data, Scale-Out, and Open Source architecture is compatible with leading wired and wireless technology manufacturers offering Service Providers (SPs) and Managed SPs the possibility to blend, in a single platform, cybersecurity and network operations tools.

Cross-vendor Network Analytics, Active CyberSecurity, and Monetization Opportunities

redborder's Big Data, Scale-Out, and Open Source architecture is compatible with leading wired and wireless technology manufacturers offering Service Providers (SPs) and Managed SPs the possibility to blend, in a single platform, cybersecurity and network operations tools.

It is the perfect territory for redborder!

redborder's Big Data, Scale Out and Open Source architecture is compatible with leading wired and wireless technology manufacturers offering Service Providers (SPs) and Managed SPs the possibility to blend, in a single platform, cybersecurity and network operations tools, as well as to explore new revenue sources based on the analytics of data crossing their networks.

 

  • Custom innovation: You have access to the source code to modify, improve, and adapt redborder to your specific needs. There is a public and documented API tool for those that want to interact with it from the outside.

 

  • Integration: Cross-vendor analytics in a single place. Support for leading wireless vendor protocols. One technical data pool for all networks.

 

  • Massive Deployments: Deploy thousands of redborder probes (IPS, mail, web, endPoint) for no extra charge. Centralized and hierarchical Management for thousands of probes in multiple environments: Open Stack or virtualization.

 

  • Cloud Ready Architecture: Multi-tenant, multi-domain, multi-site, multi-brand architecture and autoscaling cloud. Our technology is ready to deploy, you choose how: AWS, Open Stack, and soon with Azure.

 

Most important features of Service Providers
Geolocation
Geolocation
Geoblocking
Geoblocking
Risk Level
Risk Level
Attacks detection
Attacks detection
URL/IP reputation
URL/IP reputation
Anomally detection
Anomally detection
Policy control
Policy control
Hierarchical policies
Hierarchical policies
Centralized configuration
Centralized configuration
Cybersecurity
Cybersecurity

Use Cases:

  • Complete analytics and efficient protection for big events: Venues, stadiums, even smart cities! Know user behaviour, the impact of your marketing actions, user-level sentiment and more in real time.

  • Operational Intelligence at terabyte scale: Network usage, bandwidth, radio coverage, device-clasification, threats, attacks, geolocation services, tracking, and more.

  • Monetization opportunities: Become a redborder partner and increase your sales level by offering a complete cybersecurity and analytics solution to your clients.

 

 

Case study Global Congress

redborder had the opportunity to collaborate in a large international event equipped with the latest technology: one of the biggest deployments in the world of CISCO WiFi antennas. Thanks to a full integration of our solution with their wireless network infrastructure, we were able to obtain network traffic data with a precision of one minute.

The architecture of redborder's deployment:

  • redborder platform deployed in a remote environment

  • Local deployment of a redborder Client Proxy Cluster: local reception of all network data, compression, tunneling, authentication and transmission to the remote environment

  • redborder IPS probes (managed from the remote platform) for detecting attacks and filtering traffic

redborder is compatible with the following protocols, among others:

  • NetFlow 9

  • SNMP

  • Twitter

  • CISCO Application Visibility & Control

  • Radius

The digestion of Netflow (IPFIX) in layer 7 (thanks to the CISCO Visibility & Control Application integration) combined with real-time enrichment of the location of each device in the eight pavilions, Social Media feeds (Twitter), risk analysis, and traffic reputation helped to create valuable dashboards for any kind of profile.

Analytics and Cybersecurity dashboards in the Global Congress:

  • Operational Intelligence

-Bandwidth use by devices and zones

-Saturation

-RF Power

-Quality User Experience measurement

-User-Level sentiment analysis: localization and hashtags 

 

  • Social Value Analysis

-Visitors frequency by zones

-Mass movement monitorization

-Use of services statistics

-Dweling Time

-Traffic transit measurement between areas

 

  • Marketing Analysis

    -Customer Satisfaction through Social Media posts

    -Event website visits

    -Interaction rates and bounces in landing pages

 

  • Ciberprotection

-Traffic cleaning in real time

-Instrusion Prevention

-Traffic geofiltering

-IP or URL reputation filtering

-Anomaly detection

 

  • Demographic and trends Analysis

-Brand and type of devices

-Geolocalization and Classification by age, sex, job position or interests

-Usage Patterns identification depending on the type of user

 

BENEFITS

Improve your machine data lakes efficiently

  • Streamline operations

    • Operational efficiency improvement in multivendor network monitorization:  WiFi, 3-4G, IP. A common cross-vendor and cross-network platform. Automatic deployment of virtual probes by client. 

 

  • Cost reduction

    • Massive scalability with no extra cost. We offer different licensing modes based on data volume, Flat rate, revenue sharing…

 

  • New business models

    • Services based on layer 7 analysis, geolocalization, Social Media feeds and demographic analysis.

  • MSP opportunity

    • Celan traffic services, reputation, intrusion prevention and traffic visibility as a Service. The choice is yours: from your own cloud or in redborder cloud. Our solution has unlimited possibilities of customization.

1.5K APs

102K unique devices

40K Concurrent devices

1.2 Tb Machine Data gathered per day

More than 35K nf/s

"This new platform gives us the opportunity to correlate all the data we are collecting so that we can monetize it through a common API"

George Manuelian, Director SP Mobile Solution

There are solutions for many industry areas.
Financial

Your organization manages highly sensitive data every day that could compromise your security and that of your clients. We provide you the best collaborative threat intelligence: real-time traffic reputation and classification feeds to keep intrusions away, phishing and malware attempts.