SlideShare a Scribd company logo
SpearHead TechServ CONNECT
MOBILE MPLS-LAN ANYWHERE
100% ENTERPRISE SECURITY-NOTHING BEYOND THIS
ENTERPRISE MOBILITY IS A MUST
Mobility is a must for Employees & executives of all kinds of organizations as
their business reach and markets spread to Enterprise levels.
Executives when mobile have to be equipped with access to data compulsorily
that goes beyond just mail access.
As of today the only available option is to provide executives with an internet
access facility mostly using a data card or a cellular modem. The executives
connect to Internet & then connect to their corporate networks using a dial up
VPN like L2TP, PPTP etc.
With the presence of internet channel, no matter what kind of VPN, encryption is used,
no matter using whatever methods to secure logins like 2 factor authentications with
OTP deployments etc, the organizational data on the hosts is exposed to internet.
Whatever end point security is deployed the risk of data loss is
predominant as there is no way the usage of the mobile host can
be controlled. Maximum it can be logged & later retrieved.
SECURITY IMPLICATIONS EXTERNAL
Whenever a user connect to a corporate network for resources, even if using a
highly encrypted dial up VPN due to the internet connectivity being the main access
source, the connected host can easily become a gateway for internet hackers to
get onto the corporate LAN network
CORPORATE DATA SECURITY IS EITHER 100% OR ITS JUST 0%
Corporates deploy various kinds of DLP systems, but these also don’t provide control
over corporate data existing on hosts like laptops of mobile executives.
Assessing a risk factor for any corporate network having mobile hosts, its always found
that there are enough security risks. The risk factor remains the same even if the
assessment is done taking into consideration the multi firewalls deployed, Intrusion
Prevention, Filtering, End Point security, DLP, VPN’s with strong encryption etc.
A NEW CONCEPT : MANAGED CONNECTIVITY & SERVICES
Private MPLS VPLS & no INTERNET
SOLUTION : EXTEND LAN TO FOLLOW MOBILE
USERS USING MPLS PVT CONECTIVITY
Spearhead TechServ provides a unique state of art solution wherein IT HAS ITS
OWN APN IN THE SPECTRUM SPACE OF NATIONAL CELLULAR PROVIDERS.
And TechServ connects to the National Cellular Provider Central DC by a PPP link
in burst bandwidth mode. On the service provider end it connects directly to the
CGSN port dedicated to the private APN
At the other DC the link terminates on an Advanced L3 Switch with every port being
capable of working as an independent collision domain.
The Private APN of TechServ is broadcasted across all the circles of the cellular
provider all over India. Any subscriber of TechServ no matter where he is his
device connects to the Private APN & in the next hop lands at Data Center to
which its to be connected.
END TO END PRIVATE MPLS LINK
INTEGRATION OF GSM & MPLS CORE
First & the only solution for 100% Security
Private APN is created and a solution is configured on a National GSM
network.
• Private APN service is activated on a Mobile Numbers data card provided for
data connectivity.
• Private APN Name is configured in GSM device (data card or
phone), terminal, module or modem to be used for data connectivity using the
corporate SIM card.
• When GSM device connects using Private APN it does not connect to Internet at
all. A direct secured connection MPLS connection is established to the corporate
network as desired by enterprise.
ANY EXISTING END POINT SECURITY PLATFORM CAN BE USED TO LOCK
A HOST or a LAPTOP TO THE FOLLOWING VARIABLES:
User name, password, mobile number, IMSI, IMEI, SIM Number etc
Even the static IP address can be permanently mapped to a host.
KEY HIGHLIGHTS
Secured Private MPLS Connection
Reduce total cost of ownership & running costs
Ensure Compliance with Company’s IT LAN policy to all
Prevent & Control Internet Usage. User access internet
through the Internet gateway at the organizational DC
 0 Data loss possibilities. Link speeds from 3.5 mbps to 9
mbps. Performance at a latency that is lower than 60
to 70 % achieved over a dial up VPN.
 CLOSE TO 0 CAPITAL COSTS. For all mobile users its just
corp data network that is being made available, not Internet +
VPN + NAC for authentication & authorization + End point
logs analysis for investigations

More Related Content

What's hot

Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 
Top vpn interview question and answer
Top vpn  interview question and answerTop vpn  interview question and answer
Top vpn interview question and answer
Hub4Tech.com
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
Ankit Anand
 
V P N
V P NV P N
V P N
bhathiji
 
Virtual private network, vpn presentation
Virtual private network, vpn presentationVirtual private network, vpn presentation
Virtual private network, vpn presentation
Amjad Bhutto
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
Saikiran Panjala
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
AamirAziz
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
Areeba Gill
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
SANDEEPONSLIDESHARE
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)
Rajendra Dangwal
 
4ipnet Centralized AP Management
4ipnet Centralized AP Management4ipnet Centralized AP Management
4ipnet Centralized AP Management
4ipnet
 
LAN Security
LAN Security LAN Security
LAN Security
Syed Ubaid Ali Jafri
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
Abrish06
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
nikshaikh786
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
Mohamed Shishtawy
 
VPN
VPNVPN
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
Swarup Kumar Mall
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
Vignesh Suresh
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
siDz
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
Sowmia Sathyan
 

What's hot (20)

Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Top vpn interview question and answer
Top vpn  interview question and answerTop vpn  interview question and answer
Top vpn interview question and answer
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
V P N
V P NV P N
V P N
 
Virtual private network, vpn presentation
Virtual private network, vpn presentationVirtual private network, vpn presentation
Virtual private network, vpn presentation
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)
 
4ipnet Centralized AP Management
4ipnet Centralized AP Management4ipnet Centralized AP Management
4ipnet Centralized AP Management
 
LAN Security
LAN Security LAN Security
LAN Security
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 
VPN
VPNVPN
VPN
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 

Viewers also liked

World's First High & multi specialty healthcare quadrangle for Tele Medical O...
World's First High & multi specialty healthcare quadrangle for Tele Medical O...World's First High & multi specialty healthcare quadrangle for Tele Medical O...
World's First High & multi specialty healthcare quadrangle for Tele Medical O...
Syed S Ahmed
 
Introducing ANYWHERE, the book
Introducing ANYWHERE, the bookIntroducing ANYWHERE, the book
Introducing ANYWHERE, the book
Yankee Group
 
Complete Comprehensive Converged Connectivity ite.biz -final
Complete Comprehensive Converged Connectivity   ite.biz -finalComplete Comprehensive Converged Connectivity   ite.biz -final
Complete Comprehensive Converged Connectivity ite.biz -final
Syed S Ahmed
 
Digital Future: Trends & Opportunities You Need to Know About
Digital Future: Trends & Opportunities You Need to Know AboutDigital Future: Trends & Opportunities You Need to Know About
Digital Future: Trends & Opportunities You Need to Know About
Monty C. M. Metzger
 
Asian Carriers' Conference: The Changing Face Of Communication Acc Rob Van De...
Asian Carriers' Conference: The Changing Face Of Communication Acc Rob Van De...Asian Carriers' Conference: The Changing Face Of Communication Acc Rob Van De...
Asian Carriers' Conference: The Changing Face Of Communication Acc Rob Van De...
Rob Van Den Dam
 
Evaluating a Sluggish Economy with Bruce Yandle
Evaluating a Sluggish Economy with Bruce YandleEvaluating a Sluggish Economy with Bruce Yandle
Evaluating a Sluggish Economy with Bruce Yandle
Mercatus Center
 
IT Business Models & The 4 Faces of the CIO
IT Business Models & The 4 Faces of the CIOIT Business Models & The 4 Faces of the CIO
IT Business Models & The 4 Faces of the CIO
Gar Mac Críosta
 
Understanding the U.S. Health Care System
Understanding the U.S. Health Care SystemUnderstanding the U.S. Health Care System
Understanding the U.S. Health Care System
Mercatus Center
 
Capitol Hill Campis March 2016
Capitol Hill Campis March 2016Capitol Hill Campis March 2016
Capitol Hill Campis March 2016
Mercatus Center
 
ACA Has Worsened Medicaid's Structural Problems
ACA Has Worsened Medicaid's Structural ProblemsACA Has Worsened Medicaid's Structural Problems
ACA Has Worsened Medicaid's Structural Problems
Mercatus Center
 
Redefining Boundaries - Total Telecom Festival 1 Dec 2015
Redefining Boundaries -  Total Telecom Festival 1 Dec 2015Redefining Boundaries -  Total Telecom Festival 1 Dec 2015
Redefining Boundaries - Total Telecom Festival 1 Dec 2015
Rob Van Den Dam
 
CIO Agenda Insights 2016
CIO Agenda Insights 2016CIO Agenda Insights 2016
Outthinking disruption - Adapt to the fast-moving digital world or risk irrel...
Outthinking disruption - Adapt to the fast-moving digital world or risk irrel...Outthinking disruption - Adapt to the fast-moving digital world or risk irrel...
Outthinking disruption - Adapt to the fast-moving digital world or risk irrel...
Rob Van Den Dam
 
Affordable Care Act's 6 Year Anniversary
Affordable Care Act's 6 Year AnniversaryAffordable Care Act's 6 Year Anniversary
Affordable Care Act's 6 Year Anniversary
Mercatus Center
 
The Digital Revolution: Impact on Educational Innovation, Reform and Governance
The Digital Revolution: Impact on Educational Innovation, Reform and GovernanceThe Digital Revolution: Impact on Educational Innovation, Reform and Governance
The Digital Revolution: Impact on Educational Innovation, Reform and Governance
EduSkills OECD
 
An Economic Situation Update with Bruce Yandle
An Economic Situation Update with Bruce YandleAn Economic Situation Update with Bruce Yandle
An Economic Situation Update with Bruce Yandle
Mercatus Center
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
Mercatus Center
 
What Should We Do about Cyber Attacks?
What Should We Do about Cyber Attacks?What Should We Do about Cyber Attacks?
What Should We Do about Cyber Attacks?
Mercatus Center
 
How to innovate your ICT business
How to innovate your ICT businessHow to innovate your ICT business
How to innovate your ICT business
Won Kwang University
 
Future Technology Trends and Predictions
Future Technology Trends and PredictionsFuture Technology Trends and Predictions
Future Technology Trends and Predictions
Eric Hansen, ISA
 

Viewers also liked (20)

World's First High & multi specialty healthcare quadrangle for Tele Medical O...
World's First High & multi specialty healthcare quadrangle for Tele Medical O...World's First High & multi specialty healthcare quadrangle for Tele Medical O...
World's First High & multi specialty healthcare quadrangle for Tele Medical O...
 
Introducing ANYWHERE, the book
Introducing ANYWHERE, the bookIntroducing ANYWHERE, the book
Introducing ANYWHERE, the book
 
Complete Comprehensive Converged Connectivity ite.biz -final
Complete Comprehensive Converged Connectivity   ite.biz -finalComplete Comprehensive Converged Connectivity   ite.biz -final
Complete Comprehensive Converged Connectivity ite.biz -final
 
Digital Future: Trends & Opportunities You Need to Know About
Digital Future: Trends & Opportunities You Need to Know AboutDigital Future: Trends & Opportunities You Need to Know About
Digital Future: Trends & Opportunities You Need to Know About
 
Asian Carriers' Conference: The Changing Face Of Communication Acc Rob Van De...
Asian Carriers' Conference: The Changing Face Of Communication Acc Rob Van De...Asian Carriers' Conference: The Changing Face Of Communication Acc Rob Van De...
Asian Carriers' Conference: The Changing Face Of Communication Acc Rob Van De...
 
Evaluating a Sluggish Economy with Bruce Yandle
Evaluating a Sluggish Economy with Bruce YandleEvaluating a Sluggish Economy with Bruce Yandle
Evaluating a Sluggish Economy with Bruce Yandle
 
IT Business Models & The 4 Faces of the CIO
IT Business Models & The 4 Faces of the CIOIT Business Models & The 4 Faces of the CIO
IT Business Models & The 4 Faces of the CIO
 
Understanding the U.S. Health Care System
Understanding the U.S. Health Care SystemUnderstanding the U.S. Health Care System
Understanding the U.S. Health Care System
 
Capitol Hill Campis March 2016
Capitol Hill Campis March 2016Capitol Hill Campis March 2016
Capitol Hill Campis March 2016
 
ACA Has Worsened Medicaid's Structural Problems
ACA Has Worsened Medicaid's Structural ProblemsACA Has Worsened Medicaid's Structural Problems
ACA Has Worsened Medicaid's Structural Problems
 
Redefining Boundaries - Total Telecom Festival 1 Dec 2015
Redefining Boundaries -  Total Telecom Festival 1 Dec 2015Redefining Boundaries -  Total Telecom Festival 1 Dec 2015
Redefining Boundaries - Total Telecom Festival 1 Dec 2015
 
CIO Agenda Insights 2016
CIO Agenda Insights 2016CIO Agenda Insights 2016
CIO Agenda Insights 2016
 
Outthinking disruption - Adapt to the fast-moving digital world or risk irrel...
Outthinking disruption - Adapt to the fast-moving digital world or risk irrel...Outthinking disruption - Adapt to the fast-moving digital world or risk irrel...
Outthinking disruption - Adapt to the fast-moving digital world or risk irrel...
 
Affordable Care Act's 6 Year Anniversary
Affordable Care Act's 6 Year AnniversaryAffordable Care Act's 6 Year Anniversary
Affordable Care Act's 6 Year Anniversary
 
The Digital Revolution: Impact on Educational Innovation, Reform and Governance
The Digital Revolution: Impact on Educational Innovation, Reform and GovernanceThe Digital Revolution: Impact on Educational Innovation, Reform and Governance
The Digital Revolution: Impact on Educational Innovation, Reform and Governance
 
An Economic Situation Update with Bruce Yandle
An Economic Situation Update with Bruce YandleAn Economic Situation Update with Bruce Yandle
An Economic Situation Update with Bruce Yandle
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
 
What Should We Do about Cyber Attacks?
What Should We Do about Cyber Attacks?What Should We Do about Cyber Attacks?
What Should We Do about Cyber Attacks?
 
How to innovate your ICT business
How to innovate your ICT businessHow to innovate your ICT business
How to innovate your ICT business
 
Future Technology Trends and Predictions
Future Technology Trends and PredictionsFuture Technology Trends and Predictions
Future Technology Trends and Predictions
 

Similar to Spearhead mpls over 3 g with national mobility

White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
Christopher Lietz
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
Christopher Lietz
 
vpn
vpnvpn
Netbiter solutions to m2m problems with ethernet and gprs 3g
Netbiter solutions to m2m problems with ethernet and gprs  3gNetbiter solutions to m2m problems with ethernet and gprs  3g
Netbiter solutions to m2m problems with ethernet and gprs 3g
netbiter
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
Karthikeyan303142
 
Wdvpn presentation
Wdvpn presentationWdvpn presentation
Wdvpn presentation
rel comm
 
Take the hype out of hybrid
Take the hype out of hybridTake the hype out of hybrid
Take the hype out of hybrid
Orange Business Services
 
Introduction April 22
Introduction April 22Introduction April 22
Introduction April 22
Nick Kovacic
 
AUST_Permaconn Catalogue_v3_Email
AUST_Permaconn Catalogue_v3_EmailAUST_Permaconn Catalogue_v3_Email
AUST_Permaconn Catalogue_v3_Email
Andrew Lee
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
Brian Kesecker
 
GETTING YOUR BUSINESS ULTRA-CONNECTED
GETTING YOUR BUSINESS ULTRA-CONNECTEDGETTING YOUR BUSINESS ULTRA-CONNECTED
GETTING YOUR BUSINESS ULTRA-CONNECTED
Mallory Zemelis
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
Chandan Jha
 
iZone Presentation
iZone PresentationiZone Presentation
iZone Presentation
Anil Chandrasekhar
 
Ranks ITT Profile Presentation
Ranks ITT Profile PresentationRanks ITT Profile Presentation
Ranks ITT Profile Presentation
Rubaiath Rahman
 
cisco security training
cisco security trainingcisco security training
cisco security training
qosnetworking
 
Dial up security
Dial up securityDial up security
Dial up security
Ramla Sheikh
 
Telus - Network as a service
Telus - Network as a serviceTelus - Network as a service
Telus - Network as a service
Gavin M Amos.
 
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
RAJASHREE B
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
HirazNor
 

Similar to Spearhead mpls over 3 g with national mobility (20)

White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
vpn
vpnvpn
vpn
 
Netbiter solutions to m2m problems with ethernet and gprs 3g
Netbiter solutions to m2m problems with ethernet and gprs  3gNetbiter solutions to m2m problems with ethernet and gprs  3g
Netbiter solutions to m2m problems with ethernet and gprs 3g
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 
Wdvpn presentation
Wdvpn presentationWdvpn presentation
Wdvpn presentation
 
Take the hype out of hybrid
Take the hype out of hybridTake the hype out of hybrid
Take the hype out of hybrid
 
Introduction April 22
Introduction April 22Introduction April 22
Introduction April 22
 
AUST_Permaconn Catalogue_v3_Email
AUST_Permaconn Catalogue_v3_EmailAUST_Permaconn Catalogue_v3_Email
AUST_Permaconn Catalogue_v3_Email
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
 
GETTING YOUR BUSINESS ULTRA-CONNECTED
GETTING YOUR BUSINESS ULTRA-CONNECTEDGETTING YOUR BUSINESS ULTRA-CONNECTED
GETTING YOUR BUSINESS ULTRA-CONNECTED
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
iZone Presentation
iZone PresentationiZone Presentation
iZone Presentation
 
Ranks ITT Profile Presentation
Ranks ITT Profile PresentationRanks ITT Profile Presentation
Ranks ITT Profile Presentation
 
cisco security training
cisco security trainingcisco security training
cisco security training
 
Dial up security
Dial up securityDial up security
Dial up security
 
Telus - Network as a service
Telus - Network as a serviceTelus - Network as a service
Telus - Network as a service
 
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 

Recently uploaded

SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 

Recently uploaded (20)

SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 

Spearhead mpls over 3 g with national mobility

  • 1. SpearHead TechServ CONNECT MOBILE MPLS-LAN ANYWHERE 100% ENTERPRISE SECURITY-NOTHING BEYOND THIS
  • 2. ENTERPRISE MOBILITY IS A MUST Mobility is a must for Employees & executives of all kinds of organizations as their business reach and markets spread to Enterprise levels. Executives when mobile have to be equipped with access to data compulsorily that goes beyond just mail access. As of today the only available option is to provide executives with an internet access facility mostly using a data card or a cellular modem. The executives connect to Internet & then connect to their corporate networks using a dial up VPN like L2TP, PPTP etc. With the presence of internet channel, no matter what kind of VPN, encryption is used, no matter using whatever methods to secure logins like 2 factor authentications with OTP deployments etc, the organizational data on the hosts is exposed to internet. Whatever end point security is deployed the risk of data loss is predominant as there is no way the usage of the mobile host can be controlled. Maximum it can be logged & later retrieved.
  • 3. SECURITY IMPLICATIONS EXTERNAL Whenever a user connect to a corporate network for resources, even if using a highly encrypted dial up VPN due to the internet connectivity being the main access source, the connected host can easily become a gateway for internet hackers to get onto the corporate LAN network CORPORATE DATA SECURITY IS EITHER 100% OR ITS JUST 0% Corporates deploy various kinds of DLP systems, but these also don’t provide control over corporate data existing on hosts like laptops of mobile executives. Assessing a risk factor for any corporate network having mobile hosts, its always found that there are enough security risks. The risk factor remains the same even if the assessment is done taking into consideration the multi firewalls deployed, Intrusion Prevention, Filtering, End Point security, DLP, VPN’s with strong encryption etc.
  • 4. A NEW CONCEPT : MANAGED CONNECTIVITY & SERVICES Private MPLS VPLS & no INTERNET
  • 5. SOLUTION : EXTEND LAN TO FOLLOW MOBILE USERS USING MPLS PVT CONECTIVITY Spearhead TechServ provides a unique state of art solution wherein IT HAS ITS OWN APN IN THE SPECTRUM SPACE OF NATIONAL CELLULAR PROVIDERS. And TechServ connects to the National Cellular Provider Central DC by a PPP link in burst bandwidth mode. On the service provider end it connects directly to the CGSN port dedicated to the private APN At the other DC the link terminates on an Advanced L3 Switch with every port being capable of working as an independent collision domain. The Private APN of TechServ is broadcasted across all the circles of the cellular provider all over India. Any subscriber of TechServ no matter where he is his device connects to the Private APN & in the next hop lands at Data Center to which its to be connected.
  • 6. END TO END PRIVATE MPLS LINK
  • 7. INTEGRATION OF GSM & MPLS CORE First & the only solution for 100% Security Private APN is created and a solution is configured on a National GSM network. • Private APN service is activated on a Mobile Numbers data card provided for data connectivity. • Private APN Name is configured in GSM device (data card or phone), terminal, module or modem to be used for data connectivity using the corporate SIM card. • When GSM device connects using Private APN it does not connect to Internet at all. A direct secured connection MPLS connection is established to the corporate network as desired by enterprise. ANY EXISTING END POINT SECURITY PLATFORM CAN BE USED TO LOCK A HOST or a LAPTOP TO THE FOLLOWING VARIABLES: User name, password, mobile number, IMSI, IMEI, SIM Number etc Even the static IP address can be permanently mapped to a host.
  • 8. KEY HIGHLIGHTS Secured Private MPLS Connection Reduce total cost of ownership & running costs Ensure Compliance with Company’s IT LAN policy to all Prevent & Control Internet Usage. User access internet through the Internet gateway at the organizational DC  0 Data loss possibilities. Link speeds from 3.5 mbps to 9 mbps. Performance at a latency that is lower than 60 to 70 % achieved over a dial up VPN.  CLOSE TO 0 CAPITAL COSTS. For all mobile users its just corp data network that is being made available, not Internet + VPN + NAC for authentication & authorization + End point logs analysis for investigations