Protect your business during COVID-19 – here is how    |     Rights Issue 2020

5G Security

Connect.Protect

Secure the journey to 5G

The journey to 5G security has started but 4G will coexist for a long time. Clavister offers one security solution covering both 4G and 5G allowing operators to transition to 5G in a secure way.

The networks are secured from the edge via the core and all the way to internet or other operator networks. Within the Core network, nodes and management access is secured through network segmentation, VPN and MFA, also limiting the impact of a potential breach.

Solutions can be deployed as virtual or bare metal. The Clavister Security VNF (Virtualized Network Function) for telecom networks uniquely combines high-performance, scalability and carrier-grade features and paves the way for 5G deployments that need just such features.

Leveraging the benefits of SDN (Software Defined Networks) and NFV (Network Functions Virtualizations), communication service providers are estimated to reduce operational costs (Opex) with 60% and Capital investment costs (CapEx) with 40%. Additionally, these customers will need a highly resource efficient security solution that addresses the needs of the coming 5G requirements in both extreme low latency and sliceable deployments.

5G Security – The Journey Has Started

In this webinar you will learn what steps you can take today to cater for security requirements while building your 5G Security solution at the same time. We will also share our experiences from working with Tier 1 operators around the world in securing 3G/4G and 5G networks, from the edge to the core.

WATCH THE WEBINAR

Highlights

Natively designed for Virtualization – SDN/NFV

To meet the unique requirements and demands from the Telecom Cloud, using Virtualization technologies such as SDN/NFV,
the Clavister Security VNFs offers these key capabilities:

1

Fully Virtualized

Clavisters Security VNF is completely software based and natively built for virtualization and is compatible with most hypervisors on the market, including KVM and VMware.

2

Orchestration and Management

The Clavister Security VNF executes seamlessly in Telecom Cloud environments and frameworks such as Openstack.

3

Extensive Eco-system

To ensure smooth integration of the Clavister Security VNFs in a telecom cloud, Clavister cooperates and integrates with leading vendors in the market, including: Nokia, Intel, Red Hat, Windriver, vmware, Openstack and others.

TELECOM USE CASES

Designed for Telecom

The Clavister solution has been purpose built and optimized for telecom networks. In close collaboration with several leading industry partners, robustness, features and integration capabilities has been fine tuned for an optimal solution. The Clavister solution provides a unified approach for securing a wide range of telecom use cases, including:

•  Internet Security with Gi/SGi/N6 Firewalling
•  Backhaul Security
•  Roaming Security
•  Core Network Security
•  Edge Security

Through compliance and support for several industry standards such as 3GPP and ETSI-NFV the Clavister solution integrates seamlessly.

Tier 1 operators around the world put their trust in Swedish Clavister to secure their 4G/5G networks.

TELECOM USE CASES

Backhaul Security

With the rollout of 5G and an increased density of base stations the backhaul network become an even more crucial part of the network. Clavister secures the 4G/5G backhaul networks with a flexible and cost-effective solution for securing and encrypting the vulnerable interfaces used for backhaul traffic from the radio base stations (eNodeBs/gNodeBs) and edge nodes to the network core.
Reliability and privacy can be ensured by encrypting all traffic that traverse over untrusted networks.

Key highlights:

•  Purpose Built for Virtualization and SDN/NFV
     –  Fully Virtualized
     –  Integrates SDN Controllers and NFV Orchestrators
     –  Part of a strong Eco-System ensures smooth integration
     –  Ready for Service Function Chaining (SFC)
     –  Ready for Service Automation (Scale-Up / Scale-Out)
     –  Compliant with ESTI-NFV standards
•  Highest Security Performance on the Market
•  Designed for Telecom
•  Scalable and flexible business model

TELECOM USE CASES

Internet Security – Gi/SGi Firewall

Already now, more than 20 billion devices are connected to the Internet and analysts predict that within a few years, the number will rise to something in the range of 40–50 billion. Not only are the number of devices increasing but so to the amount of data-traffic demanded, especially with the introduction of 5G.

“The unprecedented growth of data-traffic in mobile networks means that the Gi/Sig/N6 firewalls protecting your core network from the internet must be able to scale in a completely new proportion, without adding more costs as competitive pricing is a must.”

Clavister’s solution operates as Gi/Sgi/N6 Firewall and protects both the Core network and subscribers against attacks and intrusions.

Key Highlights:

•  Natively designed for Virtualization and SDN/NFV
    –  Integrates with SDN controllers
    –  Integrates with NFV orchestrators
    –  Supports OpenStack and HOT Templates for rapid provisioning
•  Highest Security Performance on the market
•  High capacity for Concurrent Connections
•  Carrier-Grade NAT (CG-NAT)
•  DDoS Protection with IDP and Traffic Anomaly Filtering (Rate Limits)
•  Powerful Quality of Service and Bandwidth Management
•  Designed for Telecom and 3GPP Compliance

Want to learn more? Download the brochure

This product brochure describes the capabilities of Clavister Virtual Stream Series using cOS Stream 3.20.

DOWNLOAD BROCHURE

Specifications

 VS3VS5VS7VS9
Firewall Performance* (Gbps)5102040
VPN Performance (Gbps)2,5 51020
Concurrent Connections1M 2.5M5M10M
Concurrent VPN Tunnels (IPsec)2,000 3,000 5,000 10,000
Ethernet InterfacesUp to 3 Up to 5Up to 7 Up to 10
Virtual Interfaces (VLAN 802.1q)256 5121,0242,048
Virtual Routers50 500100 200200
Support for High Availability (HA)YesYesYesYes
Minimum available memory for the virtual machine2 GB 2 GB4 GB8 GB
Minimum recommended number of allocated CPU cores2 2 4 8
Minimum available storage2 GB2 GB2 GB2 GB
Clavister cOSClavister cOS StreamClavister cOS StreamClavister cOS StreamClavister cOS Stream

*)  Firewall Performance is based on RFC 2544. Actual performance may vary depending on network conditions, number of activated services and host hardware capabilities.

Get in touch! It will only take a minute

CONTACT USFIND A RESELLER