Our goal is to equip telecom operators with user-friendly tools aimed at fostering cutting-edge communication quality, enhancing competitiveness, and boosting the profitability of the operator’s business

Subscribers - Free social media icons

Create new services for your subscribers

Qos Icons - Free SVG & PNG Qos Images - Noun Project

Improve QoS and QoE

customer loyalty Icon - Free PNG & SVG 4642672 - Noun Project

Increase subscriber loyalty

web filter Icon - Free PNG & SVG 774688 - Noun Project

Comply to the requirements of state regulators for URL filtration

Research Icon Png #363958 - Free Icons Library

Analyze the network traffic

Optimize - Free business icons

Optimize usage of the network resources

Ddos Protection Icons - Free SVG & PNG Ddos Protection Images - Noun Project

Protect web resources from DDoS attacks

Secure IP Routing for IPv4, IPv6 with 6WIND Virtual CG-NAT

Use CG-NAT, BNG and IPv6 support

 

With over 15 years of expertise in telecommunication software development and extensive knowledge of various technologies, our team offers a platform designed to assist telecom operators and internet providers. Our platform enables the analysis of network traffic, optimization of network resource usage, creation of new subscriber services, and enhancement of subscriber loyalty through improved quality of experience.

ECHO CALL

The Echo Call service caters to subscribers with zero balance who wish to contact other subscribers. When a subscriber with zero balance initiates a call, a prompt will notify them of insufficient balance to complete the call. The Interactive Voice Response (IVR) system will then inform the calling party that the called party will be notified of the missed call. Subsequently, the called party has the option to return the call. Revenue will be generated from the party returning the call.

COLLECT CALL

The Collect Call service targets subscribers with zero balance who wish to contact other subscribers. Upon initiating a call, a prompt will notify the caller of insufficient balance to complete the call. The caller will then be given the option to have the subscriber they are trying to reach bear the charges. Revenue will be generated from the receiving party.

EMERGENCY CONTACT

This service serves as an alternative to the ICE (In Case of Emergency) mobile phone dialing system, allowing anyone to use the mobile phone of an injured or unconscious person to access and dial the pre-set emergency numbers. This system has the potential to save lives and streamline the efforts of first responders.

MARKETING CAMPAIGNS AND HOME PAGE
The homepage management feature offers the opportunity to access comprehensive subscriber information (such as gender, age, browser, input devices, preferences, etc.), facilitate the sale of partner services, conduct surveys to enhance Quality of Service (QoS) promotions, introduce new services, and boost traffic through their page descriptions. Here are examples illustrating the various use cases that can be employed with this feature

Communication

This function enables the carrier to send messages to subscribers while they are engaged in Internet activities. When the user inputs the address of a desired website, they view a message from the carrier within the browser. This carrier message is replaced by the requested page after a few seconds.

The subscriber’s message can encompass information from the carrier, such as alterations in tariffs, regular or urgent technical operations, special offers, as well as emergency messages from government agencies to alert about potential emergencies.

Behavior Reports

Every network user has unique behaviors. The Stingray platform has the capability to gather information about user behavior without infringing on the subscriber’s personal rights and present it clearly to the carrier.

This information serves various purposes, primarily to enhance the quality of services rendered. In the hands of a skilled marketing professional, the collected data can serve as a tool to augment the subscriber base and the company’s revenue.

Homepage Personalization

In less than a minute of displaying a unique “home page” to a subscriber, the carrier can gather a significant amount of user information. This enables the carrier to propose new services or products tailored to the user’s interests and evaluate their satisfaction with the services provided.

ADDITIONAL EXPERTISE SERVICES

info

WiFi HotSpot Management

The Stingray platform, equipped with a user-friendly GUI, enhances the convenience of operators' tasks. Our solution simplifies Wi-Fi HotSpot Management through an intuitive graphical interface

 
info

Regulatory Compliance

The Lawful Interception feature within the SSG Platform gathers, stores, and analyzes subscriber data in compliance with your country's local laws

 
info

Network Visibility

Enhancing network performance necessitates acquiring comprehensive information on network usage data and traffic consumption. This is crucial for effective troubleshooting and ensuring a high Quality of Experience

 
info

BNG/BRAS Solution for Broadband Providers

The Soho BRAS/BNG software fulfills contemporary network's technical prerequisites and safeguards the operator's investments due to its adaptable nature

info

Carrier Grade NAT and IPv4 to IPv6 Migration

The global network and device connectivity are undergoing significant expansion worldwide. The depletion of the IPv4 addressing space has become a reality as registrars from various regions report the allocation of their final remaining address blocks
 
info

WiFi HotSpot Management

Despite rapid technological advancements and the availability of network interfaces capable of 100G bandwidth and potential aggregation, it's crucial to acknowledge that bandwidth remains finite. Are you concerned about conserving traffic capacity? Our solution empowers you to manage and prioritize traffic effectivel

 
TRAFFIC MONETIZATION
The service is relevant to use in free Wi-Fi networks in conjunction with the HotSpot module: a subscriber who logs into your Wi-Fi network can be connected to an ad display.

BENEFITS:
- Learn your audience interests
- Choose subtle settings for each category
- Show only relevant advertisement
- Earn on your traffic
- See full statistics

Implementation Scheme

This service is supported only with an in-line installation scheme.

in line scheme

The DPI with GUI platform connects the ads aggregator resource via VAS Cloud. When the subscriber observes this advertisement, the reverse process occurs: GUI calculates the number of impressions, clicks, and sum of money that the operator receives.

Advertising Section

The advertising partnership service is linked to VAS Cloud. Once connected, it facilitates downloading lists onto one or more DPI devices. The DPI will receive information about specific banners to display on particular resources. Activating this option necessitates a restart of the DPI.

Statistics and Accruals

The Statistics section furnishes daily data regarding the count of impressions, clicks, and leads generated on the advertiser’s end. Users can choose a specific timeframe. Approved leads that result in purchases are updated daily and showcased in the “Commission” section.

PROTECTION AGAINST DOS & DDOS ATTACKS
The attack is initiated from the attacker's computer or an entire network (botnet) comprised of various devices, which could include any device with internet access (router, TV, tablet, etc.). The user might be unaware that their device is being used for the attack. In such instances, safeguarding remote resources and applications becomes the responsibility of the carrier's equipment.

WHAT CAN WE HANDLE?

  • Performance up to 20 million packets per second, depending on the configuration.
  • Protection against TCP SYN Flood and fragmented UDP Flood.
  • Protection against DDoS (LOIC etc) based on The Turing Test (Human Detection).
  • Dynamic control of the bandwidth, common and up to a separate IP.
  • Prioritization by common bandwidth and separate IP protocols.

Specifics

This computerized test aims to distinguish between system users—whether they are human or automated bots.

When the threshold value is surpassed, such as when there is an excessive number of requests per second for the website, the protective measures are triggered. Users are required to provide information from CAPTCHA to verify that they are not part of a botnet network. Only after this confirmation will access to the site be granted.

Once confirmed, the user’s information is added to the Allow List, exempting them from further scrutiny.

A SYN Flood attack results in a heightened utilization of resources within the targeted system. Denial of service happens when the flow of SYN-flood reaches a range of 100,000 to 500,000 packets per second. Remarkably, even a gigabit channel permits an attacker to transmit a stream of up to 1.5 million packets per second to the attacked site.

Stingray SG autonomously detects an attack by surpassing a specified threshold of unconfirmed SYN requests. Instead of forwarding these requests directly to the protected site, Stingray SG responds to SYN requests and establishes a TCP session with the protected site only after confirming the request by the client.

This attack method involves fragmented UDP packets, typically short in nature, requiring substantial resources from the attacked platform for assembly and analysis.

Protection is implemented by discarding a set of protocols that are irrelevant to the protected site or by imposing strict limitations on them concerning the bandwidth allowed for passage.

    Free Consultation

    Are you ready to grow your business?