Our goal is to equip telecom operators with user-friendly tools aimed at fostering cutting-edge communication quality, enhancing competitiveness, and boosting the profitability of the operator’s business
Create new services for your subscribers
Improve QoS and QoE
Increase subscriber loyalty
Comply to the requirements of state regulators for URL filtration
Analyze the network traffic
Optimize usage of the network resources
Protect web resources from DDoS attacks
Use CG-NAT, BNG and IPv6 support
With over 15 years of expertise in telecommunication software development and extensive knowledge of various technologies, our team offers a platform designed to assist telecom operators and internet providers. Our platform enables the analysis of network traffic, optimization of network resource usage, creation of new subscriber services, and enhancement of subscriber loyalty through improved quality of experience.
ECHO CALL
The Echo Call service caters to subscribers with zero balance who wish to contact other subscribers. When a subscriber with zero balance initiates a call, a prompt will notify them of insufficient balance to complete the call. The Interactive Voice Response (IVR) system will then inform the calling party that the called party will be notified of the missed call. Subsequently, the called party has the option to return the call. Revenue will be generated from the party returning the call.
COLLECT CALL
The Collect Call service targets subscribers with zero balance who wish to contact other subscribers. Upon initiating a call, a prompt will notify the caller of insufficient balance to complete the call. The caller will then be given the option to have the subscriber they are trying to reach bear the charges. Revenue will be generated from the receiving party.
EMERGENCY CONTACT
This service serves as an alternative to the ICE (In Case of Emergency) mobile phone dialing system, allowing anyone to use the mobile phone of an injured or unconscious person to access and dial the pre-set emergency numbers. This system has the potential to save lives and streamline the efforts of first responders.
Communication
This function enables the carrier to send messages to subscribers while they are engaged in Internet activities. When the user inputs the address of a desired website, they view a message from the carrier within the browser. This carrier message is replaced by the requested page after a few seconds.
The subscriber’s message can encompass information from the carrier, such as alterations in tariffs, regular or urgent technical operations, special offers, as well as emergency messages from government agencies to alert about potential emergencies.
Behavior Reports
Every network user has unique behaviors. The Stingray platform has the capability to gather information about user behavior without infringing on the subscriber’s personal rights and present it clearly to the carrier.
This information serves various purposes, primarily to enhance the quality of services rendered. In the hands of a skilled marketing professional, the collected data can serve as a tool to augment the subscriber base and the company’s revenue.
Homepage Personalization
In less than a minute of displaying a unique “home page” to a subscriber, the carrier can gather a significant amount of user information. This enables the carrier to propose new services or products tailored to the user’s interests and evaluate their satisfaction with the services provided.
ADDITIONAL EXPERTISE SERVICES
WiFi HotSpot Management
The Stingray platform, equipped with a user-friendly GUI, enhances the convenience of operators' tasks. Our solution simplifies Wi-Fi HotSpot Management through an intuitive graphical interface
Regulatory Compliance
The Lawful Interception feature within the SSG Platform gathers, stores, and analyzes subscriber data in compliance with your country's local laws
Network Visibility
Enhancing network performance necessitates acquiring comprehensive information on network usage data and traffic consumption. This is crucial for effective troubleshooting and ensuring a high Quality of Experience
BNG/BRAS Solution for Broadband Providers
The Soho BRAS/BNG software fulfills contemporary network's technical prerequisites and safeguards the operator's investments due to its adaptable nature
Carrier Grade NAT and IPv4 to IPv6 Migration
WiFi HotSpot Management
Despite rapid technological advancements and the availability of network interfaces capable of 100G bandwidth and potential aggregation, it's crucial to acknowledge that bandwidth remains finite. Are you concerned about conserving traffic capacity? Our solution empowers you to manage and prioritize traffic effectivel
BENEFITS:
- Learn your audience interests
- Choose subtle settings for each category
- Show only relevant advertisement
- Earn on your traffic
- See full statistics
Implementation Scheme
This service is supported only with an in-line installation scheme.
The DPI with GUI platform connects the ads aggregator resource via VAS Cloud. When the subscriber observes this advertisement, the reverse process occurs: GUI calculates the number of impressions, clicks, and sum of money that the operator receives.
Advertising Section
The advertising partnership service is linked to VAS Cloud. Once connected, it facilitates downloading lists onto one or more DPI devices. The DPI will receive information about specific banners to display on particular resources. Activating this option necessitates a restart of the DPI.
Statistics and Accruals
The Statistics section furnishes daily data regarding the count of impressions, clicks, and leads generated on the advertiser’s end. Users can choose a specific timeframe. Approved leads that result in purchases are updated daily and showcased in the “Commission” section.
WHAT CAN WE HANDLE?
- Performance up to 20 million packets per second, depending on the configuration.
- Protection against TCP SYN Flood and fragmented UDP Flood.
- Protection against DDoS (LOIC etc) based on The Turing Test (Human Detection).
- Dynamic control of the bandwidth, common and up to a separate IP.
- Prioritization by common bandwidth and separate IP protocols.
Specifics
This computerized test aims to distinguish between system users—whether they are human or automated bots.
When the threshold value is surpassed, such as when there is an excessive number of requests per second for the website, the protective measures are triggered. Users are required to provide information from CAPTCHA to verify that they are not part of a botnet network. Only after this confirmation will access to the site be granted.
Once confirmed, the user’s information is added to the Allow List, exempting them from further scrutiny.
A SYN Flood attack results in a heightened utilization of resources within the targeted system. Denial of service happens when the flow of SYN-flood reaches a range of 100,000 to 500,000 packets per second. Remarkably, even a gigabit channel permits an attacker to transmit a stream of up to 1.5 million packets per second to the attacked site.
Stingray SG autonomously detects an attack by surpassing a specified threshold of unconfirmed SYN requests. Instead of forwarding these requests directly to the protected site, Stingray SG responds to SYN requests and establishes a TCP session with the protected site only after confirming the request by the client.
This attack method involves fragmented UDP packets, typically short in nature, requiring substantial resources from the attacked platform for assembly and analysis.
Protection is implemented by discarding a set of protocols that are irrelevant to the protected site or by imposing strict limitations on them concerning the bandwidth allowed for passage.