NFV NEWS

NFV Home

Stoke Unveils Software-only Version of its LTE Security Gateway

By Rory Lidstone February 11, 2014

For some companies, it can be a long and winding road to NFV and SDN but for Stoke, the path to virtualization seems pretty straightforward. Indeed, the company has decided to architect its leading LTE security gateway solution for availability as a software-only version, in support of future virtualized operator environments.

“Future” seems to be the key word for the company, which sees NFV as a quick, cost-effective way for operators to provision, deploy and meet the performance requirements of modern 4G networks and their subscribers. These benefits, coupled with the fact that NFV allows operators to offer new services faster and more efficiently than traditional infrastructure, make the technology one worth supporting — as far as Stoke is concerned, at least.

“While the current market opportunities in our space are without exception hardware-based, we believe it is essential that we provide our customers with continual innovations that align with their future virtualization strategies,” said Dilip Pillaipakam, vice president of product management at Stoke, in a statement. “The ability of our hardware platform to deliver encrypted LTE traffic at line rate — including voice traffic — is a compelling value proposition for our customers. As the processing capabilities of the general-purpose hardware catch up, our customers are assured of a smooth transition to a virtualized environment using the Stoke software.”

Stoke’s evolved packet core (EPC) perimeter security solution is capable of delivering virtualized offerings, thanks to key elements of the company’s software architecture position. In particular, the company’s Linux-based software follows the Posix standard, allowing for portability across many industry-standard platforms, and its context-based service model allows for multiple instances of the security gateway to run at the same time — which is crucial for virtualization.

Meanwhile, clear separation of the control plane and the data plane enable independent scaling and deployment of the solution based on dynamic resourcing requirements.




Edited by Cassandra Tucker

Contributing Writer

SHARE THIS ARTICLE
Related Articles

Winners of the 2018 INTERNET TELEPHONY NFV Innovation Award Announced

By: TMCnet News    6/4/2018

TMC announced the recipients of the 2018 INTERNET TELEPHONY NFV Innovation Award, presented by INTERNET TELEPHONY magazine.

Read More

Harnessing Pervasive Visibility to Unleash the Power of the Cloud

By: Michael Segal    11/9/2017

Cloud computing is having an unprecedented influence on companies throughout the world; according to research from BDO, an overwhelming number (74%) o…

Read More

Nokia Introduces SDAN Solution

By: Paula Bernier    10/10/2017

Nokia has unveiled a Software-Defined Access Network solution. This offering consists of cloud-native software, integration services, open programmabl…

Read More

Stating with Attestation, a Core Foundation of Computer Security for Sensitive Systems

By: Special Guest    10/3/2017

The European Telecommunication Standards Institute (ETSI) held their annual Security Week event and along with a representative from the UK National C…

Read More

Assuring Business Outcomes on Your DX Journey

By: Michael Segal    9/7/2017

When it comes to implementing strategies for digital transformation (DX), there are nearly as many methods as there are companies using them.

Read More