ipoque Launches PRX-PE Traffic Manager for Policy Enforcement
Policy and Charging Enforcement Function (PCEF) for Policy Control in 3G & 4G Mobile Networks
PRX-PE is designed for seamless integration with third-party policy control and quota management systems. PRX-PE’s real-time identification of applications and protocols running in a network enables operators to enforce policy rules like bandwidth guarantees and limits, traffic quota and application priorities in order to avoid network congestion or to enable tiered pricing plans. It also features forwarding capabilities for selected application traffic to value-added IP service platforms such as parental control, anti-virus, anti-spam and image or video optimization systems. PRX-PE provides real-time subscriber usage data to external accounting, charging and billing systems.
Hendrik Schulze, CTO of ipoque, says: “PRX-PE creates a classic win-win situation between mobile operators and their subscribers. It enables the operator to enforce rules in real time and helps managing their growing mobile data traffic to maintain an optimal network performance. This leads to an improved mobile Internet experience for their customers, increasing satisfaction and reducing churn.”
Key Features of PRX-PE
- Carrier-grade performance at 70 Gbit/s, 10 million packets/s and 7 million concurrent subscribers per system
- High availability and full hardware redundancy
- DPI accuracy certified by independent test lab: “Close to 100% detection & regulation accuracy”
- Seamless integration with third-party policy, accounting and charging systems
- Completely invisible to network users
For more information about PRX-PE Traffic Manager please go to our website: http://www.ipoque.com/....
R&S Cybersecurity ipoque GmbH
Founded in Leipzig, Germany, ipoque is the leading European provider of deep packet inspection (DPI) solutions for Internet traffic management and analysis. Designed for Internet service providers, enterprises and educational institutions, ipoque's PRX Traffic Manager allows to effectively monitor, shape and optimize network applications. These include the most critical and hard-to-detect protocols used for peer-to-peer file sharing (P2P), instant messaging (IM), Voice over IP (VoIP), tunneling and media streaming, but also many legacy applications. For further information see www.ipoque.com.