Tag Archive for: portfolio

Mavenir extends AI and analytics portfolio to enable optimization, automation and security of mobile networks


Mavenir extends AI and analytics portfolio to enable optimization, automation and security of mobile networks

Mavenir, the industry’s only end-to-end cloud native network software provider and a leader in accelerating software network transformation for communication service providers (Communication Service Providers , CSPs), today announced its extended portfolio of artificial intelligence (AI) and analytics to enable closed-loop automation and drive digital transformation.

Mavenir’s AI / ML-based security and anti-fraud solutions are taking care of Telefónica Argentina’s continued revenue savings”

AI and machine learning (ML) in the mobile network infrastructure are expected to reduce costs by automating functions that normally require human interaction, and to accelerate new revenue-generating service offerings, becoming increasingly important as open radio access networks (Open RAN) and 5G cores are deployed.

Mavenir’s AI and analytics portfolio includes solutions designed to analyze and derive inferences from large amounts of unstructured data to automate networks, achieve cost savings and build 5G use cases. Many Industry 4.0 use cases, such as Intelligent Video Analytics and AR / VR, are powered by 5G which require AI-based inferences at the tip. Mavenir’s portfolio includes these AI-enabled applications for network automation, intelligent operations, EdgeAI and network security.

  1. Network Automation: Mavenir’s RAN Intelligent Controller (RIC) and Network Data Analytics Function (NWDAF) follow the specifications introduced by the O-RAN Alliance and 3GPP and operate at the heart of a network automation vision. RIC and NWDAF allow the network to dynamically adapt to traffic conditions, using machine learning (ML) based algorithms and applications that can be deployed on any network in a multi-vendor environment. Mavenir’s containerized RIC and NWDAF product features include:
  •    Non-RT RIC: designed to host advanced ML algorithms (rApps) to optimize network performance and train ML models using long-term RAN data for dynamic and adaptive policies to optimize RAN performance.
  •    Near-RT RIC: designed to host trained AI / ML models (xApps) to infer and control functional O-RAN elements in near real time.
  •    NWDAF: designed to…

Source…

Y Soft adds to identity verification solution portfolio


Y Soft is adding to its portfolio of identity verification solutions with the release of a new secure identity verification for networked printers.

The Y Soft MFX Mobile Reader joins the portfolio of USB readers designed to provide identity verification in what the company describes as a ‘secure, accurate, and convenient’ way.

This is particularly important following COVID-19 and a refreshed interest from businesses that focuses on keeping employees safe at the office.

Y Soft chief of products Wouter Koelewijn says the reader “addresses the need for better physical safety by letting their employees use their mobile devices to identify themselves instead of physically touching the networked printer.”

Furthermore, employees’ biometric data is only stored on their smartphones and not on corporate networks, which means there is no need to comply with data protection regulations such as the GDPR.

“Unlike an identity card, a misplaced or stolen smartphone can’t be used to access users’ print jobs since the phone’s native security features (PIN, fingerprint, facial recognition) act as the second-factor authentication,” the company explains.

The USB reader comprises the reader, digital credentials, and a mobile app.  

YSoft MFX Mobile Reader accurately reads the user’s credentials from the user’s mobile phone. Employees only need to touch their own mobile phones to print all the jobs in their print queue, eliminating the need to touch the networked printer and reducing the number of times the multifunction device (MFD) must be wiped down per day. MFX Mobile Reader also supports the use of identity cards supporting over 100 access card technologies.

YSoft Connect ID provides an enrolment process, and the credentials can be sent electronically to each user. The YSoft Mobile Connect app stores the digital credentials and uses those credentials to securely authenticate the user on any printer equipped with the MFX Mobile Reader. This provides secure two-factor authentication, and the user’s private data is stored only on their personal device.

With the YSoft Mobile Connect mobile app (Android or iOS), users can authenticate access to print management…

Source…

IT Security-as-a-Service Market Company Product Portfolio and Recent Developments Forecast 2021-2027 – Jumbo News


IT Security-as-a-Service Market

Syndicate Market Research, a leading market research company recently published a research report on “IT Security-as-a-Service Market” to its research database. This IT Security-as-a-Service Market report analyzes the comprehensive overview of the market comprising an executive summary that covers core trends evolving in the market.

The IT Security-as-a-Service market report represents the broad information comprising each and every aspect related to the IT Security-as-a-Service market. The experts arranged and processed the IT Security-as-a-Service market related raw data congregated from various sources with the help of different methodological and analytical tactics such as probability, SWOT analysis, and statistical variation among many. It also has an In-depth analysis of the industry’s competitive landscape, restraints, detailed information about different drivers, and global opportunities. Key competitors included in Global IT Security-as-a-Service Market are Blue Coat, Cisco, IBM, Intel Security, Symantec, Alert Logic, Barracuda Networks, BT Global Services, CA Technologies, CenturyLink, CGI Group, CheckPoint Software Technologies, CipherCloud, Computer Sciences, CYREN, FishNet Security, Fortinet, HP, Microsoft, NTT Com Security, Panda Security, Proofpoint, Radware, Trend Micro, Trustwave, Zscaler. 

Our Research Specialist Analyses Research Methodology overview including Primary Research, Secondary Research, Company Share Analysis, Model ( including Demographic data, Macro-economic indicators, and Industry indicators: Expenditure, infrastructure, sector growth, and facilities ), Research Limitations and Revenue Based Modeling. Company share analysis is used to derive the size of the global market. As well as a study of revenues of companies for the last three to five years also provides the base for forecasting the market size (2021- 2027 ) and its growth rate. Porter’s Five Forces Analysis, impact analysis of covid-19 and SWOT Analysis are also mentioned to understand the factors impacting consumer and supplier behaviour.

FREE | Request Sample is Available For IT Security-as-a-Service Industry Report @ 

Source…

ARRIS Adds Wave 2 Wi-Fi® Technology to Secure Home Gateway Portfolio – IT Business Net (press release)


IT Business Net (press release)

ARRIS Adds Wave 2 Wi-Fi® Technology to Secure Home Gateway Portfolio
IT Business Net (press release)
Each gateway features advanced ARRIS Secure Home Internet by McAfee software. This state-of-the-art solution enables users to simplify internet security through management controls and protection against known threats like malware, phishing, and more.

and more »

internet security news – read more