There’s an old saying that simplicity is genius. It goes hand in hand with KISS (keep it simple, stupid). When it comes to placing hardware on your network for an effective network security solution, Whalebone has taken these maximums to heart.
In today’s increasingly complex world and threat filled world, keeping your customers safe and satisfied is mission critical. Too many vendors today offer complex solutions that include extensive hardware costs, staff training, upkeep and maintenance, not to mention downtimes and troubleshooting. That’s where Whalebone’s telco hardware simplicity places them a head above the rest.
What hardware is needed to deploy Whalebone? It’s as easy as one-two-three!
What’s a resolver and how does it work?
A resolver is a Linux based machine directly on the telco network.
Sample case study
For example, John has requested to either block certain sites, like adult content, or to have access to some sites otherwise considered suspect. The resolver needs to understand that these are John’s specific requests and either block or allow these sites through.
Say John makes a request to Google on his mobile device. The Whalebone resolver goes to the internet to get the answer, remembers John’s preferences for that mobile device and John is able to access the page or have the page blocked as his preferences have been cached, i.e. Whalebone remembers his preferences, so John gets his answer with increased speed.
At the same time, John is being effectively protected from malicious and suspect sites while being able to get the information he needs, all without John noticing any difference at all in his fast internet end user experience.
How is it possible so little capacity is needed?
The backend – The reason for the beautiful simplicity is that the computationally intensive part of Whalebone is on the Whalebone backend, which proceeds to process all of the data from the resolvers to detect and block malicious domain data. Via the Whalebone API, if the telco wants to know more about specific threats, it simply asks the Whalebone backend.
Adding customers – To add a new customer, say John’s mobile or fixed line, Whalebone stores this information and sends it to the resolver already on the telco network with John’s preferences, if any.
Adding preferences – John can also change his own configuration on the portal running on the Whalebone backend in the cloud. Telcos have the choice of either deploying a user aware version, i.e. giving John a choice of his preferences, or an anonymized version, with all users receiving the same protection.
In a nutshell, what this means is that outside of maintaining the Linux based resolvers, the telco doesn’t have to provide or manage any infrastructure at all.
But what about latency?
With all this information flying about and only a few Linux resolvers to bear the load, how can Whalebone ensure that its threat protection can make the right call? Wouldn’t reading every data packet coming across the network slow down the response time unbearably?
The Magic Key
For example, John wants to watch a YouTube video. The Whalebone resolver asks YouTube to get the info, YouTube then finds the data and streams a huge amount of video data to John’s mobile device. Whalebone only gets the response that YouTube is here, a small packet, and can ascertain that the data is safe as it’s really coming from YouTube. This means the resolver doesn’t have to process the enormous amount of data YouTube is sending back packet by packet.
If it’s that easy, why isn’t everyone doing it?
Now obviously Whalebone is not the only vendor out there offering telco network protection.
Better yet, Whalebone offers zero downtime upgrades, which means that upgrading the Whalebone resolver software is done without service interruption.
The Whalebone backend is non-critical for the resolvers, meaning that, unlike other solutions, no complicated design for how to run, maintain and upgrade is necessary. Whalebone can be running on the telco network in hours with nearly no labor and no complicated staff training needed to monitor and trouble shoot. This means far fewer labor costs, and negligible training, maintenance and trouble shooting.
It’s the brilliance of simplicity in a complex world translated into customer and employee satisfaction equaling both dramatically enhanced security and increased revenue .
While some vendors need special hardware for their service, Whalebone can run on virtually anything as long as there are Linux servers.
Other vendors’ special hardware means increased costs, a long learning curve, and downtimes for breakage if new parts need to be ordered, not to mention complex monitoring and maintenance. Whalebone simply takes these unpleasant factors out of the effective security equation.
Because at Whalebone, connected means protected, not hardware costs and headaches.
For more details on the simplicity and ease of Whalebone’s minimal hardware requirements for telcos, contact us today!