Protect users and infrastructure by identifying security threats in 4G and 5G networks

MobileStream utilizes Smart Data technology from NETSCOUT’s market leading mobile service assurance solutions to monitor both user and control plane traffic within 4G and 5G mobile networks. MobileStream extends NETSCOUT’s ASI technology to passively monitor GTP-c and GTP-u traffic and stream this enriched telemetry to Arbor Sightline for unprecedented subscriber-level and infrastructure-aware traffic visibility and threat detection.

Protect users and infrastructure by identifying security threats in 4G and 5G networks
Click to Enlarge Image

MobileStream also enriches user-plane traffic telemetry with control plane information for unprecedented subscriber-level and infrastructure-aware traffic visibility and threat detection.

Benefits

Detect

Detect threats and DDoS attacks within the 4G/5G network.

Identify

Quickly identify impacted subscribers and devices for rapid isolation.

Protect

Correlate identity and user-plane traffic with underlying mobile core infrastructure for surgical mitigation.

Features

  • Control-Plane and User-Plane Visibility

    Dynamically map mobile IP addresses to identities (IMSI, MSISDN, device types, infrastructure endpoints, etc.)

  • Threat Detection

    Extract actionable insights in real-time about both underlying traffic patterns, misuse, and potential threats.

  • Identify Compromised Subscribers

    Quickly identify compromised mobile devices by correlating traffic information with Indicators of Compromise (IoCs) at scale. 

  • Flexibility for Cost-effective Visibility

    Connectivity options for 1G, 10G, 40G or 100G.  Cost-effective hardware appliance and COTS-based software appliance.  

Control-Plane and User-Plane Visibility
Click to enlarge image
Control-Plane and User-Plane Visibility

Dynamically map mobile IP addresses to identities (IMSI, MSISDN, device types, infrastructure endpoints, etc.)

Threat Detection
Click to enlarge image
Threat Detection

Extract actionable insights in real-time about both underlying traffic patterns, misuse, and potential threats.

Identify Compromised Subscribers
Click to enlarge image
Identify Compromised Subscribers

Quickly identify compromised mobile devices by correlating traffic information with Indicators of Compromise (IoCs) at scale. 

Flexibility for Cost-effective Visibility
Flexibility for Cost-effective Visibility

Connectivity options for 1G, 10G, 40G or 100G.  Cost-effective hardware appliance and COTS-based software appliance.  

Cost-Effective Deployment

Certified

NETSCOUT offers Certified MobileStream models as Commercial-Off-The-Shelf (COTS) software appliances, ideal for the various needs of your enterprise network environment.

Qualified

NETSCOUT Qualified MobileStream Software Appliances are well-suited for those organizations standardizing on Dell or Hewlett Packard Enterprise (HPE) server platforms in their data centers.

A Service Based 5G Security Posture
White Paper

A Service Based 5G Security Posture