Cyber-Defense Overlay for
Distributed Networks.

Enabling CSPs to rapidly adapt to new security challenges posed by emerging technologies > 5G, IoT, MEC, and Cloud.

Industry white paper - Scalable and Cost-Effective Strategies for Mitigating Emerging Threats in Distributed Telecom Networks
DOWNLOAD NOW
Scroll

The emergence of new threat vectors calls for a comprehensive, distributed, and adaptive network security approach, challenging traditional defense strategies

 

Mitigate the risks

associated with

new opportunities.

Empowering CSPs to embrace innovation while effectively managing risks and ensuring the utmost security for both their business and customers.
New attack surfaces call for a complete rethink.

Our Solutions

EdgeHawk capitalizes on the new capabilities of the network nodes to redefine network security.

Enhancing visibility, response time, and network performance by blocking malicious traffic closer to its source without additional hardware
Find Out How

EdgeHawk Platform Architecture

Controller

The EdgeHawk Controller, with a modular, containerized design, centrally manages detectors on peering routers. It provides management of security settings, health monitoring, real-time attack insights, mitigation orchestration, event reporting, and enables operational control and incident response.

Detector

The EdgeHawk Detector, a container deployed on a router, utilizing spare CPU and memory resources, uses patented technology to analyze network telemetry for traffic legitimacy. When an attack is detected, a mitigation policy can be applied to the router’s ingress port using ACL rules.

solutions

Internet Exchange

After a span of twenty years, legacy DDoS defense scrubbing centers have reached an evolutionary impasse.

The ever-growing demand for new broadband services necessitates a reevaluation of DDoS defense, scalability, and cost considerations.

Edgehawk is changing the economics & scalability of DDoS defense.

EdgeHawk capitalizes on the new capabilities of the network nodes to redefine network security. By utilizing the compute power embedded in routers and edge devices within the network infrastructure, the platform optimizes resource utilization and cuts costs.

5G Networks & MEC

5G networks are more than extra bandwidth. 5G now creates new B2B use cases for multiple verticals from retail to healthcare.

This also signals a technological shift into cloud-native architecture, moving from RAN to CORE.

The EdgeHawk platform can be distributed with every node of the 5G RAN and CORE elements.

Constant vigilance is maintained against cyberattacks originating from IoT devices and malfunctioning network elements, spanning across both user and signaling planes.

Broadband Access

The growing popularity of streaming TV and higher-resolution content is changing broadband network architecture, pushing operators to create local breakouts for CDNs and localized cloud hosting, prompting a reevaluation of network security.

EdgeHawk provides a scalable, cost-effective solution for broadband access networks with numerous breakout points. 

All the while looking out for cyberattacks from IoT devices and malfunctioning network elements on both user and signaling planes.

EdgeHawk Technology

highly distributed, with central control
EdgeHawk utilizes a scalable, containerized architecture featuring a central management controller, overseeing detectors distributed throughout the network.
Read More

The EdgeHawk Controller, with a modular, containerized design, centrally manages detectors on peering routers.
The EdgeHawk Detector, a container deployed on a router, utilizing spare CPU and memory resources, uses patented technology to analyze network telemetry for traffic legitimacy.

EdgeHawk can detect and defend against the smallest threats. From ICMP and port scanning to misuse of APIs, and detecting the use of stolen credentials.

Advanced Machine Learning
EdgeHawk’s Patented anomaly detection algorithm is based on fast, unsupervised machine learning.
Read More

Other solutions are based on temporal information gathering. However, Egdehawk algorithms are built to take advantage
of spatial and near real-time comparison.
This allows the EdgeHawk Platform to be fully operational in minutes.

Cloud-Native Platform
The Edgehawk platform is cloud-native from the ground up.
Read More

EdgeHawk is built from the ground up as a collection of clusters of containers, easily deployed and migrated into any environment.

Tapping embedded network power and resources
EdgeHawk takes advantage of untapped compute resources embedded in routers and edge devices.
Read More

This approach allows for efficient, costeffective, and scalable security implementations, rather than continually introducing additional appliances to the network.

Blog - Security on the Edge

Enabling CSPs to rapidly respond to security challenges introduced by advancements in 5G, IoT, MEC, and Cloud.
November, 2023
A New Paradigm for DDOS protection in Distributed Telco Networks

The advent of cloud computing and distributed network architectures has fundamentally changed the game.

Read More
September, 2023
The Need for a Comprehensive Rethink

The emergence of new attack surfaces demands a rapid and comprehensive rethink of network security strategies.

Read More
August, 2023
Rethinking Telco DDoS Mitigation: Why Legacy Approaches Fall Short in the Modern Age

Secure and reliable connectivity is now a vital dependency for civilization.

Read More

Contact us

    EdgeHawk

    3 HaNechoshet Street,
    Tel Aviv-Yafo, 6971068 Israel

    All Rights Reserved © Edgehawk security
    Site by Imaginet
    Skip to content