Solutions

carrier networks

BaseN’s significant differentiating features of monitoring critical network infrastructure are: scalability, fault tolerant architecture, broad multivendor support, easy adding of equipment and service templates. The BaseN service can combine IP, IT, ICT, and even energy monitoring into one unified view.

With over 2000 templates in our library, we enable network managers to get the increased, deep performance visibility that they require to ensure flawless operations.

Switch Monitoring

Switch Monitoring

Monitor the health and performance with traffic control and switch mapping to identify connected devices

Router Monitoring

Router Monitoring

Get critical insights on router performance with metrics like errors, utilization, routing status and health

Firewall Monitoring

Firewall Monitoring

Identify pro-actively internal & external security threats & issues at an early stage by monitoring important firewall metrics that play a critical role in the efficient firewall performance

Layer 2 discovery and mapping

Layer 2 discovery and mapping

Use the L2 network mapping to visualize and pinpoint network outages and performance degradation

SNMP monitoring

SNMP monitoring

Detect and manage devices to gain insights into performance to ensure the health of the network

SNMP Trap processing

SNMP Trap processing

Traps are messages of a fault that occurs in an SNMP device. The Trap processing converts these messages to human-readable alarm

Load balancers

Load balancers

Load balancers act as a reverse proxy that distributes network or application traffic across a number of servers. The devices are used to increase capacity and reliability of applications

WAN accelerators

WAN accelerators

Monitoring of WAN accelerators which are used to maximize the efficiency of the data flow across a wide area network. It allows for increased speed to access business-critical applications

UPS

UPS

With monitoring the uninterrupted power supplies (UPS) we ensure that all critical components in your network are up and running without outages

Real-time and historical data

Real-time and historical data

Identify errors or spikes in real-time to detect errors. Use historical data to predict performance and plan capacity upgrades

enterprise networks

BaseN  provides several alternatives of open northbound APIs (including REST and JDBC) for obtaining not only fault and performance management data but also the raw measurements for external use. BaseN platform is capable of control functions such as distributed software upgrades or complex end-to-end network configuration.

End-to-End performance monitoring and fault identification with pin-point root cause analysis and SLA tracking for large enterprise ICT, service provider networks, including LTE/4G/5G operators. Additionally, support for load disaggregation, and fault and performance monitoring of the IP/ICT fabric itself is available.

Server monitoring

Server monitoring

Monitor relevant server metrics such as server and software performance, availability and configuration changes

IT device and infrastructure monitoring

IT device and infrastructure monitoring

Monitor your infrastructure and all connected devices to avoid down time

UPS

UPS

With monitoring the uninterrupted power supply (UPS) we ensure that all critical components in your network are up and running without outages

Real-time and historical data

Real-time and historical data

Identify errors or spikes in real-time to avoid errors. Use historical data to predict performance, capacity or any other issues.

Firewall Monitoring

Firewall Monitoring

Identify pro-actively internal and external security threats and issues at an early stage by monitoring important firewall metrics that play a critical role in the efficient firewall performance

Router Monitoring

Router Monitoring

Get critical insights on router performance with metrics like errors, voltage, temperature and health

Switch Monitoring

Switch Monitoring

Monitor the health and performance with traffic control and switch mapping to identify connected devices

Inherent multi-tenancy

Inherent multi-tenancy

Quickly change, optimize, split and recombine, work in team on same tasks, track full history of changes, return to any configuration

Security monitoring & control

BaseN platform includes full-fledged support for real-time detection, in-depth analysis and control of several types of network and systems security threats and cyber attacks. BaseN offers a complete SaaS-based monitoring solution for Security Monitoring and Control that has already been used extensively to protect and safeguard networks globally by identifying numerous different types of malicious behaviors, and cyber attacks to systems, devices and networks typically used in cyber warfare scenarios.

BaseN’s fine-grained traffic analysis, is fundamentally based on detection of anomalies and alerting of discrepancies originating from the occurrence of suspicious thresholds. By monitoring traffic patterns across a very large number of measurement points, BaseN can alert on changed traffic patterns and/or any combination of traffic patterns also across CDN (Content Delivery Network) scenarios. A multitude of security attack types can be detected as reflected by abnormal performance behaviors in devices, in systems and across complex networks.

Denial-of-service attacks

Denial-of-service attacks

Due to our load balancing and traffic analysis, you will easily detect anormalies in your network

CDN (Content Delivery Network) and CDNI (Content Delivery Network Interconnection) breaches

CDN and CDNI breaches

Optimize your speed and transmission cost and analyse your traffic

Cyber-attacks

Cyber-attacks

By offering also the foundation layer, you can run customized scripts, algorithms and applications for cyber attack protection

Finger printing

Finger printing

Real-time data analysis and historical data access allows you to collect and create fingerprints

Eavesdropping

Eavesdropping

Detect potential eavesdropping with our extensive autodiscovery function

Port scanner/port sweeps

Port scanner/port sweeps

Our firewall data analysis easily reveals unauthorized port scanning

Encryption attacks

Encryption attacks

With our encryption and certificate management and monitoring we provide powerful ways of detecting unauthorized encryption and certificates

DNS spoofing

DNS spoofing

Our DNS monitoring enables you to have an overview of your entire domain (DNS) infrastructure

Man-in-the-middle attacks

Man-in-the-middle attacks

Easy detection of unauthorized hosts that are added to your network. Our routing analysis and measurements allow you to detect unauthorized routing anouncements

Address Resolution Protocol (ARP) spoofing

Address Resolution Protocol (ARP) spoofing

Our extensive switch monitoring enables you to quickly detect ARP flooding

VLAN hopping

VLAN hopping

Our VLAN configuration monitoring enables you to ensure that there are no unauthorized VLANs and switches, routers and hosts are accepting only authorized VLANs

Buffer overflow

Buffer overflow

We are able to monitor buffers in an extensive amount of telecom devices with ease.

Internet of things

BaseN Platform works as a common platform for wide range of different Industrial Internet and Internet of Things (IoT) areas. We already support our customers in many different IoT vertical for several years.

BaseN Platform fully permits and enables the usage and management of physical assets, processes, and systems as digital twins. Our platform uses digitial twins for all aspects in how it monitors, analyses, and controls everything it manages, including the management of its own platform system components. Under a BaseN terminology this is known as spime, which fully describes and tracks the role(s), relationship(s), and function(s) of its physical representation, which includes all relevant knowledge of its ecosystem, attributes, capacities, etc. both present and past.

Device communications

Device communications

We help you to identify new ways of communicating and configuring your devices while monitoring health and status of your entire IoT network

Device and component control and configuration management

Device and component control and configuration management

We let you control devices remotely, update the configurations and create a database/archive/repository of existing and historical configurations allowing for seamless automatic or manual management

Data storage and failover mechanisms

Data storage and failover mechanisms

With our unique data storage mechanism you don’t need to worry about reducing the data density. With our redundant architecture we also ensure permanent fail-over for all elements and all your data

Data and analytics processing and computation

Data and analytics processing and computation

Collect, analyze, transform, clean and model your data to discover the required information through advanced parallel processing giving you a maximum computation power

Presentation, portal, and end-user experience technologies, graphing engines and formats

Presentation, portal, and end-user experience technologies, graphing engines and formats

We offer powerful analytics in customized user portals - see at a glance what's important for you

End-to-end performance monitoring

End-to-end performance monitoring

Observe how your network operates at every node and connection to get full visibility of your network’s functionality

Remote monitoring

Remote monitoring

Monitor client endpoints, networks and computers to control very large facilities and complex networks

Looking for alternative IoT platform providers to Google/Microsoft/IBM?

We are it.