Simplify administration and improve network performance
The HeliX network platform based on MSTN technology has a solution for deploying secure distributed data networks – the Autonomous Traffic Management System (AS), which allows you to spend network resources efficiently, while having all the necessary tools to manage and monitor, diagnose and control all the processes occurring in the network, both by the user and by the operator or provider.
SECURITY
ULTIMATE ATTACK PROTECTION
- New internet architecture
- Independent of TCP/IP protocols
- Hardened for DDoS and other IP-based attacks
- Efficient encryption algorithms
- Complete network isolation
- Secure global access
RELIABILITY
UNRIVALED CONNECTIVITY
- Architecture optimized for Cloud computing
- Bandwidth summation of communication channels
- Hot or cold redundancy modes
- Loop Protection
- Mobile devices connectivity
- Dynamic Ring
SIMPLICITY
AUTONOMOUS INTELLIGENCE
- Rapid, Scalable Plug-and-Play deployment
- Supports of all data types and applications
- Realtime remote monitoring & management
- Cost Effective and Economical
- Compatible with most legacy hardware
PERFORMANCE
NEXT-GENERATION TECHNOLOGY
- Data Integrity with no packet reordering
- Minimize latency/jitter
- Duplicate filtration with zero switching time
- Kernel-based architecture
- NAT Support
Unique benefits
MSTNT is an implemented concept of intelligent software-defined networks

It runs in the OS core, which gives much better performance compared to other solutions running on the user space level.

Ability to combine multiple channels in the capacity summation mode and/or in the backup mode (hot and cold).

Dynamic port switching in case of UDP session freezing (real WAN networks).

Monitoring the quality of tunnels working in real-time (proprietary designed BTest module).

Availability of built-in effective protection against various types of L2 loops.

The tunnel can work over the UDP and ICMP protocols

The packet fragmentation algorithm is designed to overcome anomalies in the operation of the transport WAN network (Internet).

Own mechanism of network indexes assignment

A proprietary encryption algorithm that allows you to achieve high performance with a low-end processor

Guarantee that packets are still in order (in which order the packets went into the tunnel -in the same order the packets left the tunnel)

Monitoring and control based on modern Web 2.0 technologies.

Automated deployment and operation of secure networks of any scale.

Filtering DUP (duplicate) packages.

Works with all types of NAT