Unique benefits

Simplify administration and improve network performance

The HeliX network platform based on MSTN technology has a solution for deploying secure distributed data networks – the Autonomous Traffic Management System (AS), which allows you to spend network resources efficiently, while having all the necessary tools to manage and monitor, diagnose and control all the processes occurring in the network, both by the user and by the operator or provider.

SECURITY

ULTIMATE ATTACK PROTECTION

  • New internet architecture
  • Independent of TCP/IP protocols
  • Hardened for DDoS and other IP-based attacks
  • Efficient encryption algorithms
  • Complete network isolation
  • Secure global access

RELIABILITY

UNRIVALED CONNECTIVITY

  • Architecture optimized for Cloud computing
  • Bandwidth summation of communication channels
  • Hot or cold redundancy modes
  • Loop Protection
  • Mobile devices connectivity
  • Dynamic Ring

SIMPLICITY

AUTONOMOUS INTELLIGENCE

  • Rapid, Scalable Plug-and-Play deployment
  • Supports of all data types and applications
  • Realtime remote monitoring & management
  • Cost Effective and Economical
  • Compatible with most legacy hardware

PERFORMANCE

NEXT-GENERATION TECHNOLOGY

  • Data Integrity with no packet reordering
  • Minimize latency/jitter
  • Duplicate filtration with zero switching time
  • Kernel-based architecture
  • NAT Support

Unique benefits


MSTNT is an implemented concept of intelligent software-defined networks

PERFORMANCE
It runs in the OS core, which gives much better performance compared to other solutions running on the user space level.
SUMMATION
Ability to combine multiple channels in the capacity summation mode and/or in the backup mode (hot and cold).
DYNAMIC RING
Dynamic port switching in case of UDP session freezing (real WAN networks).

TUNNELS MONITORING
Monitoring the quality of tunnels working in real-time (proprietary designed BTest module).
LOOP PROTECTION
Availability of built-in effective protection against various types of L2 loops.

UDP / ICMP TUNNELING
The tunnel can work over the UDP and ICMP protocols

FRAGMENTATION
The packet fragmentation algorithm is designed to overcome anomalies in the operation of the transport WAN network (Internet).
SECURITY
Own mechanism of network indexes assignment

ENCRYPTION
A proprietary encryption algorithm that allows you to achieve high performance with a low-end processor

INTEGRITY
Guarantee that packets are still in order (in which order the packets went into the tunnel -in the same order the packets left the tunnel)
CONTROL SYSTEM
Monitoring and control based on modern Web 2.0 technologies.

AUTOMATION
Automated deployment and operation of secure networks of any scale.

DUP FILTERING
Filtering DUP (duplicate) packages.
NAT SUPPORT
Works with all types of NAT