Our experience in working with biggest telecom operators and authorities allows us to implement lawful interception solutions of any complexity on mobile and broadband networks. We know how to retain data from all kinds of sources, store petabytes and find required records within seconds.
We also offer the database monitoring system Meridian DB Patrol - the Russian analogue of such systems as Imperva and Guardium.
Spectr is a core application of Con Certeza infrastructure, being an entry point for users. The application offers convenient access to data collected via web interface or via control panel using binary protocol. The operation of the system fully complies with Russian legislation. The main functionality includes:
- Convenient modern interface
- “Machine-machine” access support (ASN.1)
- Subscribers’ control according to various identifiers
- Visualization of the collected traffic (web pages, e-mails, instant messages)
- Queries against all retained data types
- Internal database for query results storage
- Batch queries
- Queries with logical conditions
- Reports in various formats (txt, xlsx, pdf)
- Users authorization and authentication using login/password or USB tokens
- Flexible access rights hierarchy
- Protected queries log
Data retained from various sources is kept in a single scalable storage, based on Equator Server solution from our partner Coppereye. This solution provides compact data storage, linear scalability and rapid search.
Three subsystems are used to collect all data required according to legislation.
A complete set of solutions for lawful interception
Spectr products line covers all the operator’s needs for lawful interception solutions. This insures infrastructure homogeneity, decreases cost of ownership and simplifiers maintenance. The products fully comply with legislation requirements to interaction protocols, performance and types of the data retained.
Installations of any complexity
Our experience allows us to build a system of any scale. The biggest installation to date provides data retention in all regions of Russia with simultaneous analysis of 500 Gbps of traffic. Billions of CDRs and tens of billions of IPDRs are uploaded to the system per day. Storage period is up to three years and total storage volume – several petabytes.
Velocity, scalability, compactness
To store data in "Spectr" products line a solution from our partner Coppereye is used. This company develops unique storages, based on modern NoSQL approaches to data retention and querying. CopperEye Equator Server allows data access within seconds in a petabyte storage and linear system scalability with load growth. Optimized compression and no indexes usage make storage as compact as possible.
Commodity hardware usage
To retain the data commodity servers with internal discs are used, e.g. HP DL380, HP SL4540, IBM System x3650, Dell PowerEdge R730xd. Unlike the systems based on expensive disc arrays or specialized hardware/software appliances, this approach guarantees minimal price per terabyte and no vendor lock.
Advanced traffic analyses technologies
Traffic analyzers of own design allow to process data as fast as 100 Gbps in one node (1GbE, 10GbE, 40GbE, 100GbE interfaces are supported). Special network cards used and scalable architecture guaranty loss-free operation. Network sniffers can process regular TCP/IP traffic as well as GTP v1/v2 encapsulation. Broad range of network protocols is supported (HTTP, FTP, WAP, mail protocols, various clients of instant messaging, VoIP). It is also possible to work with signaling network protocols stack, including support of BSSAP and RANAP protocols family. Besides, our solutions also use proprietary technologies for Netflow and Syslog collection from different vendor’s appliances. This range of technologies makes it possible to collect any information needed from mobile operators’ networks (2G/3G/LTE) or from BB operators’ networks.
Complex monitoring and professional support
Along with other solutions Con Certeza also supplies monitoring system based on Zabbix. Due to integration with lawful interception infrastructure it is possible not only to control system parameters (CPU, memory, discs status etc.), but also some application parameters, such as number of various requests and their run time. Automatic correlation of independent data sources secures lossless information collection. For all controlled parameters it is possible to set flexible triggers for notifications. Parameters’ change history is available in graphic representation. We also provide operators on duty and 2nd line support on customer request. This allows to quickly solve all possible issues.