Calix, Inc. launched updates to the Intelligent Access EDGE platform that make the entire subscriber-facing network more secure than ever. Broadband service providers (BSPs) must ensure that their networks protect subscribers from current and emerging threats. A secure broadband access network is the cornerstone for enabling value-added security services that protect subscribers and keep their data secure.

The advanced routing module (ARm) software in Intelligent Access EDGE now identifies, isolates, and blocks unauthorized traffic across residential gateways so BSPs of any size can secure their access network. By combining the Intelligent Access EDGE with the managed home network security services available through the Revenue EDGE platform, such as ProtectIQ™, Calix secures the only end-to-end solution for BSPs that addresses the entire subscriber-facing network. Innovative BSPs can now grow their value to subscribers by: Securing the network against increasing attacks.

Broadband service providers using Intelligent Access EDGE can easily secure their networks by isolating the Layer 2 interfaces, due to updated ARm software. Upgraded capabilities prevent unauthorized network traffic from flowing between interfaces in the subscriber-facing network and potentially attacking the network; Eliminating network congestion to free up more bandwidth for subscriber services. The new ARm software eliminates the possibility of a network system being overwhelmed by continuous multicast or broadcast traffic.

Preventing this “broadcast storm” of data packets removes network congestion, so more bandwidth is available for speedy delivery of subscriber services; Accelerating security deployment by leveraging Calix Network Consulting Services. Broadband service providers using Network Consulting Services have found they can plan and deploy networks up to 75% faster than traditional deployment. Calix network consultants work closely with engineering teams to deploy the ARm software quickly and securely across the network without compromising existing network security.