What we do

the core solution: software-is-the-network

Athonet’s software provides a complete mobile-network- in-a-box that looks and feels like Wi-Fi

 

Any IT professional can simply bring up a network, manage it, provision SIMs and connect it to their IT applications and systems.

a software
for 4G / 5G networks

Operational use by non IT users Compact click- to-deploy networks for setting up a Standalone LTE network

  • Broadband
  • Low latency
  • Real-Time
  • HD Quality

Highly resilient & secure solutions designed for the most demanding environments

  • Government
  • Public safety
  • MVNE / MVNO
  • Enterprise & Utilities
  • Wireless ISPs

A full range of standard or customized applications to meet your business needs

  • Voice over LTE
  • Video over LTE
  • (MC) Push To Talk
  • Internet of Things
  • Health & Safety

Designed for business critical environments

flexibility
{
performance
scalability
competitiveness

Highest Level of Security

Athonet is a certified ISO/IEC 27001. Dedicated processes and procedures are applied at corporate level to protect the information of both Athonet ande it’s customers, as well as, to ensure the security of Athonet’s products and solutions.

In particular, the Athonet’s EPC product and tactical solutions are authorized by ANSSI since they comply with the R226 recommendations for system security hardening.

the mobile core that works for you

5 reasons why Athonet is the world’s most used mobile core for private 5G networks

01.Auto-deploy & orchestrate

Fleets of 1000’s of networks

02.IT-Friendly

Simple dashboards, GUI APIs, multi-RAN, single pane of glass

03.Openess – Deployment flexibility

Our partners are free to use any radio and we support any application including any cloud, distributed or hybrid architecture with or without georedundancy

04.Carrier grade – No compromise

Same codebase deployed in real enterprise and public cellular networks from one to millions of users

05.Athonet – The mobile core that works for you

Fully in-house developed software code, scales from a handful to millions of devices

why Athonet?

1

built and designed for Enterprise & Cloud

2

flexible & agile

3

fast/simple-to-deploy

4

interworks with traditional mobile networks

5

15 years of leadership in software- based and cloudified networks

6

mission critical

7

radio agnostic
(BYORAN – Bring Your Own RANTM)

Global Support

24/7 incident management by full-time, trained engineers and subject matter experts to monitor networks

Proactive monitoring of networks via NOC

Early detection through Network KPI’s and SNMP traps

Incidents logged via ticketing system and 24×7 hotline

Incidents triaged as critical, major and minor with clear SLA commitments

awards

prized quality

3 ICCA

International Critical Communication Awards

7 GLOMOs

Global Mobile Awards

ongo alliance awards

OnGo Alliance Awards

Judges’ Choice (with Bearcom)

patents

WiFi Cellular Convergence Awarded
2010 – Describes the use of a WiFi gateway that authenticates a WiFi-Cellular device using SIM authentication and downloads a profile for the device to the gateway. The gateway uses such profile to control the type of services that the WiFi-Cellular device can access.
Radio Access Network Control of Media Session Awarded
2014 – Describes a method used by the mobile core to prioritize media sessions by interpreting application signalling messages such as SIP and assigning dedicated radio bearers to provide the required quality of service.
Mobility Gateway Awarded
2020 – Describes the use of SIM based authentication in the cellular network in order to connect the cellular devices to any Internet of Things (IOT) platform in a secure way without the need to install complex security certificates in IOT devices (e.g. sensor). This method works with the leading IOT cloud platforms including AWS, GCP and Microsoft.​
Method for establishing a secure connection for the Internet of Things – Awarded​
2020 – Describes the use of SIM based authentication in the cellular network in order to connect the cellular devices to any Internet of Things (IOT) platform in a secure way without the need to install complex security certificates in IOT devices (e.g. sensor). This method works with the leading IOT cloud platforms including AWS, GCP and Microsoft.​