Airspan Networks, Padtec and Trópico Team up to Offer Innovative 5G Open RAN Public and Private Network Solutions

Airspan | December 14, 2021

Airspan Networks, Padtec and
Airspan Networks Inc., a subsidiary of Airspan Networks Holdings Inc. (NYSE American: MIMO), Padtec S/A, a subsidiary of Padtec Holding (B3: PDTC3), and Trópico have entered into a Memorandum of Understanding (MoU) to offer 5G network solutions. The agreement is part of Padtec’s and Trópico's strategy which focuses on entering the 5G market. The partnership will provide solutions in several spectrum bands, including 700 MHz, 2.3 GHz, 3.5 GHz and 26 GHz.The recent successful auction of 5G spectrum in Brazil will spur a wave of investments in telecom infrastructure to support the next-generation of high-bandwidth applications and services driven by 5G networks. The goal of the three companies is to collaborate to provide end-to-end hardware and software solutions to established telecom operators as well as new entrants, providing the tools to support the increasing demand for data traffic on their networks which will result from the widespread adoption of 5G.

“As 5G is deployed and wireless data traffic carried by Airspan's RAN platform grows exponentially at the edge of networks, the need for a transport network that can scale and be flexible becomes critical. This strategic collaboration with companies like Padtec and Trópico which have deep market knowledge and are leaders in their fields, along with Airspan's innovation and expertise, will help accelerate adoption of 5G public and private network solutions,"

-Richard Vincent, Airspan SVP of Sales for the Americas.

The race to deploy 5G in Brazil is on and we are confident that the combination of Airspan’s extensive RAN portfolio, with Trópico's in-depth expertise in the wireless field in Brazil will complement our capabilities in transport and aggregation of high capacity traffic and enable our alliance to deliver an integrated 5G solution to our customers on the timing they demand, said Argemiro Sousa, Padtec's Business Director.

"For us, the partnership with Padtec and Airspan accelerates our plan to offer solutions on connectivity and applications for 5G services,As the three companies are leading innovators in our respective spaces with strong customer bases for these portfolios, this powerful collaboration leverages our collective leadership to create good solutions for 5G networks," 

-Paulo Cabestré, Trópico's CEO.

About Airspan
Airspan Networks Holdings Inc. (NYSE American: MIMO) is a U.S.-based provider of groundbreaking, disruptive software and hardware for 5G networks, and a pioneer in end-to-end Open RAN solutions that provide interoperability with other vendors. As a result of innovative technology and significant R&D investments to build and expand 5G solutions, Airspan believes it is well-positioned with 5G indoor and outdoor, Open RAN, private networks for enterprise customers and industrial use applications, fixed wireless access (FWA), and CBRS solutions to help mobile network operators of all sizes deploy their networks of the future, today. With over one million cells shipped to 1,000 customers in more than 100 countries, Airspan has global scale. For more information, visit

About Padtec (
Padtec is a global provider of flexible and high-capacity optical transport solutions based on DWDM technology. Padtec offers an extensive product portfolio for corporate access, DCI, metropolitan and regional networks and multi-terabit long-distance networks, which meets the end-to-end demands – in transport, optical amplification and route protection – of operators, integrators, carrier of carriers, utilities and service providers. Padtec’s service unit is involved in the deployment, operation and maintenance of systems and in optical network management. With a strong focus on research and development, Padtec’s pioneering technology spans long distances and challenges boundaries to connect the world intelligently.

About Trópico (
Trópico's history was forged in a research and development environment that gave it its innovative DNA. Combined with the entrepreneurial spirit of its managers, a modern and dynamic company was formed, with a solid culture of innovation that stands out in the Brazilian technological forefront. With Information and Communication Technologies (ICT) products, Trópico operates in several markets, such as telecommunication operators, agribusiness, utilities, defense and public security.


5G touches almost every aspect of the way we live our lives. It’s not just about faster, bigger or better, it’s about utilizing 5G as an enabler to a series of services that we all will consume in every aspect of our lives. The time is NOW to consider the security implications and cyber risk profile that come with 5G. The business operational risk, legal risk and reputational risk of not only the companies who provide 5G transport, but all companies, nation states and individuals who provide the services that will utilize 5G. The time is now to evaluate the cyber risk posture and apply innovative thoughts to how we can approach these challenges today and build for what’s to come tomorrow. Many IoT (Internet of Things) services will utilize 5G services. The intersection of 5G and IoT brings an extension of the existing threat surface that requires careful consideration from a cyber risk perspective. 

Other News

Ethernity Networks Opens Remote Access 5G Core Setup

Ethernity Networks | April 28, 2022

Ethernity Networks (AIM: ENET.L), a leading network processing semiconductor technology company, today announced it is offering access to a real 5G core network environment that includes the company's 5G UPF Hardware Offload solution supported by leading integrator Tietoevry's UPF toolkit and testbench. The environment enables telecom operators and system integrators to remotely access the setup to experience firsthand the possible performance improvements and CPU savings. Potential customers can connect directly to the setup, which sends data flows across the environment via Ethernity's ACE-NIC100 FPGA SmartNIC, configured with PFCP commands originated by SMF. The ACE-NIC100 embeds the ENET Flow Processor semiconductor technology ported on the FPGA to handle the offloaded data plane from the server CPUs, accelerating the network function virtualization infrastructure (NFVI) via a unique containerized architecture that uses standard DPDK RTE_Flow APIs that are untied from the NFV and the driver. The result is dramatic improvement in UPF deterministic performance and a significant reduction in the CPU workload, resulting with lower server cost and power consumption. By accessing the setup, users can experience how the ACE-NIC100 communicates with other containers of open source VPP with UPF software networking elements. The solution fully offloads the user plane traffic without changing the UPF NFVI application, releasing server CPU cores and reducing power consumption, enhancing scalability, and assuring deterministic performance. The setup also incorporates graphical and statistical representations of the performance in real-time to illustrate the power of offloading 5G UPF from server CPUs. Ethernity's unique containerized 5G UPF Offload solution assures carrier-grade UPF performance. It seamlessly integrates our ACE-NIC technology with any DPDK-based UPF NFVI, providing an extremely flexible and competitive UPF offering. The solution reduces software complexity and networking overhead, improves latency, and lowers the overall solution cost. It also paves the way to place UPFs at the network edge closer to end user locations. Now, thanks to this remote setup to our 5G Core environment, we invite 5G mobile operators and integrators to experience how to achieve better UPF performance in the shortest time-to-market." Oded Bergman, Ethernity's VP of Product and Business Development About Ethernity Networks Ethernity Networks provides network processing semiconductors that integrate innovative, comprehensive networking and security solutions accelerating telco/cloud networks. Ethernity's patented ENET Flow Processor offers complete Carrier Ethernet Switch/Router data plane processing and control software with a rich set of networking features, robust security, and a wide range of virtual function accelerations to optimize telecommunications networks. Ethernity's network processing semiconductor technology and solutions quickly adapt to customers' changing needs, improving time-to-market and facilitating deployment of 5G, edge computing, and NFV.

Read More


Extreme Ensures Security, Availability Across Service Provider Data Center and Mobile Edge Network Infrastructure with Trusted Delivery

Extreme Networks | December 17, 2021

Extreme Networks, Inc. (NASDAQ: EXTR), a cloud-driven networking company, announced Extreme Trusted Delivery, a carrier-grade solution designed to protect critical network infrastructure and ensure it is performing as anticipated without interference, regardless of location. Trusted Delivery protects key service delivery infrastructure at remote and unattended cellular edge sites, as well within co-location and data center environments where shared facility access is a potential concern. With cyberattacks on the rise, supply chain security is more critical than ever, requiring state-of-the-art network technology from end to end. Trusted Delivery enables network administrators to validate hardware components, boot processes, and the operating system (OS) throughout the device lifecycle – without disrupting device functionality – mitigating the risk of supply chain cyberattacks. Key Benefits: Secure Foundation for Future Deployments: With Trusted Delivery, Extreme delivers an additional layer of certainty for service providers that are beginning to move away from legacy solutions and ensures a foundation of secure, validated infrastructure to support new networks. Available today across the Extreme 8000 Series, including the Extreme 8520 and Extreme 8720 data center and cellular edge leaf and spine switches, Trusted Delivery provides mechanisms for verifying device security and performance during operation, enabling service providers to deploy new infrastructure with confidence. Increased Simplicity in Hardware Validation: Measured boot, an anti-tamper mechanism, gives operators the ability to validate hardware and boot processes remotely without shutting the device down. This saves time and resources and prevents unnecessary service disruptions. Measured boot implementation is enabled by a microcontroller-based hardware root of trust (HWRoT) in conjunction with a Trusted Platform Module (TPM). Additionally, with remote attestation, Extreme delivers increased verification that the device is functioning as expected by enabling an off-box arbiter of trust option and ongoing binary-level validation. Executive Perspectives Brad Casemore, Research Vice President, Datacenter and Multicloud Networks, IDC "Attacks on supply chains are growing in frequency and sophistication. As a result, considerable value derives from the ability to verify a device's performance and security, at any time, without the need to shut off a service or to send a technician to a remote location. With Trusted Delivery, Extreme is taking measures to help customers ensure that their investments in IT infrastructure are protected, bolstering the reliability and security of devices throughout their lifecycle." "Our goal is to make managing network security as easy as possible for our customers. By giving them the ability to ensure devices are functioning normally without interrupting service, or without costly truck rolls, we can address one of their biggest pain points. Ensuring the security of our solutions is a continuous effort and is one of our most important roles as a provider of end-to-end network infrastructure." -Dan DeBacker, Vice President of Service Provider Product Management and Engineering, Extreme Networks About Extreme Networks Extreme Networks, Inc. (EXTR) creates effortless networking experiences that enable all of us to advance. We push the boundaries of technology leveraging the powers of machine learning, artificial intelligence, analytics, and automation. Over 50,000 customers globally trust our end-to-end, cloud-driven networking solutions and rely on our top-rated services and support to accelerate their digital transformation efforts and deliver progress like never before. For more information, visit Extreme's website at or follow us on LinkedIn, YouTube, Twitter, Facebook, or Instagram.

Read More


DISH Selects RADCOM to Monitor America's First 5G Smart Network™

DISH | May 12, 2022

RADCOM Ltd. (NASDAQ: RDCM) announced today that it was selected by DISH Wireless (DISH) to provide its best-in-class RADCOM ACE solution to monitor customers' experience across DISH's 5G Smart Network™ — the first cloud-native, OpenRAN-based 5G network in the United States. RADCOM ACE will seamlessly integrate into DISH's network, enabling the company to monitor and analyze service quality across its nationwide deployment and proactively ensure the best customer experience. "We are thrilled to be part of DISH's cloud-native 5G network, as it aims to innovate by launching nationwide 5G services using the latest cutting-edge technologies," said Eyal Harari, Chief Executive Officer, RADCOM. "Our cloud technology will allow DISH to launch 5G smoothly, offer a superior customer experience, gain real-time insights into how the network is performing 24/7 and ensure confidence when testing and rolling out new advanced services." "Our standalone 5G network is the first to be fully deployed on the public cloud, and we needed an assurance market leader that shared our innovative vision. We selected RADCOM because its advanced cloud technology will ensure our customers have access to reliable network performance and a great user experience." Jeff McSchooler, Executive Vice President of Wireless Network Operations, DISH Wireless. RADCOM ACE uses built-in artificial intelligence and machine learning to enable DISH to differentiate from its competition through automation that solves issues faster, saves engineering resources, and proactively maintains service quality across the network. In addition, RADCOM ACE provides scalability, performance, and efficiency to monitor the network continually and runs on the Amazon Web Services (AWS) cloud using Amazon Elastic Kubernetes Service (Amazon EKS) and Amazon Elastic Compute Cloud (Amazon EC2). Also, the control and automation by Amazon EKS provide DISH with an innovative approach to assurance in the cloud, using minimal data center resources while providing real-time insights into the subscribers' experience as soon as new services launch.

Read More


Palo Alto Networks Joins Microsoft 365 Networking Partner Program

Palo Alto Networks | January 13, 2022

Businesses are now expected to deliver exceptional user experiences to their employees — whether at work, home, or on the go — as well as to third parties and external customers. Many choose the leading enterprise cloud-enabled collaboration suite, Microsoft 365, to help accomplish this.Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, announced it has joined the Microsoft 365 Networking Partner Program to provide direct and efficient connectivity for Microsoft 365 users through the industry-leading Prisma Access service, facilitating an optimal user experience aligned with Microsoft's connectivity principles. "As enterprises use direct-to-app architectures for their hybrid workforces, IT teams can find themselves with limited visibility and control over what applications users are accessing. Prisma Access reduces administrative and management burden by enabling the dynamic identification and categorization of Microsoft 365 traffic providing secure branch direct Internet access via Prisma Access,We can't reinforce enough the importance of having a trusted ecosystem of technology partners. As a member of the Microsoft 365 Networking Partner Program, we help customers feel confident in the security of their cloud environments and applications." -Kumar Ramachandran, Senior Vice President of Products for Palo Alto Networks. Palo Alto Networks flagship cloud-delivered security platform, Prisma Access, meets all the requirements for securing Microsoft 365 and other cloud applications, enabling safe and reliable Zero Trust access to all the applications users need from anywhere. For teams responsible for keeping users secure, Prisma Access enables: A cloud-delivered security platform spanning over 100 global locations in more than 70 countries; API and inline-based data loss prevention and threat prevention; Native and autonomous digital experience monitoring; and Simplified deployment and fast return on investment. "We're thrilled to welcome Palo Alto Networks into the Networking Partner Program for Microsoft 365,Palo Alto Networks is a valued partner that is focused on helping Microsoft 365 customers implement the Microsoft 365 network connectivity principles. Microsoft only recommends Networking Partner Program member solutions for connectivity to Microsoft 365." -Scott Schnoll, Senior Product Marketing Manager at Microsoft. In accordance with Microsoft 365 network connectivity principles, Prisma Access can differentiate Microsoft 365 traffic by leveraging Microsoft's APIs for endpoints, enables local egress for application traffic, and enables elimination of intrusive network security for Microsoft 365 connections. Palo Alto Networks' integrated next-gen CASB approach helps IT security teams see and secure Microsoft 365 and many other applications, protect sensitive data stored and shared, and prevent zero-day threats in real time — all without deployment complexity or additional infrastructure. About Palo Alto Networks Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit

Read More


5G touches almost every aspect of the way we live our lives. It’s not just about faster, bigger or better, it’s about utilizing 5G as an enabler to a series of services that we all will consume in every aspect of our lives. The time is NOW to consider the security implications and cyber risk profile that come with 5G. The business operational risk, legal risk and reputational risk of not only the companies who provide 5G transport, but all companies, nation states and individuals who provide the services that will utilize 5G. The time is now to evaluate the cyber risk posture and apply innovative thoughts to how we can approach these challenges today and build for what’s to come tomorrow. Many IoT (Internet of Things) services will utilize 5G services. The intersection of 5G and IoT brings an extension of the existing threat surface that requires careful consideration from a cyber risk perspective.