Plug into our global data roaming service at any of the 350+ PoPs on our global IPX network and interconnect with over 700 mobile operators – and their 5 billion end customers.
Expand your reach and create new revenue streams with the simplicity of a single connection. Plug into our global data roaming service at any of the 350+ PoPs on our global IPX network and you can interconnect with over 700 mobile operators – and their 5 billion end customers. This means your customers can stay fully connected when they are overseas - and your revenue streams keep flowing.
GRX is used globally to transport mobile data between MNOs. No one knows GRX better than us – we invented it and have been at the forefront of its development ever since.
Today, we provide direct and seamless connections between mobile operators ranging from emerging markets to LTE-enabled technology leaders.
European regulations mean that users in the EU can use their home data bundle in other EU countries without extra cost. For MNOs, this means major seasonal bursts in mobile data – we estimate it can triple normal traffic. Our GRX Burst plans help operators meet the seasonal demand without paying for unneeded capacity during the rest of the year.
Call us anytime at
Or email us
Hong Kong
800 965 559
Mexico
01800 123 9599
Turkey
008 004 696 496
USA
1 888 436 1133
Features |
---|
2Mb to multiple 10G connection options | |
Option for lower CDR (committed data rate) plus GRX Burst for seasonal peaks | |
Access control lists (ACL) implemented without extra cost | |
Dedicated single, back-up, and IPSEC VPN connection options | |
Compliant with IR.34 and IR.77 as well as all relevant guidelines and standards | |
Expert technical implementation consulting support | |
Local tail and customer equipment (CE) router | |
DNS root services | |
Ability to set up customer access connection to border gateway | |
Maintenance (network, access + CE) |
Built to exceed GSMA guidelines IR.34, IR.67 and IR.77, our IPX network is completely isolated from the public Internet. Only planned and agreed routes are permitted, and unauthorized traffic is discarded at the network edge, providing best in class security.
Secure by design features |
---|
NOC situated in a well secured and connected building with multiple power sources | |
Physical and logical security considered from design to deployment | |
Network-wide User Acceptance Policy | |
Customer Service authentication procedures | |
Clear customer data handling policies |