the levl-iq platform:
solving the issues associated with mac address randomization
The LEVL-IQ platform is built to provide network operators device intelligence and device identity while still maintaining user privacy. The platform is an easy to deploy SaaS system that accurately identifies devices in just a couple of seconds. The LEVL-IQ platform requires nothing be put on a user device, dramatically simplifying and accelerating adoption. At the core the system is the our unique device identifier, the LEVL-ID. The LEVL-ID is generated automatically from within the network without using any Personally Identifiable Information (PII) from the client.
LEVL provides network operators with the device intelligence for each device on the network that is needed to run an efficient, easy to use network. There are four components to device intelligence as follows
Device Identity is the fundamental building block of our system. Historically device identity was determined using the device MAC address. However recent changes in user privacy techniques are rendering it useless. LEVL identifies devices by how the “talk and behave” on the network. We create a device identity in 30 seconds and can then identify the same device in about 2 seconds.
Device context tells us what type of device is on the network. Is it a phone or laptop? Who makes it? what is the model type and operating system version. Coupling this with device identity allows network operators to assess what types of devices are on the network. This in turn enables more accurate network planning and deployment of support resources.
Device Experience relates to the quality of the service the device is getting on the network. By knowing the device type you can assess if there is enough bandwidth for the device. Different device types have different needs from the network. We can assess the device experience once we know device type.
Device Behaviour is driven by device type as well. By assessing the actual behavior against the know device type LEVL can identify compromised devices and devices that are being spoofed by something else.
THREE PACKAGES FOR THE BEST DEVICE INTELLIGENCE SOLUTION
The Device Identity package is our entry level platform and feature basic device identity features. This allows network operators to create, maintain and match device identities on the network. The system features accuracy of >99.5% and typically identifies devices in less that 2.5 seconds. Device identities can be stored for up to 30 days. The system comes with basic reporting and analytics capabilities and APIs for quick and integration into a networks authentication system. The platform can be deployed via a virtual machine on an existing edge compute device or via a small network appliance. The compute power needed is dependent on property size but has been successfully deployed on intel ATOM platforms with 2Gbyte of memory.
The Device Performance package includes providing operators with device type ( phone vs laptop vs other), device manufacturer, device model and OS information. This package also allows for longer storage periods for device identities and provides a more advanced reporting and analytics package.
The Device Intelligence package is our top of the line offering and adds device experience and device behavior analysis capabilities. Device QOS, relative to the device type is analyzed and potential quality of service issues can be highlighted. Compromised, rogue and spoofed device detection is also include as is multi-site capability.
PRODUCT DEPLOYMENT REQUIREMENTS
Deployment is designed to be easy and time efficient. The cloud portion of the system is configured first, based on the package purchased and options selection. On site, a small amount of edge compute capability is needed. It can take the form of a virtual machine or a dedicated network appliance. (add specs for cpu/memory here) Access to the DHCP server via port mirroring and a couple of ethernet ports round out the requirements. WAN bandwidth requirements are low, typically in the 15-25 Kbytes per second range.
HOW TO BUY
Ready to discuss how to jump on to the LEVL-Q platform? Reach out to us at email@example.com or sign up for a demo here.