Business Situation & Requirements

The telecommunications and data security industry increasingly relies on VPNs as a cost-effective alternative to dedicated private networks such as MPLS, Frame Relay, and VSAT. Many organizations face challenges with third-party VPN solutions due to high recurring licensing costs, limited customization, and dependency on external vendors for feature enhancements.

FS Security, a well-established provider of security solutions for mobile telecommunication companies, was using a third-party VPN SDK to build solutions for its clients. Over time, this approach became restrictive, making it difficult to introduce new features and optimize costs without compromising performance.

To overcome these challenges, FS Security decided to build its own VPN framework that could be seamlessly integrated with its in-house security solutions. The client required a resilient and scalable VPN framework that matched the performance of existing third-party products while significantly reducing fixed and recurring development costs.

In addition, FS Security needed expert consulting support to assess technical feasibility, define the right technology stack, align the solution with budget constraints, and ensure long-term scalability. To achieve this, FS Security partnered with Unthinkable, leveraging its expertise in secure architecture development, data security, and server encryption to guide and execute the project effectively.

The key requirements that were presented to Unthinkable were:

  • Conduct in-depth technical consulting and develop a Proof of Concept (PoC) for a custom VPN framework by thoroughly analyzing OpenVPN configurations and assessing overall project feasibility.

  • Design and build a proprietary VPN framework that supports seamless extension and future development across both Android and iOS platforms.

  • Develop secure, reusable VPN libraries hosted on encrypted servers, enabling easy integration with FS Security’s in-house security solutions for multiple mobile service carriers.

  • Implement a multi-server architecture that enables secure remote access to data from different geographic locations, tailored to user-specific requirements.

  • Ensure the VPN framework is highly scalable and resilient to support increasing user loads without compromising performance or reliability.

  • Establish strong security and compliance measures, including robust encryption, secure key management, and monitoring mechanisms to protect sensitive user data.