2018 SD-WAN Survey: What Enterprises Want From Their SD-WAN Vendor

SD-WAN adoption is seeing rapid growth as companies look to streamline their WAN infrastructure and move toward more cloud-based applications. Much of the growth in SD-WAN adoption is from companies looking for ways to reduce the number of physical devices required to support applications as well as lower the cost of maintaining technology deployed in remote locations. The list of vendors offering SD-WAN services is growing, and we felt the time was ripe to go out and ask the tough questions about what it is these companies are looking for when selecting a vendor and what other factors are on their mind.

Spotlight

Cradlepoint

Branch, mobile, and IoT edge networks are undergoing dramatic change — and taking traditional enterprise WANs to their breaking point. Organizations must manage increasingly complex branch sites; data-driven vehicle fleets and mobile command centers; a vast array of IoT and M2M use cases; and everything in between.

OTHER ARTICLES
Hyper-Converged Infrastructure

Infrastructure as code vs. platform as code

Article | October 3, 2023

With infrastructure as code (IaC), you write declarative instructions about compute, storage and network requirements for the infra and execute it. How does this compare to platform as code (PaC) and what did these two concepts develop in response to? In its simplest form, the tech stack of any application has three layers — the infra layer containing bare metal instances, virtual machines, networking, firewall, security etc.; the platform layer with the OS, runtime environment, development tools etc.; and the application layer which, of course, contains your application code and data. A typical operations team works on the provisioning, monitoring and management of the infra and platform layers, in addition to enabling the deployment of code.

Read More
Application Storage, Data Storage

Transforming Data Management by Modernized Storage Solutions Using HCI

Article | July 12, 2023

Revolutionize data management with HCI: Unveil the modernized storage solutions and implementation strategies for enhanced efficiency, scalability, sustainable growth and future-ready performance. Contents 1. Introduction to Modernized Storage Solutions and HCI 2. Software-Defined Storage in HCI 3. Benefits of Modern Storage HCI in Data Management 3.1 Data Security and Privacy in HCI Storage 3.2 Data Analytics and Business Intelligence Integration 3.3 Hybrid and Multi-Cloud Data Management 4. Implementation Strategies for Modern Storage HCI 4.1 Workload Analysis 4.2 Software-Defined Storage 4.3 Advanced Networking 4.4 Data Tiering and Caching 4.5 Continuous Monitoring and Optimization 5. Future Trends in HCI Storage and Data Management 1. Introduction to Modernized Storage Solutions and HCI Modern businesses face escalating data volumes, necessitating efficient and scalable storage solutions. Modernized storage solutions, such as HCI, integrate computing, networking, and storage resources into a unified system, streamlining operations and simplifying data management. By embracing modernized storage solutions and HCI, organizations can unlock numerous benefits, including enhanced agility, simplified management, improved performance, robust data protection, and optimized costs. As technology evolves, leveraging these solutions will be instrumental in achieving competitive advantages and future-proofing the organization's IT infrastructure. 2. Software-Defined Storage in HCI By embracing software-defined storage in HCI, organizations can benefit from simplified storage management, scalability, improved performance, cost efficiency, and seamless integration with hybrid cloud environments. These advantages empower businesses to optimize their storage infrastructure, increase agility, and effectively manage growing data demands, ultimately driving success in the digital era. Software-defined storage in HCI revolutionizes traditional, hardware-based storage arrays by replacing them with virtualized storage resources managed through software. This centralized approach simplifies data storage management, allowing IT teams to allocate and oversee storage resources efficiently. With software-defined storage, organizations can seamlessly scale their storage infrastructure as needed without the complexities associated with traditional hardware setups. By abstracting storage from physical hardware, software-defined storage brings greater agility and flexibility to the storage infrastructure, enabling organizations to adapt quickly to changing business demands. Software-defined storage in HCI empowers organizations with seamless data mobility, allowing for the smooth movement of workloads and data across various infrastructure environments, including private and public clouds. This flexibility enables organizations to implement hybrid cloud strategies, leveraging the advantages of both on-premises and cloud environments. With software-defined storage, data migration, replication, and synchronization between different data storage locations become simplified tasks. This simplification enhances data availability and accessibility, facilitating efficient data management across other storage platforms and enabling organizations to make the most of their hybrid cloud deployments. 3. Benefits of Modern Storage HCI in Data Management Software-defined storage HCI simplifies hybrid and multi-cloud data management. Its single platform lets enterprises easily move workloads and data between on-premises infrastructure, private clouds, and public clouds. The centralized management interface of software-defined storage HCI ensures comprehensive data governance, unifies control, ensures compliance, and improves visibility across the data management ecosystem, complementing this flexibility and scalability optimization. 3.1 Data Security and Privacy in HCI Storage Modern software-defined storage HCI solutions provide robust data security measures, including encryption, access controls, and secure replication. By centralizing storage management through software-defined storage, organizations can implement consistent security policies across all storage resources, minimizing the risk of data breaches. HCI platforms offer built-in features such as snapshots, replication, and disaster recovery capabilities, ensuring data integrity, business continuity, and resilience against potential threats. 3.2 Data Analytics and Business Intelligence Integration These HCI platforms seamlessly integrate with data analytics and business intelligence tools, enabling organizations to gain valuable insights and make informed decisions. By consolidating storage, compute, and analytics capabilities, HCI minimizes data movement and latency, enhancing the efficiency of data analysis processes. The scalable architecture of software-defined storage HCI supports processing large data volumes, accelerating data analytics, predictive modeling, and facilitating data-driven strategies for enhanced operational efficiency and competitiveness. 3.3 Hybrid and Multi-Cloud Data Management Software-defined storage HCI simplifies hybrid and multi-cloud data management by providing a unified platform for seamless data movement across different environments. Organizations can easily migrate workloads and data between on-premises infrastructure, private clouds, and public clouds, optimizing flexibility and scalability. The centralized management interface of software-defined storage HCI enables consistent data governance, ensuring control, compliance, and visibility across the entire data management ecosystem. 4. Implementation Strategies for Modern Storage Using HCI 4.1 Workload Analysis A comprehensive workload analysis is essential before embarking on an HCI implementation journey. Start by thoroughly assessing the organization's workloads, delving into factors like application performance requirements, data access patterns, and peak usage times. Prioritize workloads based on their criticality to business operations, ensuring that those directly impacting revenue or customer experiences are addressed first. 4.2 Software-Defined Storage Software-defined storage (SDS) offers flexibility and abstraction of storage resources from hardware. SDS solutions are often vendor-agnostic, enabling organizations to choose storage hardware that aligns best with their needs. Scalability is a hallmark of SDS, as it can easily adapt to accommodate growing data volumes and evolving performance requirements. Adopt SDS for a wide range of data services, including snapshots, deduplication, compression, and automated tiering, all of which enhance storage efficiency. 4.3 Advanced Networking Leverage Software-Defined Networking technologies within the HCI environment to enhance agility, optimize network resource utilization, and support dynamic workload migrations. Implementing network segmentation allows organizations to isolate different workload types or security zones within the HCI infrastructure, bolstering security and compliance. Quality of Service (QoS) controls come into play to prioritize network traffic based on specific application requirements, ensuring optimal performance for critical workloads. 4.4 Data Tiering and Caching Intelligent data tiering and caching strategies play a pivotal role in optimizing storage within the HCI environment. These strategies automate the movement of data between different storage tiers based on usage patterns, ensuring that frequently accessed data resides on high-performance storage while less-accessed data is placed on lower-cost storage. Caching techniques, such as read and write caching, accelerate data access by storing frequently accessed data on high-speed storage media. Consider hybrid storage configurations, combining solid-state drives (SSDs) for caching and traditional hard disk drives (HDDs) for cost-effective capacity storage. 4.5 Continuous Monitoring and Optimization Implement real-time monitoring tools to provide visibility into the HCI environment's performance, health, and resource utilization, allowing IT teams to address potential issues proactively. Predictive analytics come into play to forecast future resource requirements and identify potential bottlenecks before they impact performance. Resource balancing mechanisms automatically allocate compute, storage, and network resources to workloads based on demand, ensuring efficient resource utilization. Continuous capacity monitoring and planning help organizations avoid resource shortages in anticipation of future growth. 5. Future Trends in HCI Storage and Data Management Modernized storage solutions using HCI have transformed data management practices, revolutionizing how organizations store, protect, and utilize their data. HCI offers a centralized and software-defined approach to storage, simplifying management, improving scalability, and enhancing operational efficiency. The abstraction of storage from physical hardware grants organizations greater agility and flexibility in their storage infrastructure, adapting to evolving business needs. With HCI, organizations implement consistent security policies across their storage resources, reducing the risk of data breaches and ensuring data integrity. This flexibility empowers organizations to optimize resource utilization scale as needed. This drives informed decision-making, improves operational efficiency, and fosters data-driven strategies for organizational growth. The future of Hyper-Converged Infrastructure storage and data management promises exciting advancements that will revolutionize the digital landscape. As edge computing gains momentum, HCI solutions will adapt to support edge deployments, enabling organizations to process and analyze data closer to the source. Composable infrastructure will enable organizations to build flexible and adaptive IT infrastructures, dynamically allocating compute, storage, and networking resources as needed. Data governance and compliance will be paramount, with HCI platforms providing robust data classification, encryption, and auditability features to ensure regulatory compliance. Optimized hybrid and multi-cloud integration will enable seamless data mobility, empowering organizations to leverage the benefits of different cloud environments. By embracing these, organizations can unlock the full potential of HCI storage and data management, driving innovation and achieving sustainable growth in the ever-evolving digital landscape.

Read More
Application Infrastructure, Application Storage

Securing the 5G edge

Article | July 19, 2023

The rollout of 5G networks coupled with edge compute introduces new security concerns for both the network and the enterprise. Security at the edge presents a unique set of security challenges that differ from those faced by traditional data centers. Today new concerns emerge from the combination of distributed architectures and a disaggregated network, creating new challenges for service providers. Many mission critical applications enabled by 5G connectivity, such as smart factories, are better off hosted at the edge because it's more economical and delivers better Quality of Service (QoS). However, applications must also be secured; communication service providers need to ensure that applications operate in an environment that is both safe and provides isolation. This means that secure designs and protocols are in place to pre-empt threats, avoid incidents and minimize response time when incidents do occur. As enterprises adopt private 5G networks to drive their Industry 4.0 strategies, these new enterprise 5G trends demand a new approach to security. Companies must find ways to reduce their exposure to cyberattacks that could potentially disrupt mission critical services, compromise industrial assets and threaten the safety of their workforce. Cybersecurity readiness is essential to ensure private network investments are not devalued. The 5G network architecture, particularly at the edge, introduces new levels of service decomposition now evolving beyond the virtual machine and into the space of orchestrated containers. Such disaggregation requires the operation of a layered technology stack, from the physical infrastructure to resource abstraction, container enablement and orchestration, all of which present attack surfaces which require addressing from a security perspective. So how can CSPs protect their network and services from complex and rapidly growing threats? Addressing vulnerability points of the network layer by layer As networks grow and the number of connected nodes at the edge multiply, so do the vulnerability points. The distributed nature of the 5G edge increases vulnerability threats, just by having network infrastructure scattered across tens of thousands of sites. The arrival of the Internet of Things (IoT) further complicates the picture: with a greater number of connected and mobile devices, potentially creating new network bridging connection points, questions around network security have become more relevant. As the integrity of the physical site cannot be guaranteed in the same way as a supervised data center, additional security measures need to be taken to protect the infrastructure. Transport and application control layers also need to be secured, to enable forms of "isolation" preventing a breach from propagating to other layers and components. Each layer requires specific security measures to ensure overall network security: use of Trusted Platform Modules (TPM) chipsets on motherboards, UEFI Secure OS boot process, secure connections in the control plane and more. These measures all contribute to and are integral part of an end-to-end network security design and strategy. Open RAN for a more secure solution The latest developments in open RAN and the collaborative standards-setting process related to open interfaces and supply chain diversification are enhancing the security of 5G networks. This is happening for two reasons. First, traditional networks are built using vendor proprietary technology – a limited number of vendors dominate the telco equipment market and create vendor lock-in for service providers that forces them to also rely on vendors' proprietary security solutions. This in turn prevents the adoption of "best-of-breed" solutions and slows innovation and speed of response, potentially amplifying the impact of a security breach. Second, open RAN standardization initiatives employ a set of open-source standards-based components. This has a positive effect on security as the design embedded in components is openly visible and understood; vendors can then contribute to such open-source projects where tighter security requirements need to be addressed. Aside from the inherent security of the open-source components, open RAN defines a number of open interfaces which can be individually assessed in their security aspects. The openness intrinsically present in open RAN means that service components can be seamlessly upgraded or swapped to facilitate the introduction of more stringent security characteristics, or they can simultaneously swiftly address identified vulnerabilities. Securing network components with AI Monitoring the status of myriad network components, particularly spotting a security attack taking place among a multitude of cooperating application functions, requires resources that transcend the capabilities of a finite team of human operators. This is where advances in AI technology can help to augment the abilities of operations teams. AI massively scales the ability to monitor any number of KPIs, learn their characteristic behavior and identify anomalies – this makes it the ideal companion in the secure operation of the 5G edge. The self-learning aspect of AI supports not just the identification of known incident patterns but also the ability to learn about new, unknown and unanticipated threats. Security by design Security needs to be integral to the design of the network architecture and its services. The adoption of open standards caters to the definition of security best practices in both the design and operation of the new 5G network edge. The analytics capabilities embedded in edge hyperconverged infrastructure components provide the platform on which to build an effective monitoring and troubleshooting toolkit, ensuring the secure operation of the intelligent edge.

Read More
Hyper-Converged Infrastructure

Ensuring Long-Term Reliability of Technology Partners using HCI

Article | October 10, 2023

Building trust through HCI by unveiling strategies to ensure the long-term reliability of technology partnerships, cementing lasting collaborations in a dynamic business landscape through vendor stability. Contents 1. Introduction 2. How HCI Overcomes Infrastructural Challenges 3. Evaluation Criteria for Enterprise HCI 3.1. Distributed Storage Layer 3.2. Data Security 3.3. Data Reduction 4. Assessing Vendor Stability: Ensuring Long-Term Reliability of Partners 4.1. Vendor Track Record 4.2. Financial Stability 4.3. Customer Base and References 4.4. Product Roadmap and Innovation 4.5. Support and Maintenance 4.6. Partnerships and Ecosystem 4.7. Industry Recognition and Analyst Reports 4.8. Contracts and SLAs 5. Final Takeaway 1. Introduction When collaborating with a vendor, it is essential to evaluate their financial stability. This ensures that they are able to fulfil their obligations and deliver the promised services or goods. Prior to making contractual commitments, it is necessary to conduct due diligence to determine a vendor's financial health. This article examines when a vendor's financial viability must be evaluated, why to do so, and how vendor and contract management software can assist businesses. IT organizations of all sizes face numerous infrastructure difficulties. On one hand, they frequently receive urgent demands from the business to keep their organization agile and proactive while implementing new digital transformation initiatives. They also struggle to keep their budget under control, provide new resources swiftly, and manage the increasing complexity while maintaining a reasonable level of efficiency. For many organizations, a cloud-only IT strategy is not a viable option; as a result, there is a growing interest in hybrid scenarios that offer the best of both realms. By combining cloud and traditional IT infrastructures, there is a real danger of creating silos, going in the incorrect direction, and further complicating the overall infrastructure, thereby introducing inefficiencies. 2. How HCI Overcomes Infrastructural Challenges Hyper-converged infrastructures (HCI) surpass conventional infrastructures in terms of simplicity and adaptability. HCI enables organizations to conceal the complexity of their IT infrastructure while reaping the benefits of a cloud-like environment. HCI simplifies operations and facilitates the migration of on-premises data and applications to the cloud. HCI is a software-defined solution that abstracts and organizes CPU, memory, networking, and storage devices as resource pools, typically utilizing commodity x86-based hardware and virtualization software. It enables the administrator to rapidly combine and provision these resources as virtual machines and, more recently, as independent storage resources such as network-attached storage (NAS) filers and object stores. Management operations are also simplified, allowing for an increase in infrastructure productivity while reducing the number of operators and system administrators per virtual machine managed. HCI market and itssolutions can be categorized into three groups: Enterprise Solutions They have an extensive feature set, high scalability, core-to-cloud integrations, and tools that extend beyond traditional virtualization platform management and up the application stack. Small/Medium Enterprise Solutions Comparable to the previous category, but simplified and more affordable. The emphasis remains on simplifying the IT infrastructure for virtualized environments, with limited core-to-cloud integrations and a limited ecosystem of solutions. Vertical Solutions Designed for particular use cases or vertical markets, they are highly competitive in edge-cloud or edge-core deployments, but typically have a limited ecosystem of solutions. These solutions incorporate open-source hypervisors, such as KVM, to provide end-to-end support at lower costs. They are typically not very scalable, but they are efficient from a resource consumption standpoint. 3. Evaluation Criteria for Enterprise HCI 3.1 Distributed Storage Layer The distributed storage layer provides primary data storage service for virtual machines and is a crucial component of every HCI solution. Depending on the exposed protocol, they are typically presented as a virtual network-attached storage (NAS) or storage area network (SAN) and contain all of the data. There are three distributed storage layer approaches for HCI: Virtual storage appliance (VSA): A virtual machine administered by the same hypervisor as the other virtual machines in the node. A VSA is more flexible and can typically support multiple hypervisors, but this method may result in increased latency. Integrated within the hypervisor or the Operating System (OS): The storage layer is an extension of the hypervisor and does not require the preceding approach's components (VM and guest OS). The tight integration boosts overall performance, enhances workload telemetry, and fully exploits hypervisor characteristics, but the storage layer is not portable. Specialized storage nodes: The distributed storage layer is comprised of specialized nodes in order to achieve optimal performance consistency and scalability for both internal and external storage consumption. This strategy, which is typically more expensive than the alternatives for lesser configurations, is utilized. 3.2 Data Security Currently, all vendors offer sophisticated data protection against multiple failures, such as full node, single, and multiple-component issues. Distributed erasure coding safeguards information by balancing performance and data footprint efficiency. This equilibrium is made possible by modern CPUs with sophisticated instruction sets, new hardware such as NVMe and storage-class memory (SCM) devices, and data path optimizations. In addition, the evolution of storage technologies has played a pivotal role in enhancing data protection strategies. The introduction of high-capacity SSDs (Solid-State Drives) and advancements in storage virtualization have further strengthened the ability to withstand failures and ensure uninterrupted data availability. These technological innovations, combined with the relentless pursuit of redundancy and fault tolerance, have elevated the resilience of modern data storage systems. Furthermore, for data protection and security, compliance with rules, regulations, and laws is paramount. Governments and regulatory bodies across the globe have established stringent frameworks to safeguard sensitive information and ensure privacy. Adherence to laws such as the General Data Protection Regulation (GDPR) in Europe, the Health Insurance Portability and Accountability Act (HIPAA) in the United States, and various industry-specific regulations is non-negotiable. Organizations must fortify their data against technical vulnerabilities and align their practices with legal requirements to prevent costly fines, legal repercussions, and reputational damage. 3.3 Data Reduction Optimization of the data footprint is a crucial aspect of hyper-converged infrastructures. Deduplication, compression, and other techniques, such as thin provisioning, can significantly improve capacity utilization in virtualized environments, particularly for Virtual desktop infrastructure (VDI) use cases. Moreover, in order to optimize rack space utilization and achieve server balance, the number of storage devices that can be deployed on a single HCI node is restricted. 4. Assessing Vendor Stability: Ensuring Long-Term Reliability of Partners Here are some key factors that contribute to ensuring long-term reliability: 4.1 Vendor Track Record Assessing the vendor's track record and reputation in the industry is crucial. Look for established vendors with a history of delivering reliable products and services. A vendor that has been operating in the market for a significant period of time and has a strong customer base indicates stability. 4.2 Financial Stability Consider factors such as the vendor's profitability, revenue growth, and ability to invest in research and development. Financial stability ensures the vendor's ability to support their products and services over the long term. 4.3 Customer Base and References Look at the size and diversity of the vendor's customer base. A large and satisfied customer base indicates that the vendor's solutions have been adopted successfully by organizations. Request references from existing customers to get insights into their experience with the vendor's stability and support. 4.4 Product Roadmap and Innovation Assess the vendor's product roadmap and commitment to ongoing innovation. A vendor that actively invests in research and development, regularly updates their products, and introduces new features and enhancements demonstrates a long-term commitment to their solution's reliability and advancement. 4.5 Support and Maintenance Evaluate the vendor's support and maintenance services. Look for comprehensive support offerings, including timely bug fixes, security patches, and firmware updates. Understand the vendor's service-level agreements (SLAs), response times, and availability of technical support to ensure they can address any issues that may arise. 4.6 Partnerships and Ecosystem Consider the vendor's partnerships and ecosystem. A strong network of partners, including technology alliances and integrations with other industry-leading vendors, can contribute to long-term reliability. Partnerships demonstrate collaboration, interoperability, and a wider ecosystem that enhances the vendor's solution. 4.7 Industry Recognition and Analyst Reports Assess the vendor's industry recognition and performance in analyst reports. Look for accolades, awards, and positive evaluations from reputable industry analysts. These assessments provide independent validation of the vendor's stability and the reliability of their HCI solution. 4.8 Contracts and SLAs Review the vendor's contracts, service-level agreements, and warranties carefully. Ensure they provide appropriate guarantees for support, maintenance, and ongoing product updates throughout the expected lifecycle of the HCI solution. 5. Final Takeaway Evaluating a vendor's financial stability is crucial before entering into contractual commitments to ensure their ability to fulfill obligations. Hyper-converged infrastructure overcomes infrastructural challenges by simplifying operations, enabling cloud-like environments, and facilitating data and application migration. The HCI market offers enterprise, small/medium enterprise, and vertical solutions, each catering to different needs and requirements. Analysing enterprise HCI solutions requires careful consideration of various criteria. Each approach has its own advantages and considerations related to flexibility, performance, and cost. The mentioned techniques can significantly reduce the data footprint, particularly in use cases like VDI, while maintaining performance and efficiency. Organizations take decisions that align with their specific storage, security, and efficiency requirements by considering the evaluation criteria for enterprise HCI solutions. By considering these factors, organizations can make informed decisions and choose a vendor with a strong foundation of reliability, stability, and long-term commitment, ensuring the durability of their HCI infrastructure and minimizing risks associated with vendor instability.

Read More

Spotlight

Cradlepoint

Branch, mobile, and IoT edge networks are undergoing dramatic change — and taking traditional enterprise WANs to their breaking point. Organizations must manage increasingly complex branch sites; data-driven vehicle fleets and mobile command centers; a vast array of IoT and M2M use cases; and everything in between.

Related News

Fortinet Debuts SD-WAN ASIC to Power Latest FortiGate Appliance

sdxcentral | April 09, 2019

Fortinet today released a SoC4 SD-WAN ASIC, which will power the latest iteration of its FortiGate appliance, 100F. The company also updated its operating system and security fabric to power what it calls security-driven networking, including new features for SD-WAN and other edge and multi-cloud environments. FortiGate is the firm’s next-generation firewall appliance, which is what it offers its SD-WAN features through. Fortinet began selling SD-WAN directly to its customers (through this appliance) last July. Nirav Shah, the senior director of network security products and solutions at Fortinet, said the company has been focused for three years on building SD-WAN functionality as a software, but this is the first announcement being made in terms of redesigning the architecture and building an ASIC

Read More

Belgian Carriers Grapple With 5G Spectrum Auction Delay and Radiation Concerns

sdxcentral | April 09, 2019

Belgium’s three mobile carriers have in recent months been ramping up their 5G network plans, but hurdles still lie in their way. These include growing concerns about radiation levels of new 5G antennas and the seeming inability of the country’s ruling bodies to agree on a 5G auction process. Former telecom incumbent Proximus is working with Nokia to upgrade the capacity of its IP transport network tenfold to prepare for new services including 5G and IoT. The carrier has been working with Nokia on the Terabit IP Transport and Aggregation Network (TITAN) project since last August, and just switched on the Nokia 7750 SR-14s multi-terabit router that uses the Nokia FP4 network processor.

Read More

HPE Joins IaaS Startup PubNub’s $23M Series D

sdxcentral | April 09, 2019

San Francisco-based infrastructure-as-a-service startup PubNub raised $23 million in Series D funding to build its international business, specifically in emerging markets. This brings the company’s funding to date to a little short of $70 million. Hewlett Packard Enterprise (HPE) joined existing investors Sapphire Ventures (which is backed by SAP), Relay Ventures, Scale Venture Partners, Cisco Investment, Bosch, and Ericsson in the latest round. Founded in 2010 by Todd Greene, now CEO, and Stephen Blum, now CTO, PubNub builds software and hardware for developers to build real-time web, mobile, and IoT applications. Its core product is a real-time publish/subscribe messaging API that is built on its global Data Stream Network (DSN).

Read More

Fortinet Debuts SD-WAN ASIC to Power Latest FortiGate Appliance

sdxcentral | April 09, 2019

Fortinet today released a SoC4 SD-WAN ASIC, which will power the latest iteration of its FortiGate appliance, 100F. The company also updated its operating system and security fabric to power what it calls security-driven networking, including new features for SD-WAN and other edge and multi-cloud environments. FortiGate is the firm’s next-generation firewall appliance, which is what it offers its SD-WAN features through. Fortinet began selling SD-WAN directly to its customers (through this appliance) last July. Nirav Shah, the senior director of network security products and solutions at Fortinet, said the company has been focused for three years on building SD-WAN functionality as a software, but this is the first announcement being made in terms of redesigning the architecture and building an ASIC

Read More

Belgian Carriers Grapple With 5G Spectrum Auction Delay and Radiation Concerns

sdxcentral | April 09, 2019

Belgium’s three mobile carriers have in recent months been ramping up their 5G network plans, but hurdles still lie in their way. These include growing concerns about radiation levels of new 5G antennas and the seeming inability of the country’s ruling bodies to agree on a 5G auction process. Former telecom incumbent Proximus is working with Nokia to upgrade the capacity of its IP transport network tenfold to prepare for new services including 5G and IoT. The carrier has been working with Nokia on the Terabit IP Transport and Aggregation Network (TITAN) project since last August, and just switched on the Nokia 7750 SR-14s multi-terabit router that uses the Nokia FP4 network processor.

Read More

HPE Joins IaaS Startup PubNub’s $23M Series D

sdxcentral | April 09, 2019

San Francisco-based infrastructure-as-a-service startup PubNub raised $23 million in Series D funding to build its international business, specifically in emerging markets. This brings the company’s funding to date to a little short of $70 million. Hewlett Packard Enterprise (HPE) joined existing investors Sapphire Ventures (which is backed by SAP), Relay Ventures, Scale Venture Partners, Cisco Investment, Bosch, and Ericsson in the latest round. Founded in 2010 by Todd Greene, now CEO, and Stephen Blum, now CTO, PubNub builds software and hardware for developers to build real-time web, mobile, and IoT applications. Its core product is a real-time publish/subscribe messaging API that is built on its global Data Stream Network (DSN).

Read More

Events