Click here to close now.


SDN Journal Authors: Don MacVittie, Lori MacVittie, Liz McMillan, Dinko Eror, Pat Romanski

News Feed Item

Cyan, RAD, Fortinet and Certes Networks to Demonstrate Multi-Vendor, Distributed NFV PoC at Light Reading’s Big Telecom Event

Four innovative providers of Network Functions Virtualization (NFV) solutions announced today that they will publicly demonstrate their joint European Telecommunication Standards Institute (ETSI) NFV ISG-approved proof of concept (PoC) at the Big Telecom Event in Chicago, to be held June 17-18, 2014. The four companies are Cyan (NYSE: CYNI), RAD, Fortinet, and Certes Networks.

Sponsored by CenturyLink, the multi-vendor Distributed NFV (D-NFV) PoC is based on RAD’s dedicated customer-edge D-NFV equipment running Fortinet’s Next Generation Firewall (NGFW) and Certes Networks’ virtual encryption/decryption engine as Virtual Network Functions (VNFs) with Cyan’s Blue Planet system orchestrating the entire ecosystem.

As the sponsor of the PoC and a valued advisor, Tier 1 service provider, CenturyLink, continues as an industry leader in its commitment to innovation.

“The Distributed NFV concept supports CenturyLink’s managed services strategy by providing a platform for developing unique NFV-enhanced network services and bringing desired functionality directly to the customer premises,” said James Feger, Vice President of Network Strategy and Development at CenturyLink. “We’re pleased to sponsor this ETSI multi-vendor proof of concept as it provides the industry with an opportunity to prove vendor interoperability while determining which functions work best at the edge versus the network core.”

D-NFV allows the placement of VNFs where they will be both most effective and least expensive, including at the customer edge. This approach enables service providers to quickly and easily roll out new services and implement advanced capabilities without having to put capital expenditures upfront into the data center or redesign the network. The PoC demonstrates an innovative, open and agile D-NFV deployment model comprised of multiple vendors collaborating to deliver key values for service providers using physical and virtual components.

“Distributed NFV is an important ETSI-approved use case. Many PoCs are focused on the capex and opex that can be saved through NFV. Distributed NFV is about service agility – the ability for service providers to create new revenue streams and ensure faster time-to-market by adding virtualized network functions, like firewall and encryption, to existing enterprise services quickly and cost-effectively at the customer edge,” said Caroline Chappell, Senior Analyst, Heavy Reading. “This PoC also demonstrates multi-vendor integration and how this can drive NFV forward for the industry.”

NFV and Orchestration: Beyond the Data Centers

While this PoC is important for the advancement of NFV as a whole, it more uniquely broadens the scope and conception of NFV and orchestration to encompass everything out to the edge. Specifically, NFV is implemented at the customer edge with RAD equipment, while Cyan’s orchestration spans from the data center to the customer edge integrating all of the virtual and physical components.

Cyan Blue Planet NFV Orchestration allows network providers to orchestrate VNFs from multiple vendors from a single, centralized orchestration platform; these advanced capabilities simplify the deployment and life-cycle management of VNFs. Blue Planet’s ability to orchestrate both NFV and multi-vendor Ethernet services provides network operators with a unique platform to create new, VNF-enhanced Ethernet services managed from one platform.

VNFs at the customer edge are implemented with RAD’s ETX-2, a D-NFV empowered state-of-the-art NID, the cornerstone of RAD’s Service Assured Access solution. This novel solution integrates an x86 server platform to host value-added service capabilities, as well as network functionalities that run on virtual machines.

Fortinet and Certes Networks provide VNFs that are instantiated on RAD’s ETX-2 by Cyan’s Blue Planet SDN Platform.

Fortinet’s FortiGate-VM enforces next-generation firewall security functions that provide network and application layer protection. Real-time security updates are pushed to the FortiGate-VM by FortiGuard subscription services to ensure it is aware of and enforcing protection from the latest security threats. FortiGate-VM is managed by Fortinet’s FortiManager-VM and FortiAnalyzer-VM, which provide centralized configuration, control and security analytics. Together they enhance flexibility to quickly enable comprehensive security solutions and improve the scalability of adding resources as security needs dictate.

The virtual Certes Enforcement Point (vCEP) is a virtual encryption solution that secures data in motion over any public or private network. Managed with drag-and-drop simplicity, vCEPs can be dynamically provisioned to create Certes’ CryptoFlow™ VPNs, fully meshed multi-point VPNs safeguarding data in physical, virtual and Cloud environments. CryptoFlows protect critical data for any application with automatically enforced policies and simplified control of encryption keys.

The live Distributed NFV demonstration will be held in booth #519 at the Big Telecom Event in Chicago on June 17 or 18.

For More Information:

Certes Networks:

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
The web app is agile. The REST API is agile. The testing and planning are agile. But alas, data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes that force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software organ...
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of, and Fred Yatzeck, principal architect leading product development at, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at th...
The last decade was about virtual machines, but the next one is about containers. Containers enable a service to run on any host at any time. Traditional tools are starting to show cracks because they were not designed for this level of application portability. Now is the time to look at new ways to deploy and manage applications at scale. In his session at @DevOpsSummit, Brian “Redbeard” Harrington, a principal architect at CoreOS, will examine how CoreOS helps teams run in production. Attende...
“All our customers are looking at the cloud ecosystem as an important part of their overall product strategy. Some see it evolve as a multi-cloud / hybrid cloud strategy, while others are embracing all forms of cloud offerings like PaaS, IaaS and SaaS in their solutions,” noted Suhas Joshi, Vice President – Technology, at Harbinger Group, in this exclusive Q&A with Cloud Expo Conference Chair Roger Strukhoff.
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of...
SYS-CON Events announced today that VividCortex, the monitoring solution for the modern data system, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The database is the heart of most applications, but it’s also the part that’s hardest to scale, monitor, and optimize even as it’s growing 50% year over year. VividCortex is the first unified suite of database monitoring tools specifically desi...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Saviynt Inc. has announced the availability of the next release of Saviynt for AWS. The comprehensive security and compliance solution provides a Command-and-Control center to gain visibility into risks in AWS, enforce real-time protection of critical workloads as well as data and automate access life-cycle governance. The solution enables AWS customers to meet their compliance mandates such as ITAR, SOX, PCI, etc. by including an extensive risk and controls library to detect known threats and b...
You have your devices and your data, but what about the rest of your Internet of Things story? Two popular classes of technologies that nicely handle the Big Data analytics for Internet of Things are Apache Hadoop and NoSQL. Hadoop is designed for parallelizing analytical work across many servers and is ideal for the massive data volumes you create with IoT devices. NoSQL databases such as Apache HBase are ideal for storing and retrieving IoT data as “time series data.”
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In his session at 17th Cloud Expo, Naveen Nimmu, CEO of Clouber, Inc., will advocate that making the inter-cloud migration as simple as changing airlines would help the entire industry to quickly adopt the cloud wit...