Welcome!

SDN Journal Authors: Elizabeth White, Liz McMillan, Johnnie Konstantas, Cloud Best Practices Network, Sarah Patrick

News Feed Item

Cyan, RAD, Fortinet and Certes Networks to Demonstrate Multi-Vendor, Distributed NFV PoC at Light Reading’s Big Telecom Event

Four innovative providers of Network Functions Virtualization (NFV) solutions announced today that they will publicly demonstrate their joint European Telecommunication Standards Institute (ETSI) NFV ISG-approved proof of concept (PoC) at the Big Telecom Event in Chicago, to be held June 17-18, 2014. The four companies are Cyan (NYSE: CYNI), RAD, Fortinet, and Certes Networks.

Sponsored by CenturyLink, the multi-vendor Distributed NFV (D-NFV) PoC is based on RAD’s dedicated customer-edge D-NFV equipment running Fortinet’s Next Generation Firewall (NGFW) and Certes Networks’ virtual encryption/decryption engine as Virtual Network Functions (VNFs) with Cyan’s Blue Planet system orchestrating the entire ecosystem.

As the sponsor of the PoC and a valued advisor, Tier 1 service provider, CenturyLink, continues as an industry leader in its commitment to innovation.

“The Distributed NFV concept supports CenturyLink’s managed services strategy by providing a platform for developing unique NFV-enhanced network services and bringing desired functionality directly to the customer premises,” said James Feger, Vice President of Network Strategy and Development at CenturyLink. “We’re pleased to sponsor this ETSI multi-vendor proof of concept as it provides the industry with an opportunity to prove vendor interoperability while determining which functions work best at the edge versus the network core.”

D-NFV allows the placement of VNFs where they will be both most effective and least expensive, including at the customer edge. This approach enables service providers to quickly and easily roll out new services and implement advanced capabilities without having to put capital expenditures upfront into the data center or redesign the network. The PoC demonstrates an innovative, open and agile D-NFV deployment model comprised of multiple vendors collaborating to deliver key values for service providers using physical and virtual components.

“Distributed NFV is an important ETSI-approved use case. Many PoCs are focused on the capex and opex that can be saved through NFV. Distributed NFV is about service agility – the ability for service providers to create new revenue streams and ensure faster time-to-market by adding virtualized network functions, like firewall and encryption, to existing enterprise services quickly and cost-effectively at the customer edge,” said Caroline Chappell, Senior Analyst, Heavy Reading. “This PoC also demonstrates multi-vendor integration and how this can drive NFV forward for the industry.”

NFV and Orchestration: Beyond the Data Centers

While this PoC is important for the advancement of NFV as a whole, it more uniquely broadens the scope and conception of NFV and orchestration to encompass everything out to the edge. Specifically, NFV is implemented at the customer edge with RAD equipment, while Cyan’s orchestration spans from the data center to the customer edge integrating all of the virtual and physical components.

Cyan Blue Planet NFV Orchestration allows network providers to orchestrate VNFs from multiple vendors from a single, centralized orchestration platform; these advanced capabilities simplify the deployment and life-cycle management of VNFs. Blue Planet’s ability to orchestrate both NFV and multi-vendor Ethernet services provides network operators with a unique platform to create new, VNF-enhanced Ethernet services managed from one platform.

VNFs at the customer edge are implemented with RAD’s ETX-2, a D-NFV empowered state-of-the-art NID, the cornerstone of RAD’s Service Assured Access solution. This novel solution integrates an x86 server platform to host value-added service capabilities, as well as network functionalities that run on virtual machines.

Fortinet and Certes Networks provide VNFs that are instantiated on RAD’s ETX-2 by Cyan’s Blue Planet SDN Platform.

Fortinet’s FortiGate-VM enforces next-generation firewall security functions that provide network and application layer protection. Real-time security updates are pushed to the FortiGate-VM by FortiGuard subscription services to ensure it is aware of and enforcing protection from the latest security threats. FortiGate-VM is managed by Fortinet’s FortiManager-VM and FortiAnalyzer-VM, which provide centralized configuration, control and security analytics. Together they enhance flexibility to quickly enable comprehensive security solutions and improve the scalability of adding resources as security needs dictate.

The virtual Certes Enforcement Point (vCEP) is a virtual encryption solution that secures data in motion over any public or private network. Managed with drag-and-drop simplicity, vCEPs can be dynamically provisioned to create Certes’ CryptoFlow™ VPNs, fully meshed multi-point VPNs safeguarding data in physical, virtual and Cloud environments. CryptoFlows protect critical data for any application with automatically enforced policies and simplified control of encryption keys.

The live Distributed NFV demonstration will be held in booth #519 at the Big Telecom Event in Chicago on June 17 or 18.

For More Information:

Cyan: www.cyaninc.com
RAD: www.rad.com
Fortinet: www.fortinet.com
Certes Networks: www.certesnetworks.com

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
In most cases, it is convenient to have some human interaction with a web (micro-)service, no matter how small it is. A traditional approach would be to create an HTTP interface, where user requests will be dispatched and HTML/CSS pages must be served. This approach is indeed very traditional for a web site, but not really convenient for a web service, which is not intended to be good looking, 24x7 up and running and UX-optimized. Instead, talking to a web service in a chat-bot mode would be muc...
SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,...
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee...
SYS-CON Events announced today that AppNeta, the leader in performance insight for business-critical web applications, will exhibit and present at SYS-CON's @DevOpsSummit at Cloud Expo New York, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. AppNeta is the only application performance monitoring (APM) company to provide solutions for all applications – applications you develop internally, business-critical SaaS applications you use and the networks that deli...
Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from ...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
WebSocket is effectively a persistent and fat pipe that is compatible with a standard web infrastructure; a "TCP for the Web." If you think of WebSocket in this light, there are other more hugely interesting applications of WebSocket than just simply sending data to a browser. In his session at 18th Cloud Expo, Frank Greco, Director of Technology for Kaazing Corporation, will compare other modern web connectivity methods such as HTTP/2, HTTP Streaming, Server-Sent Events and new W3C event APIs ...
SYS-CON Events announced today that iDevices®, the preeminent brand in the connected home industry, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. iDevices, the preeminent brand in the connected home industry, has a growing line of HomeKit-enabled products available at the largest retailers worldwide. Through the “Designed with iDevices” co-development program and its custom-built IoT Cloud Infrastruc...
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, will give users a checklist of considerations when choosing a provider. Chris Presley is a Solutions Architect at Pythian. He loves order – making him a premier Microsoft SQL Server expert. Not only has he programmed and administered SQL Server, but he has also shared his expertise and passion w...
Join us at Cloud Expo | @ThingsExpo 2016 – June 7-9 at the Javits Center in New York City and November 1-3 at the Santa Clara Convention Center in Santa Clara, CA – and deliver your unique message in a way that is striking and unforgettable by taking advantage of SYS-CON's unmatched high-impact, result-driven event / media packages.
As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
SYS-CON Events announced today that (ISC)²® (“ISC-squared”) will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Two leading non-profits focused on cloud and information security, (ISC)² and Cloud Security Alliance (CSA), developed the Certified Cloud Security Professional (CCSP) certification to address the increased demand for cloud security expertise due to rapid growth in cloud. Recently named “The Next...
Advances in technology and ubiquitous connectivity have made the utilization of a dispersed workforce more common. Whether that remote team is located across the street or country, management styles/ approaches will have to be adjusted to accommodate this new dynamic. In his session at 17th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., focused on the challenges of managing remote teams, providing real-world examples that demonstrate what works and what do...
As someone who has been dedicated to automation and Application Release Automation (ARA) technology for almost six years now, one of the most common questions I get asked regards Platform-as-a-Service (PaaS). Specifically, people want to know whether release automation is still needed when a PaaS is in place, and why. Isn't that what a PaaS provides? A solution to the deployment and runtime challenges of an application? Why would anyone using a PaaS then need an automation engine with workflow ...
Recognizing the need to identify and validate information security professionals’ competency in securing cloud services, the two leading membership organizations focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)^2, joined together to develop an international cloud security credential that reflects the most current and comprehensive best practices for securing and optimizing cloud computing environments.
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, will discuss using predictive analytics to ...
Eighty percent of a data scientist’s time is spent gathering and cleaning up data, and 80% of all data is unstructured and almost never analyzed. Cognitive computing, in combination with Big Data, is changing the equation by creating data reservoirs and using natural language processing to enable analysis of unstructured data sources. This is impacting every aspect of the analytics profession from how data is mined (and by whom) to how it is delivered. This is not some futuristic vision: it's ha...
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, will provide an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profes...