Scaling Your Business the Easy Way—with SD-WAN as a Service

SD-WANs are a critical component of digital transformation. Using software-defined networking (SDN) and virtual network functions (VNF) concepts to build and manage a wide area network (WAN) helps businesses successfully transition their infrastructure to the cloud by securely connecting hybrid multicloud architectures. But SD-WANs can do more than just facilitate a transition to the cloud —they make it faster and less expensive to expand your business.

Spotlight

Hillstone Networks, Inc.

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks - whether physical, virtual, or in the cloud. Hillstone solutions provide continuous threat defense not only at traditional perimeters, but also to internal networks, down to each virtual machine. For physical environments

OTHER ARTICLES
Virtual Desktop Tools, Virtual Desktop Strategies

VM Applications for Software Development and Secure Testing

Article | June 8, 2023

Contents 1. Introduction 2. Software Development and Secure Testing 3. Using VMs in Software Development and Secure Testing 4. Conclusion 1. Introduction “Testing is an infinite process of comparing the invisible to the ambiguous in order to avoid the unthinkable happening to the anonymous.” —James Bach. Testing software is crucial for identifying and fixing security vulnerabilities. However, meeting quality standards for functionality and performance does not guarantee security. Thus, software testing nowadays is a must to identify and address application security vulnerabilities to maintain the following: Security of data history, databases, information, and servers Customers’ integrity and trust Web application protection from future attacks VMs provide a flexible and isolated environment for software development and security testing. They offer easy replication of complex configurations and testing scenarios, allowing efficient issue resolution. VMs also provide secure testing by isolating applications from the host system and enabling a reset to a previous state. In addition, they facilitate DevOps practices and streamline the development workflow. 2. Software Development and Secure Testing Software Secure Testing: The Approach The following approaches must be considered while preparing and planning for security tests: Architecture Study and Analysis: Understand whether the software meets the necessary requirements. Threat Classification: List all potential threats and risk factors that must be tested. Test Planning: Run the tests based on the identified threats, vulnerabilities, and security risks. Testing Tool Identification: For software security testing tools for web applications, the developer must identify the relevant security tools to test the software for specific use cases. Test-Case Execution: After performing a security test, the developer should fix it using any suitable open-source code or manually. Reports: Prepare a detailed test report of the security tests performed, containing a list of the vulnerabilities, threats, and issues resolved and the ones that are still pending. Ensuring the security of an application that handles essential functions is paramount. This may involve safeguarding databases against malicious attacks or implementing fraud detection mechanisms for incoming leads before integrating them into the platform. Maintaining security is crucial throughout the software development life cycle (SDLC) and must be at the forefront of developers' minds while executing the software's requirements. With consistent effort, the SDLC pipeline addresses security issues before deployment, reducing the risk of discovering application vulnerabilities while minimizing the damage they could cause. A secure SDLC makes developers responsible for critical security. Developers need to be aware of potential security concerns at each step of the process. This requires integrating security into the SDLC in ways that were not needed before. As anyone can potentially access source code, coding with potential vulnerabilities in mind is essential. As such, having a robust and secure SDLC process is critical to ensuring applications are not subject to attacks by hackers. 3. Using VMs in Software Development and Secure Testing: Snapshotting: Snapshotting allows developers to capture a VM's state at a specific point in time and restore it later. This feature is helpful for debugging and enables developers to roll back to a previous state when an error occurs. A virtual machine provides several operations for creating and managing snapshots and snapshot chains. These operations let users create snapshots, revert to any snapshots in the chain, and remove snapshots. In addition, extensive snapshot trees can be created to streamline the flow. Virtual Networking: It allows virtual machines to be connected to virtual networks that simulate complex network topologies, allowing developers to test their applications in different network environments. This allows expanding data centers to cover multiple physical locations, gaining access to a plethora of more efficient options. This empowers them to effortlessly modify the network as per changing requirements without any additional hardware. Moreover, providing the network for specific applications and needs offers greater flexibility. Additionally, it enables workloads to be moved seamlessly across the network infrastructure without compromising on service, security, or availability. Resource Allocation: VMs can be configured with specific resource allocations such as CPU, RAM, and storage, allowing developers to test their applications under different resource constraints. Maintaining a 1:1 ratio between the virtual machine processor and its host or core is highly recommended. It's crucial to refrain from over-subscribing virtual machine processors to a single core, as this could lead to stalled or delayed events, causing significant frustration and dissatisfaction among users. However, it is essential to acknowledge that IT administrators sometimes overallocate virtual machine processors. In such cases, a practical approach is to start with a 2:1 ratio and gradually move towards 4:1, 8:1, 12:1, and so on while bringing virtual allocation into IT infrastructure. This approach ensures a safe and seamless transition towards optimized virtual resource allocation. Containerization within VMs: Containerization within VMs provides an additional layer of isolation and security for applications. Enterprises are finding new use cases for VMs to utilize their in-house and cloud infrastructure to support heavy-duty application and networking workloads. This will also have a positive impact on the environment. DevOps teams use containerization with virtualization to improve software development flexibility. Containers allow multiple apps to run in one container with the necessary components, such as code, system tools, and libraries. For complex applications, both virtual machines and containers are used together. However, while containers are used for the front-end and middleware, VMs are used for the back-end. VM Templates: VM templates are pre-configured virtual machines that can be used as a base for creating new virtual machines, making it easier to set up development and testing environments. A VM template is an image of a virtual machine that serves as a master copy. It includes VM disks, virtual devices, and settings. By using a VM template, cloning a virtual machine multiple times can be achieved. When you clone a VM from a template, the clones are independent and not linked to the template. VM templates are handy when a large number of similar VMs need to be deployed. They preserve VM consistency. To edit a template, convert it to a VM, make the necessary changes, and then convert the edited VM back into a new template. Remote Access: VMs can be accessed remotely, allowing developers and testers to collaborate more effectively from anywhere worldwide. To manage a virtual machine, follow these steps: enable remote access, connect to the virtual machine, and then access the VNC or serial console. Once connected, full permission to manage the virtual machine is granted with the user's approval. Remote access provides a secure way to access VMs, as connections can be encrypted and authenticated to prevent unauthorized access. Additionally, remote access allows for easier management of VMs, as administrators can monitor and control virtual machines from a central location. DevOps Integration: DevOps is a collection of practices, principles, and tools that allow a team to release software quickly and efficiently. Virtualization is vital in DevOps when developing intricate cloud, API, and SOA systems. Virtual machines enable teams to simulate environments for creating, testing, and launching code, ultimately preserving computing resources. While commencing a bug search at the API layer, teams find that virtual machines are suitable for test-driven development (TDD). Virtualization providers handle updates, freeing up DevOps teams, to focus on other areas and increasing productivity by 50 –60%. In addition, VMs allow for simultaneous testing of multiple release and patch levels, improving product compatibility and interoperability. 4. Conclusion The outlook for virtual machine applications is highly promising in the development and testing fields. With the increasing complexity of development and testing processes, VMs can significantly simplify and streamline these operations. In the future, VMs are expected to become even more versatile and potent, providing developers and testers with a broader range of tools and capabilities to facilitate the development process. One potential future development is integrating machine learning and artificial intelligence into VMs. This would enable VMs to automate various tasks, optimize the allocation of resources, and generate recommendations based on performance data. Moreover, VMs may become more agile and lightweight, allowing developers and testers to spin up and spin down instances with greater efficiency. The future of VM applications for software development and security testing looks bright, with continued innovation and development expected to provide developers and testers with even more powerful and flexible tools to improve the software development process.

Read More
Server Virtualization

How virtualization helped Dell make a pandemic pivot

Article | May 17, 2023

Danny Cobb, fellow and vice president of engineering for Dell Technologies’ telco systems business, remembers his company cruising into early 2020: Kicking off a new fiscal year with its operating plan in place, supply chain nailed down and factories humming; people coming into the office each day to the usual routine of looking for parking spots and taking laptops down to the cafeteria. Then came March, and the first wave of the Covid-19 pandemic hit U.S. shores. In the course of one weekend, Dell pivoted to having more than 90% of its workforce working from home. That meant a dramatic shift in its network needs and operations – one that was only able to be accomplished so quickly because of virtualized infrastructure.

Read More
Server Hypervisors

VMware Tanzu Kubernetes Grid Integrated: A Year in Review

Article | May 18, 2023

The modern application world is advancing at an unprecedented rate. However, the new possibilities these transformations make available don’t come without complexities. IT teams often find themselves under pressure to keep up with the speed of innovation. That’s why VMware provides a production-ready container platform for customers that aligns to upstream Kubernetes, VMware Tanzu Kubernetes Grid Integrated (formerly known as VMware Enterprise PKS). By working with VMware, customers can move at the speed their businesses demand without the headache of trying to run their operations alone. Our offerings help customers stay current with the open source community's innovations while having access to the support they need to move forward confidently. Many changes have been made to Tanzu Kubernetes Grid Integrated edition over the past year that are designed to help customers keep up with Kubernetes advancements, move faster, and enhance security. Kubernetes updates The latest version, Tanzu Kubernetes Grid Integrated 1.13, bumped to Kubernetes version 1.22 and removed beta APIs in favor of stable APIs that have since evolved from the betas. Over time, some APIs will evolve. Beta APIs typically evolve more often than stable APIs and should therefore be checked before updates occur. The APIs listed below will not be served with v1.22 as they have been replaced by more stable API versions: Beta versions of the ValidatingWebhookConfiguration and MutatingWebhookConfiguration API (the admissionregistration.k8s.io/v1beta1 API versions) The beta CustomResourceDefinition API (apiextensions.k8s.io/v1beta1) The beta APIService API (apiregistration.k8s.io/v1beta1) The beta TokenReview API (authentication.k8s.io/v1beta1) Beta API versions of SubjectAccessReview, LocalSubjectAccessReview, SelfSubjectAccessReview (API versions from authorization.k8s.io/v1beta1) The beta CertificateSigningRequest API (certificates.k8s.io/v1beta1) The beta Lease API (coordination.k8s.io/v1beta1) All beta Ingress APIs (the extensions/v1beta1 and networking.k8s.io/v1beta1 API versions) Containerd support Tanzu Kubernetes Grid Integrated helps customers eliminate lengthy deployment and management processes with on-demand provisioning, scaling, patching, and updating of Kubernetes clusters. To stay in alignment with the Kubernetes community, Containerd will be used as the default container runtime, although Docker can still be selected using the command-line interface (CLI) if needed. Networking Several updates have been made in regards to networking as well including support of Antrea and NSX-T enhancements. Antrea support With Tanzu Kubernetes Grid Integrated version 1.10 and later, customers can leverage Antrea on install or upgrade to use Kubernetes network policies. This enables enterprises to get the best of both worlds: access to the latest innovation from Antrea and world-class support from VMware. NSX-T enhancements NSX-T was integrated with Tanzu Kubernetes Grid Integrated to simplify container networking and increase security. This has been enhanced so customers can now choose the policy API as an option on a fresh installation of Tanzu Kubernetes Grid Integrated. This means that users will have access to new features available only through NSX-T policy API. This feature is currently in beta. In addition, more NSX-T and NSX Container Plug-in (NCP) configuration is possible through the network profiles. This operator command provides the benefit of being able to set configurations through the CLI, and this is persistent across lifecycle events. Storage enhancements We’ve made storage operations in our customers’ container native environments easier, too. Customers were seeking a simpler and more secure way to manage Container Storage Interface (CSI), and we introduced automatic installation of the vSphere CSI driver as a BOSH process beginning with Tanzu Kubernetes Grid Integrated 1.11. Also, as VCP will be deprecated, customers are advised to use the CSI driver. VCP-to-CSI migration is a part of Tanzu Kubernetes Grid Integrated 1.12 and is designed to help customers move forward faster. Enhanced security Implementing new technologies provides users with new capabilities, but it can also lead to new security vulnerabilities if not done correctly. VMware’s goal is to help customers move forward with ease and the confidence of knowing that enhancements don’t compromise core security needs. CIS benchmarks This year, Tanzu Kubernetes Grid Integrated continued to see improvements that help meet today’s high security standards. Meeting the Center for Internet Security (CIS) benchmarks standards is vital for Tanzu Kubernetes Grid Integrated. In recent Tanzu Kubernetes Grid Integrated releases, a few Kubernetes-related settings have been adjusted to ensure compliance with CIS requirements: Kube-apiserver with --kubelet-certificate-authority settings (v1.12) Kube-apiserver with --authorization-mode argument includes Node (v1.12) Kube-apiserver with proper --audit-log-maxage argument (v1.13) Kube-apiserver with proper --audit-log-maxbackup argument (v1.13) Kube-apiserver with proper --audit-log-maxsize argument (v1.13) Certificate rotations Tanzu Kubernetes Grid Integrated secures all communication between its control plane components and the Kubernetes clusters it manages, using TLS validated by certificates. The certificate rotations have been simplified in recent releases. Customers can now list and simply update certificates on a cluster-by-cluster basis through the “tkgi rotate-certificates” command. The multistep, manual process was replaced with a single CLI command to rotate NSX-T certificates (available since Tanzu Kubernetes Grid Integrated 1.10) and cluster-by-cluster certificates (available since Tanzu Kubernetes Grid Integrated 1.12). Hardening of images Tanzu Kubernetes Grid Integrated keeps OS images, container base images, and software library versions updated to remediate the CVEs reported by customers and in the industry. It also continues to use the latest Ubuntu Xenial Stemcell latest versions for node virtual machines. With recent releases and patch versions, the version of dockerd, containerd, runc, telegraf, nfs-utils had been bumped to the latest stable and secure versions as well. By using Harbor as a private registry management service, customers could also leverage the built-in vulnerability scan features to discover the application images CVEs. VMware is dedicated to supporting customers with production readiness by enhancing the user experience. Tanzu Kubernetes Grid Integrated Edition has stayed up to date with the Kubernetes community and provides customers with the support and resources they need to innovate rapidly.

Read More
Server Hypervisors

Network Virtualization: The Future of Businesses and Networks

Article | September 9, 2022

Network virtualization has emerged as the widely recommended solution for the networking paradigm's future. Virtualization has the potential to revolutionize networks in addition to providing a cost-effective, flexible, and secure means of communication. Network virtualization isn't an all-or-nothing concept. It can help several organizations with differing requirements, or it can provide a bunch of new advantages for a single enterprise. It is the process of combining a network's physical hardware into a single, virtual network. This is often accomplished by running several virtual guest machines in software containers on a single physical host system. Network virtualization is indeed the new gold standard for networking, and it is being embraced by enterprises of all kinds globally. By integrating their current network gear into a single virtual network, businesses can reduce operating expenses, automate network and security processes, and lay the groundwork for future growth. Network virtualization also enables organizations to simulate traditional hardware like servers, storage devices, and network resources. The physical network performs basic tasks like packet forwarding, while virtual versions handle more complex activities like networking service management and deployment. Addressing Network Virtualization Challenges Surprisingly, IT teams might encounter network virtualization challenges that are both technical and non-technical in nature. Let's look at some common challenges and discuss how to overcome them. Change in Network Architecture Practically, the first big challenge is shifting from an architecture that depends heavily on routers, switches, and firewalls. Instead, these services are detached from conventional hardware and put on hypervisors that virtualize these operations. Virtualized network services are shared, scaled, and moved as required. Migrating current LANs and data centers to a virtualized platform require careful planning. This migration involves the following tasks: Determine how much CPU, computation, and storage resources will be required to run virtualized network services. Determine the optimal approach for integrating network resilience and security services. Determine how the virtualized network services will be implemented in stages to avoid disrupting business operations. The key to a successful migration is meticulous preparation by architects who understand the business's network requirements. This involves a thorough examination of existing apps and services, as well as a clear knowledge of how data should move across the company most effectively. Moreover, a progressive approach to relocation is often the best solution. In this instance, IT teams can make changes to the virtualization platform without disrupting the whole corporate network. Network Visibility Network virtualization has the potential to considerably expand the number of logical technology layers that must collaborate. As a result, traditional network and data center monitoring technologies no longer have insight into some of these abstracted levels. In other circumstances, visibility can be established, but the tools fail to show the information correctly so that network operators can understand it. In either case, deploying and managing modern network visibility technologies is typically the best choice. When an issue arises, NetOps personnel are notified of the specific service layer. Automation and AI The enhanced level of automation and self-service operations that can be built into a platform is a fundamental aspect of network virtualization. While these activities can considerably increase the pace of network upgrades while decreasing management overhead, they need the documentation and implementation of a new set of standards and practices. Understand that prior network architectures were planned and implemented utilizing actual hardware appliances on a hop-by-hop basis. A virtualized network, on the other hand, employs a centralized control plane to govern and push policies to all sections of the network. Changes may occur more quickly in this aspect, but various components must be coordinated to accomplish their roles in harmony. As a result, network teams should move their attention away from network operations that are already automated. Rather, their new responsibility is to guarantee that the core automation processes and AI are in sync in order to fulfill those automated tasks. Driving Competitive Edge with Network Virtualization Virtualization in networking or virtual machines within an organization is not a new trend. Even small and medium businesses have realized the benefits of network virtualization, especially when combined with a hosted cloud service provider. Because of this, the demand for enterprise network virtualization is rising, driving higher end-user demands and the proliferation of devices and business tools. These network virtualization benefits can help boost business growth and gain a competitive edge. Gaining a Competitive Edge: Network Virtualization Benefits Cost-Savings on Hardware Faster Desktop and Server Provisioning and Deployment Improved Data Security and Disaster Recovery Increasing IT Operational Efficiency Small Footprint and Energy Saving Network Virtualization: The Path to Digital Transformation Business is at the center of digital transformation, but technology is needed to make it happen. Integrated clouds, highly modern data centers, digital workplaces, and increased data center security are all puzzle pieces, and putting them all together requires a variety of various products and services that are deployed cohesively. The cloud revolution is still having an influence on IT, transforming how digital content is consumed and delivered. This should come as no surprise that such a shift has influenced how we feel about current networking. When it boils down to it, the purpose of digital transformation for every company, irrespective of industry, is the same: to boost the speed with which you can respond to market changes and evolving business needs; to enhance your ability to embrace and adapt to new technology, and to improve overall security. As businesses realize that the underlying benefit of cloud adoption and enhanced virtualization isn't simply about cost savings, digital strategies are evolving, becoming more intelligent and successful in the process. Network virtualization is also a path toward the smooth digital transformation of any business. How does virtualization help in accelerating digital transformation? Combining public and private clouds, involving hardware-based computing, storage, and networking software definition. A hyper-converged infrastructure that integrates unified management with virtualized computing, storage, and networking could be included. Creating a platform for greater productivity by providing the apps and services consumers require when and when they utilize them. This should include simplifying application access and administration as well as unifying endpoint management. Improving network security and enhancing security flexibility to guarantee that quicker speed to market is matched by tighter security. Virtualization will also help businesses to move more quickly and safely, bringing products—and profits—to market faster. Enhancing Security with Network Virtualization Security has evolved as an essential component of every network architecture. However, since various areas of the network are often segregated from one another, it might be challenging for network teams to design and enforce network virtualization security standards that apply to the whole network. Zero trust can integrate such network parts and their accompanying virtualization activities. Throughout the network, the zero-trust architecture depends on the user and device authentication. If LAN users wish to access data center resources, they must first be authenticated. The secure connection required for endpoints to interact safely is provided by a zero-trust environment paired with network virtualization. To facilitate these interactions, virtual networks can be ramped up and down while retaining the appropriate degree of traffic segmentation. Access policies, which govern which devices can connect with one another, are a key part of this process. If a device is allowed to access a data center resource, the policy should be understood at both the WAN and campus levels. Some of the core network virtualization security features are: Isolation and multitenancy are critical features of network virtualization. Segmentation is related to isolation; however it is utilized in a multitier virtual network. A network virtualization platform's foundation includes firewalling technologies that enable segmentation inside virtual networks. Network virtualization enables automatic provisioning and context-sharing across virtual and physical security systems. Investigating the Role of Virtualization in Cloud Computing Virtualization in the cloud computing domain refers to the development of virtual resources (such as a virtual server, virtual storage device, virtual network switch, or even a virtual operating system) from a single resource of its type that also shows up as several personal isolated resources or environments that users can use as a separate individual physical resource. Virtualization enables the benefits of cloud computing, such as ease of scaling up, security, fluid or flexible resources, and so on. If another server is necessary, a virtual server will be immediately created, and a new server will be deployed. When we need more memory, we increase the virtual server configurations we currently have, and we now have the extra RAM we need. As a result, virtualization is the underlying technology of the cloud computing business model. The Benefits of Virtualization in Cloud Computing: Efficient hardware utilization Virtualization improves availability Disaster recovery is quick and simple Energy is saved by virtualization Setup is quick and simple Cloud migration has become simple Motivating Factors for the Adoption of Network Virtualization Demand for enterprise networks continues to climb, owing to rising end-user demands and the proliferation of devices and business software. Thanks to network virtualization, IT companies are gaining the ability to respond to shifting demands and match their networking capabilities with their virtualized storage and computing resources. In fact, according to a recent SDxCentral report, 88% of respondents believe it is "important" or "mission critical" to implement a network virtualization software over the next two to five years. Virtualization is also an excellent alternative for businesses that employ outsourced IT services, are planning mergers or acquisitions or must segregate IT teams owing to regulatory compliance. Reasons to Adopt Network Virtualization: A Business Needs Speed Security Requirements Are Rising Apps can Move Around Micro-segmentation IT Automation and Orchestration Reduce Hardware Dependency and CapEx: Adopt Multi-Tenancy Cloud Disaster Recovery mproved Scalability Wrapping-Up Network virtualization and cloud computing are emerging technologies of the future. As CIOs get actively involved in organizational systems, these new concepts will be implemented in more businesses. As consumer demand for real-time services expands, businesses will be driven to explore network virtualization as the best way to take their networks to the next level. The networking future is here. FAQ Why is network virtualization important for business? By integrating their current network gear into a single virtual network, businesses can reduce operating expenses, automate network and security processes, and set the stage for future growth. Where is network virtualization used? Network virtualization can be utilized in application development and testing to simulate hardware and system software realistically. Network virtualization in application performance engineering allows for the modeling of connections among applications, services, dependencies, and end users for software testing. How does virtualization work in cloud computing? Virtualization, in short, enables cloud providers to provide users alongside existing physical computer infrastructure. As a simple and direct process, it allows cloud customers to buy only the computing resources they require when they want them and to maintain those resources cost-effectively as the demand grows.

Read More

Spotlight

Hillstone Networks, Inc.

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks - whether physical, virtual, or in the cloud. Hillstone solutions provide continuous threat defense not only at traditional perimeters, but also to internal networks, down to each virtual machine. For physical environments

Related News

Virtual Server Infrastructure

Mobileum and VoerEir Partner to Provide End-to-End Service Assurance and Network Function Virtualization Infrastructure Testing and Benchmarking

Mobileum | February 25, 2022

Mobileum Inc., a leading global provider of analytics solutions for roaming and network services, security, risk management, testing and service assurance, and subscriber intelligence, is pleased to announce their technology partnership with VoerEir, an award-winning edge cloud technology company. The partnership between Mobileum and VoerEir creates the most comprehensive and powerful test platform for end-to-end Service Assurance and network function virtualization infrastructure (NFVI) benchmarking, certification, and validation. Combining Mobileum's SITE active test solution with VoerEir's TOUCHSTONE test suite provides a vertically integrated, full-stack testing solution that enables Communication Service Providers (CSPs) to test services and infrastructure from end-to-end. From the lab to the live network and from virtual and cloud-native network functions and applications (VNF/CNF) to the end device - all in a fully automated manner. Extensive RESTful API and automation capabilities allow the joint solution to be integrated into Telco Continuous Integration and Delivery (CI/CD) pipelines and provide an essential Continuous Testing (CT) component. Gabriel Chiriacescu, Mobileum's SVP for Testing and Service Assurance said: "The virtualized network infrastructure is the foundation on which 5G and future 6G cellular networks are being built. Assuring the NFVI's strict SLAs are met should be top of mind for all communication service providers. Together with VoerEir, we are proud to offer our global customers a best-in-class solution that ensures their next-generation networks are performing as expected." We are excited to announce this cooperation with Mobileum, which will provide our customers with the most comprehensive end-to-end testing solution for network applications (VNF/CNF), infrastructure (NFVI), and devices. VoerEir has been working steadily over the past six years to develop the best automated NVFI performance testing solution in the industry, and thanks to this partnership, we can prepare for the next level of growth." Javier Garcia Gomez, VoerEir´s CEO VoerEir's Touchstone Platform enables Telco operators to facilitate the benchmarking of multiple telco cloud environments spanning across multiple data centers. It provides support for Openstack and Kubernetes environments using an advanced test engine developed by VoerEir. The Touchstone platform includes a wide array of features for environment benchmarking, report management, and Enhanced Platform Aware (EPA) test suites. It is a leading-edge platform for cloud environment test automation, benchmarking, certification, and validation. The Mobileum-VoerEir partnership marks an important breakthrough for operators looking to accelerate their 5G rollouts and scale 5G and Edge testing capabilities. It also highlights Mobileum's open collaboration strategy of working alongside technology partners to integrate and expand its analytics capabilities to help CSPs meet their subscribers' rising service performance standards and expectations. About Mobileum Inc. Mobileum is a leading provider of Telecom analytics solutions for roaming, core network, security, risk management, domestic and international connectivity testing, and customer intelligence. More than 1,000 customers rely on its Active Intelligence platform, which provides advanced analytics solutions, allowing customers to connect deep network and operational intelligence with real-time actions that increase revenue, improve customer experience, and reduce costs. Headquartered in Silicon Valley, Mobileum has global offices in Australia, Germany, Greece, India, Portugal, Singapore, UK, and United Arab Emirates. About VoerEir AB VoerEir AB offers Touchstone, a test tool to facilitate telco cloud testing, deployment, and operation. VoerEir is headquartered in Kista (Sweden) and supplies its test suite and services to Tier-1 Telecommunication Operators and Vendors operating in several countries in Europe, the Middle East, and Asia.

Read More

Virtual Server Infrastructure

6WIND's Virtual Cell Site Router sets new standards in Virtualized & Disaggregated Networking

6WIND | January 27, 2022

6WIND, a leading high Performance and Secure networking Software Company is proud to announce the launch of its novel Virtual Cell Site Router (vCSR). 6WIND vCSR is a virtualized cell site router solution, part of 6WIND's Virtual Service Router (VSR) product family. The vCSR is tailored to the (radio) access network needs of 5G and 4G mobile network operators. The primary purpose of the vCSR is to provide best-in-class-efficiency IP/MPLS routing and high-performance end-to-end IPsec VPN security in a radio access network for hauling the aggregated traffic to the operator's core network. Just like all of 6WIND's VSR applications, vCSR runs on COTS servers, minimizing capital expenditure, maximizing economies of scale in equipment procurement and skirting around vendor lock-in. Based on 6WIND's core technology, vCSR boasts the industry-highest, linearly scalable forwarding performance on COTS hardware. It also caters for the lowest and, above all, deterministic latency, which is of utmost importance for real-time low-latency 5G network applications. vCSR can be deployed on bare metal (PNF), virtualized (VNF) or containerized (CNF) with full hardware and software disaggregation. The 6WIND vCSR is optimized to support all required CSR features and delivers its line rate performance with the lowest CPU and memory footprint. This results in market-leading efficiency in routing and security capabilities towards the provider core network. 6WINDs vCSR will readily co-exist and share resources with other network functions like for example 5G Distributed Units (DU), enabling the operator to mix and match different radio access, networking and other functions as per his specific needs. Creating on-demand, and bespoke, yet dependable network elements in the software realm, disaggregated from the hardware layer. About 6WIND 6WIND is a leading high-performance networking software company and the worldwide market leader for Virtual Service Router (VSR) solutions. 6WIND software is deployed globally by Service Providers, System Integrators, Cloud Providers and Tier-1 OEMs, allowing customers to replace expensive hardware with software and virtualization for routing and security use cases. 6WIND has a global presence with Headquarters based in Paris, France and in Santa Clara, California.

Read More

Virtualized Environments

Ekinops Obtains Microsoft Teams Certification for its SBC Solutions

EKINOPS S.A. | September 03, 2021

Ekinops, a leading network access and virtualization specialist, has announced that its enterprise SBC (Session Border Controller) solution included in the OneOS6 middleware has been certified by Microsoft Direct Routing. This certification allows businesses to benefit from the services offered by Microsoft Teams while keeping the telecom provider of their choice. Companies can now benefit from a complete solution that supports employee mobility and boosts productivity by combining the calling functions of traditional operators with the Microsoft platform capabilities, alongside advanced functionalities to make and receive phone calls from Teams users via Teams Direct Routing. A proven solution for interconnecting traditional communications systems with the latest generation of IP-based voice and data technologies, the Ekinops SBC range encompasses the most advanced features in terms of performance, security and voice quality. Ekinops offers a full range of certified SBCs for enterprises. It includes: A hybrid SBC solution (ONeSBC) that supports both analog and digital devices already in the enterprise while delivering Microsoft Direct Routing. Since it is not a "rip and replace" approach, the amortization of current investments is not impacted by the introduction of Microsoft Direct Routing in the enterprise. A virtualized VNF solution (ONEvSBC) allowing the dematerialization of the SBC solution for deployment in a public or private cloud. "In a context where home office work is growing rapidly, Microsoft Teams has become an essential and strategic collaboration platform for organizations," said Sylvain Quartier, Vice President of Marketing and Product Strategy for Access at Ekinops. "We are proud to have swiftly and successfully passed the Microsoft Direct Routing Teams certification with our SBC solutions. This certification broadens the scope of applications for our solutions and allows our operator customers to enrich their unified communications and collaboration service offerings."

Read More

Virtual Server Infrastructure

Mobileum and VoerEir Partner to Provide End-to-End Service Assurance and Network Function Virtualization Infrastructure Testing and Benchmarking

Mobileum | February 25, 2022

Mobileum Inc., a leading global provider of analytics solutions for roaming and network services, security, risk management, testing and service assurance, and subscriber intelligence, is pleased to announce their technology partnership with VoerEir, an award-winning edge cloud technology company. The partnership between Mobileum and VoerEir creates the most comprehensive and powerful test platform for end-to-end Service Assurance and network function virtualization infrastructure (NFVI) benchmarking, certification, and validation. Combining Mobileum's SITE active test solution with VoerEir's TOUCHSTONE test suite provides a vertically integrated, full-stack testing solution that enables Communication Service Providers (CSPs) to test services and infrastructure from end-to-end. From the lab to the live network and from virtual and cloud-native network functions and applications (VNF/CNF) to the end device - all in a fully automated manner. Extensive RESTful API and automation capabilities allow the joint solution to be integrated into Telco Continuous Integration and Delivery (CI/CD) pipelines and provide an essential Continuous Testing (CT) component. Gabriel Chiriacescu, Mobileum's SVP for Testing and Service Assurance said: "The virtualized network infrastructure is the foundation on which 5G and future 6G cellular networks are being built. Assuring the NFVI's strict SLAs are met should be top of mind for all communication service providers. Together with VoerEir, we are proud to offer our global customers a best-in-class solution that ensures their next-generation networks are performing as expected." We are excited to announce this cooperation with Mobileum, which will provide our customers with the most comprehensive end-to-end testing solution for network applications (VNF/CNF), infrastructure (NFVI), and devices. VoerEir has been working steadily over the past six years to develop the best automated NVFI performance testing solution in the industry, and thanks to this partnership, we can prepare for the next level of growth." Javier Garcia Gomez, VoerEir´s CEO VoerEir's Touchstone Platform enables Telco operators to facilitate the benchmarking of multiple telco cloud environments spanning across multiple data centers. It provides support for Openstack and Kubernetes environments using an advanced test engine developed by VoerEir. The Touchstone platform includes a wide array of features for environment benchmarking, report management, and Enhanced Platform Aware (EPA) test suites. It is a leading-edge platform for cloud environment test automation, benchmarking, certification, and validation. The Mobileum-VoerEir partnership marks an important breakthrough for operators looking to accelerate their 5G rollouts and scale 5G and Edge testing capabilities. It also highlights Mobileum's open collaboration strategy of working alongside technology partners to integrate and expand its analytics capabilities to help CSPs meet their subscribers' rising service performance standards and expectations. About Mobileum Inc. Mobileum is a leading provider of Telecom analytics solutions for roaming, core network, security, risk management, domestic and international connectivity testing, and customer intelligence. More than 1,000 customers rely on its Active Intelligence platform, which provides advanced analytics solutions, allowing customers to connect deep network and operational intelligence with real-time actions that increase revenue, improve customer experience, and reduce costs. Headquartered in Silicon Valley, Mobileum has global offices in Australia, Germany, Greece, India, Portugal, Singapore, UK, and United Arab Emirates. About VoerEir AB VoerEir AB offers Touchstone, a test tool to facilitate telco cloud testing, deployment, and operation. VoerEir is headquartered in Kista (Sweden) and supplies its test suite and services to Tier-1 Telecommunication Operators and Vendors operating in several countries in Europe, the Middle East, and Asia.

Read More

Virtual Server Infrastructure

6WIND's Virtual Cell Site Router sets new standards in Virtualized & Disaggregated Networking

6WIND | January 27, 2022

6WIND, a leading high Performance and Secure networking Software Company is proud to announce the launch of its novel Virtual Cell Site Router (vCSR). 6WIND vCSR is a virtualized cell site router solution, part of 6WIND's Virtual Service Router (VSR) product family. The vCSR is tailored to the (radio) access network needs of 5G and 4G mobile network operators. The primary purpose of the vCSR is to provide best-in-class-efficiency IP/MPLS routing and high-performance end-to-end IPsec VPN security in a radio access network for hauling the aggregated traffic to the operator's core network. Just like all of 6WIND's VSR applications, vCSR runs on COTS servers, minimizing capital expenditure, maximizing economies of scale in equipment procurement and skirting around vendor lock-in. Based on 6WIND's core technology, vCSR boasts the industry-highest, linearly scalable forwarding performance on COTS hardware. It also caters for the lowest and, above all, deterministic latency, which is of utmost importance for real-time low-latency 5G network applications. vCSR can be deployed on bare metal (PNF), virtualized (VNF) or containerized (CNF) with full hardware and software disaggregation. The 6WIND vCSR is optimized to support all required CSR features and delivers its line rate performance with the lowest CPU and memory footprint. This results in market-leading efficiency in routing and security capabilities towards the provider core network. 6WINDs vCSR will readily co-exist and share resources with other network functions like for example 5G Distributed Units (DU), enabling the operator to mix and match different radio access, networking and other functions as per his specific needs. Creating on-demand, and bespoke, yet dependable network elements in the software realm, disaggregated from the hardware layer. About 6WIND 6WIND is a leading high-performance networking software company and the worldwide market leader for Virtual Service Router (VSR) solutions. 6WIND software is deployed globally by Service Providers, System Integrators, Cloud Providers and Tier-1 OEMs, allowing customers to replace expensive hardware with software and virtualization for routing and security use cases. 6WIND has a global presence with Headquarters based in Paris, France and in Santa Clara, California.

Read More

Virtualized Environments

Ekinops Obtains Microsoft Teams Certification for its SBC Solutions

EKINOPS S.A. | September 03, 2021

Ekinops, a leading network access and virtualization specialist, has announced that its enterprise SBC (Session Border Controller) solution included in the OneOS6 middleware has been certified by Microsoft Direct Routing. This certification allows businesses to benefit from the services offered by Microsoft Teams while keeping the telecom provider of their choice. Companies can now benefit from a complete solution that supports employee mobility and boosts productivity by combining the calling functions of traditional operators with the Microsoft platform capabilities, alongside advanced functionalities to make and receive phone calls from Teams users via Teams Direct Routing. A proven solution for interconnecting traditional communications systems with the latest generation of IP-based voice and data technologies, the Ekinops SBC range encompasses the most advanced features in terms of performance, security and voice quality. Ekinops offers a full range of certified SBCs for enterprises. It includes: A hybrid SBC solution (ONeSBC) that supports both analog and digital devices already in the enterprise while delivering Microsoft Direct Routing. Since it is not a "rip and replace" approach, the amortization of current investments is not impacted by the introduction of Microsoft Direct Routing in the enterprise. A virtualized VNF solution (ONEvSBC) allowing the dematerialization of the SBC solution for deployment in a public or private cloud. "In a context where home office work is growing rapidly, Microsoft Teams has become an essential and strategic collaboration platform for organizations," said Sylvain Quartier, Vice President of Marketing and Product Strategy for Access at Ekinops. "We are proud to have swiftly and successfully passed the Microsoft Direct Routing Teams certification with our SBC solutions. This certification broadens the scope of applications for our solutions and allows our operator customers to enrich their unified communications and collaboration service offerings."

Read More

Events