SDN AND NFV SOFTWARE FRAMEWORKS—THE ANSWER TO STAYING 5G READY

Software-defined networking (SDN) and network functions virtualization (NFV) represent a core structural transformation in the way communication infrastructure is deployed. These technologies have induced significant improvements in the time to market, cost efficiencies, and innovation, helping the industry build agile networks at lower costs. On another level, SDN and NFV have been instrumental in deploying 5G networks. The technologies’ ability to orchestrate mobile core networks holds the key to its successful implementation.

Spotlight

Kovarus

Kovarus is a systems integrator that helps companies modernize and automate IT. We enable businesses to transform their IT service delivery to help them accelerate innovation and deliver cost-effective business outcomes. Kovarus has helped some of the greatest companies in the world by leveraging the Kovarus Solutions Portfolio of best-in-class technologies and services to deliver business services faster, at scale and more effectively to provide them a competitive advantage.

OTHER ARTICLES
Virtual Desktop Tools, Server Hypervisors

Virtualization Can Help Substantially Reduce Computing Costs

Article | June 8, 2023

Businesses use a lot of technology to keep themselves competitive and Businesses use a lot of technology to keep themselves competitive and operationally efficient. One way that organizations use to make their technology infrastructure more accessible is through the use of virtualization. Let’s discuss what virtualization is, how it benefits businesses, and some examples of how you might consider leveraging virtualization to your company’s benefit. Virtualization for Hardware and Software Virtualization in its most basic sense is taking something and making it virtual. In regards to hardware and software, it involves taking these parts of your technology infrastructure and making them available in a virtual environment. Virtual applications and hardware solutions can be deployed to the cloud so that they can be accessed by any online device. Some examples of virtualization might include creating virtual machines, like workstations and server units, that are hosted in a virtual environment for as-needed access

Read More
Virtual Desktop Tools, Virtual Desktop Strategies

Top 15 Virtualization Events to Attend in 2023

Article | June 8, 2023

Virtualization has become integral to modern computing, enabling organizations to optimize their resources and increase efficiency. Following are the upcoming events taking place in France, China, USA, Netherlands, and Germany, from April 2023 to December 2023. Let's take a closer look at each of these events and know what attendees can expect to gain from them. The following events will provide insight into the growing impact of virtualization on upcoming as well as established organizations. The renowned speakers in the following events will give economic value to the concept of virtualization and how it can transform business operations. By attending these events, participants will gain a deeper understanding of the latest trends, technologies, and strategies in virtualization, as well as the potential benefits and challenges associated with its implementation. 1. 18th Workshop on Virtualization in High-Performance Cloud Computing May 25, 2023 | Hamburg (Germany) The VHPC workshop at the International Supercomputing Conference - High Performance 2023 invites researchers and industrial practitioners to submit original and high-quality papers on virtualization in HPC, containers, virtualization, and cloud computing. The workshop will cover a broad range of topics related to virtualization, including virtualization for scientific computing and big data analytics, virtualization for high-performance computing and data centers, and virtualization for edge, fog computing, and more. The workshop will provide a forum for researchers to present their latest research findings, share ideas, and collaborate on new research directions. 2. VMware Explore 2023 August 5-10, 2023 | Nevada (USA) The VMware Explore 2023 conference is a specialized event focusing on virtualization and cloud computing technologies for data centers and virtual workspace infrastructure. It will cover topics on cloud & edge infrastructure, networking & security, modern applications & cloud management, hybrid workforce, vision & innovation. VMware Explore 2023 will host a community of technology users and leaders involved in enterprise applications, cloud architecture, infrastructure, end users, networking, and security. 3. Data Center World May 8 - 11, 2023 | Texas (USA) This is the only global event that brings together the entire data center industry, making it the go-to resource for anybody looking to optimize their data center strategy. Data Center World is the premier event for digital infrastructure, that will cater to the needs of data center managers, IT executives, and the pioneers who will shape the future of the digital sector. The technologies and concepts for designing, managing, and optimizing data centers will be presented at the event, along with expert advice and guidance. 4. The Fourteenth International Conference on Cloud Computing, GRIDs, and Virtualization June 26 - 30, 2023 | Saint-Laurent-du-Var (France) The Fourteenth International Conference on Cloud Computing, GRIDs, and Virtualization is an upcoming conference that will provide a forum for researchers and practitioners to present and discuss the latest research, trends & practical applications in cloud computing, grids, and virtualization. The conference will cover various topics related to these fields, including cloud security and privacy, cloud storage, cloud economics, and more. The conference will provide a platform for attendees to discuss emerging trends, challenges, and opportunities in these fields, as well as present their research findings and insights. 5. Knowledge 2023 May 16 - 18, 2023 | Las Vegas (United States) The event is organized by ServiceNow, which provides cloud-based IT service management, IT operations management, and IT business management solutions. Chairman and Chief Executive Officer Bill McDermott will deliver the opening keynote address. The event will include a wide range of sessions: Hands-on Labs, Presentations from Experts, Art of the Possible HackZone Demo, Annual Hackathon, Community Meetups, challenges, and more. Attendees will be able to connect with visionaries worldwide and gain new ServiceNow skills and fresh insights into the power of digital transformation. 6. 2023 5TH INTERNATIONAL CONFERENCE ON HARDWARE SECURITY AND TRUST (ICHST 2023) July 8 - 10, 2023 | Wuxi (China) The 5th International Conference on Hardware Security and Trust (ICHST 2023) will serve as a workshop for ICSIP 2023 and is sponsored by Southeast University, China, with co-sponsorship from Southeast University Wuxi Campus and the School of Cyber Science and Engineering. ICHST is an annual symposium that will seek to promote the rapid growth of hardware-based security research and development. It will focus on presenting new findings in hardware and system security, covering topics such as secure hardware techniques, tools, design and test methods, architectures, circuits, and applications. 7. .NEXT May 9 - 10, 2023 | Chicago (USA) .NEXT conference is a series of annual events organized by Nutanix, a cloud computing and hyper-converged infrastructure company. It will cover fascinating insights about new work, global supply chains, utopian visions, the metaverse and Web3, smart technology, intelligence, and many more. The conference will typically feature keynote presentations, technical sessions, and hands-on labs focused on cloud computing, data center infrastructure, and digital transformation. Attendees will also be able to experience test-drive demos. 8. Wan Summit: Enterprise Networks Chicago September 28, 2023 | Chicago (USA) Connectivity infrastructure is the main topic of discussion at WAN Summit, an invitation-only conference for network and engineering professionals shaping the future of the workplace. In order to help businesses, provide a better experience for their customers, the WAN Summit will discuss the issues that persist in the networking department. The event will have sessions as network manager focus, enterprise case studies, exhibition and networking drinks reception, and so on. 9. Black Hat USA August 5 -10, 2023 | Nevada (USA) This year marks the 26th annual Black Hat USA conference, which will be held at the Mandalay Bay Convention Center in Las Vegas. Attendees of all experience levels can participate in four days of intensive cybersecurity training. More than a hundred carefully-chosen briefings, hundreds of open-source tool demonstrations in Arsenal, a robust business hall, networking and social events, and much more will fill the two days of the main conference. This year, Black Hat will also debut a live, in-person Certification program that will last for a whole day. 10. Gartner IT Symposium | Xpo October 16 -19, 2023 | Orlando (USA) The strategic concerns of enterprise CIOs and their executive teams are the focus of the Gartner IT Symposium/Xpo. At the Gartner IT Symposium, a worldwide network of experts and peers will talk about game-changing innovations. Chief Information Officers and other IT executives will discuss the latest developments in the fields of accelerating business transformation, cybersecurity, artificial intelligence, customer experience, data analytics, executive leadership, and many other topics that will shape the future of IT and business. 11. Container Days September 11 -13, 2023 | Hamburg (Germany) An amazing learning experience on Kubernetes, Cloud Native, Container Security, DevOps, GitOps, Edge Computing, and more is available at CDS, where the CDS family increases yearly. Global tycoons will gather in person and online to share insights, make connections, and do business. Opportunities to meet like-minded people and open discussion forums are favorites among open-source and cloud-native project fans. More in-depth technical presentations and engaging panel discussions will be live across five stages this year. 12. Big Data Expo September 12 - 13, 2023 | Utrecht (Netherlands) Supply and demand in the big data industry are finally brought together at Big Data Expo. This is the only conference in the Benelux region covering every data management facet. Exhibitors are prioritized who regularly engage in data aggregation, generation, analysis, optimization, and application across a variety of scales and contexts. The two-day conference will cover various topics, from cloud computing and data visualization to data security and machine learning/artificial intelligence. If you're interested in data, the Big Data Expo is the place to be. 13. Red Hat Summit May 23 - 25, 2023 | Massachusetts (USA) The seminars, workshops, demos, laboratories, and training opportunities at Red Hat Summit 2023 in Boston (Massachusetts), will be invaluable to the individuals and their teams. In addition, this year's event will be held in conjunction with AnsibleFest, adding automation to the diverse mix of offerings that are used to address a world of IT challenges, in addition to keynotes, customer and partner stories, topics, and tracks designed to help you make the most of hybrid cloud technology. Participants will be able to watch or rewatch major announcements and view dozens of new sessions and recorded sessions from Boston—at no cost to you. 14. TechNet Cyber 2023 May 2 -4, 2023 | Baltimore convention center, Maryland (USA) TechNet Cyber is the best chance to showcase products & services to the nation's top network security, operations, and defense decision-makers. The U.S. Defense Information Systems Agency is always on the lookout for fresh concepts to help standardize and streamline cyber operations throughout the Department of Defense and the armed forces' various components. To tackle global security concerns and successfully function in a digital world, AFCEA's TechNet Cyber acts as a focal point for a government-wide effort to consolidate the policy, strategic architecture, operations, and C2, as well as the combined capabilities necessary to do so. 15. IEEE International Conference On Smart Information Systems and Technologies May 4 - 6, 2023 | Scientific Society (Kazakhstan) The 2023 IEEE SIST International Conference, technically co-sponsored by the IEEE Ukraine Section, is an essential event in the scientific society of Kazakhstan. Professionals, researchers, scientists, specialists, and students from a unique opportunity for participants to expand their knowledge and various areas of the IT industry from around the globe will attend this conference. The conference will offer perspectives on specific topics, and contribute to finding solutions to current IT trends. Additionally, the conference will be covering several research areas, including technology and engineering management, governance, finance, economy, and more. Conclusion The events will help organizations capitalize on the opportunities presented by virtualization and remain ahead of the curve in today's rapidly evolving digital landscape. The purpose of the events is to facilitate collaboration, the exchange of knowledge, and the discussion of innovative solutions for virtualized computing systems of the future.

Read More
Virtual Desktop Tools

Virtual Machine Security Risks and Mitigation in Cloud Computing

Article | August 12, 2022

Analyzing risks and implementing advanced mitigation strategies: Safeguard critical data, fortify defenses, and stay ahead of emerging threats in the dynamic realm of virtual machines in cloud. Contents 1. Introduction 2. 10 Security Risks Associated with Virtual Machines in Cloud Computing 3. Best Practices to Avoid Security Compromise 4. Conclusion 1. Introduction Cloud computing has revolutionized the way businesses operate by providing flexible, scalable, and cost-effective infrastructure for running applications and services. Virtual machines (VMs) are a key component of cloud computing, allowing multiple virtual machines to run on a single physical machine. However, the use of virtual machines in cloud computing introduces new security risks that need to be addressed to ensure the confidentiality, integrity, and availability of data and services. Effective VM security in the cloud requires a comprehensive approach that involves cloud providers and users working together to identify and address potential virtual machine security threats. By implementing these best practices and maintaining a focus on security, cloud computing can provide a secure and reliable platform for businesses to run their applications and services. 2. 10 Security Risks Associated with Virtual Machines in Cloud Computing Denial of Service (DoS) attacks: These are attacks that aim to disrupt the availability of a VM or the entire cloud infrastructure by overwhelming the system with traffic or resource requests. Insecure APIs: Cloud providers often expose APIs that allow users to manage their VMs. If these APIs are not properly secured, attackers can exploit them to gain unauthorized access to VMs or manipulate their configurations. Data leakage: Virtual machines can store sensitive data such as customer information or intellectual property. If not secured, this data can be exposed to unauthorized access or leakage. Shared resources: VMs in cloud environments often share physical resources such as memory, CPU, and network interfaces. If these resources are not isolated, a compromised VM can potentially affect the security and performance of other VMs running on the same physical host. Lack of visibility: Virtual machines in cloud environments can be more difficult to monitor than physical machines. This can make it harder to detect security incidents or anomalous behavior. Insufficient logging and auditing: If cloud providers do not implement appropriate logging and auditing mechanisms, it can be difficult to determine the cause and scope of a security incident. VM escape: This is when an attacker gains access to the hypervisor layer and then escapes into the host operating system or other VMs running on the same physical host. Side-channel attacks: This is when an attacker exploits the physical characteristics of the hardware to gain unauthorized access to a VM. Examples of side-channel attacks include timing attacks, power analysis attacks, and electromagnetic attacks. Malware attacks: VMs can be infected with malware, just like physical machines. Malware can be used to steal data, launch attacks on other VMs or systems, or disrupt the functioning of the VM. Insider threats: Malicious insiders can exploit their access to VMs to steal data, modify configurations, or launch attacks. 3. Best Practices to Avoid Security Compromise To mitigate these risks, there are several virtual machine security guidelines that cloud service providers and users can follow: Keep software up-to-date: Regularly updating software and security patches for virtual machines is crucial in preventing known vulnerabilities from being exploited by hackers. Software updates fix bugs and security flaws that could allow unauthorized access, data breaches, or malware attacks. According to a study, 60% of data breaches are caused by vulnerabilities that were not patched or updated in a timely manner.(Source: Ponemon Institute) Use secure hypervisors: A hypervisor is a software layer that enables multiple virtual machines to run on a single physical server. Secure hypervisors are designed to prevent unauthorized access to virtual machines and protect them from potential security threats. When choosing a hypervisor, it is important to select one that has undergone rigorous testing and meets industry standards for security. In 2018, a group of researchers discovered a new type of attack called "Foreshadow" (also known as L1 Terminal Fault). The attack exploits vulnerabilities in Intel processors and can be used to steal sensitive data from virtual machines running on the same physical host. Secure hypervisors that have implemented hardware-based security features can provide protection against Foreshadow and similar attacks. (Source: Foreshadow) Implement strong access controls: Access control is the practice of restricting access to virtual machines to authorized users. Multi-factor authentication adds an extra layer of security by requiring users to provide more than one type of authentication method before accessing VMs. Strong access controls limit the risk of unauthorized access and can help prevent data breaches. According to a survey, organizations that implemented multi-factor authentication saw a 98% reduction in the risk of phishing-related account breaches. (Source: Duo Security) Monitor VMs for anomalous behavior: Monitoring virtual machines for unusual or unexpected behavior is an essential security practice. This includes monitoring network traffic, processes running on the VM, and other metrics that can help detect potential security incidents. By monitoring VMs, security teams can detect and respond to security threats before they can cause damage. A study found that 90% of organizations that implemented a virtualized environment experienced security benefits, such as improved visibility into security threats and faster incident response times. (Source: VMware) Use Encryption: Encryption is the process of encoding information in such a way that only authorized parties can access it. Encrypting data both in transit and at rest protects it from interception or theft by hackers. This can be achieved using industry-standard encryption protocols and technologies. According to a report by, the average cost of a data breach in 2020 was $3.86 million. The report also found that organizations that implemented encryption had a lower average cost of a data breach compared to those that did not (Source: IBM) Segregate VMs: Segregating virtual machines is the practice of keeping sensitive VMs separate from less sensitive ones. This reduces the risk of lateral movement, which is when a hacker gains access to one VM and uses it as a stepping stone to gain access to other VMs in the same environment. Segregating VMs helps to minimize the risk of data breaches and limit the potential impact of a security incident. A study found that organizations that implemented a virtualized environment without adequate segregation and access controls were more vulnerable to VM security breaches and data loss. (Source: Ponemon Institute) Regularly Back-up VMs: Regularly backing up virtual machines is a critical security practice that can help mitigate the impact of malware attacks, system failures, or other security incidents. Backups should be stored securely and tested regularly to ensure that they can be restored quickly in the event of a security incident. A survey conducted found that 42% of organizations experienced a data loss event in 2020 with the most common cause being accidental deletion by an employee (29%). (Source: Veeam) 4. Conclusion The complexity of cloud environments and the shared responsibility model for security require organizations to adopt a comprehensive security approach that spans multiple infrastructure layers, from the physical to the application layer. The future of virtual machine security concern in cloud computing will require continued innovation and adaptation to new threats and vulnerabilities. As a result, organizations must remain vigilant and proactive in their security efforts, leveraging the latest technologies and best practices to protect their virtual machines, the sensitive data and resources they contain.

Read More
VMware

VMware NSX 3.2 Delivers New, Advanced Security Capabilities

Article | December 7, 2021

It’s an impactful release focused on significant NSX Security enhancements Putting a hard shell around a soft core is not a recipe for success in security, but somehow legacy security architectures for application protection have often looked exactly like that: a hard perimeter firewall layer for an application infrastructure that was fundamentally not built with security as a primary concern. VMware NSX Distributed Firewall pioneered the micro-segmentation concept for granular access controls for cloud applications with the initial launch of the product in 2013. The promise of Zero Trust security for applications, the simplicity of deployment of the solution, and the ease of achieving internal security objectives made NSX an instant success for security-sensitive customers. Our newest release — NSX-T 3.2 — establishes a new marker for securing application infrastructure by introducing significant new features to identify and respond to malware and ransomware attacks in the network, to enhance user identification and L7 application identification capabilities, and, at the same time, to simplify deployment of the product for our customers. Modern day security teams need to secure mission-critical infrastructure from both external and internal attacks. By providing unprecedented threat visibility leveraging IDS, NTA, and Network Detection and Response (NDR) capabilities along with granular controls leveraging L4-L7 Firewall, IPS, and Malware Prevention capabilities, NSX 3.2 delivers an incredible security solution for our customers“ Umesh Mahajan, SVP, GM (Networking and Security Business Unit) Distributed Advanced Threat Prevention (ATP) Attackers often use multiple sophisticated techniques to penetrate the network, move laterally within the network in a stealthy manner, and exfiltrate critical data at an appropriate time. Micro-segmentation solutions focused solely on access control can reduce the attack surface — but cannot provide the detection and prevention technologies needed to thwart modern attacks. NSX-T 3.2 introduces several new capabilities focused on detection and prevention of attacks inside the network. Of critical note is that these advanced security solutions do not need network taps, separate monitoring networks, or agents inside each and every workload. Distributed Malware Prevention Lastline’s highly reputed dynamic malware technology is now integrated with NSX Distributed Firewall to deliver an industry-first Distributed Malware Prevention solution. Leveraging the integration with Lastline, a Distributed Firewall embedded within the hypervisor kernel can now identify both “known malicious” as well as “zero day” malware Distributed Behavioral IDS Whereas earlier versions of NSX Distributed IDPS (Intrusion Detection and Prevention System) delivered primarily signature-based detection of intrusions, NSX 3.2 introduces “behavioral” intrusion detection capabilities as well. Even if specific IDS signatures are not triggered, this capability helps customers know whether a workload is seeing any behavioral anomalies, like DNS tunneling or beaconing, for example, that could be a cause for concern. Network Traffic Analysis (NTA) For customers interested in baselining network-wide behavior and identifying anomalous behavior at the aggregated network level, NSX-T 3.2 introduces Distributed Network Traffic Analysis (NTA). Network-wide anomalies like lateral movement, suspicious RDP traffic, and malicious interactions with the Active Directory server, for example, can alert security teams about attacks underway and help them take quick remediation actions. Network Detection and Response (NDR) Alert overload, and resulting fatigue, is a real challenge among security teams. Leveraging advanced AI/ML techniques, the NSX-T 3.2 Network Detection and Response solution consolidates security IOCs from different detection systems like IDS, NTA, malware detection. etc., to provide a ”campaign view” that shows specific attacks in play at that point in time. MITRE ATT&CK visualization helps customers see the specific stage in the kill chain of individual attacks, and the ”time sequence” view helps understand the sequence of events that contributed to the attack on the network. Key Firewall Enhancements While delivering new Advanced Threat Prevention capabilities is one key emphasis for the NSX-T 3.2 release, providing meaningful enhancements for core firewalling capabilities is an equally critical area of innovation. Distributed Firewall for VDS Switchports While NSX-T has thus far supported workloads connected to both overlay-based N-VDS switchports as well as VLAN-based switchports, customers had to move the VLAN switchports from VDS to N-VDS before a Distributed Firewall could be enforced. With NSX-T 3.2, native VLAN DVPGs are supported as-is, without having to move to N-VDS. Effectively, Distributed Security can be achieved in a completely seamless manner without having to modify any networking constructs. Distributed Firewall workflows in vCenter With NSX-T 3.2, we are introducing the ability to create and modify Distributed Firewall rules natively within vCenter. For small- to medium-sized VMware customers, this feature simplifies the user experience by eliminating the need to leverage a separate NSX Manager interface. Advanced User Identification for Distributed and Gateway Firewalls NSX supported user identity-based access control in earlier releases. With NSX-T 3.2, we’re introducing the ability to directly connect to Microsoft Active Directory to support user identity mapping. In addition, for customers who do not use Active Directory for user authentication, NSX also supports VMware vRealize LogInsight as an additional method to carry out user identity mapping. This feature enhancement is applicable for both NSX Distributed Firewall as well as NSX Gateway Firewall. Enhanced L7 Application Identification for Distributed and Gateway Firewalls NSX supported Layer-7 application identification-based access control in earlier releases. With NSX-T 3.2, we are enhancing the signature set to about 750 applications. While several perimeter firewall vendors claim a larger set of Layer-7 application signatures, they focus mostly on internet application identification (like Facebook, for example). Our focus with NSX at this time is on internal applications hosted by enterprises. This feature enhancement is applicable for both NSX Distributed Firewall as well as Gateway Firewalls. NSX Intelligence NSX Intelligence is geared towards delivering unprecedented visibility for all application traffic inside the network and enabling customers to create micro-segmentation policies to reduce the attack surface. It has a processing pipeline that de-dups, aggregates, and correlates East-West traffic to deliver in-depth visibility. Scalability enhancements for NSX Intelligence As application infrastructure grows rapidly, it is vital that one’s security analytics platform can grow with it. With the new release, we have rearchitected the application platform upon which NSX Intelligence runs — moving from a stand-alone appliance to a containerized micro-service architecture powered by Kubernetes. This architectural change future-proofs the Intelligence data lake and allows us to eventually scale out our solution to n-node Kubernetes clusters. Large Enterprise customers that need visibility for application traffic can confidently deploy NSX Intelligence and leverage the enhanced scale it supports. NSX Gateway Firewall While NSX Distributed Firewall focuses on east-west controls within the network, NSX Gateway Firewall is used for securing ingress and egress traffic into and out of a zone. Gateway Firewall Malware Detection NSX Gateway Firewall in the 3.2 release received significant Advanced Threat Detection capabilities. Gateway Firewall can now identify both known as well as zero-day malware ingressing or egressing the network. This new capability is based on the Gateway Firewall integration with Lastline’s highly reputed dynamic network sandbox technology. Gateway Firewall URL Filtering Internal users and applications reaching out to malicious websites is a huge security risk that must be addressed. In addition, enterprises need to limit internet access to comply with corporate internet usage policies. NSX Gateway Firewall in 3.2 introduces the capability to restrict access to internet sites. Access can be limited based on either the category the URL belongs to, or the “reputation” of the URL. The URL to category and reputation mapping is constantly updated by VMware so customer intent is enforced automatically even after many changes in the internet sites themselves.

Read More

Spotlight

Kovarus

Kovarus is a systems integrator that helps companies modernize and automate IT. We enable businesses to transform their IT service delivery to help them accelerate innovation and deliver cost-effective business outcomes. Kovarus has helped some of the greatest companies in the world by leveraging the Kovarus Solutions Portfolio of best-in-class technologies and services to deliver business services faster, at scale and more effectively to provide them a competitive advantage.

Related News

VMware

STL, VMware and ASOCS unveil end-to-end 5G Enterprise solution at MWC 2022

Sterlite Technologies Ltd. (STL) | March 04, 2022

STL, an industry-leading integrator of digital networks, together with ASOCS and VMWare, announced the launch of industry's first end-to-end 5G Enterprise solution to address the growing demand for private 5G enterprise connectivity for campus, industrial and venue applications. Unveiled at MWC 2022, where STL demonstrated its All-in 5G offerings, this 5G Enterprise solution will comprise Garuda, STL's O-RAN 5G indoor/outdoor small cells, CYRUS, Open Distributed Unit and Centralised Unit from ASOCS and VMware Edge Compute Stack as the virtualization layer and cloud management . 5G Enterprise networks have proven to be game changers for businesses and are set to have a market value of US$ 14 billion by 2028. These future-ready 5G networks will be enabled by open standards-based architectures and will be able to handle dense environments required for seamless indoor coverage. STL's Garuda small cell radio is ideal for small, medium and large enterprises, supporting more than 30 concurrent user devices per radio. ASOCS' CYRUS, a fully virtualized O-RAN CU/DU enterprise solution, delivers standalone and 5G connectivity in a single software stack. VMware Edge Compute Stack is an edge computing solution that helps to build, run, manage, and protect edge-native applications at the Near and Far Edge. The combination of STL, ASOCS and VMware offers a powerful on-premise fully virtualized and open RAN 5G solution on general purpose servers; this solution can be hosted alongside enterprise IT infrastructure on general purpose commercial off-the-shelf (COTS) servers, seamlessly blending with an enterprise's existing infrastructure. In December 2021, STL & ASOCS had jointly demonstrated the 5G enterprise use-case as a part of the O-RAN Alliance annual plugfest, including the interoperability of Garuda with ASOCS' Distribution Unit/Centralised Unit. Our strong partnership with STL and VMware brings a strong end-to-end Private 5G enterprise network solution which we already see being adopted in Smart Manufacturing and the digital transformation to Industry 4.0. With our CYRUS virtual RAN solution along with STL's Garuda and computation at the edge with VMware, enterprises will be able to easily deploy and manage 5G networks with high high-performance level, security, and flexibility." Gilad Garon, ASOCS CEO Commenting on the solution, Muneyb Minhazuddin, vice president of edge strategy, VMware, said: "We are delighted to associate with STL and ASOCS to bring the 5G enterprise networks solutions to provide compelling benefits to businesses. VMware Edge Compute Stack provides a purpose-built, integrated VM and container-based stack that enables organizations to deploy and secure edge-native apps at the far edge. It will complement STL's Garuda and ASOCS' CYRUS in paving the way for more seamless 5G enterprise connectivity." Speaking on the collaboration, Chris Rice, CEO, Access Solutions, STL, said: "This collaboration is a testament to the benefits of open networking principles - bringing three partners together to offer a very powerful solution to address various 5G Enterprise opportunities, globally. Enterprises will now be able to leverage a robust, secure 5G network that is easy to scale and upgrade and drives greater levels of service efficiency." About STL - Sterlite Technologies Ltd STL is a leading integrator of digital networks providing All-in 5G solutions. Our capabilities across wireless connectivity, optical networking, software, and services, place us amongst the top 5G RAN vendors by Gartner. These capabilities are built on open-source and converged architectures helping telcos, cloud companies, citizen networks, and large enterprises deliver next-gen experiences to their customers. STL partners with service providers globally in achieving a green and sustainable digital future in alignment with UN SDG goals. STL has a strong global presence in India, Italy, the UK, the US, China, and Brazil.

Read More

VMware

Arrcus and VMware Enable Operational Agility with Hyperscale Networking Solution

Arrcus | March 01, 2022

Mobile World Congress 2022 – Arrcus’ virtualized routing solution, Arrcus ACE 2.0, is now interoperable with VMware Telco Cloud Platform, enabling service providers to dynamically direct network traffic to the compute environment that best meets workload requirements. The solution gives flexibility and operational agility as they deploy a variety of workloads across private, public and edge clouds. The next generation of modern apps requires a modern networking architecture. One that can deliver reliable scale, predictable performance, and seamless orchestration. Running Arrcus ACE 2.0 on VMware Telco Cloud Platform, service providers can modernize their network to become more dynamic, scalable and efficient.” Lakshmi Mandyam, vice president of product management and partner ecosystems, Service Provider & Edge, VMware VMware Telco Cloud Platform provides a single platform on top of which service providers can run and manage all containerized network functions (CNFs) and virtualized network functions (VNFs). Arrcus ACE 2.0 provides a multi-cloud networking (MCN) platform that enables organizations to tightly integrate their data center network and public cloud infrastructure. By running Arrcus ACE 2.0 on VMware Telco Cloud Platform, service providers can take a more discreet approach to route optimization for specific data from source to destination, such as routing hyperscaler specific traffic to improve performance, scale, and efficiency of data plane communication. Sreekanth Kannan, vice president of product management and marketing at Arrcus, said, “We are seeing a convergence of networking and compute transformation driven by the emergence of modern apps. Arrcus and VMware are partnering to help global enterprises and telecommunication service providers to navigate these shifts and set them up to deliver new services more efficiently and cost-effectively to their customers.” Arrcus is proud to announce it has grown the partnership with VMware by joining the VMware Technology Alliance Partner (TAP) program and is now a certified member of the “Ready for Telco Cloud” program. Arrcus ACE platform, based on modern architectural tenets, is a fully programmable, massively scalable, modular, extensible software that enables customers to cost-effectively design, deploy and manage their network infrastructure. VMware’s Technology Alliance Partner (TAP) program enables hardware and software vendors with the tools and resources they need to build and deliver their solutions on VMware infrastructure. Partners can develop, test, integrate, certify/validate and package products with VMware products and services and then publish their joint solutions on the VMware Marketplace to our shared customers. Arrcus achieves “Ready for Telco Cloud” certification. The VMware Ready for Telco Cloud program certifies that Arrcus network functions interoperate with the VMware Telco Cloud platform to support communications service providers to accelerate the deployment of 5G workloads and more. The Arrcus ACE platform is now available in the VMware Marketplace for immediate consumption. About Arrcus Arrcus was founded to enhance business efficiency through superior network connectivity. The Arrcus Connected Edge (ACE) platform offers best-in-class networking with the most flexible consumption model at the lowest total cost of ownership. The Arrcus team consists of world-class technologists who have an unparalleled record in shipping industry-leading networking products, complemented by industry thought leaders, operating executives, strategic partners and top-tier VCs. The company is headquartered in San Jose, Calif.

Read More

Virtual Server Infrastructure

Mobileum and VoerEir Partner to Provide End-to-End Service Assurance and Network Function Virtualization Infrastructure Testing and Benchmarking

Mobileum | February 25, 2022

Mobileum Inc., a leading global provider of analytics solutions for roaming and network services, security, risk management, testing and service assurance, and subscriber intelligence, is pleased to announce their technology partnership with VoerEir, an award-winning edge cloud technology company. The partnership between Mobileum and VoerEir creates the most comprehensive and powerful test platform for end-to-end Service Assurance and network function virtualization infrastructure (NFVI) benchmarking, certification, and validation. Combining Mobileum's SITE active test solution with VoerEir's TOUCHSTONE test suite provides a vertically integrated, full-stack testing solution that enables Communication Service Providers (CSPs) to test services and infrastructure from end-to-end. From the lab to the live network and from virtual and cloud-native network functions and applications (VNF/CNF) to the end device - all in a fully automated manner. Extensive RESTful API and automation capabilities allow the joint solution to be integrated into Telco Continuous Integration and Delivery (CI/CD) pipelines and provide an essential Continuous Testing (CT) component. Gabriel Chiriacescu, Mobileum's SVP for Testing and Service Assurance said: "The virtualized network infrastructure is the foundation on which 5G and future 6G cellular networks are being built. Assuring the NFVI's strict SLAs are met should be top of mind for all communication service providers. Together with VoerEir, we are proud to offer our global customers a best-in-class solution that ensures their next-generation networks are performing as expected." We are excited to announce this cooperation with Mobileum, which will provide our customers with the most comprehensive end-to-end testing solution for network applications (VNF/CNF), infrastructure (NFVI), and devices. VoerEir has been working steadily over the past six years to develop the best automated NVFI performance testing solution in the industry, and thanks to this partnership, we can prepare for the next level of growth." Javier Garcia Gomez, VoerEir´s CEO VoerEir's Touchstone Platform enables Telco operators to facilitate the benchmarking of multiple telco cloud environments spanning across multiple data centers. It provides support for Openstack and Kubernetes environments using an advanced test engine developed by VoerEir. The Touchstone platform includes a wide array of features for environment benchmarking, report management, and Enhanced Platform Aware (EPA) test suites. It is a leading-edge platform for cloud environment test automation, benchmarking, certification, and validation. The Mobileum-VoerEir partnership marks an important breakthrough for operators looking to accelerate their 5G rollouts and scale 5G and Edge testing capabilities. It also highlights Mobileum's open collaboration strategy of working alongside technology partners to integrate and expand its analytics capabilities to help CSPs meet their subscribers' rising service performance standards and expectations. About Mobileum Inc. Mobileum is a leading provider of Telecom analytics solutions for roaming, core network, security, risk management, domestic and international connectivity testing, and customer intelligence. More than 1,000 customers rely on its Active Intelligence platform, which provides advanced analytics solutions, allowing customers to connect deep network and operational intelligence with real-time actions that increase revenue, improve customer experience, and reduce costs. Headquartered in Silicon Valley, Mobileum has global offices in Australia, Germany, Greece, India, Portugal, Singapore, UK, and United Arab Emirates. About VoerEir AB VoerEir AB offers Touchstone, a test tool to facilitate telco cloud testing, deployment, and operation. VoerEir is headquartered in Kista (Sweden) and supplies its test suite and services to Tier-1 Telecommunication Operators and Vendors operating in several countries in Europe, the Middle East, and Asia.

Read More

VMware

STL, VMware and ASOCS unveil end-to-end 5G Enterprise solution at MWC 2022

Sterlite Technologies Ltd. (STL) | March 04, 2022

STL, an industry-leading integrator of digital networks, together with ASOCS and VMWare, announced the launch of industry's first end-to-end 5G Enterprise solution to address the growing demand for private 5G enterprise connectivity for campus, industrial and venue applications. Unveiled at MWC 2022, where STL demonstrated its All-in 5G offerings, this 5G Enterprise solution will comprise Garuda, STL's O-RAN 5G indoor/outdoor small cells, CYRUS, Open Distributed Unit and Centralised Unit from ASOCS and VMware Edge Compute Stack as the virtualization layer and cloud management . 5G Enterprise networks have proven to be game changers for businesses and are set to have a market value of US$ 14 billion by 2028. These future-ready 5G networks will be enabled by open standards-based architectures and will be able to handle dense environments required for seamless indoor coverage. STL's Garuda small cell radio is ideal for small, medium and large enterprises, supporting more than 30 concurrent user devices per radio. ASOCS' CYRUS, a fully virtualized O-RAN CU/DU enterprise solution, delivers standalone and 5G connectivity in a single software stack. VMware Edge Compute Stack is an edge computing solution that helps to build, run, manage, and protect edge-native applications at the Near and Far Edge. The combination of STL, ASOCS and VMware offers a powerful on-premise fully virtualized and open RAN 5G solution on general purpose servers; this solution can be hosted alongside enterprise IT infrastructure on general purpose commercial off-the-shelf (COTS) servers, seamlessly blending with an enterprise's existing infrastructure. In December 2021, STL & ASOCS had jointly demonstrated the 5G enterprise use-case as a part of the O-RAN Alliance annual plugfest, including the interoperability of Garuda with ASOCS' Distribution Unit/Centralised Unit. Our strong partnership with STL and VMware brings a strong end-to-end Private 5G enterprise network solution which we already see being adopted in Smart Manufacturing and the digital transformation to Industry 4.0. With our CYRUS virtual RAN solution along with STL's Garuda and computation at the edge with VMware, enterprises will be able to easily deploy and manage 5G networks with high high-performance level, security, and flexibility." Gilad Garon, ASOCS CEO Commenting on the solution, Muneyb Minhazuddin, vice president of edge strategy, VMware, said: "We are delighted to associate with STL and ASOCS to bring the 5G enterprise networks solutions to provide compelling benefits to businesses. VMware Edge Compute Stack provides a purpose-built, integrated VM and container-based stack that enables organizations to deploy and secure edge-native apps at the far edge. It will complement STL's Garuda and ASOCS' CYRUS in paving the way for more seamless 5G enterprise connectivity." Speaking on the collaboration, Chris Rice, CEO, Access Solutions, STL, said: "This collaboration is a testament to the benefits of open networking principles - bringing three partners together to offer a very powerful solution to address various 5G Enterprise opportunities, globally. Enterprises will now be able to leverage a robust, secure 5G network that is easy to scale and upgrade and drives greater levels of service efficiency." About STL - Sterlite Technologies Ltd STL is a leading integrator of digital networks providing All-in 5G solutions. Our capabilities across wireless connectivity, optical networking, software, and services, place us amongst the top 5G RAN vendors by Gartner. These capabilities are built on open-source and converged architectures helping telcos, cloud companies, citizen networks, and large enterprises deliver next-gen experiences to their customers. STL partners with service providers globally in achieving a green and sustainable digital future in alignment with UN SDG goals. STL has a strong global presence in India, Italy, the UK, the US, China, and Brazil.

Read More

VMware

Arrcus and VMware Enable Operational Agility with Hyperscale Networking Solution

Arrcus | March 01, 2022

Mobile World Congress 2022 – Arrcus’ virtualized routing solution, Arrcus ACE 2.0, is now interoperable with VMware Telco Cloud Platform, enabling service providers to dynamically direct network traffic to the compute environment that best meets workload requirements. The solution gives flexibility and operational agility as they deploy a variety of workloads across private, public and edge clouds. The next generation of modern apps requires a modern networking architecture. One that can deliver reliable scale, predictable performance, and seamless orchestration. Running Arrcus ACE 2.0 on VMware Telco Cloud Platform, service providers can modernize their network to become more dynamic, scalable and efficient.” Lakshmi Mandyam, vice president of product management and partner ecosystems, Service Provider & Edge, VMware VMware Telco Cloud Platform provides a single platform on top of which service providers can run and manage all containerized network functions (CNFs) and virtualized network functions (VNFs). Arrcus ACE 2.0 provides a multi-cloud networking (MCN) platform that enables organizations to tightly integrate their data center network and public cloud infrastructure. By running Arrcus ACE 2.0 on VMware Telco Cloud Platform, service providers can take a more discreet approach to route optimization for specific data from source to destination, such as routing hyperscaler specific traffic to improve performance, scale, and efficiency of data plane communication. Sreekanth Kannan, vice president of product management and marketing at Arrcus, said, “We are seeing a convergence of networking and compute transformation driven by the emergence of modern apps. Arrcus and VMware are partnering to help global enterprises and telecommunication service providers to navigate these shifts and set them up to deliver new services more efficiently and cost-effectively to their customers.” Arrcus is proud to announce it has grown the partnership with VMware by joining the VMware Technology Alliance Partner (TAP) program and is now a certified member of the “Ready for Telco Cloud” program. Arrcus ACE platform, based on modern architectural tenets, is a fully programmable, massively scalable, modular, extensible software that enables customers to cost-effectively design, deploy and manage their network infrastructure. VMware’s Technology Alliance Partner (TAP) program enables hardware and software vendors with the tools and resources they need to build and deliver their solutions on VMware infrastructure. Partners can develop, test, integrate, certify/validate and package products with VMware products and services and then publish their joint solutions on the VMware Marketplace to our shared customers. Arrcus achieves “Ready for Telco Cloud” certification. The VMware Ready for Telco Cloud program certifies that Arrcus network functions interoperate with the VMware Telco Cloud platform to support communications service providers to accelerate the deployment of 5G workloads and more. The Arrcus ACE platform is now available in the VMware Marketplace for immediate consumption. About Arrcus Arrcus was founded to enhance business efficiency through superior network connectivity. The Arrcus Connected Edge (ACE) platform offers best-in-class networking with the most flexible consumption model at the lowest total cost of ownership. The Arrcus team consists of world-class technologists who have an unparalleled record in shipping industry-leading networking products, complemented by industry thought leaders, operating executives, strategic partners and top-tier VCs. The company is headquartered in San Jose, Calif.

Read More

Virtual Server Infrastructure

Mobileum and VoerEir Partner to Provide End-to-End Service Assurance and Network Function Virtualization Infrastructure Testing and Benchmarking

Mobileum | February 25, 2022

Mobileum Inc., a leading global provider of analytics solutions for roaming and network services, security, risk management, testing and service assurance, and subscriber intelligence, is pleased to announce their technology partnership with VoerEir, an award-winning edge cloud technology company. The partnership between Mobileum and VoerEir creates the most comprehensive and powerful test platform for end-to-end Service Assurance and network function virtualization infrastructure (NFVI) benchmarking, certification, and validation. Combining Mobileum's SITE active test solution with VoerEir's TOUCHSTONE test suite provides a vertically integrated, full-stack testing solution that enables Communication Service Providers (CSPs) to test services and infrastructure from end-to-end. From the lab to the live network and from virtual and cloud-native network functions and applications (VNF/CNF) to the end device - all in a fully automated manner. Extensive RESTful API and automation capabilities allow the joint solution to be integrated into Telco Continuous Integration and Delivery (CI/CD) pipelines and provide an essential Continuous Testing (CT) component. Gabriel Chiriacescu, Mobileum's SVP for Testing and Service Assurance said: "The virtualized network infrastructure is the foundation on which 5G and future 6G cellular networks are being built. Assuring the NFVI's strict SLAs are met should be top of mind for all communication service providers. Together with VoerEir, we are proud to offer our global customers a best-in-class solution that ensures their next-generation networks are performing as expected." We are excited to announce this cooperation with Mobileum, which will provide our customers with the most comprehensive end-to-end testing solution for network applications (VNF/CNF), infrastructure (NFVI), and devices. VoerEir has been working steadily over the past six years to develop the best automated NVFI performance testing solution in the industry, and thanks to this partnership, we can prepare for the next level of growth." Javier Garcia Gomez, VoerEir´s CEO VoerEir's Touchstone Platform enables Telco operators to facilitate the benchmarking of multiple telco cloud environments spanning across multiple data centers. It provides support for Openstack and Kubernetes environments using an advanced test engine developed by VoerEir. The Touchstone platform includes a wide array of features for environment benchmarking, report management, and Enhanced Platform Aware (EPA) test suites. It is a leading-edge platform for cloud environment test automation, benchmarking, certification, and validation. The Mobileum-VoerEir partnership marks an important breakthrough for operators looking to accelerate their 5G rollouts and scale 5G and Edge testing capabilities. It also highlights Mobileum's open collaboration strategy of working alongside technology partners to integrate and expand its analytics capabilities to help CSPs meet their subscribers' rising service performance standards and expectations. About Mobileum Inc. Mobileum is a leading provider of Telecom analytics solutions for roaming, core network, security, risk management, domestic and international connectivity testing, and customer intelligence. More than 1,000 customers rely on its Active Intelligence platform, which provides advanced analytics solutions, allowing customers to connect deep network and operational intelligence with real-time actions that increase revenue, improve customer experience, and reduce costs. Headquartered in Silicon Valley, Mobileum has global offices in Australia, Germany, Greece, India, Portugal, Singapore, UK, and United Arab Emirates. About VoerEir AB VoerEir AB offers Touchstone, a test tool to facilitate telco cloud testing, deployment, and operation. VoerEir is headquartered in Kista (Sweden) and supplies its test suite and services to Tier-1 Telecommunication Operators and Vendors operating in several countries in Europe, the Middle East, and Asia.

Read More

Events