Home SDN

SDN

Leveraging SDN and NFV for Comprehensive and Cost-effective Cyber Network Defense & Application Delivery

Last week I spent a few days in sunny (and crowded) San Jose, California at the NFV World Forum.  The theme this year was...

What’s the Relationship Between Security and SDN Deployment?

A couple of years ago the discussion of SDN focused primarily on the fact that SDN separated the network control function from...

NFV: What You Should Consider in Your ADCs

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger. Network functions virtualization (NFV) is...

SDN Use Cases: Myths and Realities

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger. There were a lot of...

Transformation of the Data Center & Building the Private Cloud, Part 2

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger. In Part 1 of...

Transformation of the Data Center & Building the Private Cloud (Part 1)

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger. In order to remain engaged...

The Year of the (SDN) App

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger.While there is still work...

Empowering via Orchestration

As solution innovators we design towards compelling goals in emerging markets that are proven multiple times -- all prior to broad adoption. ...

How Can NFV Help Service Providers?

In nearly every country I traveled to in the past two quarters, the same vision repeated itself:   giant billboards promoting 4G mobile...

Accelerating Enterprise’s Effectiveness – Automating IT Services Without Increasing Cost

Yesterday morning, Alcatel-Lucent unveiled new software defined networking (SDN) technologies for the OmniSwitch Ethernet LAN portfolio of its Enterprise division that will help ...

Mass Market Tipping Point for SDN, NFV and Orchestration

It has been just more than six months since we finished our first commercial Software defined networking (SDN) product launch.  Prior,...

Virtualization and network programmability, according to SDN and NFV

Vendor-driven network overlay techniques, programmability via proprietary APIs for existing switches, and manual reprogramming to route traffic are some of the options...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.