main

DDoSSDNSecurityWAF

Orchestrating Flows for Cyber

January 24, 2018 — by Edward G. Amaroso0

sdn-960x463.jpg

There is a great scene in the movie Victor, Victoria, where the character played by James Garner decides it’s time to mix things up a bit. So, he strolls into an old gritty bar wearing a tuxedo, walks up to the bartender, and orders milk. Within minutes, the other men in the bar decide they’ve had enough of this, and they start an intense bar fight. Garner is soon throwing and taking punches, getting tossed across the floor, and loving every minute of it.

Application DeliveryDDoSSDNSecurityService ProviderWPO

Your Favorite Posts of 2015

December 30, 2015 — by Radware1

Over the past twelve months, our team of authors has offered advice, expertise, and analysis on a variety of topics facing the application delivery and security communities.  The articles below are the most read and shared ones we published this year.  Our goal was (and is) to share our experience and knowledge so you, our readers, can better prepare, implement, and gain insights that you can apply to your business.

Application DeliverySDN

Application Delivery Controllers and Software-Defined Networking: SDN is a Layer 2–7 Industry Now

November 5, 2015 — by Shamus McGillicuddy0

Software-defined networking (SDN) started out as an architecture for solving the inefficiencies of Layer 2/3 networks. SDN initially neglected the rest of the Open Systems Interconnection (OSI) stack, but that should change quickly as application delivery controllers (ADCs) and other network services expand their involvement in the SDN industry.

Application DeliverySDN

Application Delivery Controllers in an SDN World – Programming the Network?

November 4, 2015 — by Prakash Sinha0

Over the past several years, server virtualization has led to consolidation of physical server resources to reduce cost and enable flexibility by allowing applications to be virtualized and distributed.

A similar trend is underway for networks – traditional networks are now becoming more dynamic to lower cost and reduce vendor lock-in. The two key efforts of note: Software Defined Networking (SDN), which brings standardization through APIs, and Network Function Virtualization (NFV) that allows operators to quickly enable value-added services.  The NFV initiative is highly complementary to SDN.

SDNSecurity

Why You Should Plan Now for SDN-Enabled Network Security

October 14, 2015 — by Louis Scialabba0

Software Defined Networking (SDN) is a hot topic for carriers and most service providers are somewhere in the process of figuring out how to take advantage of this technology.  SDN’s design can help to overcome the network challenges that accompanied the explosive growth of video, mobility and cloud services. Major Tier 1 telecoms across the globe are already implementing capabilities to reduce costs and add more flexibly to their managed services.

Application DeliveryNFVSDNSecurity

Leveraging SDN and NFV for Comprehensive and Cost-effective Cyber Network Defense & Application Delivery

May 12, 2015 — by Mike O'Malley2

Last week I spent a few days in sunny (and crowded) San Jose, California at the NFV World Forum.  The theme this year was largely about open environments and interoperability, ushered on by the standardization efforts behind NFV, along with the related topics of carrier-grade service assurance and reliability.  I was fortunate to speak about how Radware is actively investing in open environments as the architecture becomes common platforms for commercial implementations.  Radware is implementing SDN and NFV in network security and application delivery domains to help service providers achieve radical cost reduction while benefitting from the advantages of cloud-based application services.

SDNSecurity

What’s the Relationship Between Security and SDN Deployment?

April 10, 2015 — by Jim Metzler3

A couple of years ago the discussion of SDN focused primarily on the fact that SDN separated the network control function from the network forwarding function and that separation of functions might require the introduction of new protocols such as OpenFlow. More recently there has been a lot of discussion about the value of an overlay SDN model vs. an underlay SDN model and the role of specialized hardware in either model. All of these discussions are important and they all are focused on key architectural characteristics of SDN.

Application DeliveryNFVSDN

NFV: What You Should Consider in Your ADCs

March 12, 2015 — by Jim Frey0

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger.

Network functions virtualization (NFV) is one of the best-accepted and most-understood spinoffs of the SDN craze that has taken root over the past few years. The concept is straightforward: take features and capabilities that are typically implemented in the network and repackage them in forms that can be invoked automatically, without requiring the deployment of new hardware.

Application DeliverySDN

SDN Use Cases: Myths and Realities

February 25, 2015 — by Jim Frey0

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger.

There were a lot of promises made when software-defined networking (SDN) first came onto the scene, and while some real benefits have been experienced, not all promises have been realized, or were even realistic. Such is commonly the case with new technologies: the initial hype exceeds the reality of the situation, but usually there are reasons to hold firm to the trend and take advantage of what the technology does deliver successfully.

SDN

Transformation of the Data Center & Building the Private Cloud, Part 2

December 16, 2014 — by Jim Frey0

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger.

In Part 1 of this blog, we looked at the growing adoption of cloud and Software-Defined Datacenter (SDDC), but also the fact that network virtualization choices are many and varied, creating some uncertainty regarding how to proceed.  In part 2, we will look at network virtualization options and how to align for best success.