Total Members: 5470

This community is proudly sponsored by :

Cloud Service Community Blogs

Let's hear what you have to say...

4 NFV Myths Debunked

Mitch Auster is Senior Director in the Technology Office for Ciena's Agility division, with responsibilities spanning software-defined networking and network functions virtualization, predictive analytics, cloud networking, and related software solutions. This article was originally posted on Network Computing (@networkcomputin)   Remember the good old days, when transformative networking concepts only came around every five to ten years? Now, even before the marketplace has come to grips with software-defined networking (SDN), along comes network functions virtualization (NFV). As with SDN, many vendors claim to have a standards-based, open NFV solution ready to go and render current networks obsolete. While the industry certainly...
Continue reading
746 Hits

A New Dynamic Security Model for NFV Enabled Environments

Priya Natarajan is Senior Director of Marketing for Ciena Agility, and an expert on the topics of SDN, NFV, cloud and security. You can find her on Twitter at @NatarajanPriya.    As organizations move from private cloud to public or hybrid cloud, securing the data while still providing access to legit users requires carefully planned security. It is important to effectively block unapproved traffic from reaching the network, including the incessant packets, pings and probes that are constantly poking a network’s edge. In this Ciena guest blog,  John Hayes, CTO of BlackRidge Technology, a Ciena Agility Matrix NFV partner, talks about the need...
Continue reading
652 Hits

Ciena Agility and Silver Peak: Changing the Rules in NFV

Priya Natarajan is Senior Director of Marketing for Ciena Agility, and an expert on the topics of SDN, NFV, cloud and security. You can find her on Twitter at @NatarajanPriya. With branches, head offices and data centers distributed all over the global map and endless variety of applications deployed and consumed by employees, the WAN becomes a critical element in unifying them. Users need access to their data anytime from anywhere instantaneously. Instead of deploying more and more bandwidth to meet these demands, it is far more efficient to optimize existing resources and scale in a meaningful manner. Key benefits from using...
Continue reading
1228 Hits