Loading...

Follow 128 Technology on Feedspot

Continue with Google
Continue with Facebook
or

Valid
Leading enterprise mobility integration provider to offer software-centric SD-WAN to customers

BURLINGTON, Mass.– 128 Technology, the leader in Session Smart routing, and Optical Phusion, Inc. (OPI), a self-service kiosk, enterprise mobility and wireless technology integration solutions company, today announced a partnership to distribute a SD-WAN solution powered by 128 Technology’s Session Smart Router. This partnership enables OPI to enhance its connectivity platform for enterprise customers, simplifying the complexities of integrating cloud communications solutions into IP networks.

OPI is the latest provider to join the 128 Technology Solution Partner Program, which enables service providers to create new revenue streams by leveraging 128 Technology’s 128T Networking Platform. With more than 15 years of industry experience, OPI helps customers manage the entire lifecycle of their enterprise mobility, interactive kiosk, product service systems, radio frequency identification, mobility and wireless technology projects with innovative, application-driven solutions. 128 Technology’s Session Smart Routing solution will help OPI enhance offerings across the business spectrum with increased mobility, speed and flexibility of wireless for customers in retail, manufacturing, warehousing, finance, legal, insurance and more.

The partnership with 128 Technology allows OPI to offer an expanded connectivity platform based on 128 Technology’s agile WAN connectivity, which is built for today’s business applications and services and includes enhanced performance and security compared to competing hardware-based approaches to SD-WAN.

“OPI kiosks are one of the key ways retailers can enhance the customer experience with services like promotional video presentation, coupon printing, loyalty registration and price verification. However, having remote kiosks that require their own internet and connectivity can prove challenging for many networks,” said Tony Rivers, VP Sales and Business Development. “We are excited to partner with 128 Technology and leverage the 128T Networking Platform solution to enhance our customers’ productivity, bandwidth efficiency and profitability.”

“OPI has an extensive array of products and services to meet the broad opportunities in the marketplace. Partnering with 128 Technology will benefit its customers by helping future-proof their networks with a truly software-centric approach to SD-WAN.” said Andy Ory, Chief Executive Officer, 128 Technology. “We look forward to delivering on our promise to OPI’s customers by providing an SD-WAN solution that transforms the network for today’s business needs.”

To learn more about 128 Technology’s 128T Smart Router and Session Smart Technology, visit here.

About OPI
Optical Phusion, Inc. (OPI) is a self-service kiosk, enterprise mobility and wireless technology integration solutions company that helps customers manage the entire lifecycle of kiosk and wireless technology projects with application-driven solutions for a range of markets specializing in retail, logistics and field sales organizations. Its mobile device management solution supports a broad range of kiosk and enterprise mobile assets. OPI has implemented a variety of Kiosk systems for promotional Video presentation, Coupon Printing, Loyalty Registration and Price Verification. OPI’s creative kiosk designs, quality manufacturing and experience with critical components will deliver a responsive solution to your needs, reduced total cost of ownership (TCO) and greater return on investment (ROI).

Productivity, efficiency and profitability are coveted goals for every business. Mobility and wireless technology can impact these crucial areas in powerful ways, especially for companies that partner with Optical Phusion.
We are experts in helping our customers manage the entire lifecycle of their enterprise mobility and wireless technology projects.

To learn more about OPI, visit https://www.opticalphusion.com/.

About 128 Technology
128 Technology makes your network do what your business needs, by changing the way networks work. Our professional grade software teaches routers the language of applications and services, letting them understand the requirements of individual services and segments, and adapt the network dynamically to deliver what the business needs, when and where it needs it. We make routers Session Smart, enabling enterprise customers and service providers to create a service-centric fabric that’s more simple, agile, and secure, delivering better performance at a lower cost.

The post 128 Technology and Optical Phusion, Inc. Announce Partnership for Reliable, Secure SD-WAN Solution appeared first on 128 Technology.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
The solution provides secure and reliable edge-to-cloud connectivity with guaranteed quality of service specifically optimized for UC services

LOD, Israel and BURLINGTON, Massachusetts —

Highlights

  • AudioCodes Mediant 800, hosting 128 Technology’s SD-WAN solution, gives service providers and enterprises a versatile, integrated appliance, eliminating the need for multiple boxes
  • Tunnel-free SD-WAN implementation brings unique values of low bandwidth and session resilience and offers sub-second transition between WAN interfaces
  • The unified solution supports session border controller (SBC) and media gateway, and enables service resiliency for large enterprises deploying Microsoft Teams and Skype for Business
  • Superior resiliency made possible via multiple independent WAN interfaces in a single box
  • Single pane of glass for management, configuration and monitoring of the SD-WAN application and the Mediant SBC/gateway application

Details

128 Technology, the leader in Session Smart routing, and  AudioCodes (NASDAQ: AUDC), a leading vendor of advanced voice networking and media processing solutions for the digital workplace, today announced the introduction of an integrated SD-WAN solution to support business voice, video and data needs. The joint solution features multiple WAN access interfaces, dynamic multi-path routing, session border controllers (SBC), and VoIP media gateways, all on a single AudioCodes Mediant 800 platform. Targeted for global enterprises, medium and small businesses and service providers, it enables secured and cost-effective branch-to-branch, branch-to-data center and edge-to-cloud connection, as well as unified communications (UC) service delivery, all in a single integrated appliance.

The 128 Technology solution combines session-awareness, service-centric segmentation, waypoint routing and metadata to provide a tunnel-free SD-WAN solution. This reduces bandwidth usage by 30-50%, leading to lower connectivity costs, lower congestion, improved application performance and improved throughput. The tunnel-free solution removes the need for hub-and-spoke architectures that cause unnecessary latency, and enables sub-second failovers between underlying WAN interfaces.

AudioCodes’ integrated SBC facilitates smooth and hassle-free interoperability between local IP-PBXs (such as Microsoft Skype for Business Server, Cisco, Avaya, NEC and many more) and service provider networks, including certified Direct Routing SBC connectivity with Microsoft Teams. Additionally, the Mediant 800 features a variety of WAN interfaces (T1, xDSL, Ethernet, fiber and 4G/LTE), as well as multiple PSTN interfaces (FXS, BRI and PRI) and multiple LAN ports with optional PoE. This unique solution gives service providers a versatile product for multiple customer configurations, eliminating the need for multiple boxes on customer premises.

AudioCodes’ One Voice Operations Center (OVOC), a voice network management solution that combines management of voice network devices and quality of experience monitoring into a single, intuitive web-based application, was adapted to integrate 128 Technology’s Conductor. The Conductor is an authority-wide orchestration and automation service, providing topology, policy management, centralized visibility and an analytics engine. By making all this information available in a single pane of glass, the end customer has an advanced management tool for both data and voice services.

“Partnering with AudioCodes helps us bring our SD-WAN solution to a wider enterprise and cloud service provider market due to its wide range of voice and data networking products,” said Andy Ory, CEO at 128 Technology. “The complex demands of today’s IP-based communication systems have increased the importance of strong alliances between vendors offering complementary solutions. It’s critical that a company’s networks operate efficiently and securely while minimizing additional costs, and that’s what our partnership is designed to achieve.”

“As a worldwide market leader in enabling UC for both enterprises and service providers, the need for reliable and secure UC delivery from private and public clouds over broadband internet connections becomes more and more evident to us,” said Lior Aldema, EVP and Chief Business Officer at AudioCodes. “We are happy to partner with 128 Technologies to bring a uniquely efficient SD-WAN solution which, in conjunction with our Mediant 800, provides an all-in-one appliance that satisfies all the communication needs of a typical branch office or small business.”

To learn more about 128 Technology’s 128T Smart Router and Session Smart Technology, visit here.

For more information on AudioCodes’ Mediant 800, visit here.

About 128 Technology

128 Technology makes your network do what your business needs, by changing the way networks work. Our professional grade software teaches routers the language of applications and services, letting them understand the requirements of individual services and segments, and adapt the network dynamically to deliver what the business needs, when and where it needs it. We make routers Session Smart, enabling enterprise customers and service providers to create a service-centric fabric that’s more simple, agile, and secure, delivering better performance at a lower cost.

To learn more about 128 Technology, visit www.128technology.com and follow the company on TwitterLinkedIn and Facebook.

About AudioCodes

AudioCodes Ltd. (NASDAQ: AUDC) (TASE: AUDC) is a leading vendor of advanced voice networking and media processing solutions for the digital workplace. AudioCodes enables enterprises and service providers to build and operate all-IP voice networks for unified communications, contact centers, and hosted business services. AudioCodes offers a broad range of innovative products, solutions and services that are used by large multi-national enterprises and leading tier-1 operators around the world.

For more information on AudioCodes, visit http://www.audiocodes.com.

The post 128 Technology and AudioCodes Introduce an Integrated SD-WAN Solution for Resilient Unified Communications Services appeared first on 128 Technology.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

SD-WAN is may be the hottest topic in networking right now. You’ve probably heard that SD-WAN optimizes networks, simplifies operations, and reduces expenditures leading to a more powerful, cost-effective network. You may also hear buzz about potential security concerns with deploying software-defined networks. In order to effectively mitigate any new risks that may be posed, enterprises must come to understand “two truths” about SD-WAN security.

  1. If a network doesn’t know what’s right, it can never know what’s wrong.
  2. If network activity can happen without any record of it, then malicious behaviors will be among the network activity

Tom Nolle, President of CIMI Corporation and member of 128 Technology’s technical advisory board, along with Prashant Kumar, Co-founder and Vice President of Product Management at 128 Technology, recently engaged in an in-depth discussion (click here to watch the full webinar) to shed light on the two truths, as well as share some best practices for implementing SD-WAN. We’ve put together a summary of their webinar to give you the highlights until you can listen to it in its entirety.

“We believe in these truths, and we believe our implementation of SD-WAN sets us apart in terms of security. It is these truths that you should be thinking about if you are planning to implement SD-WAN.”

– Prashant Kumar, Co-Founder and VP of Product Management, 128 Technology

THE FIRST TRUTH If a network doesn’t know what’s right, it can never know what’s wrong.

If you look at any of the most recent high-profile hacks outlined in the figure below, you will see they were large-scale attacks with millions of users compromised. In each case, several preventative measures were in place including firewalls, next generation firewalls (NGFW), anti-SPAM and SEIM solutions.

So, the question is: why are these attacks happening if networks are secured? The answer? Because you can’t understand what you don’t see. Unless you know precisely what services and applications are running on your network, it’s almost impossible to differentiate legitimate traffic from malicious requests.

Recent Hacks:

To best protect your network, you’ll not only need to know who the specific users are that have permission to access to it, but it’s critical to understand the correct destinations for traffic requests. That way you can ensure that the right resources are being accessed by the right users. Additionally, an intelligent session-based router can differentiate whether traffic is encrypted or not by leveraging adaptive encryption. It only encrypts the traffic in question so you won’t have to spend valuable time or budget on unnecessary encryption, while still being confident that your data is secure.

The question often arises if the first truth only applies to North-South traffic, which comprises requests that travel from the LAN to the WAN. The answer is No. East-West traffic refers to that which comes from within your network; for example, accessing data within an internal database. Since 60% -80% of attacks originate from inside the network, it is essential to monitor both North-South and East-West traffic as part of your overall SD-WAN security strategy.

THE SECOND TRUTH If network activity can happen without any record of it, then malicious behaviors will be among the network activity.

Now that we know why it’s critical to take proactive measures to successfully distinguish between good and bad traffic, let’s explore why it’s just as important to have a record of everything so you can recognize threats before they attack. Intelligent journaling, or recording the behavior of your network traffic, is the key to supporting the two truths. If you define the rules for traffic flow, you’ll know precisely what is allowed and what isn’t allowed on your network. Journaling is the mechanism to seeing what’s happening behind the scenes.

A typical security breach usually involves many repetitive attacks, so it’s rare that a cyber criminal haphazardly gains entrance to a secure network. By documenting network activity through intelligent journaling efforts, you can easily identify repeated attempts to execute something nefarious on the network. With that information, you can determine if a malicious user is responsible, or if an insider unknowingly downloaded malware. Then you can respond accordingly. However, not all IT managers keep detailed logs of network traffic.

Years ago, the common thinking was that if you treated IP connectivity simply as random, individual packets floating around, it was nearly impossible to manage. Our philosophy is that applications are best understood in terms of sessions, or a persistent relationship between two entities in a network, usually between a user and an application. If you focus journaling efforts on session attempts instead of individual packets, you can quickly reduce the overhead needed to record every single packet behavior. And when you pair journaling with a session-aware capability, you’ll know exactly what is happening on the network at any time.

One best practice that complements journaling, is to segment, or divide the network into zones based on the services and applications. Security zones help to reduce the attack surface by limiting the lateral movement of traffic across the network. Segmenting networks in such a way ensures that if there is an attack in one segment, it’s contained and doesn’t spread to other areas of the network.

Real-world Example

One of Tom Nolle’s enterprise clients performed a comprehensive security audit of its network, focusing on available access to the entire suite of applications. Of the permitted access to applications:

    • Only 3% were accessed by appropriate users
    • About 9% were only occasionally used for business

The remainder of the permitted applications (88%) were unknown and should not have been on the network in the first place.

CONCLUSION

A software-defined solution may be your next step toward greater efficiency and agility. However, to conduct business securely, especially in highly regulated industries like healthcare and financial services, the practice of permissive activity is not enough in today’s environment. A more proactive, session-based approach to security – that supports the two truths – is the best way to keep a watchful eye on everything that happens on the network.

Making the right SD-WAN security choice depends on your business objectives. But one thing is certain. You’ll need innovative capabilities that will meet your security needs both today and tomorrow. Our SD-WAN solution is based on the 128T Session Smart Router that’s helping to close the gap between what your customers need and what your network can deliver, so you can continue to move at the speed of business.

To learn more about the value-added benefits of the 128T Session Smart Router and how it supports the tenants of the two truths, please visit 128technology.com/product-overview.

Listen to the full webinar, “The Truth About SD-WAN Security,” here:

The post Blog: Uncovering the “Truths” about SD-WAN Security: The Summary from Our Thought-Provoking Webinar appeared first on 128 Technology.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

I learned something over the past few weeks that really surprised me, and I wanted to share it with the 128T community. I discovered that HTTPs proxies are transparent – and it’s even more prevalent than you might think.

Transparent HTTPs proxies (also called SslBump) intercept your encrypted Internet communications without your knowledge. Even if you do not configure an outbound proxy, and you do not submit to mobile device management, and even without you ever agreeing in any way, a firewall can mimic the original TLS/SSL server certificate when bumping traffic [this article explains in much more detail].

And your browser will not warn you or indicate that anything is amiss. Palo Alto performs the exact same capability, as do most next-generation firewalls. The firewall actually terminates the inbound TCP connection and issues its own client certificate to the secure website. Upon receiving the server certificate, it actually “on the fly” creates a new server certificate by scraping out the text information from the actual server certificate. This new certificate, created on the fly, passes all of the tests for validity on your endpoint, because the firewall has been endowed as a subordinate certificate authority, or sub-CA, from a trusted CA. But none of the information in the created certificate is truly valid. [watch this video for specifics].

The following table provides a summary of how typically the fields from the original certificate are used by the transparent proxy to create the new certificate:

X.509 Certificate Property After Successful TLS/SSL Bumping
Common Name (CN) By default, True CN is used. Is overwritten sometimes
Alias True alias
Subject Name True subject name by default. Is overwritten sometimes
Subject Alternative Name True names, if any, by default
Signer and Signature Self-signed CA or the sub-CA, as configured on the transparent proxy. Signature is generated using the private key of the self-signed CA or the sub-CA.
Issuer Name The subject name of the signer certificate
Serial Number 20-byte SHA1 hash, generated on the transparent proxy
Validity Dates By default, true dates, copied from the original certificate
Version By default, true version, copied from the original certificate

I decided to figure out how I could easily become a sub-CA and get a self-signed certificate, and learned the process is quite easy [check out this article]. To do this correctly, I might have to actually spend money on getting a real CA certificate, but otherwise there appears to be very little oversight of the process.

I am disturbed at how easy it is to insert a “man-in-the-middle” of any highly valuable encrypted communication, but the truly shocking aspect is how easy it is to create a false certificate to trick or fool a browser into providing an “all is good” signal to the clients browser. The value of encryption when a “man-in-the-middle” can secretly read or observe information passing between them surprised me. I believed that without an outbound proxy configuration I was safe, and my browser would warn me of threats.

On March 21 of this year, TLS1.3 was finalized, and is now the standard for session layer encryption. TLS1.3 encrypts the server certificate, making it impossible to passively decrypt sessions for analytics. This was as far as they went to prevent a “man-in-the-middle”. It is unlikely that any new standards will emerge that can provide a guarantee that there are NO men hanging out somewhere in the middle.

Obviously, your client/server applications can inspect the certificates presented in detail to ensure no SslBump is on the wire, and this is good for sophisticated operations. But for generalized HTTPs services, this is not really practical.

Now here is the obvious plug for the 128T Networking Platform, but I believe you’ll find it helpful and perhaps comforting.

At 128 Technology, we created the Secure Vector Routing (SVR) protocol to drive the 128T Networking Platform, and it cannot be intercepted passively – seriously.  You see, the routers that are running SVR and bookend a 128T network will only accept security keys bilaterally, and as such no passive interception is possible. When TLS traverses a 128T network, it also cannot be intercepted for two other reasons:

  • The packet port numbers are anonymized, and the per packet HMAC calculation will detect any packet modifications and protect against replay attacks.
  • FIPS 140-2 certified per packet encryption will prevent eavesdropping.
  • The firewall detector will sense there is a firewall present, and switch the packets from TCP to UDP.

So, in my opinion, if you are sending traffic that needs super security, using the 128T Networking Platform is really the way to go.

-Patrick

The post Blog: What I Recently Learned about HTTPs Proxies appeared first on 128 Technology.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
128T Networking Platform has been certified to run on Red Hat products and technologies including Red Hat Enterprise Linux 8

BURLINGTON, Mass. — 128 Technology, the leader in Session Smart routing, today announced that it has joined Red Hat’s software partner ecosystem as a certified software partner. The 128T Networking Platform is certified to run on Red Hat Enterprise Linux 8, which provides a more consistent foundation for enterprise hybrid cloud deployments.

Unifying hardware providers, ISVs, systems integrators and public clouds, 128 Technology is now part of the IT industry’s largest commercial open source ecosystem. Serving as an entry point to this extensive network is Red Hat Enterprise Linux 8, which delivers a flexible and scalable platform for certified solutions and configurations ready to support the open hybrid cloud. 128 Technology’s Session Smart routing approach offers the tightly controlled, yet agile network enterprises need to make their network ready for multi-cloud and hybrid cloud architectures.

The 128T Networking Platform features:

  • High performance Session Smart router with tunnel-free bandwidth saving capabilities.
  • Session oriented routing that enables instantaneous failovers, session migration, duplication, resiliency, optimization and high availability.
  • Zero-trust security, hypersegmentation, L2-L4 stateful firewall, routing with words, application classification, load balancing and dynamic multi-path routing.
  • Centralized visibility and management of policies across public and private cloud environments.

“Red Hat’s customers can now more easily install and deploy the 128T Networking Platform, which is scalable and cost-efficient,” said Ritesh Mukherjee, Vice President Product Management at 128 Technology. “Our ground-breaking approach to networking provides customers a high-performance router with tunnel-free, bandwidth-saving capabilities. Our zero-trust security model offers enterprises peace of mind that their network will operate safely, delivering the functionality their business needs without interruption.”

Stefanie Chiras, vice president and general manager, Red Hat Enterprise Linux, Red Hat said, “Red Hat Enterprise Linux 8 presents IT organizations with a keystone for driving open hybrid cloud deployments, with these implementations often driven by Red Hat’s partner ecosystem. We’re pleased to collaborate with 128 Technology around the launch of Red Hat Enterprise Linux 8 and look forward to working with them as we help enterprises around the world pursue hybrid cloud and digital transformation efforts.”

To learn more about 128 Technology’s 128T Smart Router and Session Smart Technology, visit here.

About 128 Technology

128 Technology makes your network do what your business needs, by changing the way networks work. Our professional grade software teaches routers the language of applications and services, letting them understand the requirements of individual services and segments, and adapt the network dynamically to deliver what the business needs, when and where it needs it. We make routers Session Smart, enabling enterprise customers and service providers to create a service-centric fabric that’s more simple, agile, and secure, delivering better performance at a lower cost.

Red Hat and Red Hat Enterprise Linux are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the U.S. and other countries. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.

The post 128 Technology Joins Red Hat Enterprise Linux Ecosystem appeared first on 128 Technology.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

By Ritesh Mukherjee

Systems need to understand network services and path performance information, allowing them to choose the most efficient pathways efficiently, just like modern navigation systems do.

Can you recall a time when you went to a friend’s new place for dinner without consulting your smartphone? How about a time when you drove across state lines without looking at an app for directions? You probably cannot recall when that happened. Navigation systems today are fast, accurate, and reliable. They provide rich information on traffic, provide convenient voice prompts, tell us about locations, including ratings of those places, and even guide us when we make mistakes in following instructions.

The reason navigation systems have become indispensable is because they provide us with the right information when required. They don’t tell us about the traffic in London when we are trying to get from home to an office in Boston. They give us the information we need to make accurate navigation decisions.

Internet traffic has very different characteristics today compared to a decade ago. Traffic patterns have changed and traffic volumes have grown drastically. Our dependence on networks for finding faster routes has increased with real-time applications like autonomous cars and remote-assisted surgeries. This makes it imperative to have an efficient navigation system for networks. Wouldn’t it be great if each router could have a navigation system of its own? Much like the navigation systems in our smartphones and cars, these routers would be able to figure out the best paths depending on where packets need to go and localized real-time information on the pathways.

Unfortunately, legacy routing protocols that establish connectivity for most of the Internet today do not convey real-time traffic or load information. This makes it impossible to make sound decisions for navigating through network pathways efficiently. Many companies like FacebookGoogle, and others have built their own systems to convey real-time information on capacity and performance of pathways to make these decisions. Some have even eliminated traditional routing protocols within their networks. However, there are significant challenges to replacing these routing protocols on a massive scale globally. Any solution must work with existing protocols.

Traditional networking vendors have continued to invent additional protocols or extend legacy protocols to add service information or network state information. These have not found wide acceptance as they increase complexity and make networks difficult to troubleshoot. These methods also do not take into account modern developments in other fields like machine learning, artificial intelligence, big data, and high-speed databases. Handheld or car navigating systems are successful and effective because they go outside the boundaries of traditional maps and provide real-time actionable data.

There is a dire need for routers to be able to exchange service information, which is analogous to having information on locations. It’s also important for routers to exchange connection information to those services, which is analogous to traffic information to get to those locations. This information should only be shared when there are travelers or packets interested in going to those locations. Networks must perform the following functions to support modern cloud, IoT, and 5G applications:

  • Service Discovery: A method for routers to dynamically learn where services are located similar to how users search for Walmart or Target on their phones.
  • Multi-hop path selection: Routers should be able to calculate paths to these services based on real-time network loads and path performances. This is analogous to finding the best route to the local Walmart depending on road and traffic conditions.
  • Analytics and heuristics: By analyzing network performance information over time, network elements can predict future delays or loads similar to how Google maps can tell you how much time it will take to get to Walmart tomorrow at a given time.

For the foreseeable future, existing routing protocols will continue providing connectivity information across the internet. While businesses have become much more connected and service-centric over the past decades, there has been little innovation to the network. The network has only become more complex with the addition of tunnels, firewalls, load balancers and deep packet inspection – each a “band-aid” approach that doesn’t address the underlying issues. What’s really needed is innovation to the router itself.

Systems need to enable routers to learn services and path performance information, allowing them to choose pathways efficiently, just like modern navigation systems do. Next time you feel the need to whip out your smartphone and look up directions to a location, keep in mind that the routers in modern networks can benefit from a similar app too.

Ritesh Mukherjee is a Vice President of Product Management at 128 Technology.
The original article can be found here.

The post Why We Need an Efficient Navigation System for Networks appeared first on 128 Technology.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Everyone is interested in 5G these days, including both users of SD-WAN services and operators looking to integrate SD-WAN with 5G.  Most 5G stories deal with the carrier’s view of the technology, but users will never see those details.  They’ll see only the services 5G can bring them.  128 Technology already has a nice blog on the operator or “inside-out” perspective of 5G and SD-WAN.

I’m going to focus on the “outside-in” 5G service features that enterprises will see, and how 128 Technology’s implementation of SD-WAN optimizes those service features, using explicit connectivity, session awareness, and session-based policy routing.

The biggest service difference between 5G and 4G is bandwidth.  Mobile 5G is expected to offer two to five times the speed of 4G, and the “millimeter-wave” version of 5G designed to replace wireline delivery to homes and small business sites could offer ten to fifty times the speed of today’s copper-wire broadband.  For many branch offices and small sites, 5G could become the fastest network technology available, and that could change how SD-WAN is used both as a backup to wireline and as a replacement for it.

For many branch offices and small sites, 5G could become the fastest network technology available, and that could change how SD-WAN is used both as a backup to wireline and as a replacement for it.

Small-site backup using 4G isn’t common, but it’s happening.  What 5G brings is a backup option that’s more realistic, more likely to sustain operations in affected locations.  That doesn’t mean it’s identical, either in pricing or in cost, or that failing over to backup won’t create a disruption in itself.  That’s one area where your SD-WAN implementation can make or break your connectivity strategy.

When a connection fails, the applications using it will normally see the disruption and fail as well.  Tunnel-based SD-WAN may have to re-establish the tunnels as well as the sessions over them, and the combination can create a protracted outage.  128 Technology doesn’t use tunnels, and because it recognizes each authorized session individually, it can recover the session paths to reduce or even eliminate the secondary failures that can disrupt operations.  The no-tunnel approach also reduces SD-WAN overhead on backup links where bandwidth is limited or where you pay data usage charges.

128 Technology doesn’t use tunnels, and because it recognizes each authorized session individually, it can recover the session paths to reduce or even eliminate the secondary failures that can disrupt operations.

Another backup challenge that’s largely unrecognized is the change in traffic routing that usually accompanies a failover.  Both wireline and 5G access connect to the Internet and then to the company VPN.  The two access options may involve different network operators, different traffic gateways, and thus will connect to the corporate VPN in a different place.  The “optimum” path between the office whose connection has failed over and the applications and resources being used may well change, and if that change isn’t recognized, it’s likely to generate additional application latency and even traffic congestion.

With session-based policy routing, the path authorized sessions take is constantly monitored and adapted to changes in conditions.  If after backup is established for a broadband connection, the best path for a given application to take goes through a different set of SD-WAN nodes, a new route will be selected automatically, based on policies established by the SD-WAN user.  Configuration of the SD-WAN will adapt to the new access connections.

With session-based policy routing, the path authorized sessions take is constantly monitored and adapted to changes in conditions.

Policies are also important when you consider the fact that backup 5G connections may not be as fast as wireline, or may incur additional charges.  Prioritization of traffic by “type” is helpful, but every CIO knows that all phone or video calls, all access to applications, don’t have the same level of business importance even though traffic types may be the same.  With individual session awareness, users can set meaningful priorities based not only on the application, but on who’s accessing it or even when it’s being accessed.  That means that scarce backup capacity can be assigned where it does the most good.  The same mechanism can throttle traffic representing non-critical use, such as web-surfing, to reduce charges incurred during backup operation.

With individual session awareness, users can set meaningful priorities based not only on the application, but on who’s accessing it or even when it’s being accessed.  That means that scarce backup capacity can be assigned where it does the most good.

These mechanisms can also be applied where 5G is the primary site access option, to accommodate the variable capacity and latency often found in mobile networks subject to variable load.  As 5G access conditions change, these changes can trigger changes in prioritization, in how some application traffic is routed, and in whether low-priority traffic is admitted at all.

Another 5G service feature that should impact your consideration of SD-WAN features and vendors is the impact of machine-to-machine (M2M) or the Internet of Things (IoT).  It’s not likely that enterprises will install SD-WAN nodes on each of their IoT sensors, but 5G support for IoT is very likely to result in many new sites, sites where there may be no permanent staff to connect but where IoT controllers are gathering information and making process or facility changes.  Some industries, particularly utilities, could use 5G to network two to ten times the number of sites they network today.

All these new sites can create a major problem for some SD-WAN implementations.  Most tunnel-overlay SD-WAN technology has a fixed limit on the number of tunnel connections, often in the thousands.  With 128 Technology, there’s support for millions of session connections, enough to support not only a widely distributed workforce but also a large population of IoT device communities.

With 128 Technology, there’s support for millions of session connections, enough to support not only a widely distributed workforce but also a large population of IoT device communities.

5G IoT also reopens the point about route and traffic control by application session.  5G is designed to be a low-latency network technology to improve event-handling, but having low-latency access does little good if the events are held up because of congestion or inefficient routing within the SD-WAN and company VPN.  Explicit connection management by logical name, combined with explicit session-aware routing and continuous monitoring of QoS, means users can minimize latency within their SD-WAN and into the corporate VPN or cloud to reach applications.

Because most SD-WANs will have multiple paths to reach the company VPN and applications, picking the optimum one is important.  The “best” path for events may be different from the best path for normal transaction traffic because the various QoS parameters are traded in different ways.  QoS routing by application and parameter means that applications sensitive to latency or “jitter” in delay can be routed to minimize or avoid those problems.

5G will open more sites to SD-WAN as well as open new and more useful backup opportunities, but 5G is more than just plugging in a 5G modem.  It’s important that these benefits be preserved by accommodating 5G’s specific capabilities in the SD-WAN you use to connect these sites.  If you don’t your investment in 5G service, and in SD-WAN, could be at risk.

Tom Nolle is president of CIMI Corporation, a strategic consulting firm specializing in telecommunications and data communications since 1982.

The post Guest Blog: 5G and SD-WAN Inside Out and Outside In appeared first on 128 Technology.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

First up is Tim Cook, founder and chief revenue officer of Blulogix, the B2B monetization specialists. Cook explains how partners can take advantage of what he calls the “monetization moment” and discusses the on-demand Channel Partners webinar that can help our audience make a giant leap toward getting there. (Tim Cook also will be featured in an upcoming Channel Partners webinar on April 3.

Next up is Andy Ory, co-founder and CEO of 128 Technology, a company that takes a unique look at networking. Ory tells us how the surge in the use of multiple clouds is impacting the industry and how his company’s Session Smart SD-WAN is changing the game for its partner community.

Coffee with Craig and Kevin Episode No. 54: Blulogix, 128 Technology - SoundCloud
(1738 secs long, 218 plays)Play in SoundCloud

The original podcast posting can be found here.
Subscribe on iTunes or via SoundCloud.
Follow Craig and Kevin on the Coffee with Craig & Kevin Twitter page!

The post Coffee with Craig and Kevin Episode No. 54: Blulogix, 128 Technology appeared first on 128 Technology.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Combined solution allows enterprise customers to remove networking barriers to digital transformation

BURLINGTON, Mass. & MÜNSTER, Germany — 128 Technology, the leader in Session Smart routing, today announced a partnership with nicos AG, a leading managed services provider ensuring secure, global data communications with its SmartWAN Solution, to enable enterprise customers to better leverage their networks to accelerate digital transformation.

nicos AG, based in Münster, Germany, has become one of the company’s first partners in Europe and has joined the 128 Technology Solution Partner Program, which gives service providers new business opportunities by leveraging 128 Technology’s 128T Networking Platform. The 128T Networking Platform helps resolve common enterprise networking issues including bandwidth inefficiencies, security risks and high operational costs that are often barriers to digital transformation. The partnership enables not only stronger and more reliable connections but also provides global access to the best resources and technologies, combined with a customer-centric service which nicos AG and 128 Technology offer together. nicos AG has been delivering highly responsive IT services to enterprise customers for almost 20 years and will provide IT outsourcing to enterprise customers as part of this partnership.

“Our managed services guarantee the highest possible IT security and availability in data communications. Renowned, globally operating companies have relied on our know-how and expertise for almost 20 years. The Session Smart network technology of 128 Technology is an important building block for us to provide our customers with the best application performance and security available while simultaneously supporting our overall growth plans,” said Thomas Brosch, Managing Director and founder of nicos AG.

“This new partnership will serve as a reliable solution for network security and efficiency for European customers looking for agile WAN connectivity at a lower cost,” said Alex Hoffman, Managing Director of 128 Technology Germany GmbH. “Through our partnership with nicos AG, we’ll offer customers a truly smart SD-WAN solution, where their network speaks the language of applications and services and can help drive digital transformation across an organization.”

To learn more about 128 Technology’s 128T Smart Router and Session Smart Technology, visit here.

About 128 Technology
128 Technology makes your network do what your business needs, by changing the way networks work. Our professional grade software teaches routers the language of applications and services, letting them understand the requirements of individual services and segments, and adapt the network dynamically to deliver what the business needs, when and where it needs it. We make routers Session Smart, enabling enterprise customers and service providers to create a service-centric fabric that’s more simple, agile, and secure, delivering better performance at a lower cost.

To learn more about 128 Technology, visit www.128technology.com and follow the company on TwitterLinkedIn and Facebook.

About nicos AG
nicos AG has set itself the task of helping its customers to stay successful. Founded in the year 2000, we have the skills and experience to deliver high-performance secure, global networks that will enable our customers to power their business and help drive digital transformation.

Focusing our customers’ needs and demands, nicos SmartWAN Solution provides suitable solutions for all technical and organizational requirements of data networks. Our managed services portfolio includes the areas of access, infrastructure, security and cloud & virtualization.

nicos connects internationally operating companies with their branches everywhere in the world and ensures the secure operation of the data networks around the clock, 365 days a year. With more than 4,000 services at over 2,000 locations in 130 countries worldwide, nicos is one of the market leaders for carrier and provider-independent services.

The post 128 Technology Expands Leadership Position in Germany by Partnering with nicos AG appeared first on 128 Technology.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
128 Technology and Ribbon Announce Integrated SD-WAN and SBC Platform That Delivers Enhanced UC Network Performance and Lower Operational Costs for Service Providers and Enterprises

BURLINGTON, Mass. – 128 Technology, the leader in Session Smart routing and Ribbon Communications(Nasdaq: RBBN), a global software leader in secure and intelligent cloud communications today announced a new integrated solution that combines 128 Technology’s SD-WAN software with Ribbon’s market-leading session border controller (SBC) technology to help service providers and enterprises cost-efficiently improve network operations.

The combined solution is designed to solve many common cloud networking issues including bandwidth inefficiencies, security gaps and high operational costs.

The newly integrated solution makes connections to both private and public clouds simpler and more efficient, allowing communications networks and data centers to be easily interconnected to other branches. With Ribbon and 128 Technology’s combined solution, enterprises can utilize any service provider for their voice and data networks to ensure simple, fast and inexpensive deployment.

“The integration of 128 Technology’s SD-WAN solution with our SBC Edge devices allows us to deliver a new level of security, reliability and efficiency to enterprise networks” said Tony Scarfo, EVP, Products, R&D, Support and Supply Chain for Ribbon. “Together, we will accelerate the communications transformation from legacy environments to IP-based architecture in the enterprise with a full suite of advanced security and SD-WAN solutions that ensure peak-level performance for business-critical communications and applications.”

“Ribbon is the ideal partner to help strengthen and broaden our SD-WAN solutions and make this combined offering available to the global enterprise and cloud service provider market,” said Andy Ory, CEO, 128 Technology. “As enterprises and service providers increasingly move their operations to the cloud, it is critical that their networks operate efficiently and securely, while minimizing costs. This combined offering is a great opportunity to help our customers accelerate their network transformation.”

The combined solution, which is ideal for any Unified Communications (UC) or Unified Communications as a Service (UCaaS) offering, delivers numerous benefits including:

  • Improved Quality – Customers consuming their UC capabilities from a cloud provider will gain the best possible quality of experience (QoE) in their communications infrastructure. Cloud providers now have the ability to reduce customer churn by offering advanced service level agreements (SLAs).
  • Integrated Business Edge – Customers will have a single platform solution for all of their SBC and SD-WAN requirements, enabling enhanced communications experiences through the rapid deployment of UC and data networks and the ability to be more responsive to dynamically changing traffic patterns. The solution also allows customers to match the appropriate internet connection for the application (MPLS, Ethernet, DIA, etc.).
  • Zero Trust Security – The combined solution creates a zero trust model for both communications and data. Ribbon’s advanced IP firewall and 128 Technology’s deep security segmentation ensure a simple, affordable, and distributed defense offering that is highly effective against today’s toughest UC and data cyber threats.

To learn more about Ribbon’s SBCs and this integrated solution, visit the SBC 2000 or the SBC 1000 product pages

To learn more about 128 Technology’s 128T Smart Router and Session Smart Technology, visit here.

About 128 Technology

128 Technology makes your network do what your business needs, by changing the way networks work. Our professional grade software teaches routers the language of applications and services, letting them understand the requirements of individual services and segments, and adapt the network dynamically to deliver what the business needs, when and where it needs it. We make routers Session Smart, enabling enterprise customers and service providers to create a service-centric fabric that’s more simple, agile, and secure, delivering better performance at a lower cost.

To learn more about 128 Technology, visit www.128technology.com and follow the company on TwitterLinkedIn and Facebook.

About Ribbon Communications

Ribbon Communications Inc. (Nasdaq: RBBN) delivers market-leading software solutions that secure and power many of the world’s leading service provider and enterprise communications environments. Built on world-class technology and intellectual property, the company’s cloud-native solutions deliver intelligent and secure real-time communications solutions for the cloud, network and enterprise edge. Ribbon’s Kandy Cloud real-time communications software platform delivers advanced and embedded CPaaS and UCaaS capabilities enabling service providers to rapidly create and deploy high-value communications services. To learn more, visit ribboncommunications.com.

Important Information Regarding Forward-Looking Statements

The information in this release contains forward-looking statements regarding future events that involve risks and uncertainties, including statement regarding delivering value to customers. All statements other than statements of historical facts contained in this release are forward-looking statements. The actual results of Ribbon Communications may differ materially from those contemplated by the forward-looking statements. For further information regarding risks and uncertainties associated with Ribbon Communications’ business, please refer to the “Risk Factors” section of Ribbon Communications’ most recent annual or quarterly report filed with the SEC. Any forward-looking statements represent Ribbon Communications’ views only as of the date on which such statement is made and should not be relied upon as representing Ribbon Communications’ views as of any subsequent date. While Ribbon Communications may elect to update forward-looking statements at some point, Ribbon Communications specifically disclaims any obligation to do so.

The post 128 Technology and Ribbon Announce Integrated SD-WAN and SBC Platform That Delivers Enhanced UC Network Performance and Lower Operational Costs for Service Providers and Enterprises appeared first on 128 Technology.

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview