The Era of Edge NFV Devices
Communication service providers (CSPs) are on the cusp of a new era of business opportunity. Network functions virtualization (NFV) presents CSPs with an opportunity to rapidly expand the managed services they offer and swiftly develop new revenue streams. But to do this, they need to overcome a critical hurdle. They must ensure that virtual network functions (VNFs) can be created, operated and managed in a simple, open and reliable way. Hosting and performance assurance of software appliances requires a new generation of edge NFV devices.
... CSPs are able to host software appliances in the edge NFV device and directly monitor the performance of the application in the most comprehensive manner possible.
VNFs With Service Demarcation
Our FSP 150 ProVMe series represents a new era for the service edge. It combines multi-layer Carrier Ethernet 2.0 and IP demarcation with an internal server that can host virtual network applications. By combining these capabilities in one single box, CSPs are able to host software appliances in the edge NFV device and directly monitor the performance of the application in the most comprehensive manner possible. This is something unique within the industry. What makes our edge NFV devices even more unique is their openness. They include standardized interfaces based on OpenFlow, OpenStack and Netconf/YANG. A pluggable server variant enables CSPs to seamlessly grow their business from connectivity services to managed enterprise IT services.
Network Security for NFV-Centric Environments
This enormous potential for CSPs to develop new revenue opportunities brings with it added security risks. Replacing dedicated hardware with standard network components and open-source software demands a new approach to network security. That’s why our FSP 150 ProVMe devices include ConnectGuard™. This technology provides a key mix of security features that ensure network security and data protection. These include robust encryption, tamper resistance and network isolation with access control lists. Such levels of protection mean that your network has never been more secure.
Would You Like To Discuss This Further?