News
1/6/2011
11:40 AM
George Crump
George Crump
Commentary
50%
50%

Virtual WAN Optimization

Returning to our discussion on virtual appliances one of the areas where we are seeing a lot of use of virtual appliance technology is in the WAN optimization market. WAN optimization has been atop the project list whiteboard for many data center managers. WAN connectivity is expensive. By optimizing utilization of the WAN you can either lower your WAN connectivity bill or at least delay the need to upgr

Returning to our discussion on virtual appliances one of the areas where we are seeing a lot of use of virtual appliance technology is in the WAN optimization market. WAN optimization has been atop the project list whiteboard for many data center managers. WAN connectivity is expensive. By optimizing utilization of the WAN you can either lower your WAN connectivity bill or at least delay the need to upgrade it.WAN Optimization is critical today, especially in storage. It seems that every storage system, backup application and failover application has the potential to replicate data between data centers. Storage replication software used to be a significant investment that only the largest of data centers could afford. Now the functionality is often either included with the storage array or backup application at a minimal cost, making improved disaster recovery (DR) capabilities available to a broader range of applications and companies. The cost savings in functionality quickly erodes if you need to make a significant upgrade to your WAN links. While IT budgets are loosening, you have to still watch your expenditures as close as ever. WAN Optimization allows you to add these types of capabilities to improve your ability to recover from disaster while not increasing you WAN expenses.

The challenge for WAN Optimization vendors in the past is that they would deploy their software on appliances to ease the installation for network administrators. Many of the appliances though were not purpose built, they were simply off the shelf hardware from a server OEM that the WAN Optimization vendor preloaded and preconfigured their software.

This gave the vendors some consistency in the hardware and made things easier to support. The challenge was that it was another brand of hardware to integrate into your data center. The vendors also quickly learned that even if they bought the same hardware from the same hardware vendor they still had to deal with changes to motherboards or network interface cards. The consistency they desired was not being delivered.

Enter virtual appliances. With virtual appliances WAN Optimization vendors like Riverbed Technology, Silver Peak Systems, Certeon and NetEx now had a very consistent "hardware" platform. Certeon and NetEx have both earned the VMware Ready label. As a result these companies and others not only eliminate the challenge of having to deal with physical machines they gain all the advantages of the virtual environment. For example you now have the ability to move your WAN appliance between physical hosts in case of hardware maintenance or a need for more performance. You also don't have to worry about having IT staff that understands WAN Optimization to mount hardware in each remote location. For the vendors the "hardware" is now downloadable so you can more easily evaluate it. For customers you can easily "ship it." It is also bundle-able meaning that WAN Optimization vendors can partner with storage and backup software companies to deliver and all in one solution.

There is also some potential for Virtual WAN Optimization and Cloud Storage. With hardware it would be difficult to offer a universal solution to thousands of potential customers. Virtual WAN Optimization software could be part of the cloud storage download or integrated into the cloud gateway to make performance of cloud storage even better.

From a performance perspective most vendors are reporting results in the virtual versions of WAN Optimization that leads me to believe that performance between dedicated hardware and shared hosts is going to be a wash for many data centers. Even if you decide to dedicate a virtual host to just the WAN Optimization virtual appliance you still gain all the benefits of virtualization should you need them.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7266
Published: 2015-02-01
Algorithmic complexity vulnerability in Cybozu Remote Service Manager through 2.3.0 and 3.x through 3.1.2 allows remote attackers to cause a denial of service (CPU consumption) via vectors that trigger colliding hash-table keys. NOTE: this vulnerability exists because of an incomplete fix for CVE-2...

CVE-2014-7269
Published: 2015-02-01
ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376....

CVE-2014-7270
Published: 2015-02-01
Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earl...

CVE-2014-8630
Published: 2015-02-01
Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shel...

CVE-2014-9200
Published: 2015-02-01
Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet/IP Communication Library 1.0.0 and earlier, EM X8...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.