News
1/6/2011
11:40 AM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Virtual WAN Optimization

Returning to our discussion on virtual appliances one of the areas where we are seeing a lot of use of virtual appliance technology is in the WAN optimization market. WAN optimization has been atop the project list whiteboard for many data center managers. WAN connectivity is expensive. By optimizing utilization of the WAN you can either lower your WAN connectivity bill or at least delay the need to upgr

Returning to our discussion on virtual appliances one of the areas where we are seeing a lot of use of virtual appliance technology is in the WAN optimization market. WAN optimization has been atop the project list whiteboard for many data center managers. WAN connectivity is expensive. By optimizing utilization of the WAN you can either lower your WAN connectivity bill or at least delay the need to upgrade it.WAN Optimization is critical today, especially in storage. It seems that every storage system, backup application and failover application has the potential to replicate data between data centers. Storage replication software used to be a significant investment that only the largest of data centers could afford. Now the functionality is often either included with the storage array or backup application at a minimal cost, making improved disaster recovery (DR) capabilities available to a broader range of applications and companies. The cost savings in functionality quickly erodes if you need to make a significant upgrade to your WAN links. While IT budgets are loosening, you have to still watch your expenditures as close as ever. WAN Optimization allows you to add these types of capabilities to improve your ability to recover from disaster while not increasing you WAN expenses.

The challenge for WAN Optimization vendors in the past is that they would deploy their software on appliances to ease the installation for network administrators. Many of the appliances though were not purpose built, they were simply off the shelf hardware from a server OEM that the WAN Optimization vendor preloaded and preconfigured their software.

This gave the vendors some consistency in the hardware and made things easier to support. The challenge was that it was another brand of hardware to integrate into your data center. The vendors also quickly learned that even if they bought the same hardware from the same hardware vendor they still had to deal with changes to motherboards or network interface cards. The consistency they desired was not being delivered.

Enter virtual appliances. With virtual appliances WAN Optimization vendors like Riverbed Technology, Silver Peak Systems, Certeon and NetEx now had a very consistent "hardware" platform. Certeon and NetEx have both earned the VMware Ready label. As a result these companies and others not only eliminate the challenge of having to deal with physical machines they gain all the advantages of the virtual environment. For example you now have the ability to move your WAN appliance between physical hosts in case of hardware maintenance or a need for more performance. You also don't have to worry about having IT staff that understands WAN Optimization to mount hardware in each remote location. For the vendors the "hardware" is now downloadable so you can more easily evaluate it. For customers you can easily "ship it." It is also bundle-able meaning that WAN Optimization vendors can partner with storage and backup software companies to deliver and all in one solution.

There is also some potential for Virtual WAN Optimization and Cloud Storage. With hardware it would be difficult to offer a universal solution to thousands of potential customers. Virtual WAN Optimization software could be part of the cloud storage download or integrated into the cloud gateway to make performance of cloud storage even better.

From a performance perspective most vendors are reporting results in the virtual versions of WAN Optimization that leads me to believe that performance between dedicated hardware and shared hosts is going to be a wash for many data centers. Even if you decide to dedicate a virtual host to just the WAN Optimization virtual appliance you still gain all the benefits of virtualization should you need them.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2595
Published: 2014-08-31
The device-initialization functionality in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, enables MSM_CAM_IOCTL_SET_MEM_MAP_INFO ioctl calls for an unrestricted mmap interface, which all...

CVE-2013-2597
Published: 2014-08-31
Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that lever...

CVE-2013-2598
Published: 2014-08-31
app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to overwrite signature-verification code via crafted boot-image load-destination header values that specify memory ...

CVE-2013-2599
Published: 2014-08-31
A certain Qualcomm Innovation Center (QuIC) patch to the NativeDaemonConnector class in services/java/com/android/server/NativeDaemonConnector.java in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.3.x enables debug logging, which allows attackers to obtain sensitive disk-encryption pas...

CVE-2013-6124
Published: 2014-08-31
The Qualcomm Innovation Center (QuIC) init scripts in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.4.x allow local users to modify file metadata via a symlink attack on a file accessed by a (1) chown or (2) chmod command, as demonstrated by changing the permissions of an arbitrary fil...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.