News

1/6/2011
11:40 AM
George Crump
George Crump
Commentary
50%
50%

Virtual WAN Optimization

Returning to our discussion on virtual appliances one of the areas where we are seeing a lot of use of virtual appliance technology is in the WAN optimization market. WAN optimization has been atop the project list whiteboard for many data center managers. WAN connectivity is expensive. By optimizing utilization of the WAN you can either lower your WAN connectivity bill or at least delay the need to upgr

Returning to our discussion on virtual appliances one of the areas where we are seeing a lot of use of virtual appliance technology is in the WAN optimization market. WAN optimization has been atop the project list whiteboard for many data center managers. WAN connectivity is expensive. By optimizing utilization of the WAN you can either lower your WAN connectivity bill or at least delay the need to upgrade it.WAN Optimization is critical today, especially in storage. It seems that every storage system, backup application and failover application has the potential to replicate data between data centers. Storage replication software used to be a significant investment that only the largest of data centers could afford. Now the functionality is often either included with the storage array or backup application at a minimal cost, making improved disaster recovery (DR) capabilities available to a broader range of applications and companies. The cost savings in functionality quickly erodes if you need to make a significant upgrade to your WAN links. While IT budgets are loosening, you have to still watch your expenditures as close as ever. WAN Optimization allows you to add these types of capabilities to improve your ability to recover from disaster while not increasing you WAN expenses.

The challenge for WAN Optimization vendors in the past is that they would deploy their software on appliances to ease the installation for network administrators. Many of the appliances though were not purpose built, they were simply off the shelf hardware from a server OEM that the WAN Optimization vendor preloaded and preconfigured their software.

This gave the vendors some consistency in the hardware and made things easier to support. The challenge was that it was another brand of hardware to integrate into your data center. The vendors also quickly learned that even if they bought the same hardware from the same hardware vendor they still had to deal with changes to motherboards or network interface cards. The consistency they desired was not being delivered.

Enter virtual appliances. With virtual appliances WAN Optimization vendors like Riverbed Technology, Silver Peak Systems, Certeon and NetEx now had a very consistent "hardware" platform. Certeon and NetEx have both earned the VMware Ready label. As a result these companies and others not only eliminate the challenge of having to deal with physical machines they gain all the advantages of the virtual environment. For example you now have the ability to move your WAN appliance between physical hosts in case of hardware maintenance or a need for more performance. You also don't have to worry about having IT staff that understands WAN Optimization to mount hardware in each remote location. For the vendors the "hardware" is now downloadable so you can more easily evaluate it. For customers you can easily "ship it." It is also bundle-able meaning that WAN Optimization vendors can partner with storage and backup software companies to deliver and all in one solution.

There is also some potential for Virtual WAN Optimization and Cloud Storage. With hardware it would be difficult to offer a universal solution to thousands of potential customers. Virtual WAN Optimization software could be part of the cloud storage download or integrated into the cloud gateway to make performance of cloud storage even better.

From a performance perspective most vendors are reporting results in the virtual versions of WAN Optimization that leads me to believe that performance between dedicated hardware and shared hosts is going to be a wash for many data centers. Even if you decide to dedicate a virtual host to just the WAN Optimization virtual appliance you still gain all the benefits of virtualization should you need them.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.