Read online or download SDx Analyst and Research Reports on Cloud, NFV, SDN, Network Virualization, Security and other SDx topics!
Check out our latest SDx Analyst & Research report: Virtual Edge Expanding: The 2016 SD-WAN and vCPE Report. Download PDF.
Check out our latest SDx Analyst & Research report: Virtual Edge Expanding: The 2016 SD-WAN and vCPE Report. Download PDF.
Preview the current SDx Analyst and Research Reports below:
Virtual Edge Expanding: The 2016 SD-WAN and vCPE Report, October 2016
Over the past few years, software-defined wide-area networking (SD-WAN) and virtual customer premises (vCPE) have emerged as the pre-eminent use cases for software-defined networking (SDN) technology, potentially solving the key user needs of increased flexibility and reduce hardware management and expense.
Our 2016 report covers these emerging WAN technologies, which we refer to as the virtual edge. It’s becoming clear that vCPE, as a key enabling technology for SD-WAN, has become the leading use case for both SDN and network functions virtualization, as demonstrated by growing customer engagements and service provider deployments. We’ll tell you why in this report.
Whether it’s an enterprise network manager trying to build a WAN, a consumer connecting to broadband, or a service provider building a new WAN service, network end users are tired of complicated, proprietary networks that require specialized knowledge and complicated configurations. In addition, service providers would like a simple way to push services out to their customers.
The Future of Network Virtualization and SDN Controllers Report, September 2016
This year, SDxCentral.com has combined the software-defined networking (SDN) Controller and Network Virtualization (NV) report. The reason is that we see the two technologies as complementary – and these markets will likely converge over time. We also see a potential for these solutions to end up merging with orchestration systems such as cloud management platforms or OSS or network service orchestration platforms. Regardless, most of today’s NVplatforms contain SDN controllers. Or put another way, NV is the most common use case for SDN controllers.
Generally speaking, NV solutions have mostly been deployed within data centers for cloud platforms (used in both enterprises and service providers), though we have seen NV start their spread into the campus and the WAN with SD-WAN based on overlay technologies. At the same time, SDN controllers (independent of the NV use case) have primarily been used for WAN deployments, to control and built out dynamic WAN topologies, or in other service provider solutions involving service function chaining. We will split out the technologies where we can, and the vendor product section at the end of this report containers separate categories for SDN controllers and NV solutions.
2016 Special Report: Network Performance Management Takes On Applications, June 2016
The landscape for application performance management (APM) and network performance management (NPM) has changed enormously over the last few years, driven largely by changing infrastructure and application architectures.
The industry as a whole, including enterprises, service providers and vendors, is grappling with difficult performance management issues. How do you monitor, analyze and optimize the behavior of highly distributed, virtualized, cloud-based systems built of ever smaller components such as containers and micro-services?
In this report, SDxCentral examines the trends that are re-shaping the APM and NPM markets and driving the need for integrated APM/NPM solutions.
2016 Next-gen Infrastructure Security Report, May 2016
The cloud model of delivering IT services and infrastructure, coupled with extensive connectivity to the Internet, has brought an unprecedented level of security challenges. This means the cybersecurity and security solutions landscape is in constant flux and that a wide range of next gen infrastructure security technology is needed.
Over the past year, we have seen threat actors, motivated by financial gain, competitive advantage, political aspirations, etc., continue to escalate the scale and sophistication of their attacks. They are exploiting old and new attack vectors created by all the people, services and Internet of things (IoT) that are now connected and communicating with one another. They are also taking advantage of the highly dynamic environments of today’s networks, which contain a mix of encrypted traffic (SSL/TLS), virtualized services and apps, and cloud platforms, to hide and propagate undetected.
On the flip side, we have seen progressively intelligent counter measures introduced to try to beat the attackers at their own game. Today’s security paradigm assumes attackers are in (or going to get into) the network (the defensible perimeter has long been dead). New approaches are taking the fight to them (in the wild, on the darknet, etc.) and making it harder to get anything of value, by trusting nothing, locking resources down, and obviating critical information.
2016 Mega NFV Report Pt. 2: VNFs, April 2016
The 2016 Mega NFV Report Pt. 2: VNFs gives you a full update into the trends and progress in the market for Virtual Network Functions (VNFs). Since our NFV report in 2015, the NFV market is progressing, with operator deployments beginning in earnest. Their primary goal is to create new revenue-generating services on an open, interoperable NFV platform.
For more background, see our 2016 Mega NFV Report Pt. 1: MANO and NFVI. This report contains some of that information as well as more details and specifics about VNFs.
The main goal of NFV is that it can deliver network functionality via software running on industry-standard commercial off-the-shelf (COTS) hardware. The advantages are that it can provide networking needs of a service provider or enterprises’ application on standard server and storage infrastructures. New services do not require new hardware infrastructure – simply software installation.
2016 Mega NFV Report Part I: MANO and NFVI, March 2016
The 2016 Network Functions Virtualization (NFV) MANO and NFVI Report gives you a full update into the trends and progress of the NFV market. Since our report in 2015, the NFV market is progressing, with operator deployments beginning in earnest. Their primary goal is to create new revenue-generating services on an open, interoperable NFV platform.
The hallmark of NFV is that it can deliver network functionality via software running on industry-standard commercial off-the-shelf (COTS) hardware. The main advantages are that it can provide networking needs of a service provider or enterprises’ application on standard server and storage infrastructures. New services do not require new hardware infrastructure – simply software installation.
NFV decouples network services from the hardware that delivers them. As a result, functions, such as network address translation (NAT), firewalling, intrusion detection, domain name service (DNS), and even complete suites like EPC (Evolved Packet Core) services can be delivered in software and deployed on general purpose appliances. This gives organizations a lot more flexibility in the way they design, deploy and manage their network services.
Future of Converged Data Center, March 2016
The disaggregation of software and hardware is driving the emergence of new converged data center architectures built on commercial off-the-shelf (COTS) or near-COTS hardware that converges the functions of traditional data centers into a single, converged infrastructure. This converged data center infrastructure pools compute, network and storage resources to simplify management and make it easier to scale up/down, move and share resources to better support fluctuating demands, optimize utilization and reduce overall costs.
In theory, a converged data center – or hyper converged data center — sounds great, but what does it really look like in practice? This report is designed to pull back the covers of the converged data center and describe its state today, with some assumptions and predictions of where it might go in the future
Inside the Linux Container Ecosystem, February 2016
Linux container technology: Everybody’s talking about it. Container has become one of those magic buzzwords that can conjure up billions of dollars in capital and create market-leading companies such as Docker, overnight.
But what are containers used for, exactly, and how do they apply to existing virtualization and networking markets? That is what we intend to define here in the first SDxCentral report on container infrastructure, which is sure to become an annual tradition. This includes the development of important niches of the container ecosystem, including container security, container networking, and Docker networking. Think of the container technology world as developing parallels to all of the existing tools in the networking market.
Lifecycle Service Orchestration (LSO) Market Overview Report, January 2016
Service providers and large enterprises have expressed the need to move to a more modern model of deploying and managing network services. This model follows the consumer cloud paradigm, whereby a customer can sign up for and provision a new IT service “in the cloud” in minutes.
They seek the same model that cloud services – and even many consumer mobile data services – use today. This is a customer-driven affair, in which a customer looks at new services offerings on a screen, often a Web page, selects what he or she wants, and then presses a button. The service or software are then automatically provisioned or orchestrated and can be used in a matter of minutes.
It’s different in the telecommunications and enterprise communications markets. Many Business-to-Business (B2B) network services such as Ethernet, IP VPN, and optical circuits are manually provisioned (requiring a human to either plug something in or flip a switch). This lack of automation means that new services can take days, weeks, and even months – rather than minutes or seconds – to deploy.
Network Virtualization in the Data Center Report, November 2015
There is no doubt about it, the network is going virtual. Network virtualization (NV) creates a logical virtual network that runs on top of a physical one, making it easy for organizations to roll out, scale and adjust workloads and resources to meet changing needs. Adoption of NV solutions is ramping with organizations large and small, as they strive to improve the flexibility, scalability and overall efficiency of their data center and cloud environments.
While NV may be inevitable, there are still questions around the details – who, what, where, when and why. These are the questions the 2015 Network Virtualization Report aims to answer, or at least provide insights to, based on current market trends. The Report covers:
- What is driving the adoption of NV
- The primary benefits of NV
- Where NV is being deployed
- How NV is being used
- Different approached vendors are taking to the market
- Key attributes to consider when evaluating NV solutions
- Market trends – announcements and moves by NV leaders
- Vendor profiles
This report will include perspectives from members of the SDxCentral community, with original research(1) from the SDxCentral Research Team on current perceptions and experiences with network virtualization. Results from the SDxCentral Survey on NV are used throughout to provide a snapshot of what is actually happening with NV within organizations.
Virtual Edge (vCPE / SD-WAN) Report, November 2015
Service providers and enterprise network operators would like to simplify the way that Wide Area Network (WAN) connectivity and applications are purchased, provisioned, and managed. Whether it’s an enterprise network manager trying to build a WAN, a consumer connecting to broadband, or a service provider building a new WAN service, network end users are tired of complicated, proprietary networks that require specialized knowledge and complicated configurations. In addition, service providers would like a more simple way to push services out to their customers.
Service providers and enterprises are taking a page from the software-defined networking (SDN) and networking functions virtualization (NFV) world to do this – by applying software-defined principles to the WAN and the network edge, where the customer plugs into WAN services. The network edge is traditionally the land of specialized proprietary equipment – including routers, Network Interface Devices (NIDs) and Customer Premises Equipment (CPE). The industry is aiming to change that, replacing specialized gear with commodity hardware that can be rapidly updated and provisioned from the cloud, with open software.
There is a wide range of technology aiming to virtualize, automate, and provision WAN services using a cloud software model. Imagine a wide range of enterprise-quality network services that can be automatically deployed and managed on the customer edge, just like you download apps on your mobile devices.
This report focuses on the technology tools and techniques to create more flexible WAN services that customers can plug into at the virtual edge. This report includes:
- An introduction to business drivers and benefits of virtual CPE and software-defined WAN technology.
- A look at how the virtualized edge changes technology requirements in devices, such as vCPE, edge routers, and NIDs.
- An overview of the “spectrum” of virtualizing the edge, ranging from a thin client to full Network as a Service (NAAS).
- How virtualized applications managed by service providers or enterprises can enable remote provisioning andconfigurability of network functions running on edge devices.
- Results of the SDxCentral Survey on vCPE and SD-WAN.
- Different network architectures for vCPE and SD-WAN.
- Profiles of management, vCPE and SD-WAN solutions in the market, including key features available today.
SDx OpenStack & Cloud Management Report, October 2015
The 2015 SDx Cloud Management Report looks at the shifting role the cloud is playing in the software-defined infrastructure (SDxI) and the maturity of the platforms and tools available to help you maximize the efficiencies and value you can derive from your cloud data centers. The Report aims to help you understand the trends impacting the cloud data center’s architecture and provide insights into market strategies and offerings designed to help you mitigate potential challenges.
Specifically, the Report focuses on cloud management, orchestration and automation solutions, providing you the key requirements to look for, as well as a sampling of vendor solutions on the market today, to help you make decisions that best meet the needs of your business and technical environment. The Report also includes perspectives from your peers within the SDxCentral community, as the Report unveils original research conducted by the SDxCentral Research Team on current perceptions and experiences with cloud data center technologies.
In summary, if you read this Report, you will receive:
- An introduction to SDx Infrastructure and the role of the cloud data center.
- Potential benefits and challenges associated with cloud data centers.
- The increasing need for management, orchestration and automation/DevOps tools for cloud data centers.
- Results of the SDxCentral Survey on Cloud Data Centers.
- Profiles of management, orchestration, automation and DevOps solutions in the market, including key features available today.
SDN Controllers Report, August 2015
The 2015 Software-Defined Networking (SDN) Controller Report takes a look at the state of the Controller market, which ultimately provides insights into the maturity of the SDN market at large. Controllers are the “brains” of an SDN environment, acting as the strategic control point in the network responsible for relaying information to the switches, routers and other network devices ‘below’ (via southbound application programming interfaces (APIs)) and the applications and business logic ‘above’ (via northbound APIs). Due to the pivotal role they play in a SDN deployment, it is important to understand what Controllers are capable of doing today and where they are going in the coming months/years.
This Report attempts to shed some light on the trends and influences on the Controller market, providing:
- A brief history of Controllers.
- Current core Controller capabilities.
- General use cases that require Controllers today.
- Details on different vendor offerings.
- Insights into potential evolution paths for Controllers.
SDx Infrastructure Security Report, July 2015
In response to demand from the community, SDxCentral is releasing the first SDx Infrastructure Security Reportdesigned to provide an overview of the rapidly evolving market. The Report aims to give our readers early visibility into the security challenges and opportunities emerging within the SDx infrastructure and provide information on a sampling of some of the early products and solutions blazing new trails.
The Report will cover:
- An introduction to SDx Infrastructure Security
- Survey results that capture current perceptions in the community on SDx Infrastructure Security
- Challenges in SDx Infrastructure Security
- The SDx Security landscape, focusing on three main areas where the industry is seeing the biggest changes:
- Cloud and Data Center Security
- Campus and Branch Security
- The Internet of Things
- Features and benefits of SDx Infrastructure Security solutions
- Early innovators in SDx security technologies and products
SDN & NFV Market Size and Forecast Report, May 2015
Network Functions Virtualization Report, April 2015
The 2015 Network Functions Virtualization (NFV) Report is designed to provide you valuable insights into the trends and progress of the NFV market. As we start to see more and more proof of concepts trialed within service provider, and even enterprise networks, it is more important than ever to understand the dramatic sea change that NFV represents within the networking industry.
NFV delivers network functionality via software, so that it can be deployed on virtual and general purpose, industry-standard hardware to support the varied networking needs of a service provider or enterprises’ application, server and storage infrastructures. This Report is designed to capture the architectures/designs, use cases and vendors that make up the NFV market. It provides:
- An overview of NFV, describing its history, architectural components and potential benefits.
- General use cases for NFV technologies.
- Details on different vendor offerings to provide early insights into the capabilities and maturity of different solutions.