Wedge Promotes Third Network Security
NEW YORK -- Network security specialist Wedge Networks announced today that it has joined the MEF. Wedge has expressed a commitment to promoting Security as a Service as a key contribution to the MEF’s recently announced the world’s Third Network vision of Agile, Assured and Orchestrated networking delivered worldwide as a service.
“Security is a key indicator of a high quality network service” according to Dr Hongwen Zhang, President and CEO of Wedge Networks. “The mobile worker’s first priority is to be connected, and the Internet is available almost anywhere. But security is the next vital concern: as a service it should be available anywhere, personalized to the user’s needs. Wedge is specialized in weaving advanced security in large service provider networks as cloud based services. Its technology is high performance, software defined, seamlessly embedded in these networks to provide thorough security for all endpoints. It aligns well with the new MEF vision.”
The world’s Thid Network proposes worldwide Network as a Service (NaaS), to remove today’s split between: a) a business service that take months to establish but promises assured performance and security, and b) ubiquitous, on demand Internet/IP connectivity that leaves users to deal with security and performance issues. The Third Network is an evolution of network connectivity to better align with the dynamic and virtualized nature of cloud-based services. When providing connectivity as a service for different types of customers, data and network security measures taken for granted in a private, static network become a critical concern.
Wedge sees security as a service as a vital subset of the MEF vision of agile, assured and orchestrated services. Agility means that security measures must be rapidly and easily provisioned – the more painful the provision the greater risk of security being sidelined. Assurance means that once one has signed up for a certain level and type of security, that same service should be provided whenever and wherever the user connects. Orchestration of the security policy and implementation will ensure that this service and its management remains consistent across any number of intervening network segments.