Feeds

Aryaka adds mobile admin to WANOP kit

Cloudy net stats on your fondleslab

Internet Security Threat Report 2014

WAN-optimisation-in-the-cloud provider Aryaka has added mobile portal access to its network.

Unleashed on the world at Interop, the MyAryaka portal has a simple enough proposition: since systems administrators are expected to be able to tell their bosses what's going on even in their downtime, why not make the ability to look at the network a bit more mobile than it used to be.

As the company's Sonal Puri explained to The Register, it's also in line with Aryaka's mid-market focus. If a business is large enough to buy its own international MPLS links, it's almost certainly bought its own high-end network management software.

Aryaka's pitch, Puri said, has always been to smaller companies which might have offices in more than one country but not the scale of an international finance giant. Such companies are traditionally the customers of managed network providers (either carriers or their resellers).

Rather than pitch itself merely as another managed international network, however, the company created a novel differentiator by combining its carrier relationships with WAN optimisation – in its network rather than as something the customer has to deploy by purchasing appliances.

As long as a location can get a connection (either private or as an Internet VPN) to an Aryaka location, it gets both the international network and the optimisation (something of a virtuous circle: the customer gets to save on traffic costs, and so does Aryaka since it's a customer of the upstream carriers).

“The biggest problem today is getting traffic across oceans,” Puri told The Register.

As for the latest announcement, the main characteristic of MyAryaka is that it's not an app, but a mobile portal. It provides a simplified overview of network an application performance, with drill-down to the kind of details customers would expect (link statistics, application statistics, latency, data reduction performance and so on, associated with either logical or physical paths). ®

Internet Security Threat Report 2014

More from The Register

next story
Docker's app containers are coming to Windows Server, says Microsoft
MS chases app deployment speeds already enjoyed by Linux devs
IBM storage revenues sink: 'We are disappointed,' says CEO
Time to put the storage biz up for sale?
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
'Urika': Cray unveils new 1,500-core big data crunching monster
6TB of DRAM, 38TB of SSD flash and 120TB of disk storage
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
SDI wars: WTF is software defined infrastructure?
This time we play for ALL the marbles
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.