Feeds

VeloCloud stitches together virty WAN

Not so much wide area as wide aerial

Internet Security Threat Report 2014

A startup called VeloCloud has taken the wraps off a cloudy WAN-as-service offering designed to help enterprises wean themselves off branch networks using private WAN services like MPLS or T1 links.

Talking to The Register, VeloCloud's CEO Sanjay Uppal (an alumnus of Webvan among other things, but let's not hold that against him) explained that companies maintain private line WANs for branch office networks for reliability reasons, but those networks are being stressed by employees' adoption of cloud services.

That (and the need for security) often prevents companies from taking advantage of the lower cost of consumer-grade Internet connections – and that's the problem that VeloCloud has set out to solve. It's offering a lightweight CPE which, along with the infrastructure in the company's cloud, can bond multiple Internet access links across different technologies (like cable, DSL and LTE – as well, of course, as supporting the existing WAN links).

That's presented as a single link to the branch office, but with VeloCloud auto-sensing the links available to the CPE and auto-configuring the service.

The CPE kit also has an understanding of around 2,000 applications, so if there are particular requirements for individual apps, Uppal said, the kit “chooses the best WAN connection” to steer the app.

Each link, Uppal said, is monitored for latency, jitter and packet loss. VeloCloud's design allows packets in a communication to be spread across the links and reassembled at the destination (that, he said, is a key part of the company's IP), so if a link degrades, packets will be redirected without the user noticing.

On top of the base level service, there's a suite of extras that run as VM instances in VeloCloud, so users can spin up different services – VPN, firewalls, web security, performance monitoring and so on – for different sites. That way, for example, social media can be allowed at some sites and not others, or restricted by time.

The services are sold on a per-branch, per-service, per-month basis.

Since VeloCloud will be targeting existing VARs as its sales channel, it's also offering APIs that let the resellers layer their own services on top of the platform. ®

Internet Security Threat Report 2014

More from The Register

next story
Docker's app containers are coming to Windows Server, says Microsoft
MS chases app deployment speeds already enjoyed by Linux devs
IBM storage revenues sink: 'We are disappointed,' says CEO
Time to put the storage biz up for sale?
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
SDI wars: WTF is software defined infrastructure?
This time we play for ALL the marbles
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
Oracle hires former SAP exec for cloudy push
'We know Larry said cloud was gibberish, and insane, and idiotic, but...'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.