How Cloud Network Defense Works
Cloud Network Defense is the world's highest performance cloud security solution. As an embedded software defined solution, it doesn't require user traffic to leave the network. Situated between the client request and the destination server, it directs the actual switching fabric of the network to inspect and implement policy-based security services on selected traffic in real time. This architecture employs the award-winning WedgeOS with the deepest security inspection possible to replace endpoint based security. Its Elastic Security Service Orchestration can dynamically process high volumes of network traffic in real time without compromising the performance of the world's largest and most demanding networks.
- Cloud Network Defense receives user policy and endpoint identification from a number of sources depending on how it is deployed. (i.e. Identity Management System, Telco OSS/BSS)
- The system then uses that information as it controls the network routing to inspect desired user traffic via its Network Functions Virtualization for Security (NFV-S) compute stack.
- NFV-S is the heart of Cloud Network Defense's Elastic Security Service Orchestration. Working as a pooled resource, it dynamically applies specific policy based security inspection to specific user device traffic in response to network load. NFV-S is powered by Wedge Networks' patented WedgeOS, an embedded operating system that enables the delivery of a variety of security functions as an agnostic, open and easily consumable service.
- The Cloud Network Defense Conductor coordinates all the cloud operational aspects to dynamically monitor and maintain virtual instances and effectively apply platform resources.