2. copyright 2015
Agenda
Setting the scene – the typical app and its perimeter
A quick catch up on cloud networking history
Unified Threat Management (UTM) and Application Delivery
Controllers (ADC)
Going virtual, and why Software Defined Networking (SDN)
and Network Function Virtualization (NFV) are so sweet
together
Bringing it home – the cloud perimeter model on enterprise
infrastructure
31. copyright 2015
Anywhere an application can go - it needs
security & connectivity.
Summary
Cloud adoption has driven an application centric networking
and security model.
Application Security Controllers use NFV and SDN to build an
application centric perimeter that can be deployed on the
public cloud or within the established Enterprise perimeter.
The best of UTM and ADC, but without the metal
31
32. copyright 2015
Cohesive Networks - cloud security made easy
32
VNS3 family of security and
connectivity solutions protects
cloud-based applications from
exploitation by hackers, criminal
gangs, and foreign governments
1000+ customers in 20+ countries
across all industry verticals and
sectors
Questions?