NFV NEWS

NFV Home

HKNet Puts NFV to Use in Dedicated Internet Access Service

By Steve Anderson February 01, 2016

South Korea is perhaps one of the planet's true exemplars of Internet technology. With high average speeds and minimal restrictions on bandwidth use, it's easy to be jealous of South Korea's connectivity. HKNet Company Limited, meanwhile, recently put a little extra spark in its own connectivity, augmenting its vIP-Net service with a little touch of network functions virtualization (NFV) capability.

With the new NFV connection, HKNet's vIP-Net system—a dedicated Internet access service system—improves on several levels, particularly agility and overall reliability. Plus, with the new always-on service, it's more cost effective than it was previously. The new addition also allows for a new Point of Presence (PoP) in South Korea, which helps take some of the pressure off demands for direct Internet connectivity.

The NFV tools include a variety of systems that should prove welcome to anyone running a system, ranging from Virtual Firewall to Virtual Router, and going into things like Traffic Analytics tools, Content Security, and the Malware Sandbox. All of these tools can deliver effective benefits in terms of keeping a system up and running, while at the same time offering such tools at a readily-accessible basis.

Since HKNet brought NFV into the picture, the system can now virtualize some network functions, as the name suggests, that were commonly only found on on-premises systems. That makes these functions more accessible, and without requiring the high-end proprietary systems and hardware that made these functions necessary. So the hardware costs drop to gain access to these same functions, but it also requires less in the way of lead time or complexity to get access to same. Plus, since the tools are located off-site, there's an added bit of insurance that at least some functions will remain operational in the event of issues with subsystems or the like.

The NFV part of this operation is a welcome one, as it allows the users to take advantage of the variety of functions here without needing to have the specific hardware on hand, which keeps operating costs down and allows the tools to be available almost on a subscription basis. The tools involved are also clearly noteworthy; having traffic analysis systems is a great way to keep the network up and running to its fullest, and the notion of a “Malware Sandbox” could be one of the better ways to keep a system safe by preventing false-positive threat analysis. When the system better knows what poses a threat, it can be responded to more effectively.




Edited by Kyle Piscioniere

Contributing Writer

SHARE THIS ARTICLE
Related Articles

Winners of the 2018 INTERNET TELEPHONY NFV Innovation Award Announced

By: TMCnet News    6/4/2018

TMC announced the recipients of the 2018 INTERNET TELEPHONY NFV Innovation Award, presented by INTERNET TELEPHONY magazine.

Read More

Harnessing Pervasive Visibility to Unleash the Power of the Cloud

By: Michael Segal    11/9/2017

Cloud computing is having an unprecedented influence on companies throughout the world; according to research from BDO, an overwhelming number (74%) o…

Read More

Nokia Introduces SDAN Solution

By: Paula Bernier    10/10/2017

Nokia has unveiled a Software-Defined Access Network solution. This offering consists of cloud-native software, integration services, open programmabl…

Read More

Stating with Attestation, a Core Foundation of Computer Security for Sensitive Systems

By: Special Guest    10/3/2017

The European Telecommunication Standards Institute (ETSI) held their annual Security Week event and along with a representative from the UK National C…

Read More

Assuring Business Outcomes on Your DX Journey

By: Michael Segal    9/7/2017

When it comes to implementing strategies for digital transformation (DX), there are nearly as many methods as there are companies using them.

Read More