Cloud Network Defense
An embedded software defined solution that doesn't require user traffic to leave the network. Situated between the client request and the destination server, it directs the switching fabric of the network to inspect and implement policy-based security services on selected traffic in real time. It receives user policy and endpoint identification from a number of sources depending on how it is deployed (i.e. Identity Management System, Telco OSS/BSS, etc.)
The system then uses that information as it controls the network routing to inspect desired user traffic via its Network Functions Virtualization for Security (NFV-S) compute stack.
Working as a pooled resource, it dynamically applies specific policy-based security inspection to specific user-device traffic in response to network load. It coordinates all the cloud operational aspects to dynamically monitor and maintain virtual instances and effectively apply platform resources.