SD-WAN
Against the backdrop of digital transformation, cloud computing, mobile applications, and business globalization
Against the backdrop of digital transformation, cloud computing, mobile applications, and business globalization, an increasing number of real-time applications need to be transmitted across multiple nodes. However, the current wide area network (WAN) faces a series of challenges, such as high dedicated line costs, long deployment cycles, poor application experience, and difficult operation and maintenance. These issues make it unable to meet the WAN usage needs of different industries, users, and scenarios.
To address these challenges, the SD-WAN solution has emerged. It fulfills the interconnection demands for on-demand selection, flexibility, efficiency, and simple O&M (Operation and Maintenance) between branches, branches and data centers, as well as branches and clouds.
Nowadays, the security situation is becoming increasingly complex. The continuous increase in WAN edge nodes expands the network attack surface, while ransomware, mining Trojans, and advanced threats are surging. The successive issuance of relevant laws and regulations has also driven enterprises to continuously enhance their requirements for WAN security compliance and security capabilities.
Designed based on the characteristics of SDN (Software-Defined Networking), SD-WAN integrates network orchestration with native security through years of exploration and in-depth research. It provides users with a secure WAN interconnection solution that enables on-demand selection, flexibility, convenience, security, reliability, and secure O&M between data centers, headquarters, branches, and clouds.
This solution solves the problems of traditional WAN, such as long service deployment cycles, high operation costs, unguaranteed business experience, difficult security compliance, and complex network O&M. It helps users establish a secure, transparent, and flexible new-generation WAN service delivery method, meeting their digital security protection and security operation needs on a broader scale.
Core Values
Full-Scenario Deployment & On-Demand Network Definition
It supports hybrid WAN links, with transmission not restricted by link types. It also supports networking models such as Hub-spoke and Full-mesh, and provides multiple deployment methods including hardware and virtualization. This enables flexible access capabilities for various distributed users and locations anytime, anywhere, helping customers quickly achieve dynamic access and connectivity required for digital transformation.
Comprehensive Security Protection & Flexible Security Services
It fully integrates native security with SD-WAN, allowing on-demand activation based on users’ actual needs. Through pre-event risk detection, in-event protection and response, and post-event forensics and analysis, it forms an all-round security defense system, providing users with comprehensive closed-loop security protection.
Application SLA Guarantee & High-Availability Architecture
With accurate application identification and link quality detection based on packet loss, latency, and jitter, it realizes application-level fine-grained bandwidth guarantee and optimal path selection, providing highly reliable connectivity. The platform supports clustered deployment, ensuring that business operations remain unaffected and no service interruptions occur even if any component fails.
Simple O&M Configuration & Visible Network Management
It supports Zero-Touch Provisioning (ZTP) for plug-and-play functionality, enabling management and maintenance of branch office devices without on-site visits. This reduces the O&M cycle from days to minutes. It also provides a map-based visual interface and multiple reports, presenting network and device status in a graphical format. This enhances the operational experience and work efficiency of network O&M personnel, while reducing O&M costs.






Reviews
There are no reviews yet.