Create a single, cohesive cloud environment using Nuage Networks Virtualized Network Services (VNS) to automate branch site connectivity and help buyers and enterprises reduce operational overhead and launch new services faster. This integration helps you maximise the efficiency and effectiveness of your IT operations across multiple sites and technologies.
- Datacentre features networking environment focused on virtual applications/workload mobility.
- Provides deployment options for cloud integration and branch VPN services.
- Add new automation/on-demand service capabilities to existing VPN/MPLS offerings.
- Overlay model uses any IP-network to provide connectivity between sites.
- Designed to serve enterprises adopting cloud-based IT consumption models.
- Provisioning, configuration, optimization of network/security policies is completely automated.
- Seamlessly links all locations while reducing need for customized networking.
- Choose from multiple access/last-mile technologies, including copper, fibre, mobile broadband.
- Mix and match available networks from multiple providers.
- Includes range of branch routers and gateways at remote site.
- Aligns the network service with the needs of the enterprise.
- Deliver an unconstrained network experience that matches dynamic cloud environment.
- Complements your existing IP and Carrier Ethernet (CE) VPN services.
- Enables maximum flexibility.
- Facilitates seamless and automated connectivity to cloud networks.
- Build cloud speed connectivity between your datacenters and branch offices.
- Has a small footprint and is energy efficient.
- Supports virtualized network functions, eliminating the need for additional hardware.
- Streamlines operations and improves agility by automating network connectivity.
- Automates network connectivity and services in a policy-based fashion.
£1007 to £13136 per device
Nokia UK Ltd
|Software add-on or extension||No|
|Cloud deployment model||Hybrid cloud|
|Service constraints||No known constraints, indeed it is the benefit of the solution that it helps users to overcome mixed configurations of cloud and network services.|
|Email or online ticketing support||Yes, at extra cost|
|Support response times||Depends on the agreed upon SLAs. Various options exist so as best to fit each client's requirement.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
|Support levels||Different support levels are available.|
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||Nokia assists its clients in the use, administration and operation of their solutions by providing relevant and comprehensive documentation and online or phone support.|
|End-of-contract data extraction||Not applicable|
|End-of-contract process||Not applicable|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||No|
|Accessibility standards||None or don’t know|
|Description of accessibility||N/A|
|What users can and can't do using the API||VCS provides robust interfaces that let you manage existing legacy infrastructure together with leading-edge software and hardware, such as Docker containers and network accelerators. You can integrate the platform with a broad range of tools and environments – from cloud platforms such as CloudStack and OpenStack to custom self-service interfaces.|
|API documentation formats||HTML|
|API sandbox or test environment||Yes|
|Description of customisation||The entire GUI can be customised by the Nokia specialist staff|
|Independence of resources||The software defined network controllers are federated and can therefore be augmented to scale for any number of users.|
|Service usage metrics||Yes|
|Metrics types||Statistics about traffic, security breaches, performance|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||Other|
|Other data at rest protection approach||As defined by the customers' security standards.|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||Connectivity between compute resources|
|Data export formats||Other|
|Other data export formats||
|Data import formats||Other|
|Other data import formats||
|Data protection between buyer and supplier networks||IPsec or TLS VPN gateway|
|Data protection within supplier network||IPsec or TLS VPN gateway|
Availability and resilience
|Guaranteed availability||As with other Nokia Services.|
|Approach to resilience||This information is available on request.|
|Outage reporting||As per the customers' specified BC/DR planning and policies.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Only available via user name and password|
|Access restriction testing frequency||Less than once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||You control when users can access audit information|
|How long user audit data is stored for||Less than 1 month|
|Access to supplier activity audit information||You control when users can access audit information|
|How long supplier audit data is stored for||Less than 1 month|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||Bureau Veritas|
|ISO/IEC 27001 accreditation date||05/08/2016|
|What the ISO/IEC 27001 doesn’t cover||Available on request|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||Nokia policies are in line with industry standards such as ISO 27001. They are reviewed and updated regularly to ensure they conform with changing technologies, threats and industry best practices.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Nokia has a full software configuration and change management processes that will be shared with potential customers on request.
Release note are provided with software releases every four months.
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||Nokia conducts both Internal/ external assessments and Audits to test vulnerability in system and networks wherever feasible. Nokia has Security Vulnerability Monitoring (SVM) Process which refers to the gathering of information on attacks, vulnerabilities and available correction patches from various information sources, including RSS feeds form the Internet, and OEM partners and customers. The process assesses the relevance of this information to Nokia Networks products and issues corresponding security recommendations for further actions within Nokia Networks. The process is continuous and concurrent to the Product Life Cycle.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Nokia embed security into all our products and services. Following are the key measures in place to ensure securing the information ecosystem • Nokia Design for Security ensures that security is built into products from the start of the development and maintained throughout the lifecycle • We proactively use audits, checks and threat analysis throughout the lifecycle to identify and fix vulnerabilities • We receive incident and vulnerability information from many sources to identify emerging vulnerabilities and develop countermeasures • We carefully manage patches and upgrades and work with customers to ensure these are applied as necessary|
|Incident management type||Undisclosed|
|Incident management approach||Nokia’s Information Security is responsible for developing, implementing, maintaining and communicating Nokia's Threat and Incident Response process for information security incidents This process includes the following but is not limited to: 1. When and under what circumstances to invoke the incident response activities, and how to ensure the proper workers are available and notified 2. How and what to communicate inside and outside the Company 3. Incident closure process ensures corrective actions taken and information recorded are consistent and readable|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£1007 to £13136 per device|
|Discount for educational organisations||No|
|Free trial available||No|