Nokia UK Ltd

SD WAN

Create a single, cohesive cloud environment using Nuage Networks Virtualized Network Services (VNS) to automate branch site connectivity and help buyers and enterprises reduce operational overhead and launch new services faster. This integration helps you maximise the efficiency and effectiveness of your IT operations across multiple sites and technologies.

Features

  • Datacentre features networking environment focused on virtual applications/workload mobility.
  • Provides deployment options for cloud integration and branch VPN services.
  • Add new automation/on-demand service capabilities to existing VPN/MPLS offerings.
  • Overlay model uses any IP-network to provide connectivity between sites.
  • Designed to serve enterprises adopting cloud-based IT consumption models.
  • Provisioning, configuration, optimization of network/security policies is completely automated.
  • Seamlessly links all locations while reducing need for customized networking.
  • Choose from multiple access/last-mile technologies, including copper, fibre, mobile broadband.
  • Mix and match available networks from multiple providers.
  • Includes range of branch routers and gateways at remote site.

Benefits

  • Aligns the network service with the needs of the enterprise.
  • Deliver an unconstrained network experience that matches dynamic cloud environment.
  • Complements your existing IP and Carrier Ethernet (CE) VPN services.
  • Enables maximum flexibility.
  • Facilitates seamless and automated connectivity to cloud networks.
  • Build cloud speed connectivity between your datacenters and branch offices.
  • Has a small footprint and is energy efficient.
  • Supports virtualized network functions, eliminating the need for additional hardware.
  • Streamlines operations and improves agility by automating network connectivity.
  • Automates network connectivity and services in a policy-based fashion.

Pricing

£1007 to £13136 per device

Service documents

G-Cloud 10

506344925573980

Nokia UK Ltd

Mike Barlow

07794 920228

mike.1.barlow@nokia.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints No known constraints, indeed it is the benefit of the solution that it helps users to overcome mixed configurations of cloud and network services.
System requirements N/a

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Depends on the agreed upon SLAs. Various options exist so as best to fit each client's requirement.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Different support levels are available.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Nokia assists its clients in the use, administration and operation of their solutions by providing relevant and comprehensive documentation and online or phone support.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
End-of-contract data extraction Not applicable
End-of-contract process Not applicable

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility N/A
Accessibility testing N/A
API Yes
What users can and can't do using the API VCS provides robust interfaces that let you manage existing legacy infrastructure together with leading-edge software and hardware, such as Docker containers and network accelerators. You can integrate the platform with a broad range of tools and environments – from cloud platforms such as CloudStack and OpenStack to custom self-service interfaces.
API documentation Yes
API documentation formats HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The entire GUI can be customised by the Nokia specialist staff

Scaling

Scaling
Independence of resources The software defined network controllers are federated and can therefore be augmented to scale for any number of users.

Analytics

Analytics
Service usage metrics Yes
Metrics types Statistics about traffic, security breaches, performance
Reporting types
  • API access
  • Real-time dashboards

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Other
Other data at rest protection approach As defined by the customers' security standards.
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Connectivity between compute resources
Data export formats Other
Other data export formats
  • Interface via the provided API
  • Interfaces with the cloud management system
  • Configuration files
Data import formats Other
Other data import formats
  • Interface via the provided API
  • Interfaces with the cloud management system
  • Configuration files

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks IPsec or TLS VPN gateway
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability As with other Nokia Services.
Approach to resilience This information is available on request.
Outage reporting As per the customers' specified BC/DR planning and policies.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Only available via user name and password
Access restriction testing frequency Less than once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for Less than 1 month
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for Less than 1 month
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Bureau Veritas
ISO/IEC 27001 accreditation date 05/08/2016
What the ISO/IEC 27001 doesn’t cover Available on request
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Aligned with CTPAT
  • Aligned with AEO
  • Aligned with TAPA

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Nokia policies are in line with industry standards such as ISO 27001. They are reviewed and updated regularly to ensure they conform with changing technologies, threats and industry best practices.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Nokia has a full software configuration and change management processes that will be shared with potential customers on request.
Release note are provided with software releases every four months.
Vulnerability management type Undisclosed
Vulnerability management approach Nokia conducts both Internal/ external assessments and Audits to test vulnerability in system and networks wherever feasible. Nokia has Security Vulnerability Monitoring (SVM) Process which refers to the gathering of information on attacks, vulnerabilities and available correction patches from various information sources, including RSS feeds form the Internet, and OEM partners and customers. The process assesses the relevance of this information to Nokia Networks products and issues corresponding security recommendations for further actions within Nokia Networks. The process is continuous and concurrent to the Product Life Cycle.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Nokia embed security into all our products and services. Following are the key measures in place to ensure securing the information ecosystem • Nokia Design for Security ensures that security is built into products from the start of the development and maintained throughout the lifecycle • We proactively use audits, checks and threat analysis throughout the lifecycle to identify and fix vulnerabilities • We receive incident and vulnerability information from many sources to identify emerging vulnerabilities and develop countermeasures • We carefully manage patches and upgrades and work with customers to ensure these are applied as necessary
Incident management type Undisclosed
Incident management approach Nokia’s Information Security is responsible for developing, implementing, maintaining and communicating Nokia's Threat and Incident Response process for information security incidents This process includes the following but is not limited to: 1. When and under what circumstances to invoke the incident response activities, and how to ensure the proper workers are available and notified 2. How and what to communicate inside and outside the Company 3. Incident closure process ensures corrective actions taken and information recorded are consistent and readable

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £1007 to £13136 per device
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑