Nokia UK Ltd

Software Defined Networking (SDN) for Cloud and Data Centre

Make cloud services and datacenter networks more agile with policy-based automation. Nuage Networks Virtualised Services Platform (VSP) supplies Virtualised Cloud Services (VCS) that let you automate the configuration, management and optimization of virtual networks. This includes security services that provide tenant isolation and access controls to individual applications and workloads.

Features

  • Non-disruptive software-defined networking (SDN) overlay for all server/network resources.
  • Provides a robust control plane for datacentre and cloud network.
  • Install all components in Docker containers, hypervisors, virtual machines.
  • Automate instantiation of network services and devices.
  • Controllable network resources through policies and templates that are preset.
  • Apply granular security policies in consistent way across the cloud.
  • Robust interfaces let you manage existing legacy infrastructure, leading-edge software/hardware.
  • Integrate platform with a range of tools (e.g. CloudStack, OpenStack).
  • Consumption interface controls unify/federate public/private clouds into a single cloud.
  • Cloud scale multitenant operations featuring multicast and network template capabilities.

Benefits

  • It is transparent to the underlying physical infrastructure.
  • Use policy-based automation to make IT services more responsive.
  • Helps you eliminate the constraints and complexity of cloud networking.
  • Gain competitive advantage by supporting open-source, emerging tools (Docker containers)
  • Provides a complete cloud networking framework requiring no specialized hardware.
  • Robust overlay/underlay visibility through our Virtualized Services Assurance Platform.
  • Scale to meet demands of tenants with unique application requirements.
  • Control plane maintains full per-tenant view of network/service topologies.
  • Detects changes in compute environment and instantaneously triggers policy-based responses.
  • Through RESTful APIs to VSD, define/refine service designs/incorporate enterprise policies.

Pricing

£3503 to £14011 per licence

Service documents

G-Cloud 10

858083624436863

Nokia UK Ltd

Mike Barlow

07794 920228

mike.1.barlow@nokia.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints No known constraints, indeed it is the benefit of the solution that it helps users to overcome mixed configurations of cloud and network services.
System requirements N/a

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Depends on the agreed SLAs.
Various options exist so as best to fit each clients' requirement.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Different Support levels are available to best meet your requirements.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Nokia assists its clients in the use, administration and operation of their solutions by providing relevant and comprehensive documentation and online or phone support.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Not applicable
End-of-contract process Not applicable

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility N/A
Accessibility testing N/A
API Yes
What users can and can't do using the API VCS provides robust interfaces that let you manage existing legacy infrastructure together with leading-edge software and hardware, such as Docker containers and network accelerators. You can integrate the platform with a broad range of tools and environments – from cloud platforms such as CloudStack and OpenStack to custom self-service interfaces.
API documentation Yes
API documentation formats HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The entire GUI can be customised by the Nokia specialist staff

Scaling

Scaling
Independence of resources The software defined network controllers are federated and can therefore be augmented to scale for any number of users.

Analytics

Analytics
Service usage metrics Yes
Metrics types Statistics about traffic, security breaches, performance
Reporting types
  • API access
  • Real-time dashboards

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Other
Other data at rest protection approach As defined by the customers' security standards.
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Connectivity between compute resources
Data export formats Other
Other data export formats
  • Interface via the provided API
  • Interfaces with the cloud management system
  • Configuration files
Data import formats Other
Other data import formats
  • Interface via the provided API
  • Interfaces with the cloud management system
  • Configuration files

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks IPsec or TLS VPN gateway
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability As with other Nokia services.
Approach to resilience This information is available on request.
Outage reporting As per the customers' specified BC/DR planning and policies.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Only available via user name and password
Access restriction testing frequency Less than once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for Less than 1 month
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Bureau Veritas
ISO/IEC 27001 accreditation date 05/08/2016
What the ISO/IEC 27001 doesn’t cover Available on request
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Aligned with CTPAT
  • Aligned with AEO
  • Aligned with TAPA

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Nokia policies are in line with industry standards such as ISO 27001. They are reviewed and updated regularly to ensure they conform with changing technologies, threats and industry best practices.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Nokia has a comprehensive software configuration and change management process. Changes are assessed for potential security impact.
Vulnerability management type Undisclosed
Vulnerability management approach Nokia conducts both Internal/ external assessments and Audits to test vulnerability in system and networks wherever feasible. Nokia has Security Vulnerability Monitoring (SVM) Process which refers to the gathering of information on attacks, vulnerabilities and available correction patches from various information sources, including RSS feeds form the Internet, and OEM partners and customers. The process assesses the relevance of this information to Nokia Networks products and issues corresponding security recommendations for further actions within Nokia Networks. The process is continuous and concurrent to the Product Life Cycle.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Nokia embed security into all our products and services. Following are the key measures in place to ensure securing the information ecosystem • Nokia Design for Security ensures that security is built into products from the start of the development and maintained throughout the lifecycle • We proactively use audits, checks and threat analysis throughout the lifecycle to identify and fix vulnerabilities • We receive incident and vulnerability information from many sources to identify emerging vulnerabilities and develop countermeasures • We carefully manage patches and upgrades and work with customers to ensure these are applied as necessary
Incident management type Undisclosed
Incident management approach Nokia’s Information Security is responsible for developing, implementing, maintaining and communicating Nokia's Threat and Incident Response process for information security incidents This process includes the following but is not limited to: 1. When and under what circumstances to invoke the incident response activities, and how to ensure the proper workers are available and notified 2. How and what to communicate inside and outside the Company 3. Incident closure process ensures corrective actions taken and information recorded are consistent and readable

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £3503 to £14011 per licence
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑