Make cloud services and datacenter networks more agile with policy-based automation. Nuage Networks Virtualised Services Platform (VSP) supplies Virtualised Cloud Services (VCS) that let you automate the configuration, management and optimization of virtual networks. This includes security services that provide tenant isolation and access controls to individual applications and workloads.
- Non-disruptive software-defined networking (SDN) overlay for all server/network resources.
- Provides a robust control plane for datacentre and cloud network.
- Install all components in Docker containers, hypervisors, virtual machines.
- Automate instantiation of network services and devices.
- Controllable network resources through policies and templates that are preset.
- Apply granular security policies in consistent way across the cloud.
- Robust interfaces let you manage existing legacy infrastructure, leading-edge software/hardware.
- Integrate platform with a range of tools (e.g. CloudStack, OpenStack).
- Consumption interface controls unify/federate public/private clouds into a single cloud.
- Cloud scale multitenant operations featuring multicast and network template capabilities.
- It is transparent to the underlying physical infrastructure.
- Use policy-based automation to make IT services more responsive.
- Helps you eliminate the constraints and complexity of cloud networking.
- Gain competitive advantage by supporting open-source, emerging tools (Docker containers)
- Provides a complete cloud networking framework requiring no specialized hardware.
- Robust overlay/underlay visibility through our Virtualized Services Assurance Platform.
- Scale to meet demands of tenants with unique application requirements.
- Control plane maintains full per-tenant view of network/service topologies.
- Detects changes in compute environment and instantaneously triggers policy-based responses.
- Through RESTful APIs to VSD, define/refine service designs/incorporate enterprise policies.
£3503 to £14011 per licence
Nokia UK Ltd
|Software add-on or extension||No|
|Cloud deployment model||Hybrid cloud|
|Service constraints||No known constraints, indeed it is the benefit of the solution that it helps users to overcome mixed configurations of cloud and network services.|
|Email or online ticketing support||Yes, at extra cost|
|Support response times||
Depends on the agreed SLAs.
Various options exist so as best to fit each clients' requirement.
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
|Support levels||Different Support levels are available to best meet your requirements.|
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||Nokia assists its clients in the use, administration and operation of their solutions by providing relevant and comprehensive documentation and online or phone support.|
|End-of-contract data extraction||Not applicable|
|End-of-contract process||Not applicable|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||No|
|Accessibility standards||None or don’t know|
|Description of accessibility||N/A|
|What users can and can't do using the API||VCS provides robust interfaces that let you manage existing legacy infrastructure together with leading-edge software and hardware, such as Docker containers and network accelerators. You can integrate the platform with a broad range of tools and environments – from cloud platforms such as CloudStack and OpenStack to custom self-service interfaces.|
|API documentation formats||HTML|
|API sandbox or test environment||Yes|
|Description of customisation||The entire GUI can be customised by the Nokia specialist staff|
|Independence of resources||The software defined network controllers are federated and can therefore be augmented to scale for any number of users.|
|Service usage metrics||Yes|
|Metrics types||Statistics about traffic, security breaches, performance|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||Other|
|Other data at rest protection approach||As defined by the customers' security standards.|
|Data sanitisation process||No|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||Connectivity between compute resources|
|Data export formats||Other|
|Other data export formats||
|Data import formats||Other|
|Other data import formats||
|Data protection between buyer and supplier networks||IPsec or TLS VPN gateway|
|Data protection within supplier network||IPsec or TLS VPN gateway|
Availability and resilience
|Guaranteed availability||As with other Nokia services.|
|Approach to resilience||This information is available on request.|
|Outage reporting||As per the customers' specified BC/DR planning and policies.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Only available via user name and password|
|Access restriction testing frequency||Less than once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||You control when users can access audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||You control when users can access audit information|
|How long supplier audit data is stored for||Less than 1 month|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||Bureau Veritas|
|ISO/IEC 27001 accreditation date||05/08/2016|
|What the ISO/IEC 27001 doesn’t cover||Available on request|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||Nokia policies are in line with industry standards such as ISO 27001. They are reviewed and updated regularly to ensure they conform with changing technologies, threats and industry best practices.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Nokia has a comprehensive software configuration and change management process. Changes are assessed for potential security impact.|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||Nokia conducts both Internal/ external assessments and Audits to test vulnerability in system and networks wherever feasible. Nokia has Security Vulnerability Monitoring (SVM) Process which refers to the gathering of information on attacks, vulnerabilities and available correction patches from various information sources, including RSS feeds form the Internet, and OEM partners and customers. The process assesses the relevance of this information to Nokia Networks products and issues corresponding security recommendations for further actions within Nokia Networks. The process is continuous and concurrent to the Product Life Cycle.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Nokia embed security into all our products and services. Following are the key measures in place to ensure securing the information ecosystem • Nokia Design for Security ensures that security is built into products from the start of the development and maintained throughout the lifecycle • We proactively use audits, checks and threat analysis throughout the lifecycle to identify and fix vulnerabilities • We receive incident and vulnerability information from many sources to identify emerging vulnerabilities and develop countermeasures • We carefully manage patches and upgrades and work with customers to ensure these are applied as necessary|
|Incident management type||Undisclosed|
|Incident management approach||Nokia’s Information Security is responsible for developing, implementing, maintaining and communicating Nokia's Threat and Incident Response process for information security incidents This process includes the following but is not limited to: 1. When and under what circumstances to invoke the incident response activities, and how to ensure the proper workers are available and notified 2. How and what to communicate inside and outside the Company 3. Incident closure process ensures corrective actions taken and information recorded are consistent and readable|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£3503 to £14011 per licence|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|