dcsimg

Customizing the WAN Optimization User Experience

Michael Vizard

Networks are a lot like fingerprints in that no two are exactly the same. Every company has a different set of applications running across their network and given the circumstances of the day, different classes of traffic need to be prioritized at various times of the day and month.


And yet, most networks have limited abilities when it comes to identifying types of traffic and almost no ability to associate any of that traffic with specific business objectives. The folks at Exinda are out to change that with a set of wide area network (WAN) optimization appliances that allow IT organizations to accelerate and prioritize specific network traffic based on polices set by the IT organization.


Today the company extended those capabilities with the release of Exinda Edge, a more turnkey approach to WAN optimization feature application packs that are targeted over 2,500 specific Layer 7 application signatures. According to Nolan Rosen, chief marketing officer for Exinda, those application signatures are now embedded within the company's 360 Dynamic Policy Engine.

 


Rosen adds that the Exinda architecture can be federated across the enterprise via connections to Active Directory, which then allows polices and signatures to be applied to specific users and applications as they move from one branch office to another.


Exinda refers to this ability to optimize traffic patterns as WAN Optimization 2.0. Exinda is hardly alone in terms of realizing the potential business benefits of applying policies to network traffic. But they are among the first to apply those theories in practice at over 3,000 customer sites, including MLB Networks.


With the volume of traffic moving across enterprise networks these days, it's easy for traffic of little to no business value to overwhelm traffic that is critical to the business, resulting in, for example, video traffic from YouTube crowding out traffic being generated by a mission-critical SAP application. Beyond the fact that most networks tend to treat most traffic relatively equal regardless of its business value, there really is no good reason for these situations to continue to persist.


Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.




Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.


×
By using this site, you agree to the Privacy Policy