|By PR Newswire||
|March 20, 2014 05:01 AM EDT||
PARIS, March 20, 2014 /PRNewswire/ --
New range of purpose-built router solutions meets under-served needs of operators, Cloud and communication service providers in high-performance router space
OneAccess, a global provider of specialist multi-service access routers for telecom operators and communication service providers (CSPs), today steps into the high performance 'mid-range' router market to offer a direct challenge to Cisco, the sector's dominant and currently uncontested leader.
OneAccess' purpose-built network access solutions are designed to address the unique challenges faced by operators, Cloud and managed service providers as they gradually migrate both their networks and services to virtualized and all-IP environments. In the fiercely competitive branch-office router market, OneAccess' express focus on operators and CSPs has already resulted in EMEA unit shipments surpassing those of Cisco. Today's announcement maintains this recipe for success and extends OneAccess' support to operators and CSPs to include higher-performance router solutions, most commonly deployed in Cloud and central locations with high data exchange requirements over the WAN.
"Cisco's network access equipment and its distributor-based go-to-market model are designed for the enterprise market, which has a very different set of requirements to those of operators and CSPs," comments Pravin Mirchandani, CMO, OneAccess. "We have successfully redressed this imbalance in the branch-office router market by working collaboratively with our operator customers to purpose-build a range of solutions that meet their needs. Now we are extending this model to offer this customer segment faster and more flexible solutions, with fiercely competitive price performance ratios, that can be deployed in the central and high capacity Cloud environments."
Operators and CSPs worldwide are challenged by an unremitting requirement to reduce TCO, increase network performance and drive competitive differentiation through the provision of new and innovative managed network services. As the market continues to shift toward Cloud and virtualized network infrastructures, operators and CSPs must also update their networks, replacing obsolete legacy equipment with access solutions capable of delivering the next generation of hybrid all-IP WAN designs, complete with the necessary multi-path links and application performance monitoring functionality that will support their evolving SLA commitments to customers.
The One25XX series offers layer 2 and layer 3 convergence, enabling operators and CSPs to deliver conventional Carrier Ethernet and IP services in one box. It also replaces multiple processors with a single multi-core CPU, enabling the device to be reduced in size and increasing mean time between failure.
"We understand that the greatest TCO savings in network access technologies are realized when the equipment is both flexible and future-proofed," adds Mirchandani. "OneAccess provides the widest choice of access technologies available and is committed to supporting all combinations of these technologies, both today and in the future. Unlike larger vendors, we are culturally attuned to the individual market needs of operators; we work with them directly and collaboratively to identify a multi-service access solution suited to their specific requirements. We are very excited to bring this dedicated approach to a brand new market sector for us."
OneAccess' carrier-class routers and EADs enable operators to 'mass-customize' their network access capabilities, installing the same access platforms with all customers, but provisioning only the services required by each. This means they can centralize IT control, minimize the need for costly site visits and implement remote service updates across multiple customers simultaneously.
By making substantial TCO reductions, OneAccess' solutions can alleviate the pressures operators are facing globally due to increased competition, higher customer expectations, exponential increases in data volumes and reduced ARPU.
OneAccess designs, develops and markets innovative platforms for the profitable delivery of CPE-based managed network services for communication service providers (CSPs). Its multi-service access routers and Carrier Ethernet devices are designed to ensure service continuity and a high quality of experience for managed broadband and wireless data and voice services targeted at enterprise customers. OneAccess service-delivery platforms align with the current and future deployment and operating models of service providers by optimizing the delivery of managed Cloud services and migration to SDN architectures. OneAccess CPE platforms are used by more than 150 communication service providers internationally, including some of the world's largest telecommunications companies. With a global presence that includes North America, Europe and Asia, OneAccess, a private company, was incorporated in 2001.
For more information, visit http://www.oneaccess-net.com
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use c...
Feb. 1, 2015 10:15 AM EST Reads: 2,102
NuoDB just introduced the Swifts 2.1 Release. In this demo at 15th Cloud Expo, Seth Proctor, CTO of NuoDB, Inc., discussed why scaling databases in the cloud is challenging, why building your application on top of the infrastructure that is designed with this in mind makes a difference, and what you can do with NuoDB that simplifies your programming model, your operations model.
Feb. 1, 2015 10:15 AM EST Reads: 1,706
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session a...
Feb. 1, 2015 10:00 AM EST Reads: 2,569
“We are a managed services company. We have taken the key aspects of the cloud and the purposed data center and merged the two together and launched the Purposed Cloud about 18–24 months ago," explained Chetan Patwardhan, CEO of Stratogent, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 1, 2015 10:00 AM EST Reads: 2,150
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With "smart" appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user's habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps,...
Feb. 1, 2015 10:00 AM EST Reads: 3,312
“The year of the cloud – we have no idea when it's really happening but we think it's happening now. For those technology providers like Zentera that are helping enterprises move to the cloud - it's been fun to watch," noted Mike Loftus, VP Product Management and Marketing at Zentera Systems, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 1, 2015 10:00 AM EST Reads: 2,471
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates hundreds of DNS queries. In addition, as more internet-enabled ‘Things' get connected, people will rely on DNS to name and find their fridges, toasters and toilets. Acco...
Feb. 1, 2015 10:00 AM EST Reads: 3,308
"For over 25 years we have been working with a lot of enterprise customers and we have seen how companies create applications. And now that we have moved to cloud computing, mobile, social and the Internet of Things, we see that the market needs a new way of creating applications," stated Jesse Shiah, CEO, President and Co-Founder of AgilePoint Inc., in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 1, 2015 09:30 AM EST Reads: 2,472
“We are strong believers in the DevOps movement and our staff has been doing DevOps for large enterprise environments for a number of years. The solution that we build is intended to allow DevOps teams to do security at the speed of DevOps," explained Justin Lundy, Founder & CTO of Evident.io, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 1, 2015 09:00 AM EST Reads: 2,362
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 1, 2015 09:00 AM EST Reads: 2,870
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
Feb. 1, 2015 09:00 AM EST Reads: 2,963
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, ...
Feb. 1, 2015 09:00 AM EST Reads: 3,013
"Application monitoring and intelligence can smooth the path in a DevOps environment. In a DevOps environment you see constant change. If you are trying to monitor things in a constantly changing environment, you're going to spend a lot of your job fixing your monitoring," explained Todd Rader, Solutions Architect at AppDynamics, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 1, 2015 09:00 AM EST Reads: 2,979
"Desktop as a Service is emerging as a very big trend. One of the big influencers of this – for Esri – is that we have a large user base that uses virtualization and they are looking at Desktop as a Service right now," explained John Meza, Product Engineer at Esri, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 1, 2015 09:00 AM EST Reads: 2,476
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
Feb. 1, 2015 09:00 AM EST Reads: 2,715