Riverbed removes steel from WAN juicing Steelhead

Fake appliance goes anywhere


Riverbed has released a version of its Steelhead WAN optimization appliance that isn't an appliance. You might say it's a Steelhead without the steel.

Yes, it's a Virtual Steelhead, and the company tells us it's meant for offices that just don't have room for a (real) appliance, data centers that have already virtualized everything else, and military outfits that wanna put WAN optimization on hardware that can be dropped out of the back of an airplane. "With the Virtual, you can put it on whatever hardware you like," says Riverbed's Nik Rouda, director of marketing for Steelhead WAN Optimization.

The Virtual Steelhead will be available later this quarter.

Riverbed optimizes wide area networks by de-duping network traffic, working to quash the inefficiencies of underlying network protocols, and reducing network round trips at the application layer. Rouda says that simply by de-duping traffic, its technology can reduce bandwidth utilization by 60 to 95 per cent.

In addition to offering a (real) Steelhead appliance for optimizing WAN performance from a central location, the company offers a mobile version does much the same for individual laptops and desktops.

The unreal Steelhead appliance runs on VMware's ESX and ESXi version 4 hypervisors. But the company plans to support other hypervisors in future. ®

Similar topics


Other stories you might like

  • Singapore uncovers four critical vulnerabilities in Riverbed software
    Details emerge of the now-patched flaws

    The Government Technology Agency of Singapore's Cyber Security Group, the cybersecurity lead for the Singapore Government, has uncovered four critical flaws in code from network software company Riverbed.

    The vulnerable application is SteelCentral AppInternals, formerly referred to as AppInternals Xpert, provided by Riverbed's Aternity division. AppInternals provides application performance monitoring and diagnostics, and is part of SteelCentral. Customers usually deploying this in their datacenter and on their cloud servers to collect information about performance, transaction traces, and more, so it can all be monitored from a centralized UI.

    Specifically, the insecure code is in Dynamic Sampling Agent, which is the collection component of AppInternals. Versions affected, according to a CVE record, include 10.x, versions prior to 12.13.0, and versions prior to 11.8.8. Aternity's advisory about the security holes is locked behind a customer login page. We've asked the vendor for more information.

    Continue reading

Biting the hand that feeds IT © 1998–2022