Solutions
Deploy Your Network, Anywhere in Minutes
IoT Connection
Immediately and securely connect IoT to fog, core and cloud. Use any Internet connection, eliminating the cost and complexity of VPNs or private networks. IoT Connect software can be installed on IoT devices or on edge gateways as a container or VM.
MultiCloud Connection
Easily, securely and reliably connect to any public or private cloud, without requiring VPNs, private network or infrastructure. Virtual MultiCloud Connect gateways deploy in minutes with pre-build AWS and Azure templates.
AppWAN
Use pre-built AppWANs such as IBM Watson Voice to deploy apps without network engineering and infrastructure, or spin-up your own purpose-built AppWAN, on-demand, integrating network with your app’s identity, policy, security and performance needs.
Branch Office Connect
Connect branch offices via your choice of broadband Internet providers to your WAN, clouds, IoT, remote workers and extranet partners. NetFoundry provides the security, compliance and performance, as a service, eliminating the need for infrastructure and private networks.
Learn More
 
Integrate NetFoundry endpoints inside your services
Our endpoint software enables your services to connect with security & reliability over any Internet access
What the Industry is Saying
Why digital transformation is essential for becoming a Modern Enterprise.
 
 
 
Digital transformations require application-made networks
Yesterday’s networks don’t support digital transformations.  NetFoundry enables digital transformations by enabling businesses to extend mobile, IT, IoT and cloud applications across the Internet, IT, IoT and clouds, with the security and performance of a private network solution.

NetFoundry’s unique application-made networks are deployed as software, integrated with business applications, services and solutions.  This new architecture – in which the network is embedded inside services in order to meet their connection criteria – provides the agility and flexibility required for digital transformations, eliminating the barriers caused by client-server generation network architectures.
Company News
Stay Up To Date
When It Comes to Managing Hybrid & Multi-Cloud, Our Abstraction is Your Salvation
Over a century ago, it was common for factories and large manufacturers to use on-site power production facilities. At the time, it was less expensive to produce energy as part of plant operations than it was to lean on the relatively new and unreliable power companies. Over time, technological advances increased reliability and lowered the cost of subscription-based energy delivery, making most on-site factory power plants obsolete. Computing power has followed a similar trend. Until relatively recently, it wasn't technically feasible or cost-effective to host business-critical, computationally demanding applications outside of on-site data centers. With the digital transformation push and the advent of distributed platforms and virtualization, cloud-based application hosting with incredibly high computational power, scalability, and relatively low cost has become a reality. As such, companies are pushing more to the cloud to save costs and increase agility. The Lay of the Land Small companies and startups are often born into cloud environments. They get their email taken care of with Office 365, their web presence is entirely virtual, and they typically expand infrastructure in the cloud without ever purchasing a single physical server. The barrier to compute power is significantly lower in a cloud vs. premises cost benefit analysis, so it makes sense. However, most companies that demand incredibly high-performance compute and massive scalability are not startups or small businesses, they are existing, mature companies that have been around a long time. They have data centers filled with assets running many, if not all, of the functions of their business. “Just move everything to the cloud” is an unrealistic mantra for these firms. Many large companies have started to take advantage of cloud services where it makes sense as part of a digital transformation strategy, focusing on things like customer journeys, disaster recovery, or storage first. However, these services aren’t technically tied to the company’s existing infrastructure. In order to tie services in the cloud to the network, the firm has to consider inter-connectivity, security, and performance. They’re adopting the hybrid cloud approach. In fact, this approach is popular. According to a recent 2017 McAfee cloud security report, hybrid cloud adoption grew 3X in the last year, increasing from 19% to 57%. A hybrid cloud environment consists of a mix of on-premises and cloud services that are connected to allow orchestration between the each in such a way that the combined entity acts as a single network. For example, permissions and identity management extends across both the servers that reside locally and the servers or services in the cloud without the need for replication. In fact, hybrid cloud is emerging as the preferred solution for larger businesses looking to migrate to the cloud, either completely or partially. As a byproduct of hybrid cloud adoption, firms are taking advantage of the strengths of a myriad of different providers to meet the varying needs of business services that are being developed for, or migrating to the cloud. While this multicloud strategy is emerging as a best-practice (85% of enterprises have a multi-cloud strategy in 2017, up from 82% in 2016), it brings added complexity into planning and connectivity. While many organizations simply manage the connections between and amongst these complex multicloud environments using traditional, change-averse networking solutions, the best are getting smart and abstracting themselves away from the complexity. Our Abstraction is Your Salvation We have created a unique, patented service network platform enabling IT teams to “spin up” private networks over the public Internet, that can connect public and private clouds over a unified platform – dramatically simplifying connectivity. We see the huge value in hybrid cloud and particularly multicloud, and have validated that the true value of capabilities from companies like AWS, Google, Microsoft, Rackspace and others, will be unlocked when enterprises can leverage those services fully but over secure, resilient, and high performance virtual, software defined, and policy controlled networks. The NetFoundry platform enables instant creation of cloud-to-cloud and cloud-to-edge connected solutions across the Internet, using any Internet access provider, increasing business velocity while eliminating the costs of expanding private networks and infrastructure to each cloud. To learn more about our platform and our multicloud connect solution, contact us.     Broaden Your Cloud Footprint NetFoundry enables enterprises to move applications to the cloud which they previously could not move due to insufficient security or inadequate internet performance. Adaptively and automatically route traffic across the best performing paths Proxying TCP, substituting a performant method over UDP, increases throughput by 3x to 7x compared to VPN and decreases latency Aggregate multiple networks into one according to policies, improving performance   A Secure, Performant, Less Costly Alternative to Direct Connections NetFoundry uses a layered security approach, focusing on five key areas: Authenticate before connect - No network access until endpoint authenticates Least privileged access - Endpoint is only given access it needs, as defined by your centralized access policies Dark network - NetFoundry denies any packets which have not been authorized, making the network dark. Even if a device inside the network is vulnerable, the deficiency is masked by rejecting externally originated attempts before they can reach a vulnerable device. Data-in-motion protection - Data is encrypted, streams are segmented, preventing man-in-the-middle attacks Attack surface moves away from the business - The attack surface moves to the highly resilient and protected NetFoundry core, away from less well-protected business networks, assets, and data.  
Digital Transformation Requires A New Networking Paradigm
We embrace digital technologies as a normal and persistent part of our lives, and expectations around how digital experiences present value and inspire purchasing decisions are evolving continuously. This digital disruption is so rapid, that many companies are struggling to understand how to respond. The transformation to digital business requires more than just a mobile app and a website to compete for the modern customer’s attention. In fact, the leaders of the pack have completely retooled their organizational structures, operating models, business processes, technology, skills, and cultures. Interestingly, younger, tech-centric firms often outpace their larger, established counterparts in the digital transformation arena. Many decades-old banks are struggling to pump out apps and features as fast as they can to compete with cloud and mobile-first disruptors like Square and Stripe, whose business models are almost entirely digital. As these established businesses evolve to compete, the agility they seek requires business service architectures focused on modularization. As a result, applications and services are moving to highly distributed, multi-cloud, interdependent microservices and APIs. Truly going digital involves all aspects of a business from customer engagement to fulfillment, and everything in between. It encompasses paradigm shifts in systems and process integration and deeply influences strategic decision-making at its core. So where should you begin? It's All About the Journey With the immersion of everyday life in internet connectivity, customers typically interact with a company through multiple channels, often making buying decisions based on the perception of simple, seamless usability of channel interaction. If this interaction becomes painful, the customer will often move on to other companies that offer a better experience. In many instances, the better customer experience influences buying decisions more strongly than the actual product or service being purchased. Focusing on the highest priority customer experiences (highest potential revenue generation, most complained about, fastest growing, etc.) and developing  modularity surrounding the components of those experiences to allow for agility as market demand changes is a key first step. While adaptable customer experiences and their underpinning processes are important, business functions must then be enabled in such a way that they too can be modularized and used in multiple places. In today’s world, this is done by implementing isolated, independent microservices. For example, if a customer purchases insurance, one step may require the customer to digitally sign their acceptance. If such a function is presented as a microservice (i.e. modularized), it can be reused in multiple places across many different customer engagement experiences. As digital transformation accelerates, the library of such reusable microservices will continue to grow. As the environment changes, business functions will be updated to meet the new requirements of the ecosystem. If at some point e-signatures are replaced by palm scans, updating the single microservice to meet that need ensures automatic propagation across all places that function is used. This adaptability enables fast and efficient change. A Cascading Effect Ideally the modularity that the organization applies to microservices should be extended into the infrastructure that supports them, allowing for more cost-effective and efficient scalability of high-demand services. Although integration between these systems is key, isolating technology in terms of the business services they provide makes it possible to swap certain modules of technology gradually instead of completely revamping the infrastructure. As a result, cloud virtualization and infrastructure-as-a-service (IaaS) have become the rule, rather than the exception. Making changes and adjustments in these environments is simple, inexpensive, and immediate. With constant change in applications and infrastructure, demand for network agility is on the rise, but networks and the equipment that drives them them have remained largely unchanged. SD-WANs and similar technologies have introduced some abstraction into site-to-site connectivity, but are often location, hardware, and service-provider specific. The modularity that makes the cloud and microservices so attractive requires a paradigm shift, where network edges are no longer defined by physical locations, but by application endpoints. Enter NetFoundry and application-specific networking (ASN). With application-specific networking, dependency on private circuits, proprietary hardware, and traditional telco solutions is eliminated. Our technology makes it possible to spin up highly secure, performant, app-specific networks at scale through a centralized, web-based console. These "AppWANs" abstract the network in the same way that containers and virtual machines abstract applications from underlying compute infrastructure. There are three key components that make this possible: An administrator uses NetFoundry’s console and APIs to design cloud-native, app-specific networks (AppWANs). AppWANs are programmatically controlled by application contexts and needs. The console and APIs enable the administrator to leverage orchestrators and integrations to enforce their policies, without needing to manage the orchestrator infrastructure itself. Each AppWAN is managed by a NetFoundry orchestrator. Each orchestrator manages private network overlays, enabling the administrator to benefit from NetFoundry’s network fabric, without needing to manage the underlying networks. Orchestrators interact with business and application systems such as IAM, IoT identity, and cloud policies to enable each AppWAN to be programattically controlled by the app contexts and needs. NetFoundry’s global network fabric and endpoint software enables secure, reliable networking from anywhere to anywhere. NetFoundry endpoint software connects to the fabric from any Internet connection, extending each AppWAN to the application edge. The software is installed on personal devices, deployed on edges (enterprise, IoT, cloud) as vCPE, and integrated with apps via APIs and SDKs. The software routes each session to the NetFoundry network fabric, and adaptively manages QoE during each session. Moreover, since digital transformation is a gradual process, NetFoundry gives businesses the ability to meet the needs of the digitally transformed application environment, while interworking with existing networks and systems to continue to serve current needs. As business services are modularized in the transformation, AppWANs can be spun up, segmented, and adjusted in real-time to secure and connect them to the rest of company ecosystem. To learn more about AppWANs, application-specific networks, and how NetFoundry can simplify your digital transformation, contact us.  
Neustar and NetFoundry Deliver World’s First Identity-Secured IoT Networking Solution
End-to-end, network-independent security, compliance and reliability   October 4, 2017 – BARCELONA, Spain and STERLING, Va. – Neustar, Inc., a trusted, neutral provider of real-time information services, and NetFoundryTM, a Tata Communications business incubated in Tata Communications’ ‘Shape the Future’ program, announced an integration between the Neustar Trusted Device Identity (TDI) solution and NetFoundry’s Application Specific Networking (ASN) platform, which provides customers with superior security, extending trusted identity based solutions across multiple networks and clouds. The Neustar Trusted Device Identity (TDI) solution, built-on-top of the NetFoundry Application-Specific platform, reduces the time, cost and risk of implementing secure end-to-end solutions. "Creating a secure end-to-end environment based on identity for devices and secure core transport to the edge is necessary for IoT to gain adoption," said Hank Skorny, SVP of IoT, Neustar. “Neustar and NetFoundry together provide a highly secure, highly manageable and recoverable environment to secure communications between any and all parties.” “Traditional networking with the use of PKI and firewalls has been manageable to date, but the digitally transformed applications landscape requires the app contexts, such as identity, to programmatically define the network,” said Galeal Zino, Founder of NetFoundry. “Our platform enables leading solutions from innovative partners such as Neustar to program the network to enforce each application’s identity, access and security policies, rather than trying to manually manage a separate set of policies on the network.” PKI-based identity management solutions are leaving IoT enterprises exposed and overburdened with the need for certificate management of thousands of devices. Neustar TDI delivers a next-generation approach to trusted identity management, offering the scale and security required for the Internet of Things. By applying this new approach to traditional PKI with multi-factor device authentication, Neustar TDI can authenticate and revoke identities in real-time, monitor and detect behavior anomalies, as well as enable organizations to quickly isolate and recover from breaches. This way the IT Network Operations Center (NOC) can take back control of revocation and restoration. The NetFoundry platform enables leading solution providers like Neustar to integrate application specific networking into their solutions (“AppWANs”) with no restrictions on network providers, VPNs or custom CPE. Each AppWAN is driven by the context of the application, such as identity, compliance and performance needs, enforcing application level micro-segmentation across any set of networks and clouds, with superior performance and security results, while enabling complete, centralized control and visibility of each AppWAN. The Neustar and NetFoundry implementation is ideal for microservices-based architectures, such as the one developed by the open source EdgeX Foundry project of the Linux Foundation, of which both Neustar and NetFoundry are founding members. Customers using a TDI and NetFoundry end-to-end solution benefit from: Real-time activation and revocation Route validation Secure remote management Anomaly detection Multi-factor authentication Recovery without the need to re-key Endpoint and identity management The security and efficiency of end-to-end identity driven networking Enhanced application performance with dynamic path optimization and remediation Application level micro-segmentation with data-in-motion encryption and isolation A secure end-to-end Networking Platform as a Service (NPaaS) solution will be demonstrated by Neustar and NetFoundry at the Linux Foundation/EdgeX Foundry booth at IoT Solutions World Congress in Barcelona, Spain from October 3-5.   About NetFoundry NetFoundry is leading the next generation of networking providers, using software to connect application endpoints, as opposed to traditional SD-WAN and MPLS WANs which use CPE to connect sites.  Each NetFoundry AppWAN is driven by the contexts of the app, and can be software integrated into partner services and platforms.  Security and performance are built into each AppWAN, so that customers can choose any set of networks and clouds and still get the security, compliance and reliability they require.  NetFoundry is a Tata Communications business incubated in Tata Communications’ Shape the Future program, headquartered in Charlotte, North Carolina, with offices in San Francisco, Austin, New York, Bangalore and Singapore.   About Neustar Every day, the world generates roughly 2.5 quadrillion bits of data. Neustar isolates certain elements and analyzes, simplifies and edits them to make precise and valuable decisions that drive results. As one of the few companies capable of knowing with certainty who is on the other end of every interaction, we’re trusted by the world’s great brands to make critical decisions some 20 billion times a day. We help marketers send timely and relevant messages to the right people. Because we can authoritatively tell a client exactly who is calling or connecting with them, we make critical real-time responses possible. And the same comprehensive information that enables our clients to direct and manage orders also stops attackers. We know when someone isn’t who they claim to be, which helps stop fraud and denial of service before they’re a problem.  Because we’re also an experienced manager of some of the world’s most complex databases, we help clients control their online identity, registering and protecting their domain name, and routing traffic to the correct network address.  By linking the most essential information with the people who depend on it, we provide more than 11,000 clients worldwide with decisions—not just data.  More information is available at https://www.neustar.biz.   Neustar Media Contact Kim Maynard Kimberly.Maynard@neustar.biz 415-238-0362   NetFoundry Media Contact Orietta Sutherberry osutherberry@zonicgroup.com +44-780313-7126
NetFoundry Beta Program
Join the adventurous few and help us shape the future. Plus get access to all the newest features.

Learn More