Solutions
Deploy Your Network, Anywhere in Minutes
IoT Connection
Immediately and securely connect IoT to fog, core and cloud. Use any Internet connection, eliminating the cost and complexity of VPNs or private networks. IoT Connect software can be installed on IoT devices or on edge gateways as a container or VM.
MultiCloud Connection
Easily, securely and reliably connect to any public or private cloud, without requiring VPNs, private network or infrastructure. Virtual MultiCloud Connect gateways deploy in minutes with pre-build AWS and Azure templates.
AppWAN
Use pre-built AppWANs such as IBM Watson Voice to deploy apps without network engineering and infrastructure, or spin-up your own purpose-built AppWAN, on-demand, integrating network with your app’s identity, policy, security and performance needs.
Branch Office Connect
Connect branch offices via your choice of broadband Internet providers to your WAN, clouds, IoT, remote workers and extranet partners. NetFoundry provides the security, compliance and performance, as a service, eliminating the need for infrastructure and private networks.
Learn More
 
Integrate NetFoundry endpoints inside your services
Our endpoint software enables your services to connect with security & reliability over any Internet access
What the Industry is Saying
Why digital transformation is essential for becoming a Modern Enterprise.
 
 
 
Digital transformations require application-made networks
Yesterday’s networks don’t support digital transformations.  NetFoundry enables digital transformations by enabling businesses to extend mobile, IT, IoT and cloud applications across the Internet, IT, IoT and clouds, with the security and performance of a private network solution.

NetFoundry’s unique application-made networks are deployed as software, integrated with business applications, services and solutions.  This new architecture – in which the network is embedded inside services in order to meet their connection criteria – provides the agility and flexibility required for digital transformations, eliminating the barriers caused by client-server generation network architectures.
Company News
Stay Up To Date
Digital Transformation Requires A New Networking Paradigm
We embrace digital technologies as a normal and persistent part of our lives, and expectations around how digital experiences present value and inspire purchasing decisions are evolving continuously. This digital disruption is so rapid, that many companies are struggling to understand how to respond. The transformation to digital business requires more than just a mobile app and a website to compete for the modern customer’s attention. In fact, the leaders of the pack have completely retooled their organizational structures, operating models, business processes, technology, skills, and cultures. Interestingly, younger, tech-centric firms often outpace their larger, established counterparts in the digital transformation arena. Many decades-old banks are struggling to pump out apps and features as fast as they can to compete with cloud and mobile-first disruptors like Square and Stripe, whose business models are almost entirely digital. As these established businesses evolve to compete, the agility they seek requires business service architectures focused on modularization. As a result, applications and services are moving to highly distributed, multi-cloud, interdependent microservices and APIs. Truly going digital involves all aspects of a business from customer engagement to fulfillment, and everything in between. It encompasses paradigm shifts in systems and process integration and deeply influences strategic decision-making at its core. So where should you begin? It's All About the Journey With the immersion of everyday life in internet connectivity, customers typically interact with a company through multiple channels, often making buying decisions based on the perception of simple, seamless usability of channel interaction. If this interaction becomes painful, the customer will often move on to other companies that offer a better experience. In many instances, the better customer experience influences buying decisions more strongly than the actual product or service being purchased. Focusing on the highest priority customer experiences (highest potential revenue generation, most complained about, fastest growing, etc.) and developing  modularity surrounding the components of those experiences to allow for agility as market demand changes is a key first step. While adaptable customer experiences and their underpinning processes are important, business functions must then be enabled in such a way that they too can be modularized and used in multiple places. In today’s world, this is done by implementing isolated, independent microservices. For example, if a customer purchases insurance, one step may require the customer to digitally sign their acceptance. If such a function is presented as a microservice (i.e. modularized), it can be reused in multiple places across many different customer engagement experiences. As digital transformation accelerates, the library of such reusable microservices will continue to grow. As the environment changes, business functions will be updated to meet the new requirements of the ecosystem. If at some point e-signatures are replaced by palm scans, updating the single microservice to meet that need ensures automatic propagation across all places that function is used. This adaptability enables fast and efficient change. A Cascading Effect Ideally the modularity that the organization applies to microservices should be extended into the infrastructure that supports them, allowing for more cost-effective and efficient scalability of high-demand services. Although integration between these systems is key, isolating technology in terms of the business services they provide makes it possible to swap certain modules of technology gradually instead of completely revamping the infrastructure. As a result, cloud virtualization and infrastructure-as-a-service (IaaS) have become the rule, rather than the exception. Making changes and adjustments in these environments is simple, inexpensive, and immediate. With constant change in applications and infrastructure, demand for network agility is on the rise, but networks and the equipment that drives them them have remained largely unchanged. SD-WANs and similar technologies have introduced some abstraction into site-to-site connectivity, but are often location, hardware, and service-provider specific. The modularity that makes the cloud and microservices so attractive requires a paradigm shift, where network edges are no longer defined by physical locations, but by application endpoints. Enter NetFoundry and application-specific networking (ASN). With application-specific networking, dependency on private circuits, proprietary hardware, and traditional telco solutions is eliminated. Our technology makes it possible to spin up highly secure, performant, app-specific networks at scale through a centralized, web-based console. These "AppWANs" abstract the network in the same way that containers and virtual machines abstract applications from underlying compute infrastructure. There are three key components that make this possible: An administrator uses NetFoundry’s console and APIs to design cloud-native, app-specific networks (AppWANs). AppWANs are programmatically controlled by application contexts and needs. The console and APIs enable the administrator to leverage orchestrators and integrations to enforce their policies, without needing to manage the orchestrator infrastructure itself. Each AppWAN is managed by a NetFoundry orchestrator. Each orchestrator manages private network overlays, enabling the administrator to benefit from NetFoundry’s network fabric, without needing to manage the underlying networks. Orchestrators interact with business and application systems such as IAM, IoT identity, and cloud policies to enable each AppWAN to be programattically controlled by the app contexts and needs. NetFoundry’s global network fabric and endpoint software enables secure, reliable networking from anywhere to anywhere. NetFoundry endpoint software connects to the fabric from any Internet connection, extending each AppWAN to the application edge. The software is installed on personal devices, deployed on edges (enterprise, IoT, cloud) as vCPE, and integrated with apps via APIs and SDKs. The software routes each session to the NetFoundry network fabric, and adaptively manages QoE during each session. Moreover, since digital transformation is a gradual process, NetFoundry gives businesses the ability to meet the needs of the digitally transformed application environment, while interworking with existing networks and systems to continue to serve current needs. As business services are modularized in the transformation, AppWANs can be spun up, segmented, and adjusted in real-time to secure and connect them to the rest of company ecosystem. To learn more about AppWANs, application-specific networks, and how NetFoundry can simplify your digital transformation, contact us.  
Neustar and NetFoundry Deliver World’s First Identity-Secured IoT Networking Solution
End-to-end, network-independent security, compliance and reliability   October 4, 2017 – BARCELONA, Spain and STERLING, Va. – Neustar, Inc., a trusted, neutral provider of real-time information services, and NetFoundryTM, a Tata Communications business incubated in Tata Communications’ ‘Shape the Future’ program, announced an integration between the Neustar Trusted Device Identity (TDI) solution and NetFoundry’s Application Specific Networking (ASN) platform, which provides customers with superior security, extending trusted identity based solutions across multiple networks and clouds. The Neustar Trusted Device Identity (TDI) solution, built-on-top of the NetFoundry Application-Specific platform, reduces the time, cost and risk of implementing secure end-to-end solutions. "Creating a secure end-to-end environment based on identity for devices and secure core transport to the edge is necessary for IoT to gain adoption," said Hank Skorny, SVP of IoT, Neustar. “Neustar and NetFoundry together provide a highly secure, highly manageable and recoverable environment to secure communications between any and all parties.” “Traditional networking with the use of PKI and firewalls has been manageable to date, but the digitally transformed applications landscape requires the app contexts, such as identity, to programmatically define the network,” said Galeal Zino, Founder of NetFoundry. “Our platform enables leading solutions from innovative partners such as Neustar to program the network to enforce each application’s identity, access and security policies, rather than trying to manually manage a separate set of policies on the network.” PKI-based identity management solutions are leaving IoT enterprises exposed and overburdened with the need for certificate management of thousands of devices. Neustar TDI delivers a next-generation approach to trusted identity management, offering the scale and security required for the Internet of Things. By applying this new approach to traditional PKI with multi-factor device authentication, Neustar TDI can authenticate and revoke identities in real-time, monitor and detect behavior anomalies, as well as enable organizations to quickly isolate and recover from breaches. This way the IT Network Operations Center (NOC) can take back control of revocation and restoration. The NetFoundry platform enables leading solution providers like Neustar to integrate application specific networking into their solutions (“AppWANs”) with no restrictions on network providers, VPNs or custom CPE. Each AppWAN is driven by the context of the application, such as identity, compliance and performance needs, enforcing application level micro-segmentation across any set of networks and clouds, with superior performance and security results, while enabling complete, centralized control and visibility of each AppWAN. The Neustar and NetFoundry implementation is ideal for microservices-based architectures, such as the one developed by the open source EdgeX Foundry project of the Linux Foundation, of which both Neustar and NetFoundry are founding members. Customers using a TDI and NetFoundry end-to-end solution benefit from: Real-time activation and revocation Route validation Secure remote management Anomaly detection Multi-factor authentication Recovery without the need to re-key Endpoint and identity management The security and efficiency of end-to-end identity driven networking Enhanced application performance with dynamic path optimization and remediation Application level micro-segmentation with data-in-motion encryption and isolation A secure end-to-end Networking Platform as a Service (NPaaS) solution will be demonstrated by Neustar and NetFoundry at the Linux Foundation/EdgeX Foundry booth at IoT Solutions World Congress in Barcelona, Spain from October 3-5.   About NetFoundry NetFoundry is leading the next generation of networking providers, using software to connect application endpoints, as opposed to traditional SD-WAN and MPLS WANs which use CPE to connect sites.  Each NetFoundry AppWAN is driven by the contexts of the app, and can be software integrated into partner services and platforms.  Security and performance are built into each AppWAN, so that customers can choose any set of networks and clouds and still get the security, compliance and reliability they require.  NetFoundry is a Tata Communications business incubated in Tata Communications’ Shape the Future program, headquartered in Charlotte, North Carolina, with offices in San Francisco, Austin, New York, Bangalore and Singapore.   About Neustar Every day, the world generates roughly 2.5 quadrillion bits of data. Neustar isolates certain elements and analyzes, simplifies and edits them to make precise and valuable decisions that drive results. As one of the few companies capable of knowing with certainty who is on the other end of every interaction, we’re trusted by the world’s great brands to make critical decisions some 20 billion times a day. We help marketers send timely and relevant messages to the right people. Because we can authoritatively tell a client exactly who is calling or connecting with them, we make critical real-time responses possible. And the same comprehensive information that enables our clients to direct and manage orders also stops attackers. We know when someone isn’t who they claim to be, which helps stop fraud and denial of service before they’re a problem.  Because we’re also an experienced manager of some of the world’s most complex databases, we help clients control their online identity, registering and protecting their domain name, and routing traffic to the correct network address.  By linking the most essential information with the people who depend on it, we provide more than 11,000 clients worldwide with decisions—not just data.  More information is available at https://www.neustar.biz.   Neustar Media Contact Kim Maynard Kimberly.Maynard@neustar.biz 415-238-0362   NetFoundry Media Contact Orietta Sutherberry osutherberry@zonicgroup.com +44-780313-7126
The IoT Solutions World Congress - it's all about Use Cases
At NetFoundry, our vision is to make it easy to spin up highly secure and performant global Application-Specific Networks (ASNs). Users can spin-up globally available app-driven networks in minutes and these “AppWANs” include endpoint identity, identity and access management (IAM) policies, and Quality of Experience (QoE) policies. Since this week at the IoT Solutions World Congress is all about use cases, the NetFoundry team is showcasing a few exciting demonstrations to showcase the power and agility of Application-Specific Networking.  More specifically, in IoT deployments, identity is critical to endpoint protection, secure access and data integrity for all real-time communications and we'll show you how we use identity and app-context to provide highly secure and reliable connections over any network. The main demonstration highlights using the NetFoundry web console to spin up a software-driven MultiCloud AppWAN to show superior application performance and security across any network, including the public internet. This demo highlights the application performance and responsiveness when using the NetFoundry platform for edge-to-cloud and cloud-to-cloud application-specific networks. Another unique demonstration highlights a "Smart Parking Architecture" where a local sensor needs secure access to a Remote Parking Management Application.  In this demonstration, the Neustar TDI authenticates and revokes identities in real-time while the NetFoundry platform secures and encrypts all data-in-motion from end-to-end. You can read more about Neustar TDI and NetFoundry here. Finally, an innovative demonstrations shows a Secure Automotive Electronic Control Unit (ECU) where a smart car requires secure and reliable access over the public internet to the Microsoft Azure IoT Hub.  In this demonstration, NetFoundry leverages Micron’s strong device identity and hardware roots of trust to securely and reliably deliver the automotive ECU over an unsecure network. You can read more about the Micron Authenta™ technology and NetFoundry here Where to find us? As a founding company of the EdgeX Foundry, we're in the EdgeX Foundry pavilion with other EdgeX partners, including Dell, Micron, Neustar, VMware, and others.  Come check us out in Hall 5, Booth E541 and our booth hosts will answer any questions. You can also find us on Twitter and Linkedin!
NetFoundry Beta Program
Join the adventurous few and help us shape the future. Plus get access to all the newest features.

Learn More