Click here to close now.




















Welcome!

News Feed Item

Procera Networks' NAVL Engine Selected by Connectem for Industry's First Virtual Evolved Packet Core Solution

NAVL OEM Embedded Software Engine Provides Internet Intelligence Through Deep Packet Inspection for vEPC Product in a Virtualized Environment

FREMONT, CA -- (Marketwired) -- 06/03/14 -- Procera Networks, Inc. (NASDAQ: PKT), the global Internet Intelligence company, today announced that its Network Application Visibility Library (NAVL) has been selected by Connectem to enhance its virtual evolved packet core (vEPC), the industry's first comprehensive EPC solution for a virtual environment. Procera's NAVL software engine provides application identification, traffic visibility, intelligence and control for Connectem's solution. This ensures the Connectem vEPC offers all of the advanced traffic management functions, and delivers world-class analytics in the demanding mobile network environments that providers are building today. Additionally, this collaboration takes advantage of Network Function Virtualization (NFV), further solidifying the approach of both vendors in relation to this critical and emerging carrier initiative.

Using NAVL's Internet Intelligence, Connectem's vEPC provides ongoing, real-time application usage information that is critical to mobile providers. Such analytics and usage data can help define product mix and potential new service offerings, as well as alert operators to new and emerging trends. An increased focus on specialized service packages, the ability to clearly delineate what subscribers are doing on the network and potentially enforce policy and service level through application identification has become a critical capability.

"In our review of Procera's NAVL product, we found that Procera is committed to the vendors that are developing products for the NFV environment," said Barry Hill, founder at Connectem. "That commitment, combined with a laser-focus on simplicity of integration and performance, makes NAVL a great fit for inclusion in our vEPC product. We look forward to introducing our product in the market, knowing that we have chosen the right partner from a network analytics and deep packet inspection perspective."

James Dirksen, vice president of OEM products at Procera, stated that, "Enabling strong partners such as Connectem with state-of-the-art embedded intelligence is what NAVL was designed to do from the ground up. As the market moves toward NFV, Procera's commitment to powering these NFV solutions with embedded products remains steadfast. We have made significant investments in critical engineering functions to further expand NAVL's market leadership in this space, and feedback from our customers and prospects has been strong -- with many already making commitments to Procera's NAVL application identification engine."

NAVL's industry leading traffic signature database is updated on an ongoing basis, allowing solutions providers to keep their products current, a difficulty with a constantly evolving network landscape that includes frequently altered and newly emerging malicious sites, security threats and potential sources of Internet abuse. NAVL is a next-generation Deep Packet Inspection (DPI) software engine that provides real-time, Layer-7 classification of network traffic. Running on all popular processors and operating systems, NAVL allows integrators to remain focused on their core competencies while implementing industry-leading DPI functionality from Procera in their products.

About Connectem
Connectem Inc. was founded in 2011 by industry veterans who identified an opportunity to bring the advances of virtualization and cloud computing to the Mobile Packet Core. Connectem's Virtual Core for Mobile (VCM) Platform is one of the few true innovations to have been introduced to the mobile operator infrastructure in years, fundamentally changing the way wireless devices connect to a powerful and elastic network. With this platform, carriers for the first time can economically address the rapid growth in services, the number of IP endpoints and the associated signaling. Further information is available at www.connectem.net.

About Procera Networks, Inc.
Procera Networks, Inc. (NASDAQ: PKT) delivers Internet Intelligence solutions to service providers and network equipment manufacturers for analytics and enforcement of broadband traffic worldwide. Procera's solutions provide actionable intelligence and policy enforcement to ensure a high quality experience for any Internet and network connected device. For more information, visit http://www.proceranetworks.com or follow Procera on Twitter at @ProceraNetworks.

Cautionary Note Regarding Forward-Looking Statements
This press release contains forward-looking statements related to Procera Networks, Inc., the potential applications for Procera's products, the performance of, and demand for, Procera's products, and the ability of its products to interoperate effectively with other technologies and meet the requirements of customers. Statements in this release that are not historical or current facts are forward-looking statements. All forward-looking statements in this release are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. These statements are not guarantees of future performance and involve known and unknown risks, uncertainties and other factors that may cause Procera's actual results, performance or achievements to be materially different from any future results, performances or achievements expressed or implied by the forward-looking statements. These risks and uncertainties include, without limitation, risks and uncertainties related to the acceptance and adoption of Procera's products and solutions; Procera's ability to service and upgrade its products; its dependence on a limited product line and key customers; its dependence on key employees; its customers canceling orders or awards; its ability to achieve revenue recognition on awarded business; its ability to compete in its industry with companies that are significantly larger and have greater resources; its ability to protect its intellectual property rights in a global market; its ability to manufacture product quickly enough to meet potential demand; and other risks and uncertainties described more fully in Procera's documents filed with or furnished to the Securities and Exchange Commission. More information about these and other risks that may impact Procera Networks' business are described in the "Risk Factors" sections of its Form 10-K filed for the year ended December 31, 2013 and its Form 10-Q filed for the quarter ended March 31, 2014 and other reports filed with the SEC, which are available free of charge on the SEC's website at http://www.sec.gov or on Procera's website at http://www.proceranetworks.com. Given these risks and uncertainties, investors should not place undue reliance on forward-looking statements as a prediction of actual results. All forward-looking statements in this press release are based on information available to Procera as of the date hereof, and Procera undertakes no obligation to update, amend or clarify any forward-looking statement for any reason.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, explained the best practices of continuous testing at high scale, which is rele...
"We have been in business for 21 years and have been building many enterprise solutions, all IT plumbing - server, storage, interconnects," stated Alex Gorbachev, President of Intelligent Systems Services, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
"We specialize in testing. DevOps is all about continuous delivery and accelerating the delivery pipeline and there is no continuous delivery without testing," noted Marc Hornbeek, Sr. Solutions Architect at Spirent Communications, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. In his session at @DevOpsSummit, Haseeb Budhani, CEO and Co-founder of Soha, shared five common approaches that DevOps teams follow to secure access to applications deployed in AWS, Azure, etc., and the friction an...
"Alert Logic is a managed security service provider that basically deploys technologies, but we support those technologies with the people and process behind it," stated Stephen Coty, Chief Security Evangelist at Alert Logic, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
The essence of cloud computing is that all consumable IT resources are delivered as services. In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, demonstrated the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He discussed from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT to tran...
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprecedented opportunities to improve business and government operations, decision making and mission support capabilities.
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists addressed this very serious issue of pro...
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your user needs: document sharing and collaboration, mobile access, e-mail, even industry-specific applications. In his session at 16th Cloud Expo, Shawn Mills, President and a founder of Green House Data, discussed h...
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affect t...