Professional Documents
Culture Documents
SD-WAN Comparison Chart: Cisco Velocloud Versa Silver Peak
SD-WAN Comparison Chart: Cisco Velocloud Versa Silver Peak
Cisco public
Advanced Security
Advanced branch
threat defense
Cisco’s converged branch platform Limited Offers integrated Limited
integrates real-time contextual next-generation firewall and
Offers access-control Offers access-control lists,
awareness, security automation, and intrusion detection system.
lists, stateful firewall, stateful firewall, and Network
industry-leading threat prevention,
and Network Address Address Translation only.
malware protection, EAL4-certified
Translation only.
perimeter defense, and web security.
End-to-end secure
architecture
Site-to-site and remote-access VPN
technologies, DMVPN, GET VPN,
FlexVPN, SSL VPN help protect
sensitive enterprise communications.
NIST-approved, line-rate encryption
secures data in motion.
Real-time threat
intelligence
Cloud-delivered, integrated security Requires a third-party Limited Requires a third-party solution.
service for Cisco branch routers, solution. Supports an intrusion-
providing protection against malware, detection system but not
botnets, phishing, and targeted online detection of DNS-layer attacks.
attacks at the DNS layer.
Network as sensor
and enforcer
Trustworthy systems
User Experience
Application-aware
WAN
Monitor more than 1400 applications Claims to monitor more Claims to monitor more Supported via deep packet
and network performance. than 2500 applications. than 2000 applications and inspection and DNS snooping.
Troubleshoot issues quickly. Deploy Offers application group protocols. Offers application Used in application steering,
business-intent policies across the support and application group support, application QOS, WAN optimization, and
entire network with no probes or filter support. filter support, and application security policies.
additional hardware. visibility and log support.
Application high
availability
Monitor path performance and Monitor path performance Monitor path performance Monitor path performance
apply what is learned to select and apply what is and apply what is learned and apply what is learned
the best network path for a given learned to select the best to select the best network to select the best network
application. Effectively load-balance network path for a given path for a given application. path for a given application.
across paths while delivering ideal application. Effectively Effectively load-balance across Effectively load-balance across
application-level SLAs. load-balance across paths paths while delivering ideal paths while delivering ideal
while delivering ideal application-level SLAs. application-level SLAs.
application-level SLAs.
Enhanced application
experience
Cisco’s software- and hardware- Limited Limited Fully integrated WAN optimization
integrated solution offers bandwidth Integrated forward error Integrated forward error and acceleration.
optimization, application acceleration, correction and tunnel correction and tunnel bonding-
and intelligent caching. bonding-type features. type features. Requires third
Requires third party for party for WAN optimization.
WAN optimization.
Seamless cloud
extension
Last-mile network
resiliency
Agility
Open and
programmable
Pay-as-you-grow
services
Software licensing
packages
Virtualization
Enterprise
Network Functions
Virtualization Simplify operations and deployment Supports third-party Supports third-party Limited
of virtual routing, security, and VNF hosting. VNF hosting.
Available as a VNF.
application services.
Native application
hosting
Integrated compute
and storage
Services
Depth of services
portfolio
Provides a diverse and complete Limited Multiservice capabilities for
lifecycle of advisory, implementation, SD-WAN, including enterprise, Limited
Limited portfolio of strategic
optimization, technical, managed, and managed, and cloud IP platform. Tiered Managed SD-WAN
planning and advisory
training service offers for SD-WAN and Service provides various levels
services. Service delivery/
intent-based networking. of service: base, integrated,
orchestration and analytics
enhanced (optimization), and
through Velocloud’s
cloud optimization. Limited
Virtual Services’ NSX
portfolio of strategic planning and
SD-WAN solution relies
advisory services as well as end-
on multiple virtualized
to-end solution support.
network functions.
Ease of getting
started
SD-WAN Advise and Implement Velocloud’s NSX SD-WAN Limited Tiered Managed SD-WAN
Quick Start accelerates adoption integrates with existing The managed SD-WAN Service allows customers to add
with predefined project scope and service provider networks solution has built-in service or upgrade software capabilities
budget to simplify implementation for wide-area networking chaining to easily integrate through their service provider.
with validated best practices. Get that integrates advanced with existing third-party Within the Tiered Managed
centralized 24/7 support from expert services through a zero- network and security functions SD-WAN Service, Silver Peak
engineers and a primary point of touch deployment model. in the branch office. You offers the Unity EdgeConnect
contact, accountable from first call Offers a limited free can schedule a demo, but SD-WAN Solution that includes
to resolution. trial evaluation. there are no free trials or service chaining.
quick-start offers.
Strength of services
for security
Technology-agnostic services Limited Managed services combine Uses EdgeConnect simplified
create a security strategy to reduce Virtual service delivery is SD-WAN capabilities with a service chaining with cloud-
implementation risks. Cisco Advanced reliant on the cloud, which range of security functions based security gateways and
Malware Protection (AMP) identifies presents many security using Versa VNFs. Virtual next-generation firewall vendors.
and stops threats before, during, vulnerabilities, challenges, service delivery is reliant on Virtual service delivery is reliant
and after attacks. Business Critical and threats. The Velocoud the cloud, which presents on the cloud, which presents
Services provides an end-to-end website is not secure. many security vulnerabilities, many security vulnerabilities,
view of security architecture. challenges, and threats. challenges, and threats.
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) C83-741534-00 10/18