Skip to main content

Radware Partners with Mellanox

Radware announced a collaborative effort with Mellanox Technologies to enable mobile carriers to leverage Network Functions Virtualization (NFV) and Software Defined Networking (SDN).

Combining its Application Delivery and Attack Mitigation Security solutions with Mellanox Technologies’ 10G and 40G NICs, illustrates an innovative ability to extract network and application information that can be translated and leveraged to a scalable solution for detection of various security threats, in real-time.

This unique solution not only permits a more resilient mobile network while enabling the Network Functions Virtualization (NFV) initiative, but it also allows a cost-effective, better-utilized mobile operation by eliminating high CPU overhead and performance hit associated with vSwitches.

In addition embedded switching and SR-IOV technology results in accelerated performance and improved security, isolation, and scalability.

By using an OpenFlow interface to manage the embedded virtual switch, operators can now monitor and control traffic in real time, and through a standard control interface. Enabling to deploy end to end Software Defined Networking (SDN) solutions, the unique solution provides mobile carriers with highly secured, resilient mobile service operation and cost-effective mobile cloud services.

“Our ADC and Security are field-proven products that are already deployed in various virtualization environments. By integrating Mellanox’s industry-leading and high-bandwidth solution offers mobile carriers to drive their NFV and SDN initiatives,” says Avi Chesla, CTO, Radware.

“By integrating solutions with Radware, we can provide mobile carriers with clear business benefits and unique value at the application-level through the integration with a NFV-based infrastructure,” says Amir Prescher, Sr. VP of BD at Mellanox.

Radware and Mellanox’s offering to mobile carriers was designed to employ the virtues of both SDN and NFV, enabling easy adoption of commercial off-the-shelf (COTS) server infrastructure serving both the network level and application level needs, respectively. Furthermore, it can also enable different mobile carrier and mobile cloud use-cases including elastic application delivery, mobile security, and more.

The Latest

Cyber threats are growing more sophisticated every day, and at their forefront are zero-day vulnerabilities. These elusive security gaps are exploited before a fix becomes available, making them among the most dangerous threats in today's digital landscape ... This guide will explore what these vulnerabilities are, how they work, why they pose such a significant threat, and how modern organizations can stay protected ...

The prevention of data center outages continues to be a strategic priority for data center owners and operators. Infrastructure equipment has improved, but the complexity of modern architectures and evolving external threats presents new risks that operators must actively manage, according to the Data Center Outage Analysis 2025 from Uptime Institute ...

As observability engineers, we navigate a sea of telemetry daily. We instrument our applications, configure collectors, and build dashboards, all in pursuit of understanding our complex distributed systems. Yet, amidst this flood of data, a critical question often remains unspoken, or at best, answered by gut feeling: "Is our telemetry actually good?" ... We're inviting you to participate in shaping a foundational element for better observability: the Instrumentation Score ...

We're inching ever closer toward a long-held goal: technology infrastructure that is so automated that it can protect itself. But as IT leaders aggressively employ automation across our enterprises, we need to continuously reassess what AI is ready to manage autonomously and what can not yet be trusted to algorithms ...

Much like a traditional factory turns raw materials into finished products, the AI factory turns vast datasets into actionable business outcomes through advanced models, inferences, and automation. From the earliest data inputs to the final token output, this process must be reliable, repeatable, and scalable. That requires industrializing the way AI is developed, deployed, and managed ...

Almost half (48%) of employees admit they resent their jobs but stay anyway, according to research from Ivanti ... This has obvious consequences across the business, but we're overlooking the massive impact of resenteeism and presenteeism on IT. For IT professionals tasked with managing the backbone of modern business operations, these numbers spell big trouble ...

For many B2B and B2C enterprise brands, technology isn't a core strength. Relying on overly complex architectures (like those that follow a pure MACH doctrine) has been flagged by industry leaders as a source of operational slowdown, creating bottlenecks that limit agility in volatile market conditions ...

FinOps champions crucial cross-departmental collaboration, uniting business, finance, technology and engineering leaders to demystify cloud expenses. Yet, too often, critical cost issues are softened into mere "recommendations" or "insights" — easy to ignore. But what if we adopted security's battle-tested strategy and reframed these as the urgent risks they truly are, demanding immediate action? ...

Two in three IT professionals now cite growing complexity as their top challenge — an urgent signal that the modernization curve may be getting too steep, according to the Rising to the Challenge survey from Checkmk ...

While IT leaders are becoming more comfortable and adept at balancing workloads across on-premises, colocation data centers and the public cloud, there's a key component missing: connectivity, according to the 2025 State of the Data Center Report from CoreSite ...

Radware Partners with Mellanox

Radware announced a collaborative effort with Mellanox Technologies to enable mobile carriers to leverage Network Functions Virtualization (NFV) and Software Defined Networking (SDN).

Combining its Application Delivery and Attack Mitigation Security solutions with Mellanox Technologies’ 10G and 40G NICs, illustrates an innovative ability to extract network and application information that can be translated and leveraged to a scalable solution for detection of various security threats, in real-time.

This unique solution not only permits a more resilient mobile network while enabling the Network Functions Virtualization (NFV) initiative, but it also allows a cost-effective, better-utilized mobile operation by eliminating high CPU overhead and performance hit associated with vSwitches.

In addition embedded switching and SR-IOV technology results in accelerated performance and improved security, isolation, and scalability.

By using an OpenFlow interface to manage the embedded virtual switch, operators can now monitor and control traffic in real time, and through a standard control interface. Enabling to deploy end to end Software Defined Networking (SDN) solutions, the unique solution provides mobile carriers with highly secured, resilient mobile service operation and cost-effective mobile cloud services.

“Our ADC and Security are field-proven products that are already deployed in various virtualization environments. By integrating Mellanox’s industry-leading and high-bandwidth solution offers mobile carriers to drive their NFV and SDN initiatives,” says Avi Chesla, CTO, Radware.

“By integrating solutions with Radware, we can provide mobile carriers with clear business benefits and unique value at the application-level through the integration with a NFV-based infrastructure,” says Amir Prescher, Sr. VP of BD at Mellanox.

Radware and Mellanox’s offering to mobile carriers was designed to employ the virtues of both SDN and NFV, enabling easy adoption of commercial off-the-shelf (COTS) server infrastructure serving both the network level and application level needs, respectively. Furthermore, it can also enable different mobile carrier and mobile cloud use-cases including elastic application delivery, mobile security, and more.

The Latest

Cyber threats are growing more sophisticated every day, and at their forefront are zero-day vulnerabilities. These elusive security gaps are exploited before a fix becomes available, making them among the most dangerous threats in today's digital landscape ... This guide will explore what these vulnerabilities are, how they work, why they pose such a significant threat, and how modern organizations can stay protected ...

The prevention of data center outages continues to be a strategic priority for data center owners and operators. Infrastructure equipment has improved, but the complexity of modern architectures and evolving external threats presents new risks that operators must actively manage, according to the Data Center Outage Analysis 2025 from Uptime Institute ...

As observability engineers, we navigate a sea of telemetry daily. We instrument our applications, configure collectors, and build dashboards, all in pursuit of understanding our complex distributed systems. Yet, amidst this flood of data, a critical question often remains unspoken, or at best, answered by gut feeling: "Is our telemetry actually good?" ... We're inviting you to participate in shaping a foundational element for better observability: the Instrumentation Score ...

We're inching ever closer toward a long-held goal: technology infrastructure that is so automated that it can protect itself. But as IT leaders aggressively employ automation across our enterprises, we need to continuously reassess what AI is ready to manage autonomously and what can not yet be trusted to algorithms ...

Much like a traditional factory turns raw materials into finished products, the AI factory turns vast datasets into actionable business outcomes through advanced models, inferences, and automation. From the earliest data inputs to the final token output, this process must be reliable, repeatable, and scalable. That requires industrializing the way AI is developed, deployed, and managed ...

Almost half (48%) of employees admit they resent their jobs but stay anyway, according to research from Ivanti ... This has obvious consequences across the business, but we're overlooking the massive impact of resenteeism and presenteeism on IT. For IT professionals tasked with managing the backbone of modern business operations, these numbers spell big trouble ...

For many B2B and B2C enterprise brands, technology isn't a core strength. Relying on overly complex architectures (like those that follow a pure MACH doctrine) has been flagged by industry leaders as a source of operational slowdown, creating bottlenecks that limit agility in volatile market conditions ...

FinOps champions crucial cross-departmental collaboration, uniting business, finance, technology and engineering leaders to demystify cloud expenses. Yet, too often, critical cost issues are softened into mere "recommendations" or "insights" — easy to ignore. But what if we adopted security's battle-tested strategy and reframed these as the urgent risks they truly are, demanding immediate action? ...

Two in three IT professionals now cite growing complexity as their top challenge — an urgent signal that the modernization curve may be getting too steep, according to the Rising to the Challenge survey from Checkmk ...

While IT leaders are becoming more comfortable and adept at balancing workloads across on-premises, colocation data centers and the public cloud, there's a key component missing: connectivity, according to the 2025 State of the Data Center Report from CoreSite ...