{"id":2501,"date":"2018-06-05T10:00:00","date_gmt":"2018-06-05T10:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/"},"modified":"2018-06-05T10:00:00","modified_gmt":"2018-06-05T10:00:00","slug":"sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/","title":{"rendered":"SDNs and NFV are complementary and core components of modernized networks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2015\/10\/sdn-control-100624422-primary.idge.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>The terms software defined networking (SDN) and network functions virtualization (NFV) are often used interchangeably, which is incorrect.\u00a0 In a sense, the two are tied together as companies start using NFV as part of their SDN plans but that doesn\u2019t have to be the case.<\/p>\n<p>Enterprises could maintain their current network architecture and shift to NFV or they could roll out an SDN and never leverage the benefits of NFV, so it\u2019s important to understand what each is and the benefits of both.<\/p>\n<aside class=\"fakesidebar\"><strong>[ For more on SDN see <a href=\"https:\/\/www.networkworld.com\/article\/3209131\/lan-wan\/what-sdn-is-and-where-its-going.html#nww-fsb\">where SDN is going<\/a> and learn the <a href=\"https:\/\/www.networkworld.com\/article\/3206709\/lan-wan\/what-s-the-difference-between-sdn-and-nfv.html#nww-fsb\">difference between SDN and NFV<\/a>. | Get regularly scheduled insights by <a href=\"https:\/\/www.networkworld.com\/newsletters\/signup.html#nww-fsb\">signing up for Network World newsletters<\/a>. ]<\/strong><\/aside>\n<h2>What is software-defined Networking<\/h2>\n<p>SDNs are a fundamentally different way to think about networks.\u00a0 Technically, SDNs can be defined as the separation of the management, control and data-forwarding planes of networks.\u00a0 Many people, including technical individuals read that definition and say, \u201cSo what?\u201d, but the separation of these planes has a profound impact on networks and enables things that have never been done before.<\/p>\n<p>Historically, management, control and data forwarding were tightly coupled together. This meant each network device such as a router or a switch needed to be configured independently, typically through a cryptic command line interface (CLI), which makes operating a network challenging.\u00a0<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id=\"\"\/>\n<p>Any time a change needed to be made to the network, even a small one, each network device had to be reconfigured independently.\u00a0 For small networks, this is an annoyance.\u00a0 For medium and large networks, the manual nature of the work could bring things to a crawl.\u00a0 In fact, ZK Research conducted a study in 2017 and found that in large enterprises it took an average of four months to implement a change network wide.<\/p>\n<p>This might have been fine a decade ago when businesses weren\u2019t as dependent on their networks as they are today, and network changes were only made infrequently. In today\u2019s digital era, companies compete on speed, and four months is far too slow for the network to keep up with the business.\u00a0<\/p>\n<h2>SDNs decouple control, management and data forwarding<\/h2>\n<p>By extracting the control and management planes from the underlying hardware, they can be abstracted into a software layer that is independent of the hardware and centralized via a controller.\u00a0 The controller can be a physical device, virtualized or deployed in the cloud.\u00a0 This model enables network engineers to make a change in a GUI \u2013 instead of using CLI \u2013 and then propagating it across the entire network with a single click of the mouse.\u00a0 Network changes can be done at the speed the business requires.<\/p>\n<aside id=\"fsb-2599\" class=\"fakesidebar fakesidebar-auto fakesidebar-sponsored\"><strong>[ <a href=\"https:\/\/pluralsight.pxf.io\/c\/321564\/424552\/7490?u=https%3A%2F%2Fwww.pluralsight.com%2Fpaths%2Fcertified-information-systems-security-professional-cisspr\" rel=\"nofollow\">Prepare to become a Certified Information Security Systems Professional with this comprehensive online course from PluralSight. Now offering a 10-day free trial!<\/a> ]<\/strong><\/aside>\n<h2>SDNs improve security<\/h2>\n<p>In addition to speed and agility, another benefit of SDNs is improved security using micro-segmentation.\u00a0 Traditional networks use virtual LANs (VLANs) and access control lists (ACLs) for coarse-grained segmentation.\u00a0 SDNs enable the network to be partitioned at a much more granular or fine-grained level. Also, because the segmentation operates in an overlay network, devices can be assigned to segments by policy. If the device moves, the policy follows without automatically.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id=\"\"\/>\n<h2>SDN enables programmable networks<\/h2>\n<p>Another benefit of SDNs is the network becomes programmable.\u00a0 SDN controllers expose northbound APIs that application developers can use to interface with the network so applications can dynamically configure it to reserve bandwidth, apply security or whatever else the apps may require. The programmability also enables networks to be orchestrateable through the use of common orchestration tools like Chef, Puppet and Ansible.\u00a0 This means networks can be better aligned with DevOps initiatives.<\/p>\n<h2>SDNs work with most hardware<\/h2>\n<p>Also, with SDNs the network becomes hardware agnostic where the overlay controllers can work with a wide range of hardware, include white-box switches.\u00a0 Most customers choose a turnkey solution that includes hardware and software from the same vendor, but SDNs do present the opportunity to move away from that model, if a business chooses.<\/p>\n<p>One of the more underappreciated benefits of SDN is that it increases network uptime.\u00a0 ZK Research has found that the largest cause of downtime, 35%, is from configuration errors related to human errors.\u00a0 This happens because of the manual nature of a CLI and the fact that tasks have to be repeated over and over.\u00a0 SDNs automate the configuration, which can eliminate self-inflicted downtime. Offloading these tasks also lets network engineers focus on more strategic initiatives instead of spending most of their day \u201ckeeping the lights on.\u201d<\/p>\n<h2>What is network functions virtualization (NFV)?<\/h2>\n<p>An SDN is a critical step on the path to a modernized network, but many services, such as routing, WAN optimization and security are still tied to the underlying hardware.\u00a0 As the name suggests, network functions virtualization solves this problem by decoupling the network function from the hardware, virtualizing it allowing it to be run in a virtual machine on any compute platform a business chooses.<\/p>\n<h2>NFV is similar but different from server virtualization<\/h2>\n<p>NFV is similar to the transition that the server industry experienced when server virtualization went mainstream.\u00a0 With server virtualization, applications ran as virtual workloads in software, which lowered cost and increased hardware utilization. With NFV, these benefits can be applied to the network as network services running as virtual workloads.<\/p>\n<p>To date, the majority of NFV deployments have been carried out by service providers, but recently NFV has become a priority for digital companies.\u00a0 A 2017 study by ZK Research found that 61% of respondents are researching (29%), testing (13%), planning to deploy (10%) or have deployed (9%) NFV; NFV is coming quickly.<\/p>\n<p>While there are similarities between server virtualization and NFV, there is a major difference. The primary use case for server virtualization has been to consolidate servers in a data center. NFV can be used in a data center, but it\u2019s sweet spot is bringing network services to other points in the network including the branch and the cloud where there are no local engineers.\u00a0<\/p>\n<h2>NFV increases service agility<\/h2>\n<p>For example, a business that wants to take advantage of local internet breakout where branch workers can access internet services \u2013 such as accessing SaaS apps directly instead of going through a central hub \u2013 could leverage NFV to secure the traffic. Typically, this would require a physical firewall (or a pair of them for redundancy) to be deployed in every branch office with local internet breakout.\u00a0 This can be a very expensive undertaking given the cost of next-generation firewalls.\u00a0 Also, it could take months to purchase the firewalls and have an engineer travel to the branch and deploy them.\u00a0 With NFV, the firewall functionality can be virtualized and \u201cspun up\u201d almost instantly, making them fast and easy to deploy.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id=\"\"\/>\n<p>Today, competitive advantage is based on a company\u2019s ability to be agile, adapt to changes and make rapid transitions to capture new business opportunities. Virtualization and containers have increased compute and application agility but the network has remained relatively static. The long lead times to deploy, change and optimize the network should be considered the hidden killer of companies as that can hold companies back from implementing digital initiatives.\u00a0<\/p>\n<p>Software defined networks increase the agility of the network ensuring it is in alignment with the rest of the business.\u00a0 Network functions virtualization is a complimentary technology that makes network services agile.\u00a0 The two together are core building blocks to modernize corporate networks.<\/p>\n<div class=\"end-note\">\n<div id=\"\" class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\">LinkedIn<\/a> to comment on topics that are top of mind.<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3278278\/lan-wan\/sdns-and-nfv-are-complementary-technologies-that-are-core-components-of-a-modernized-network-unders.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nThe terms software defined networking (SDN) and network functions virtualization (NFV) are often used interchangeably, which is incorrect.\u00a0 In a sense, the two are tied together as companies start using NFV as part of their SDN plans but that doesn\u2019t have to be the case.Enterprises could maintain their current network architecture and shift to NFV or they could roll out an SDN and never leverage the benefits of NFV, so it\u2019s important to understand what each is and the benefits of both.[ For more on SDN see where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled insights by signing up for Network World newsletters. ]<br \/>\nWhat is software-defined Networking<br \/>\nSDNs are a fundamentally different way to think about networks.\u00a0 Technically, SDNs can be defined as the separation of the management, control and data-forwarding planes of networks.\u00a0 Many people, including technical individuals read that definition and say, \u201cSo what?\u201d, but the separation of these planes has a profound impact on networks and enables things that have never been done before.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":2502,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[762,1109,307,847],"class_list":["post-2501","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-networking","tag-sdn","tag-security","tag-virtualization"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SDNs and NFV are complementary and core components of modernized networks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SDNs and NFV are complementary and core components of modernized networks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-05T10:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"SDNs and NFV are complementary and core components of modernized networks\",\"datePublished\":\"2018-06-05T10:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\\\/\"},\"wordCount\":1262,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks.jpg\",\"keywords\":[\"Networking\",\"SDN\",\"Security\",\"virtualization\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\\\/\",\"name\":\"SDNs and NFV are complementary and core components of modernized networks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks.jpg\",\"datePublished\":\"2018-06-05T10:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks.jpg\",\"width\":620,\"height\":413},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Networking\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/networking\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SDNs and NFV are complementary and core components of modernized networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SDNs and NFV are complementary and core components of modernized networks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/","og_locale":"en_US","og_type":"article","og_title":"SDNs and NFV are complementary and core components of modernized networks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-05T10:00:00+00:00","og_image":[{"width":620,"height":413,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"SDNs and NFV are complementary and core components of modernized networks","datePublished":"2018-06-05T10:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/"},"wordCount":1262,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks.jpg","keywords":["Networking","SDN","Security","virtualization"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/","url":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/","name":"SDNs and NFV are complementary and core components of modernized networks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks.jpg","datePublished":"2018-06-05T10:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks.jpg","width":620,"height":413},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/sdns-and-nfv-are-complementary-and-core-components-of-modernized-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Networking","item":"https:\/\/www.threatshub.org\/blog\/tag\/networking\/"},{"@type":"ListItem","position":3,"name":"SDNs and NFV are complementary and core components of modernized networks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=2501"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2501\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/2502"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=2501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=2501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=2501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}