WAN/ISP Optimization and Failover

Expand all

The Need

Optimizing organizations’ online presence is crucial for long term business success. Wide Area Network (WAN) and Internet Service Provider (ISP) link failover, as well as traffic management, have grown from “nice-to-have” to “must-have” features, and businesses of all sizes use them on a daily basis.

All ISPs are subject to congestion and other performance problems, and most suffer frequent service outages (e.g. 99.5 percent reliability means 43 hours of downtime per year). To eliminate operational disruptions and financial losses, businesses are using a technique called “multi-homing” to connect with multiple ISPs.  Also, bandwidth aggregation and Internet links load balancing techniques, allow businesses to utilize the total bandwidth available from these ISPs, while Quality of Service (QoS) rules can be used to allocate bandwidth availability to specific applications and services based on their criticality on business operations. An essential component of multi homing is ISP failover, or the ability to automatically redirect both outgoing and incoming Internet traffic from the failed ISP links, to functioning connections.

These techniques give your organization the capability to manage failed links automatically, side-stepping the hurdles of using the ‘BGP approach’ as done by many organizations until now (convergence time, ISP cooperation, expensive equipment).

Enabling your Organization

Odyssey remains abreast of the latest trend and technology developments in the area of data connectivity.  We also maintain strong partnerships with long standing market leaders, which permit us to expand our knowledge and insights on these technologies.  We are, therefore, in a position to provide you with best of breed, effective failover connectivity solutions, which suit your specific needs and environment.

In doing so, our team of experts will first assess your organization’s needs based on your existing infrastructure, network architecture, applications running and systems set up, as well as your future expansion plans.  During this process we will also ensure that we clearly understand your business objectives, internal policies and external compliance requirements. Once we have a well-rounded understanding of your environment, we will recommend the best-suited solutions for your needs.

The deployment phase is a critical part of this implementation process and requires your active involvement.  Your input ensures that the redundancy protection offered by the new connectivity solution is in line with your policies and expectations.

Post deployment, is the steady state phase during which traffic from each ISP link is monitored and failover policies are tweaked so that their effectiveness of the policy is optimized.

Doing it right: Our WAN/ISP Optimization and Failover Solutions’ Key Features and Benefits

Our WAN/ISP Optimization solutions are largely characterized by the following Key Features and Benefits:

Key Features


Avoid duplicated expensive Internet/WAN connections

Eliminate business critical applications downtime

WAN link redundancy with automatic failover

Reduce Costs

Bandwidth aggregation

QoS and traffic shaping

High Availability/Hardware failover

Application High-Availability over the WAN

Increase Up-Time of organization’s online presence


Remaining Functional and Compliant – Support tailored to your needs

We very well understand that to remain effective, a WAN/ISP Optimization and Failover deployment requires constant monitoring, fine-tuning, updating and maintenance.  These requirements may prove a burden your organization is not poised to undertake.  We have, therefore, structured our post-deployment services so that you may have the level of support you need, in order to achieve maximum return on your investment, with the least of worries.

Our suite of post-deployment services range from simple Maintenance and Support, to full-fledged Managed Security and Outsourcing Services.

This solution comprises part of the “Design & Implement” phase of our Information Security Continuum (D&I).