Key Milestones on the Digital Enterprise Journey

Moving to the cloud is motivated by the need for scalable and flexible middleware, database, and cloud services, not by gaining instantaneous storage and compute capacity or cost reduction. Running on a hybrid and multi-cloud infrastructure provides different advanced application services that business units can use to secure their digital transformation journey. The shift to […]

Top 5 Takeaways from ONUG Spring in Dallas

First, a huge thank you to everyone who participated at ONUG Spring in Dallas this past May. It was the ONUG Community’s largest spring gathering yet, bigger than ONUG Spring 2018 in San Francisco by 20+% with some 300 new IT executives joining the community. The ONUG Board decided that Dallas is the new home […]

Automation for Security Operations

In today’s age of digital transformation, companies are trying to capitalize on the momentum by adding security operations automation and orchestration systems to their SIEM (Security Information and Event Management) platforms. Splunk acquired Phantom; IBM acquired Resilient; Rapid7 acquired Komand. These are all recent proofs of the rapid maturation of the market for security operations, […]

AI, Analytics, and Next Generation Monitoring Are Redefining How We Operate IT

Artificial Intelligence, advanced analytics, and next-generation monitoring are promising to deliver their benefits, but only when properly applied to the right problems. With that done, next-gen network analytics driven by Machine Learning (ML) and Artificial Intelligence (AI) will be able to revolutionize traditional infrastructure management models, reduce costs, simplify operations, and provide new insights. AI […]

Cloud and Containerization Trends Are Reshaping Digital Infrastructures

Cloud and containerization of infrastructure functions are enormous trends that will continue to reshape enterprise digital platforms. Containers are even expected to completely reshape the idea of Software Defined Data Center (SDDC) and Network Functions Virtualization (NFV). Enterprises that are built on or moved their core business functionality to digital platforms have become prevalent over […]

Creating a Zero Trust Network Infrastructure

Centered around the principle that nothing both inside or outside a network perimeter can be trusted without verification, the Zero Trust model is attracting more and more attention from organizations that struggle to prevent data breaches with traditional approaches. However, enterprises that want to embrace this model must be prepared for certain jettison practices based […]