Search Results


Sort by
Showing results 1-10 of 44 for

3 Steps to an Open Access, Cloud-Centric WAN

As organizations continue to embrace cloud computing, the traditional wide area network (WAN) architecture is struggling to keep up with the increasing demand for fast, reliable, and secure access to cloud applications and services. Gartner analysts Simon Richard and Sumit Rajput recently addressed these challenges in a Gartner for Technical Professionals research note, Optimize WAN Architectures for Workloads That Span the Hybrid Cloud and the Multicloud 1. Richard and Rajput note that “When they first started deploying workloads in the cloud, most IT organizations realized…

Prepare your WAN and network security architecture for a hybrid work future

Corporate networks have evolved over the years around the notion of physical spaces — offices, retail stores, factory floors, production studios, and data centers. We predominantly used client-server applications, with the server-side hosted in private data centers, and the client-side running on desktop and laptop computers at physical office locations. We accommodated remote users, business travelers, and the occasional home-based employees using the dreaded three-letter acronym — VPN. VPNs were deemed a necessary evil, both by the end-users who tolerated the clunky user experience and…

Cloud Edge: What Are the Use Cases & Building Blocks?

At ONUG Spring, cloud edge’s ability to reduce latency was tied to a wide range of use cases and new capabilities that are sure to unleash new business possibilities. IoT, remote workforce infrastructure are but two. What are the building blocks for cloud edge, 5G, software-defined infrastructure, zero-trust, SD-WAN/SASE, IAM, etc.? This must-see session will give you what you need to start building your cloud edge solution.

Think Beyond the WAN to Simplify, Secure, and Optimize Branch Operations

Managing a large distributed network with a small centralized IT team brings unique challenges. In this webinar we will illustrate how an SD-Branch approach (much more than SD-WAN) is required to simplify the deployment, management and operation of your wireless, wired and WAN infrastructure under a single, software-defined framework with policy and segmentation to meet today’s IT, users, IoT devices, and business needs. This webinar builds upon the previous ONUG PoC session to include additional demonstrations of SD-Branch use cases for provisioning and policy automation, SD-WAN orchestration, secure access for mobile and IoT, and…

On the Edge: How Sprawling Networks Have Redefined WAN Security Requirements

The notion of a self-contained network that lives inside a controlled, secure perimeter has been blown apart with the advent of cloud computing and the Internet of Things. Instead, technology advances have led to a sprawling profusion of networks and individual devices that live outside the network edge or on the near or far edge of centralized networks, creating new computing demands and security challenges. When organizations began connecting their local area networks (LANs) across multiple sites, they created wide area networks (WANs). This WAN…

DeRisking the Enterprise-Everywhere WAN

Digital transformation is accelerating within the enterprise, as businesses seek to improve agility, avoid disruption, and gain competitive advantage. As part of this transformation, enterprises are increasingly leveraging cloud-based applications and services and embracing mobility and a distributed workforce. Bandwidth consumption is dramatically expanding to accommodate SaaS, and the prospect of rising transport costs and suboptimal employee digital experience is creating greater pressure on enterprises to move away from their legacy WAN in favor of one optimized for the cloud. The WAN Bends to the…

Public vs. Private: Battle for the Future of SD-WAN

The Internet is perhaps the greatest of mankind’s infrastructure achievements. It has virtually unlimited use cases. For Enterprises, it has become an integral part of connectivity, with over 90% of SaaS access leveraging best-efforts public Internet. In fact, many SD-WAN deployments rely exclusively on Internet for connectivity. There are a growing number of Enterprise use cases, however, that have exposed the inherent limitations of these public networks: applications that rely on real-time protocols, like video and voice; modern SaaS and IaaS, particularly over long-haul distances,…

M&A and SD-WAN 2.0 Working Group Updates

Starting this week, the M&A and SD-WAN 2.0 Working Group calls will include both vendors and IT executives. To bring everyone in the ONUG Community up to date, here are summaries for what IT executives in each working group have been discussing in the first three calls this year. Anyone who would like to participate in either working group is encouraged to join. The next step is to prioritize the key use cases to concentrate on and then flesh out the detailed functional requirements for each….

Software-Defined Security – Natural Affinity with SD-WAN Integration

Virtualized WAN services are much like any other software application, in that SD-WAN services must be secure. Except in the case of SD-WAN, VNF software also has to secure the “payload” of the packet, which increasingly is a cloud – or SaaS-based application. SD-Security is a crucial factor in the overall SD-WAN value equation in large part because telecoms and managed service providers are finding that their enterprise customers now expect it. In response, many MSPs are moving ahead with implementing a suite of security…

Trust but Verify: How to Monitor SD-WAN

SD-WAN is a popular topic on every blog, news site, and at every conference today, but much of the chatter deals with the implementation benefits. As ONUG’s own Nick Lippis mentions in his post about the top 5 topics IT will be talking about, SD-WAN is entering a new generation that’s focused on scale, security, and performance. With this new generation, IT needs a new understanding of how to monitor SD-WAN effectively for the long term, bearing in mind nuances around the technology and why…