Matt Conran

Want to Join?
Opinions expressed by ICN authors are their own.

Matt Conran has more than 19 years of networking industry with entrepreneurial start-ups, government organizations and others. He is a lead Architect and successfully delivered major global greenfield service provider and data center networks. Core skill set includes advanced data center, service provider, security and virtualization technologies. He loves to travel and has a passion for landscape photography.

The opinions expressed in this blog are those of Matt Conran and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Secure SD-WAN: The security vendors and their SD-WAN offerings

SASE: Redefining the network and security architecture

SASE: Redefining the network and security architecture

Adoption of SASE reduces complexity and overhead, improves security and boosts application performance.

AI and 5G: Entering a new world of data

AI and 5G: Entering a new world of data

The deployment model of vendor-centric equipment cannot sustain this exponential growth in traffic.

The evolution to Secure Access Service Edge (SASE) is being driven by necessity

The evolution to Secure Access Service Edge (SASE) is being driven by necessity

The users and devices are everywhere. As a result, secure access services also need to be everywhere.

The software-defined data center drives agility

The software-defined data center drives agility

The value of SDN is doing as much as possible in the software so you don’t depend on the delivery of new features to come from a new generation of the hardware.

Secure Access Service Edge (SASE): A reflection of our times

Secure Access Service Edge (SASE): A reflection of our times

Gartner makes the claim that the shift to SASE will make obsolete existing networking and security models.

A Virtual WAN: Moving closer to the enterprise

A Virtual WAN: Moving closer to the enterprise

Virtual WAN will radically change the telecom environment, including how circuits are procured and who procures them.

Software-defined perimeter – the essence of trust

Software-defined perimeter – the essence of trust

Within a zero-trust environment, there is no implicit trust. Thus, trust must be sourced from somewhere else in order to gain access to protected resources.

Intent-Based Networking (IBN): Bridging the gap on network complexity

Intent-Based Networking (IBN): Bridging the gap on network complexity

Intent-Based Networking was a result of the need for greater network automation.

How edge computing is driving a new era of CDN

How edge computing is driving a new era of CDN

A CDN is an edge application and an edge application is a superset of what your CDN is doing.

Software Defined Perimeter (SDP): The deployment

Software Defined Perimeter (SDP): The deployment

After discussing with numerous SDP vendors, I have discovered that the current SDP landscape tends to be based on specific use cases and projects, as opposed to a technology that has to be implemented globally.

Software Defined Perimeter (SDP): Creating a new network perimeter

Software Defined Perimeter (SDP): Creating a new network perimeter

Considering the way networks work today and the change in traffic patterns; both internal and to the cloud, this limits the effect of the fixed perimeter.

Load More