

Matt Conran
star Advisor
IDG Contributor Network
Want to Join?
Opinions expressed by ICN authors are their own.
Matt Conran has more than 19 years of networking industry with entrepreneurial start-ups, government organizations and others. He is a lead Architect and successfully delivered major global greenfield service provider and data center networks. Core skill set includes advanced data center, service provider, security and virtualization technologies. He loves to travel and has a passion for landscape photography.
The opinions expressed in this blog are those of Matt Conran and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.


The future of devops for network engineers
Script-driven approach is a playground. Let’s finally mature.

Securing microservice environments in a hostile world
If you build bridges you have to go where the water is.

Scalable groups tags with SD-Access
An effective security posture starts with the right visibility.

A primer on closed-loop automation
The shortest path to achieving intent-based networking.

The rise of artificial intelligence DDoS attacks
The leaves may change color, but the roots are the same. Are you ready for AI-based DDoS attacks?

SD-WAN: Hardening external connectivity
Traditionally, SD-WAN was used to connect internal resources. Nowadays challenges arise as to how we connect external identities such as remote partners and mobile workers from multiple locations.

A new era of campus network design
Technologies invented 30 years ago won’t cut it in today’s networking environments. A new era of campus fabric design has evolved, providing consistent management, contextual insights and intelligent segmentation.

Overcoming kludges to secure web applications
Nothing is easy when applications lay upon multiple kludges of network architecture and flawed protocols. Without adequate safeguards, security results in a hit and miss approach.

IPSec – A swiss army knife of kludges
One shoe does not fit all when it comes to SD-WAN providers. There are a variety of ways to tunnel user traffic. Stay clear of anyone who hasn't made the right extensions to IPSec.

Container security: crafting application identity
Containers are not like traditional workloads and as a result, they require a new security model. Traditional methods such as IP address and ACLs are no longer effective.

Why carriers aren't ready for SD-WAN services
An insider's guide to SD-WAN services.