SD-WAN management means more than reviewing logs and parsing events

SD-WAN management means more than reviewing logs and parsing events

Creating a single view of the different types of data requires specialized skills, custom integration and a significant budget. Just look at the SIEM.

Secure SD-WAN: The security vendors and their SD-WAN offerings

Secure SD-WAN: The security vendors and their SD-WAN offerings

A networking vendor simply can’t jump into this space. Some SD-WANs add stateful packet filters and call this security.

SASE: Redefining the network and security architecture

SASE: Redefining the network and security architecture

Adoption of SASE reduces complexity and overhead, improves security and boosts application performance.

AI and 5G: Entering a new world of data

AI and 5G: Entering a new world of data

The deployment model of vendor-centric equipment cannot sustain this exponential growth in traffic.

The evolution to Secure Access Service Edge (SASE) is being driven by necessity

The evolution to Secure Access Service Edge (SASE) is being driven by necessity

The users and devices are everywhere. As a result, secure access services also need to be everywhere.

The software-defined data center drives agility

The software-defined data center drives agility

The value of SDN is doing as much as possible in the software so you don’t depend on the delivery of new features to come from a new generation of the hardware.

Secure Access Service Edge (SASE): A reflection of our times

Secure Access Service Edge (SASE): A reflection of our times

Gartner makes the claim that the shift to SASE will make obsolete existing networking and security models.

A Virtual WAN: Moving closer to the enterprise

A Virtual WAN: Moving closer to the enterprise

Virtual WAN will radically change the telecom environment, including how circuits are procured and who procures them.

Software-defined perimeter – the essence of trust

Software-defined perimeter – the essence of trust

Within a zero-trust environment, there is no implicit trust. Thus, trust must be sourced from somewhere else in order to gain access to protected resources.

Intent-Based Networking (IBN): Bridging the gap on network complexity

Intent-Based Networking (IBN): Bridging the gap on network complexity

Intent-Based Networking was a result of the need for greater network automation.

How edge computing is driving a new era of CDN

How edge computing is driving a new era of CDN

A CDN is an edge application and an edge application is a superset of what your CDN is doing.

Software Defined Perimeter (SDP): The deployment

Software Defined Perimeter (SDP): The deployment

After discussing with numerous SDP vendors, I have discovered that the current SDP landscape tends to be based on specific use cases and projects, as opposed to a technology that has to be implemented globally.

Software Defined Perimeter (SDP): Creating a new network perimeter

Software Defined Perimeter (SDP): Creating a new network perimeter

Considering the way networks work today and the change in traffic patterns; both internal and to the cloud, this limits the effect of the fixed perimeter.

Managed WAN and the cloud-native SD-WAN

Managed WAN and the cloud-native SD-WAN

The motivation for WAN transformation is clear, today organizations require: improved internet access and last mile connectivity, additional bandwidth and a reduction in the WAN costs.

The modern data center and the rise in open-source IP routing suites

The modern data center and the rise in open-source IP routing suites

Open source enables passionate people to come together and fabricate work of phenomenal quality. This is in contrast to a single vendor doing everything.

Open architecture and open source – The new wave for SD-WAN?

Open architecture and open source – The new wave for SD-WAN?

As networking continues to evolve, you certainly don't want to break out a forklift every time new technologies are introduced. Open architecture would allow you to replace the components of a system, and give you more flexibility to...

Performance-Based Routing (PBR) – The gold rush for SD-WAN

Performance-Based Routing (PBR) – The gold rush for SD-WAN

The inefficiency factor in the case of traditional routing is one of the main reasons why SD-WAN is really taking off.

Zero-trust: microsegmentation networking

Zero-trust: microsegmentation networking

Microsegmentation gives administrators the control to set granular policies in order to protect the application environment.

Software-defined perimeter: Identity-centric enforced network perimeter

Software-defined perimeter: Identity-centric enforced network perimeter

Traditional VPNs no longer cut it.

Named data networking: Stateful forwarding plane for datagram delivery

Named data networking: Stateful forwarding plane for datagram delivery

Reinventing smart routing and dumb forwarding.

Load More