Evaluating Architectural Approaches to Micro-Segmentation

The concept of segmentation has existed ever since we started connecting data centers to each other. In the early days, firewalls controlled what was able to get in from the outside. Perimeter firewalls are still a critical part of protecting the data center and that will never go away, despite the dissolving perimeter. As networks became more complex, we saw the concept of segmentation move inside with VLANs creating segments for the right size broadcast zones to ensure network performance. For more granular control, we’ve…

Dynamically Securing Applications in a Multi-Cloud World

Security threats continue to increase exponentially in volume and in risk. According to a recent CBR article, cybercrime is expected to cost the world more than $2 trillion by 2019. Developers are creating applications more frequently and many are migrating them between different clouds for business agility. The greater volume and dynamic nature of applications make businesses more vulnerable. In fact, Microsoft predicts that we will be writing 111 billion lines of new code every year that will generate 50 times more data volume by…

The Multi-Cloud World is Here to Stay: Be Sure You Are Ready…

by Calvin Rowland The whole tech industry is abuzz with talk of multi-cloud environments. Survey after survey shows definitively that the race is on to a multi-cloud world. In fact, according to IDC, 30%[1] or more of organizations have already migrated or have plans to migrate literally every workload to the cloud. Further, 85%[2] of large businesses will be committed by 2018 to multi-cloud strategies as IT continues to transform.

The Blueprint for Micro-Segmentation 2.0

by Manuel Nedbal  “Micro-segmentation” has rapidly become the de facto term invoked when cloud and virtualization teams start talking risk, compliance and security policy for highly virtualized or Cloud infrastructure environments.  Yet while this important concept provides a foundation upon which security may be applied, by itself, it does not constitute enterprise-class security. It is simply a foundation, a first step.

Enabling Hybrid WAN for Cloud and IoT Applications

by Atchison Frazer Back in 2015, we offered some popular advice on “how to create a virtual WAN” (VWAN), a concept that was widely covered in the media at the time as a game-changing alternative to MPLS. However, the name quickly became outdated, as discussions about the future of networking shifted to software-defined WANs (SD-WANs) and hybrid WANs that actually complement MPLS. Today, the VWAN descriptor is rarely used, except as an occasional synonym for SD-WAN.

Software-Defined Adaptive Security Using SDN Analytics and Automated Response for Securing Hybrid Cloud, Datacenter, and Branch

by Hari Krishnan The threat landscape is getting more sophisticated with the rise of ransomware, web based malware, botnets and phishing emails resulting in significant financial loss and data breaches. Recent malware like WannaCry ransomware that used lateral movement shows the importance of ensuring proper segmentation both at the branch and datacenter to contain lateral spread and the need for a new analytics based approach to detect and respond to these zero-day attacks. Recent massive data breach at Equifax Is a reminder to organizations on…

Arista Focuses on the Hybrid Multi-Cloud World

by Nick Lippis  It’s clear that Amazon, Google, Microsoft, Oracle and other cloud providers are building out their services at speed to keep up with demand. In that process, and mostly due out of necessity, they are building their own cloud stacks. That is, each cloud is proprietary and will be so for a very long time.

For End-Users, It’s Really All About the Network

By Damian Roskill It’s all about the apps, or so the prevailing wisdom goes in our mobile-powered world. But dig a little deeper, and you’ll find that the network, or networks, are playing a major role. With SaaS and cloud-hosted applications taking over at most modern businesses, and users spread across various offices and locations, the network is what connects them all.

Why White Box Vendors Have Not Penetrated the Large Enterprise Market…and What They Can Do to Change This

by Nick Lippis According to International Data Corp (IDC), worldwide Ethernet switch sales increased 3% over the previous year to $24.4 billion in 2016; that’s a big market. IDC also notes that Arista’s share of the overall data center switching market has grown from nothing in 2010 to over 9% in 2016; it is the largest winner in the new Ethernet switch market.

Is Legacy IT Infrastructure a Toxic Asset in the Digital Economy?

by Nick Lippis Digital transformation describes the new digital economy that leverages algorithms, mobile, and cloud computing, social media, etc., to reach customers delivering products/services at speed, with increased flexibility plus usability and lower cost. Digital transformation companies usually deliver a big customer “wow” factor too. From a business perspective, digital transformation represents new revenue streams that possess a global footprint.