Is Multi-Cloud Worth It?

The ONUG Community has been focused on building and running infrastructure that supports multiple cloud providers along with their on-prem data center resources. It’s hard and complex on so many levels; you have to wonder, is it worth it? All cloud providers offer different tooling and constructs up and down their stacks for consumers, which […]

Solve Your Remote Workforce Needs in a Snap with ADEM

Secure access service edge (SASE), a category defined by Gartner in 2019, represents the blueprint of the networking and security architecture of the future.  The SASE model consolidates many networking and security functions traditionally delivered in siloed point solutions–into a single, integrated cloud service. Many vendors have slapped the term SASE onto their current offerings […]

Is Cybersecurity Alert Fatigue Real?

Many ONUG enterprise consumers have shared the toil that their SecOps/DevSecOps teams face daily.  “The room” is often overwhelmed by the sheer volume of attacks as well as the tools and playbooks necessary to sort through all of the relevant alerts. What alerts are ACTUALLY relevant? That’s a constant work in progress. This challenge is […]

Why the World Needs ZTNA 2.0

Interest in Zero Trust has exploded recently, partly due to its catchy name and seemingly broad usage throughout the cyber security industry (Zero Trust washing?). But, there is also another more compelling reason for the rise in interest in Zero Trust – we really need it. When speaking with customers, many of them tell me […]

Working Group Updates from ONUG Spring 2022

For those who attend technical conferences, it’s hard not to come away with the energy to execute on new ideas. I’m certainly feeling that way after ONUG Spring 2022. Attendees at the conference showed an overwhelming interest in the Cloud Security Notification Framework (CSNF) and how it can reduce toil for the SecOps community. The […]

How It Felt to Be Back In-Person at ONUG

We did it; it was nail biting, but we came together in numbers at the Meadowlands of New Jersey over a few brisk spring days in late April. I was nervous when I sent the first invitations for speakers to present at ONUG Spring back in January. If speakers were not able to attend in-person […]

How a Leading Healthcare Provider prioritizes User Experience in their SASE Approach

Secure Access Service Edge (SASE) represents the network and security architecture blueprint of the future, consolidating many networking and security point solutions into a single, integrated cloud service.  The ability to monitor end user experience across a SASE architecture is critical. Here’s one company’s story of how they used digital experience monitoring to gain visibility […]

Cloud Security 101

Managing cloud permissions and configurations As organizations evolve in the cloud, you will find the number of cloud services their teams use and identity permissions that need to be managed increase significantly. These services teams used to build and deliver applications are referred to as assets or resources. Configuring cloud assets, roles, and permissions doesn’t […]

Building a Bridge to the Future: Power Hybrid Environments with Network Resilience

The pandemic ushered in a new era, one where technology has created flexibility for organizations, employees, and customers. These technological advancements provide endless possibilities for all parties – increased productivity, improved customer experience, maximized service, and minimized costs. Ensuring that these experiences exceed expectations, enterprises have become increasingly reliant on their network – a resilient […]

3 User Access Scenarios Where ZTNA Can Help in 2022

As hybrid work is here to stay for a vast majority of organizations, there are three secure user access scenarios that most affect an organization: remote employees;  branch offices; and accommodating new, contingent, or traveling workers.  Remote employees Every remote employee is essentially an internet gateway. With remote access services transitioning to identity-based controls, attackers […]