Beginning your Network Automation journey can seem like an overwhelming task. We often hear questions from our clients, such as, “Where do I even begin?” or “How can I ensure that I am building a platform the right way from the start?” All great questions. However, journey is the key word when it comes to automating your network. This blog post will detail some of the key findings I’ve discovered leading business development efforts at Network to Code and how our customers are successfully implementing…
Corporate networks have evolved over the years around the notion of physical spaces — offices, retail stores, factory floors, production studios, and data centers. We predominantly used client-server applications, with the server-side hosted in private data centers, and the client-side running on desktop and laptop computers at physical office locations. We accommodated remote users, business travelers, and the occasional home-based employees using the dreaded three-letter acronym — VPN. VPNs were deemed a necessary evil, both by the end-users who tolerated the clunky user experience and…
Malware has been the archenemy of organizations around the globe for years, with ransomware, in particular, being an extremely deadly foe. Locking down victims’ files through encryption and demanding a ransom for decryption has proven to be an effective tactic for cybercriminals, with a steady stream of recent attacks serving as a constant reminder. However, these attackers are continually refining their tactics and have recently turned to double-extortion, whereby they threaten to leak victims’ sensitive files in order to increase the odds of ransoms being paid. Kaseya-style…
At a theoretical level, implementing zero trust makes significant sense. Cybersecurity threats can come from anywhere—outside or inside the network, and even start in one place then move to another. Adopting a zero trust— “Never trust, always verify” —strategy can help you tamp down on application- and services-related vulnerabilities, thereby reducing friction for the rest of the organization. But despite its widespread use in cybersecurity circles, the term “zero trust” is not well understood—especially when it is applied to segmentation or microsegmentation—and it’s up to security teams to explain why…
In the last few years, organizations have begun to focus more on digital transformation – moving workloads to the cloud, deploying the Internet of Things (IoT), experimenting with artificial intelligence and data analytics, and embracing a myriad of other technologies – all to become more efficient, deliver a better customer experience and, ultimately, drive more revenue. The pandemic kicked this gradual transformation into high gear, forcing CIOs to re-examine their IT infrastructure. Smart CIOs looked at expensive on-premise and dated data centers, saw them as…
If you’ve been working with enterprise networking for a while, you’ve likely seen the phrases “intent-based networking” or “network intent” and perhaps some promises that these technologies will revolutionize networking or lead to the rise of the self-healing network. While this sounds exciting, the impact that intent-based networking has had on the enterprise, although positive, has been more incremental than revolutionary. One of the limitations of intent-based networking systems (IBNS) is that these technologies focus on Day 0/1 network operations – deployment, configuration, and other…
The New Workplace Requires a New Vision of the Network Is your workforce about to return to the office for the 40 hour week or embrace the new flex workplace? Either way, you’ll want to hear how networks are evolving to support new and more complex operating and performance demands. Network engineers and help desks are even more strategic to organization performance. Why? Because employees are now interconnected by networks than hallways and meeting rooms. From cloud apps to consumer routers and ISP hops a…