The Onug Blog
Enterprise Cloud 2.0 Technology Solutions, Strategy and Use Cases

Subscribe

Using APIs for End-to-End Process Automation

Blog #3 in a Series on APIs from the ONUG O&A Working Group Part One of this blog series on APIs for network automation set the foundation for the importance of using APIs (application programming interfaces) for network and end-to-end process automation. Part Two, we are going to look at more of the implementation details and points to consider when first looking to leverage API calls for automation. Here in Part Three, we are going to look at putting APIs to work to enable end-to-end…

Bringing Network Automation into the Cloud Era

Network performance, security, and scalability are factors that can redefine IT investments as a competitive advantage. The network remains the unifying feature of modern environments despite the increasingly distributed and remote nature of enterprises. The impact of the cloud is such that the dynamics of modern networks are ever-changing while enterprise environments grow more complex and chaotic. The management of these environments – the discovery, analysis, updating, and maintenance – and the ever-growing number of devices, domains, and clouds can constitute major risks to business…

Will “Best of Breed” Dominate the Future of Large Enterprise Infrastructure?

For most ONUG members, your network and security infrastructure is built from “best of breed” products (aka “point solutions”). Dating back to the ‘80s, selecting, piloting, integrating, and deploying every single component of your infrastructure was the common practice. The prevailing notion was, and still is to a certain extent, that point solutions built by a specialist that focuses on a specific set of requirements and capabilities will outperform suites or platforms that address them as part of a broader solution.  This common wisdom had…

Avoid the Speed Bumps of Your Cloud Journey

Do you remember how your organization started using the cloud or why? Do you remember the meeting where it was discussed, who was assigned to lead the migration strategy, and what was in the detailed plan they produced? Of course you don’t, because it didn’t happen like that. It started with a request to IT for connecting already deployed cloud workloads into the corporate network. “How long? HOW long?” Now your organization has 50 different applications deployed in the cloud across multiple regions – and…

No-code, high value: Democratizing Automation for Better Network Operations

You may have noticed that low-code and no-code technologies are taking enterprise IT by storm. Speaking to TechTarget, Forrester analyst John Bratincevic reported that up to 75% of enterprises will make low-code technology a part of their software strategies by 2024. This explosive adoption is the result of a perfect storm of events:  A dramatic rise in the awareness and availability of no-code/low-code platforms (tools that allow users to design applications through visual drag-and-drop templates without requiring programming knowledge)  Enterprises are feeling the compounding effects…

Realizing the Operational Efficiencies of Automating Hybrid Infrastructure

The invasion of cloud services to enterprise networks is accelerating at an unprecedented pace, continuing the trend of putting operational pressure on network teams to keep pace with the rate of change. Enterprises continue to face the daunting task of how to seamlessly integrate heterogeneous networks that span private infrastructure and public cloud services. Disparate devices, complex topologies, and snowflake application requirements make it challenging to find operational efficiencies due to the complex nature of existing implementations, lack of standardized interfaces, and diverse sets of…

How to Protect Your Data from Ransomware and Double-Extortion

Malware has been the archenemy of organizations around the globe for years, with ransomware, in particular, being an extremely deadly foe. Locking down victims’ files through encryption and demanding a ransom for decryption has proven to be an effective tactic for cybercriminals, with a steady stream of recent attacks serving as a constant reminder. However, these attackers are continually refining their tactics and have recently turned to double-extortion, whereby they threaten to leak victims’ sensitive files in order to increase the odds of ransoms being paid. Kaseya-style…

The Six Business Benefits of Zero Trust Segmentation

At a theoretical level, implementing zero trust makes significant sense. Cybersecurity threats can come from anywhere—outside or inside the network, and even start in one place then move to another. Adopting a zero trust— “Never trust, always verify” —strategy can help you tamp down on application- and services-related vulnerabilities, thereby reducing friction for the rest of the organization. But despite its widespread use in cybersecurity circles, the term “zero trust” is not well understood—especially when it is applied to segmentation or microsegmentation—and it’s up to security teams to explain why…

Dress Up Your Cloud Security Notification Messages If You Want to Scale 

2021 has been a tremendous year for the ONUG Community of Global 2000 IT business leaders and sponsor members.  In the ONUG Collaborative, Oracle Cloud has joined to help develop the open source Cloud Security Notification Framework’s Decorator along with Microsoft Azure, IBM Cloud and Google Cloud Platform under the guidance of FedEx, Cigna, Raytheon, Intuit, Adobe, Fidelity Investments, Goldman Sachs, Kaiser Permanente, etc.  Cisco, Sysdig, Wiz, Concourse Labs and many others are now making the Decorator, a common data model and metadata scheme to…

How to Establish a Culture of Secure DevOps

We’re constantly told to “Shift Left” and that Secure DevOps is the only way to have confidence in your cloud native applications. But speaking to end-users and industry colleagues, it’s clear that there are some major challenges in adopting Secure DevOps. If we read our history books, we know that DevOps wasn’t successfully adopted by buying tools, and a true cultural movement towards DevOps wasn’t established by having a small dedicated team of DevOps specialists. I’m sure many of us have read the Phoenix Project…