The Onug Blog
Enterprise Cloud 2.0 Technology Solutions, Strategy and Use Cases

Subscribe

Gluware Network RPA to Take the Stage at ONUG Spring 2022 – The Future of the Network is Hyperautomation

Today kicks off the first day of ONUG Spring 2022, the premier biannual event for the ONUG Community. At this year’s conference, the enterprise cloud community will convene to discuss ongoing challenges and the application of solutions for some of the most pressing issues hybrid and multi-cloud enterprises face. As a co-founder of ONUG, I’ve seen first-hand how these events can be used to bring the community together, collaboratively defining requirements as they evolve for the enterprise tech industry. I’m excited to be onsite at…

Map Your Organization on the Monitoring Maturity Model

How mature is your monitoring capability within IT? Monitoring has been around for decades as a way for IT operations to gain insight into the availability and performance of IT systems. However, according to a survey by Enterprise Management Associates (EMA), most enterprises find it difficult to determine the right monitoring strategy. Additionally, 65% of enterprises have more than 10 monitoring tools. These monitoring tools run as siloed solutions to support specific needs for different teams. This limits IT operation’s ability to centrally detect, diagnose…

Redefining Networking: The Move from Cost Center to Strategic Necessity

A transition is underway in enterprise networking. In the past, the focus of enterprise networks was on the connections between offices, data centers, and colocation facilities. With the emergence of cloud computing, IT leaders have grown accustomed to elastic scale, spending flexibility, and near-instant deployment. These experiences with cloud services are raising expectations for enterprise networks. Alongside this transition, the importance of linking IT to business performance is higher than ever—increasing the urgency for network agility. When your network can pivot to meet new business…

5 Multicloud Challenges and How to Manage Them

Solutions for common problems that may be impacting your multicloud deployment and connectivity In 2022, the term “multicloud” is no longer a new one; by now, you are probably familiar with many of the advantages of this approach to cloud computing. Within this framework, an organization relies on cloud services sourced from more than one vendor. With multicloud, various Cloud Services Providers (CSPs) are utilized as opposed to a single provider, and they each contribute distinct resources and capabilities to meet the specific needs of…

TriggerMesh A Key Component In ONUG CSNF Demonstration

Open source integration platform standardizes multi-cloud security events The TriggerMesh team is excited to participate in our first ONUG this week. The event marks a significant milestone that caps several weeks of work by our engineering team with the Automated Cloud Governance WG on the Cloud Security Notification Framework (CSNF). Enterprises are multi-cloud, and Cloud Service Providers emit security notification data in varying formats, which can complicate analysis and remediation. CSNF aims to provide a standardized method and architecture to normalize and automate these security…

Oracle and Multi-Cloud Security at the ONUG Spring Conference

The growth of multi cloud deployments is undeniable. According to the 451 Research Voice of the Enterprise: Cloud, Hosting & Managed Services, Vendor Evaluations 2020 survey, 76% of companies are using two or more public clouds, with the average having 2.3 clouds in use. For larger organizations, these figures are even higher: those with more than $1bn in revenue are twice as likely to be using three or more clouds than smaller businesses.  The top reason that enterprises use multiple clouds is to have access…

Cloud Security 101

Managing cloud permissions and configurations As organizations evolve in the cloud, you will find the number of cloud services their teams use and identity permissions that need to be managed increase significantly. These services teams used to build and deliver applications are referred to as assets or resources. Configuring cloud assets, roles, and permissions doesn’t take long to become tedious, time-consuming, and error-prone. The leading causes of security incidents are misconfigurations of assets and over-privileged identities, therefore, it essential to diligently manage these. Discovering cloud…

The Start of a New “Rule-free” Era

No, I’m not advocating that we jump into a new society where there are no rules; that would be catastrophic. We know what “rules” are in the network and IT operations. They are all those things we need to program to define the operational boundaries of our infrastructure. We use rules to set acceptable or non-acceptable thresholds on metrics, parse log messages, extract information from them, and do proper classification. In addition, we use rules to determine if configurations are right or wrong and define…

Applying a Platform Approach to Intent-Based Automation 

Network Complexity Grows Unabated   All enterprise networks are growing increasingly more complex, expanding in breadth and depth from the edge to the cloud. The rapid adoption of multi-cloud architectures, Datacenter networks, SD-WAN, and other edge networking technologies have created new challenges for network operations (NetOps) teams. And all of this growth and technology change is causing a huge chasm between the available skilled NetOps resources and the litany of management tasks at hand. All said and done, this growth is proving that traditional device-centric methods…

The Path to Security as Code:
One Company’s Journey

Companies everywhere are moving to the cloud. But they struggle to ensure their security, to comply with regulatory standards, and to protect themselves and their customers from data breach or disruption. Yet the pressure to migrate to cloud continues unabated, and with little tolerance for slowing innovation to get control of cloud risk. A new approach is needed, one that automates security and compliance across the entire cloud application lifecycle, prevents breaches before they can happen and immediately identifies drift and attack in runtime environments….