The Onug Blog
Enterprise Cloud 2.0 Technology Solutions, Strategy and Use Cases

Subscribe

Cloud Security 101

Managing cloud permissions and configurations As organizations evolve in the cloud, you will find the number of cloud services their teams use and identity permissions that need to be managed increase significantly. These services teams used to build and deliver applications are referred to as assets or resources. Configuring cloud assets, roles, and permissions doesn’t take long to become tedious, time-consuming, and error-prone. The leading causes of security incidents are misconfigurations of assets and over-privileged identities, therefore, it essential to diligently manage these. Discovering cloud…

The Start of a New “Rule-free” Era

No, I’m not advocating that we jump into a new society where there are no rules; that would be catastrophic. We know what “rules” are in the network and IT operations. They are all those things we need to program to define the operational boundaries of our infrastructure. We use rules to set acceptable or non-acceptable thresholds on metrics, parse log messages, extract information from them, and do proper classification. In addition, we use rules to determine if configurations are right or wrong and define…

Applying a Platform Approach to Intent-Based Automation 

Network Complexity Grows Unabated   All enterprise networks are growing increasingly more complex, expanding in breadth and depth from the edge to the cloud. The rapid adoption of multi-cloud architectures, Datacenter networks, SD-WAN, and other edge networking technologies have created new challenges for network operations (NetOps) teams. And all of this growth and technology change is causing a huge chasm between the available skilled NetOps resources and the litany of management tasks at hand. All said and done, this growth is proving that traditional device-centric methods…

The Path to Security as Code:
One Company’s Journey

Companies everywhere are moving to the cloud. But they struggle to ensure their security, to comply with regulatory standards, and to protect themselves and their customers from data breach or disruption. Yet the pressure to migrate to cloud continues unabated, and with little tolerance for slowing innovation to get control of cloud risk. A new approach is needed, one that automates security and compliance across the entire cloud application lifecycle, prevents breaches before they can happen and immediately identifies drift and attack in runtime environments….

Five Tips to a Successful Virtualized Enterprise Edge Deployment

To accelerate digital transformation and deliver a higher-quality customer experience, enterprises across multiple industries are attempting to shift to a “virtualized” IT and network environment.  In this context, “virtualized” refers to the evolution from a hardware-centric enterprise edge to a software-centric environment.  This entails replacing numerous physical network devices and application servers in each location with virtual network functions and application workloads uploaded to a single physical device.  Examples include SD-WAN, Virtual Router, Virtual Firewall, Secure Access Service Edge, and others.  Enterprises that make the…

Flipping the Script on Security

Traditional security solutions still aren’t helping companies detect, recognize, and respond to rapidly changing relationships and threats. This problem is underscored by three main factors: Managers view workers as the cause of poor security. Workers make mistakes, they violate rules—they represent a problem that an organization needs to solve, instead of dealing with the underlying phenomena of security issues. Because of this, organizations intervene to try and influence workers’ behavior. Managers develop strict rules and guidelines that control what workers do, because they cannot be…

Multi-cloud Is Enterprise Computing

Enterprise computing is entering its fourth evolution. The large enterprise market has adopted mainframe, client-server, internet and now multicloud computing. And just like the previous computing cycles, multi-cloud is driven by business unit developers. That is, developers use the best tools available to write applications that create business value. They are not wed to any one cloud service provider (CSP), as they will switch development to the CSP that offers them the best application development tools. But as these decentralized decisions go unchecked, cost and…

3 Steps to Up Your Cloud Networking Game

It’s no surprise that workloads are moving to the cloud in record numbers. At the same time, trends towards multi-cloud and hybrid cloud architectures are making networking far more complicated. Yet, network teams are often the last team to be brought in when organizations migrate. Why? Because cloud-provider tools were built for developers, not for the network. There’s a common theme emerging here: Tools, the organization, and the cloud infrastructure are optimized for application support and not networking. No one thinks about networks when building…

Building a Bridge to the Future: Power Hybrid Environments with Network Resilience

The pandemic ushered in a new era, one where technology has created flexibility for organizations, employees, and customers. These technological advancements provide endless possibilities for all parties – increased productivity, improved customer experience, maximized service, and minimized costs. Ensuring that these experiences exceed expectations, enterprises have become increasingly reliant on their network – a resilient network. Travel restrictions and lockdowns spurred by the pandemic were two of the main catalysts of this new, hybrid, digital age. One where products can be bought anywhere, solutions can…

Cloud Networking Needs More Than Incremental Innovation

If you’re looking for a better way to build your network, everyone knows you go to ONUG.  ONUG has proven that community collaboration transcends convention and myopic perspective.  ONUG has been re-inventing what’s possible with the OSI stack allowing us to continue our forward progress when we were about to run out of road.  Ten years ago, I remember an event where the presenter terrified everyone (who mostly showed up for a free steak) with the “fact” that we were about to exhaust the public…