The Onug Blog
Enterprise Cloud 2.0 Technology Solutions, Strategy and Use Cases

Subscribe

Building a Bridge to the Future: Power Hybrid Environments with Network Resilience

The pandemic ushered in a new era, one where technology has created flexibility for organizations, employees, and customers. These technological advancements provide endless possibilities for all parties – increased productivity, improved customer experience, maximized service, and minimized costs. Ensuring that these experiences exceed expectations, enterprises have become increasingly reliant on their network – a resilient network. Travel restrictions and lockdowns spurred by the pandemic were two of the main catalysts of this new, hybrid, digital age. One where products can be bought anywhere, solutions can…

Cloud Networking Needs More Than Incremental Innovation

If you’re looking for a better way to build your network, everyone knows you go to ONUG.  ONUG has proven that community collaboration transcends convention and myopic perspective.  ONUG has been re-inventing what’s possible with the OSI stack allowing us to continue our forward progress when we were about to run out of road.  Ten years ago, I remember an event where the presenter terrified everyone (who mostly showed up for a free steak) with the “fact” that we were about to exhaust the public…

Is Your Multi-Cloud Estate Secure?

It is unlikely that anyone would question the need for securing their hybrid multi-cloud estate; the number of mission-critical applications running in the public cloud nearly doubled between 2020 and 2021, and the growth is expected to continue. (Source: 451 Research’s Voice of the Enterprise: Information Security, Budgets & Outlook 2021). Cloud providers want to mitigate concerns, often saying, “The cloud is more secure than your on-prem network.”  This is true, sort of. Public cloud providers have more highly trained experts focused on cloud security…

3 User Access Scenarios Where ZTNA Can Help in 2022

As hybrid work is here to stay for a vast majority of organizations, there are three secure user access scenarios that most affect an organization: remote employees;  branch offices; and accommodating new, contingent, or traveling workers.  Remote employees Every remote employee is essentially an internet gateway. With remote access services transitioning to identity-based controls, attackers will be opportunistic by targeting credentials. And why not?  Let’s think about digital access the same way we think about physical access to a building. What’s easier for gaining access…

Operational Lessons Learned from Cloud-First Companies at ONUG Fall 21

The cloud brought enormous business value to companies in virtually every industry, and cloud-first companies have led the way as pioneers. But as these first-movers have scaled up, they’ve uncovered a problem: the cost of using the cloud has, in many cases, exceeded the cost of sales. To resolve the issue, many cloud-first companies have shifted at least some of their workloads back to on-premises facilities, in what could be an example for businesses looking to scale up on the cloud in an economically-viable way….

Run Your SD-WAN Deployment with Network AI

SD-WAN is seemingly taking the enterprise world by storm. The market is big and still growing, with room for at least five major vendors doing a healthy business. And it’s easy to see why. SD-WAN eases a lot of headaches in running a large enterprise WAN. The reliability, redundancy, and security benefits are real. I was tempted to say that SD-WAN “solves” a lot of WAN headaches, and SD-WAN vendors would have you believe this is really true – that it’s a set-and-forget kind of…

Your Firewall is Now Everywhere — And Nowhere

Network security has been stuck in a box for too long. Much of what we know consists of perimeter or zone-based rules that limit which network segments can talk to which other network segments over which ports. The workhorse of this world has been the firewall appliance, interconnecting network segments and enforcing these rules. In the meantime, applications have moved to the public cloud and users have left the building. Hybrid work is challenging the very notion of the enterprise WAN. So what does this…

You Know It Works Because You Saw it at ONUG

Helping Cloud Professionals understand the building blocks needed to construct multi-cloud infrastructure There is a massive on-prem infrastructure build about to take place in the mid to large enterprise as evident in the $600B+ 2021 Venture Capital start-up investment bonanza. Let me explain.    Application developer requirements are forcing infrastructure teams to build and run multi-cloud infrastructure. That is, application developers have allegiance to cloud service provider (CSP) tools and not necessarily CSP brands. A software engineer will write an application in any CSP or private…

Discover your Cloud Security Posture Maturity Level

ONUG Cloud Native Security Working Group Blog Series Introduction Cloud Security Posture Management (CSPM) is currently one of the fastest growing areas within the field of cloud security; most security vendors are now offering or developing CSPM capabilities. However, enterprises are still trying to build the most effective CSPM program to fit their environment. In many cases, it’s unclear where to start and what the end goal is for the CSPM effort.  To help simplify this process, this post will share guiding principles for implementing…

ONUG Collaborative Update – February, 2022

The first quarter of 2022 has been incredibly busy and exciting for the ONUG Collaborative. As ONUG rallies around the multi-cloud attributes of Connect, Secure, Observe and Automate, the Collaborative Working Groups have gained improved focus on how to deliver value to our members. There are several initiatives worth highlighting: The Cloud Security Notification Framework (CSNF) is the open source initiative being led by ONUG, bringing order to chaos in cloud security messaging. The ACG Working Group is getting ready to present the MVP iteration…