The Onug Blog
Enterprise Cloud 2.0 Technology Solutions, Strategy and Use Cases

Subscribe

Run Your SD-WAN Deployment with Network AI

SD-WAN is seemingly taking the enterprise world by storm. The market is big and still growing, with room for at least five major vendors doing a healthy business. And it’s easy to see why. SD-WAN eases a lot of headaches in running a large enterprise WAN. The reliability, redundancy, and security benefits are real. I was tempted to say that SD-WAN “solves” a lot of WAN headaches, and SD-WAN vendors would have you believe this is really true – that it’s a set-and-forget kind of…

Your Firewall is Now Everywhere — And Nowhere

Network security has been stuck in a box for too long. Much of what we know consists of perimeter or zone-based rules that limit which network segments can talk to which other network segments over which ports. The workhorse of this world has been the firewall appliance, interconnecting network segments and enforcing these rules. In the meantime, applications have moved to the public cloud and users have left the building. Hybrid work is challenging the very notion of the enterprise WAN. So what does this…

You Know It Works Because You Saw it at ONUG

Helping Cloud Professionals understand the building blocks needed to construct multi-cloud infrastructure There is a massive on-prem infrastructure build about to take place in the mid to large enterprise as evident in the $600B+ 2021 Venture Capital start-up investment bonanza. Let me explain.    Application developer requirements are forcing infrastructure teams to build and run multi-cloud infrastructure. That is, application developers have allegiance to cloud service provider (CSP) tools and not necessarily CSP brands. A software engineer will write an application in any CSP or private…

Discover your Cloud Security Posture Maturity Level

ONUG Cloud Native Security Working Group Blog Series Introduction Cloud Security Posture Management (CSPM) is currently one of the fastest growing areas within the field of cloud security; most security vendors are now offering or developing CSPM capabilities. However, enterprises are still trying to build the most effective CSPM program to fit their environment. In many cases, it’s unclear where to start and what the end goal is for the CSPM effort.  To help simplify this process, this post will share guiding principles for implementing…

ONUG Collaborative Update – February, 2022

The first quarter of 2022 has been incredibly busy and exciting for the ONUG Collaborative. As ONUG rallies around the multi-cloud attributes of Connect, Secure, Observe and Automate, the Collaborative Working Groups have gained improved focus on how to deliver value to our members. There are several initiatives worth highlighting: The Cloud Security Notification Framework (CSNF) is the open source initiative being led by ONUG, bringing order to chaos in cloud security messaging. The ACG Working Group is getting ready to present the MVP iteration…

Building a Bridge to the Future: A Resilient Approach to Digital Transformation

Rapidly evolving customer expectations, growing market pressures, and overall organizational goals have fueled digital transformation in every industry. It’s projected that by 2025, global spending for transformational efforts is expected to reach $2.8 trillion.[1] Digital transformation is the process of leveraging new technologies, across all areas of an organization, to optimize operations and drive growth by providing new value to customers. Digital transformation evolves the way an organization conducts business, enabling them to transition from outdated processes and legacy equipment with the use of new…

What’s the Future of Enterprise Computing? Nick Lippis and Ernest Lefner Discuss at ONUG Fall

Enterprise Cloud 1.0 has changed the game for top-level computing, but like everything else in the industry, things keep changing – and quickly. To keep up, enterprise customers are looking toward the next wave: the leap that could combine the disparate worlds of cloud and on-premises into Enterprise Cloud 2.0. But what does that mean, exactly? What will digital enterprise look like once it has become the new paradigm? And is it capable of bridging gaps that left Cloud 1.0 wanting? In the ONUG Fall…

The WAN is Now Cloudy and That’s a Good Thing

Enterprises are used to the idea that the cloud is consumable. After all, cloud consumability is the characteristic that brings the chief cloud benefit: business agility. Why build and maintain your own data center space, power, equipment, etc. when you can simply click or API your way to thousands of servers? For traditional IT teams, cloud consumability has been a revelation. For digital native DevOps and SRE teams, cloud consumability is a given. The bad news is that the WAN as a whole has historically…

A More Secure Digital Future

A More Secure Digital Future During my long career, there has been one constant requirement I often hear, “I want to see an end-to-end view of an application.” This is the holy grail to assure great user experience, assure security and observability.  Developers, IT infrastructure and operational teams struggle every day with this lack of visibility of an application’s dependency map. Gaining end-to-end visibility is hard enough when you own every device or piece of software that supports an application as in a private data…

Zero Trust: An Overnight Sensation Decades Later

Introduction Years after the term was coined by Stephen Paul Marsh in 1994 and popularized by John Kindervag more than a decade ago, Zero Trust has become the “new” security solution that addresses the confluence of today’s three critical factors and the emergence of what amounts to a cyber-war on businesses and governments. Zero Trust switches the focus from outward-facing defense of a network perimeter to prevention of unauthorized exfiltration of data and other exploits. This short work looks at why it has become virtually…