The Onug Blog
Enterprise Cloud 2.0 Technology Solutions, Strategy and Use Cases

Subscribe

Visibility, Actionable Insights, and Performance for the Modern, Hybrid Enterprise

This was an exciting month, as Riverbed hosted our Global User Conference and we participated in ONUG Fall 2021 and connected with colleagues, customers and the wider enterprise technology community. As we look forward to what’s coming for enterprises—it’s digital-first and hybrid by design, with cloud, SaaS and legacy technologies working together and employees collaborating and engaging with users anywhere, anytime on any device. To achieve the needs of today’s enterprise, businesses and customers are demanding IT organizations take the following steps to successfully move…

Getting Started with Network Automation – A Guide for Your Journey

Beginning your Network Automation journey can seem like an overwhelming task. We often hear questions from our clients, such as, “Where do I even begin?” or “How can I ensure that I am building a platform the right way from the start?” All great questions. However, journey is the key word when it comes to automating your network. This blog post will detail some of the key findings I’ve discovered leading business development efforts at Network to Code and how our customers are successfully implementing…

Prepare your WAN and network security architecture for a hybrid work future

Corporate networks have evolved over the years around the notion of physical spaces — offices, retail stores, factory floors, production studios, and data centers. We predominantly used client-server applications, with the server-side hosted in private data centers, and the client-side running on desktop and laptop computers at physical office locations. We accommodated remote users, business travelers, and the occasional home-based employees using the dreaded three-letter acronym — VPN. VPNs were deemed a necessary evil, both by the end-users who tolerated the clunky user experience and…

Using APIs for End-to-End Process Automation

Blog #3 in a Series on APIs from the ONUG O&A Working Group Part One of this blog series on APIs for network automation set the foundation for the importance of using APIs (application programming interfaces) for network and end-to-end process automation. Part Two, we are going to look at more of the implementation details and points to consider when first looking to leverage API calls for automation. Here in Part Three, we are going to look at putting APIs to work to enable end-to-end…

Bringing Network Automation into the Cloud Era

Network performance, security, and scalability are factors that can redefine IT investments as a competitive advantage. The network remains the unifying feature of modern environments despite the increasingly distributed and remote nature of enterprises. The impact of the cloud is such that the dynamics of modern networks are ever-changing while enterprise environments grow more complex and chaotic. The management of these environments – the discovery, analysis, updating, and maintenance – and the ever-growing number of devices, domains, and clouds can constitute major risks to business…

Will “Best of Breed” Dominate the Future of Large Enterprise Infrastructure?

For most ONUG members, your network and security infrastructure is built from “best of breed” products (aka “point solutions”). Dating back to the ‘80s, selecting, piloting, integrating, and deploying every single component of your infrastructure was the common practice. The prevailing notion was, and still is to a certain extent, that point solutions built by a specialist that focuses on a specific set of requirements and capabilities will outperform suites or platforms that address them as part of a broader solution.  This common wisdom had…

Avoid the Speed Bumps of Your Cloud Journey

Do you remember how your organization started using the cloud or why? Do you remember the meeting where it was discussed, who was assigned to lead the migration strategy, and what was in the detailed plan they produced? Of course you don’t, because it didn’t happen like that. It started with a request to IT for connecting already deployed cloud workloads into the corporate network. “How long? HOW long?” Now your organization has 50 different applications deployed in the cloud across multiple regions – and…

No-code, high value: Democratizing Automation for Better Network Operations

You may have noticed that low-code and no-code technologies are taking enterprise IT by storm. Speaking to TechTarget, Forrester analyst John Bratincevic reported that up to 75% of enterprises will make low-code technology a part of their software strategies by 2024. This explosive adoption is the result of a perfect storm of events:  A dramatic rise in the awareness and availability of no-code/low-code platforms (tools that allow users to design applications through visual drag-and-drop templates without requiring programming knowledge)  Enterprises are feeling the compounding effects…

Realizing the Operational Efficiencies of Automating Hybrid Infrastructure

The invasion of cloud services to enterprise networks is accelerating at an unprecedented pace, continuing the trend of putting operational pressure on network teams to keep pace with the rate of change. Enterprises continue to face the daunting task of how to seamlessly integrate heterogeneous networks that span private infrastructure and public cloud services. Disparate devices, complex topologies, and snowflake application requirements make it challenging to find operational efficiencies due to the complex nature of existing implementations, lack of standardized interfaces, and diverse sets of…

How to Protect Your Data from Ransomware and Double-Extortion

Malware has been the archenemy of organizations around the globe for years, with ransomware, in particular, being an extremely deadly foe. Locking down victims’ files through encryption and demanding a ransom for decryption has proven to be an effective tactic for cybercriminals, with a steady stream of recent attacks serving as a constant reminder. However, these attackers are continually refining their tactics and have recently turned to double-extortion, whereby they threaten to leak victims’ sensitive files in order to increase the odds of ransoms being paid. Kaseya-style…