The Onug Blog
Enterprise Cloud 2.0 Technology Solutions, Strategy and Use Cases

Subscribe

Will “Best of Breed” Dominate the Future of Large Enterprise Infrastructure?

For most ONUG members, your network and security infrastructure is built from “best of breed” products (aka “point solutions”). Dating back to the ‘80s, selecting, piloting, integrating, and deploying every single component of your infrastructure was the common practice. The prevailing notion was, and still is to a certain extent, that point solutions built by a specialist that focuses on a specific set of requirements and capabilities will outperform suites or platforms that address them as part of a broader solution.  This common wisdom had…

Avoid the Speed Bumps of Your Cloud Journey

Do you remember how your organization started using the cloud or why? Do you remember the meeting where it was discussed, who was assigned to lead the migration strategy, and what was in the detailed plan they produced? Of course you don’t, because it didn’t happen like that. It started with a request to IT for connecting already deployed cloud workloads into the corporate network. “How long? HOW long?” Now your organization has 50 different applications deployed in the cloud across multiple regions – and…

No-code, high value: Democratizing Automation for Better Network Operations

You may have noticed that low-code and no-code technologies are taking enterprise IT by storm. Speaking to TechTarget, Forrester analyst John Bratincevic reported that up to 75% of enterprises will make low-code technology a part of their software strategies by 2024. This explosive adoption is the result of a perfect storm of events:  A dramatic rise in the awareness and availability of no-code/low-code platforms (tools that allow users to design applications through visual drag-and-drop templates without requiring programming knowledge)  Enterprises are feeling the compounding effects…

Realizing the Operational Efficiencies of Automating Hybrid Infrastructure

The invasion of cloud services to enterprise networks is accelerating at an unprecedented pace, continuing the trend of putting operational pressure on network teams to keep pace with the rate of change. Enterprises continue to face the daunting task of how to seamlessly integrate heterogeneous networks that span private infrastructure and public cloud services. Disparate devices, complex topologies, and snowflake application requirements make it challenging to find operational efficiencies due to the complex nature of existing implementations, lack of standardized interfaces, and diverse sets of…

How to Protect Your Data from Ransomware and Double-Extortion

Malware has been the archenemy of organizations around the globe for years, with ransomware, in particular, being an extremely deadly foe. Locking down victims’ files through encryption and demanding a ransom for decryption has proven to be an effective tactic for cybercriminals, with a steady stream of recent attacks serving as a constant reminder. However, these attackers are continually refining their tactics and have recently turned to double-extortion, whereby they threaten to leak victims’ sensitive files in order to increase the odds of ransoms being paid. Kaseya-style…

The Six Business Benefits of Zero Trust Segmentation

At a theoretical level, implementing zero trust makes significant sense. Cybersecurity threats can come from anywhere—outside or inside the network, and even start in one place then move to another. Adopting a zero trust— “Never trust, always verify” —strategy can help you tamp down on application- and services-related vulnerabilities, thereby reducing friction for the rest of the organization. But despite its widespread use in cybersecurity circles, the term “zero trust” is not well understood—especially when it is applied to segmentation or microsegmentation—and it’s up to security teams to explain why…

Dress Up Your Cloud Security Notification Messages If You Want to Scale 

2021 has been a tremendous year for the ONUG Community of Global 2000 IT business leaders and sponsor members.  In the ONUG Collaborative, Oracle Cloud has joined to help develop the open source Cloud Security Notification Framework’s Decorator along with Microsoft Azure, IBM Cloud and Google Cloud Platform under the guidance of FedEx, Cigna, Raytheon, Intuit, Adobe, Fidelity Investments, Goldman Sachs, Kaiser Permanente, etc.  Cisco, Sysdig, Wiz, Concourse Labs and many others are now making the Decorator, a common data model and metadata scheme to…

How to Establish a Culture of Secure DevOps

We’re constantly told to “Shift Left” and that Secure DevOps is the only way to have confidence in your cloud native applications. But speaking to end-users and industry colleagues, it’s clear that there are some major challenges in adopting Secure DevOps. If we read our history books, we know that DevOps wasn’t successfully adopted by buying tools, and a true cultural movement towards DevOps wasn’t established by having a small dedicated team of DevOps specialists. I’m sure many of us have read the Phoenix Project…

Evolving Towards Multi-Service Enterprise Edge Compute and Cloud Virtualization Infrastructure

There’s a lot of talk about the ‘edge’ these days—edge compute, edge cloud, near edge, far edge, the list goes on.   We see these as just different approaches to ensure that enterprise employees have ‘always-on’ access to the data, content, and applications they need to do their jobs—regardless of their physical location. These edge approaches also deliver a higher-quality customer experience and meet application specific latency and bandwidth needs. For over a decade, enterprises accomplished this task by moving many applications into public, private, and…

Financial Services – Regulation and Risk Management for Cloud Services

Outsourcing IT infrastructure to public cloud is on the rise for Financial Service Institutions (FSI) and in most cases, enterprises will work with the Cloud Service Provider (CSP) of their choice to plan and manage workloads and software services. A lot of the early cloud strategy and decision-making can be influenced by what that initial CSP prescribes. Similarly, the CSP can dictate what products customers can consume within an established scope. FSIs are relying more heavily on CSPs. The role the CSP plays in supporting…