A decade ago, enterprise branch offices had a primary connection (usually MPLS) to the data center and other internal sites. Some large or high-value locations utilized multiple connections or backup links during outages. Then Viptela introduced the software-defined wan or SD-WAN. One of the benefits of SD-WAN was that it enabled the use of active paths across multiple disparate types of transport. Whereas hardware-based networks are slower and harder to connect to additional remote locations. It accomplished this by creating an overlay network on top…
Greetings to all our esteemed suppliers of enterprise IT equipment and services! The ONUG Board invites you to join us this year at the much-anticipated ONUG Fall 2023 in NYC at Hudson Yards on October 24th and 25th! Come and showcase your cutting-edge tools and technologies to an eager audience of network and cybersecurity professionals who are at the forefront of building, managing and integrating cloud infrastructure with on-prem systems and controls. ONUG Fall, as the leading industry forum for enterprise IT, promises an unparalleled…
Working groups serve as ONUG’s vehicle for generating industry change, with members of the ONUG Community – IT professionals, vendors, service providers and solutions integrators – joining together to address the business and technical challenges that enterprises must overcome on their digital transformation journey. Working groups engage in a collaborative process to develop recommended solutions for the top-priority use cases for typical deployment scenarios in complex enterprise networking environments. Based on the strong interest in private 5G networks at the recent ONUG Spring 2023 event…
ONUG’s Cloud Security Notification Framework (CSNF) solution plays a pivotal role in enhancing cloud security across CSPs. CSNF and its related Canonical Data Model (CDM) enables the enterprise to address evolving threats while reducing toil for the SOC by facilitating integration with SIEM/SOAR platforms and bolstering incident detection and response capabilities. Learn more about CSNF here, then get ready for the ONUG Fall 2023 Hackathon! Description In support of the CSNF initiative and on behalf of its membership, ONUG is excited to announce the first-ever…
We are delighted to announce the formation of the Full-Stack Observability effort in the Hyperautomation Working Group, an initiative devoted to pioneering advancements in multi-layered, multi-domain analytics capabilities. This initiative is driven by the urgency to bridge the gap in cybersecurity, particularly focusing on integrated full-stack solutions that consolidate endpoint and network security telemetry. Despite the indispensability of visibility and observability in protecting digital assets, the current lack of a unified platform solution hampers comprehensive threat detection and response, posing a significant risk across organizations….
Introduction It’s no secret that great engineers are difficult to find. As technology disciplines become increasingly siloed and advances continue at a rapid pace, talent acquisition is likely to remain challenging. From an engineer’s perspective, mastery is always temporary and learning emerging technologies is laborious. Meanwhile, business demands are pushing those same engineers to provide ever greater levels of service quality. Customers expect an interaction that is frictionless, secure, and rapid: an expectation that can only be met with the latest technologies. These demands require…
Agile Infrastructures bring hyper scale challenges Once narrowly defined as applications specifically built to run and scale on the cloud, the term “cloud native” has evolved to encompass any app built using cloud services. This broadening of the definition has led to the emergence of new terminology such as “hyper-scale” and “agile infrastructure” to describe cloud workloads designed to handle infinite scale – workloads built with containers, Kubernetes and serverless technologies. By design, hyper-scale applications are highly modular, with each component running in its own…
Public cloud providers have really begun to step up their game when it comes to security. Each provider offers a tool kit of cloud-native services to ensure that you’re able to adequately safeguard your applications and data that reside in their infrastructure. But as the industry begins to leverage services and storage from multiple cloud providers, building secure network connectivity that can transcend proprietary cloud networking constructs and work across multiple clouds can become increasingly challenging. In this article, we investigate the crucial factors and…
In today’s interconnected digital landscape, network and security operations have become increasingly complex and critical for organizations across industries. The proliferation of cloud technologies, the Internet of Things (IoT) and remote work environments has necessitated robust network infrastructure and heightened security measures. To effectively manage and safeguard these intricate systems, observability has emerged as a vital practice. And now, with the advent of hyperautomation, observability is undergoing a revolutionary transformation, enabling enhanced efficiency, agility and proactive decision-making. Observability refers to the ability to gain insights…
Two of the most relevant, if trendy, topics in cybersecurity today relate to the starting point — the “ground zero” of attacks — from both the attacker’s and the defender’s perspective. The most useful weapons in the attacker’s arsenal are Zero Day attacks; that is, previously unknown or unseen attacks. Such attacks are especially pernicious because there is no bespoke, pre-existing defender countermeasure. There is no snort signature, no specifically predefined pattern of behavior to look for, no TCP port to lock down. In that…