Besides public and private (on-premises) cloud solutions, the hybrid cloud is the third option that bridges the gap between the two. Despite the public cloud service market reaching the worth of more than $200 billion, many companies are also using on-site (private) clouds. On-site cloud is the best option for industries with strict workflow needs or those highly regulated. Hybrid cloud solutions allow enterprises of all sizes to take advantage of the public cloud scalability and flexibility without sacrificing security or performance. Before utilizing the…
The ONUG Hybrid Multi-Cloud (HMC) Working Group consists of IT executives tasked with identifying the barriers to cloud adoption and making actionable recommendations for how ONUG can help the community break through these barriers. For example, after each ONUG event, the working group evaluates attendee use case voting results, which often leads to the creation of a new working group in which users and vendors in the community will work together to define the requirements for a pressing use case and develop reference solutions that…
Moving to the cloud is motivated by the need for scalable and flexible middleware, database, and cloud services, not by gaining instantaneous storage and compute capacity or cost reduction. Running on a hybrid and multi-cloud infrastructure provides different advanced application services that business units can use to secure their digital transformation journey. The shift to hybrid multi-cloud adoption for supporting IaaS (Infrastructure as a service) and PaaS (Platform as a service) is an essential milestone that an enterprise must evaluate, plan out, and ensure that…
First, a huge thank you to everyone who participated at ONUG Spring in Dallas this past May. It was the ONUG Community’s largest spring gathering yet, bigger than ONUG Spring 2018 in San Francisco by 20+% with some 300 new IT executives joining the community. The ONUG Board decided that Dallas is the new home for ONUG Spring moving forward. But not only was the Dallas ONUG successful in terms of community response, there were at least five major industry topics that everyone should know…
In today’s age of digital transformation, companies are trying to capitalize on the momentum by adding security operations automation and orchestration systems to their SIEM (Security Information and Event Management) platforms. Splunk acquired Phantom; IBM acquired Resilient; Rapid7 acquired Komand. These are all recent proofs of the rapid maturation of the market for security operations, automation, and orchestration. Security automation. It is the use of information technology for security event management and cyber incident response in place of manual processes. Security orchestration. Involves the integration…
Artificial Intelligence, advanced analytics, and next-generation monitoring are promising to deliver their benefits, but only when properly applied to the right problems. With that done, next-gen network analytics driven by Machine Learning (ML) and Artificial Intelligence (AI) will be able to revolutionize traditional infrastructure management models, reduce costs, simplify operations, and provide new insights. AI can be trained to pinpoint network shortcomings and failures (even before they happen) and detect where the problem is. Also, it can fix insufficient network utilization, provide bandwidth and delay…
Cloud and containerization of infrastructure functions are enormous trends that will continue to reshape enterprise digital platforms. Containers are even expected to completely reshape the idea of Software Defined Data Center (SDDC) and Network Functions Virtualization (NFV). Enterprises that are built on or moved their core business functionality to digital platforms have become prevalent over the last few years. Companies that want to stay in the game need to be willing to adopt new platform strategies and risk their revenue streams by moving closer toward…
Centered around the principle that nothing both inside or outside a network perimeter can be trusted without verification, the Zero Trust model is attracting more and more attention from organizations that struggle to prevent data breaches with traditional approaches. However, enterprises that want to embrace this model must be prepared for certain jettison practices based on embedded notions of a secure corporate network and trusted insiders. What is the Zero Trust Model? The term was coined in 2010 by Forrester Research to describe a model…
About 30 years ago, IT departments had an enviable task when dealing with cybersecurity. Given the small number of devices they had to protect, their job was simple. Today, the use of digital technologies in the work environment is increasing sharply due to the need for enterprises to become more adaptable and agile. It creates a surging number of endpoints cyber-attackers can use to gain access to networks. Traditional security isn’t enough as threats are becoming more complex. As the global cyber battlefield has dramatically…
Throughout the ages, one of the mantras of successful businesses around the world has been – transform or perish. And in today’s fast-evolving and highly disruptive world of technology, we see that the digital transformation of business also depends on the right use of technology. Digital transformation drivers are many – to take products and services to market more cost-effectively, to reach out to a broader customer base, to appeal to new audiences, etc. Disruptive technologies like blockchain, artificial intelligence, and cloud promise to help…