The Onug Blog
Enterprise Cloud 2.0 Technology Solutions, Strategy and Use Cases

Subscribe

Digital Business Requires an End-to-End Intelligence for WAN Edge

Digital Transformations Get Pervasive – Driving Enterprise Productivity, Efficiency and Competitiveness CIOs across enterprise verticals are investing in digital transformation initiatives, driving a digital era like never before. According to IDG’s 2018 Digital Business research, 89% of the organizations have adopted a digital-first strategy. 32% of IT decision makers have testified that digital transformation has already helped them to meet their revenue growth objectives. Enterprises today, of all sizes, are constantly finding new ways of being agile and remaining competitive in the face of extreme…

All-Cloud is the Future of Enterprise Campus Network

All-Cloud network Architecture helps global enterprises to enable digital transformation in campus network, multi-region branch, and IoT scenarios. Technologies continue to develop and innovate at an unprecedented rate, enterprise services will change rapidly, and network systems will change accordingly. We believe that these trends will change enterprise networks. Cloud-based Enterprise Network Management Extends from Small-Sized Branch Campuses to Medium- and Large-Sized Campuses Medium- and large-sized campuses with large networks and complex services want to use cloud management solutions to reduce operating expense (OPEX). Medium- and…

Multi-Cloud Is an Application Strategy, Not an Infrastructure Strategy

  Multi-Cloud is one of the hottest trends for enterprises right now, but a common misconception can cost your organization millions if it isn’t addressed. IT leaders need to recognize that multi-cloud is an application strategy, not an infrastructure strategy. Adopting multiple clouds can deliver a better global footprint, provide unique data services, and avoid lock-in, but it can also fracture your applications, teams, and budget. Infrastructure-centric teams will have to spend significant cycles configuring, deploying, and scaling applications uniquely per cloud. A fragmented cloud…

Cloud First No More, Cloud Smarter Instead

A Request for Comment (RFC) on cloud computing adoption across the federal government has gone out and it says that it’s time to move from Cloud First to Cloud Smart. According to an article on NextGov.com, “The new strategy will update the Obama administration’s “Cloud First” policy, established in 2010, to better reflect where agencies and the technology are today. Seven years ago “was a time when cloud computing was still new,” Federal Chief Information Officer Suzette Kent said during a roundtable with reporters Monday….

ONUG Fall in New York!

ONUG is a group representing enterprise users of network technology. Some of those users are the biggest names in the industry – names like FedEx (shipping and logistics), Gap (retail), Bank of America, Citi (financial services) and Kaiser Permanente (healthcare) that gather together twice a year to define the issues they are facing with technology, working with vendors to solve those issues. Companies attending the upcoming Fall 2018 event on October 22-23rd in New York City will discuss what is happening particularly in the SD-WAN…

Trust but Verify: How to Monitor SD-WAN

SD-WAN is a popular topic on every blog, news site, and at every conference today, but much of the chatter deals with the implementation benefits. As ONUG’s own Nick Lippis mentions in his post about the top 5 topics IT will be talking about, SD-WAN is entering a new generation that’s focused on scale, security, and performance. With this new generation, IT needs a new understanding of how to monitor SD-WAN effectively for the long term, bearing in mind nuances around the technology and why…

Are You Unwillingly Placing Your “Trusted” Digital Certificates in the Hands of Unauthorized Users?

In an increasingly digital world, digital certificates become the identity of a particular enterprise. Who trusts this digital identity? Almost every entity that is connected to the internet, including browsers and their underlying operating systems. Basically, certificates are like our passports; they are widely accepted as proof of identity. A digital (or “identity”) certificate is also used to securely exchange information over the internet using the entity’s public key. Due to this, digital certificates have garnered a significant amount of trust over the years, and…

Three Best Practices for Managing Your Network Security in the Age of Digital Transformation

Digital transformation is impacting every industry—and it’s now essential to staying competitive. But as you digitally transform your enterprise, new complexities and challenges will continually emerge. And that makes network security more important than ever. In this new landscape, the organizations that are most prepared will survive. But it’s about more than just survival—you need true resilience to thrive and get ahead of the competition. The arena you’re operating in is transforming, so your approach needs to adapt. Here are three things you should consider…

Digital Transformation Must Include Network Architecture to Get Ahead of Attackers

Digital transformation is sweeping every aspect of business from IT to customer engagement to partner integrations. Its drivers are less about the demands of an increasingly digital-native audience and more about efficiency and scale in the face of a dearth of technical talent. Whether we’re transforming network and application service infrastructure to support “as code” pipelines or digitally encoding business processes in shiny, sparkly apps, digital transformation is here to stay. Organizations are aiming for IT optimization, faster time to value, and a reduction in…

The Zero-Trust Mandate: Never Trust, Continually Verify

The traditional network security model was designed to connect workers at headquarters or a branch office to the resources they needed in data centers. At that time, there were relatively few remote workers and they connected back into their home network using an operationally complex VPN. Today, most employees work remotely at least one day a week and virtually all organizations also make use of multiple public cloud services. Those factors combined with the security vulnerabilities associated with VPNs means that the traditional model is…