The Onug Blog
Enterprise Cloud 2.0 Technology Solutions, Strategy and Use Cases

Subscribe

Cloud First No More, Cloud Smarter Instead

A Request for Comment (RFC) on cloud computing adoption across the federal government has gone out and it says that it’s time to move from Cloud First to Cloud Smart. According to an article on NextGov.com, “The new strategy will update the Obama administration’s “Cloud First” policy, established in 2010, to better reflect where agencies and the technology are today. Seven years ago “was a time when cloud computing was still new,” Federal Chief Information Officer Suzette Kent said during a roundtable with reporters Monday….

ONUG Fall in New York!

ONUG is a group representing enterprise users of network technology. Some of those users are the biggest names in the industry – names like FedEx (shipping and logistics), Gap (retail), Bank of America, Citi (financial services) and Kaiser Permanente (healthcare) that gather together twice a year to define the issues they are facing with technology, working with vendors to solve those issues. Companies attending the upcoming Fall 2018 event on October 22-23rd in New York City will discuss what is happening particularly in the SD-WAN…

Trust but Verify: How to Monitor SD-WAN

SD-WAN is a popular topic on every blog, news site, and at every conference today, but much of the chatter deals with the implementation benefits. As ONUG’s own Nick Lippis mentions in his post about the top 5 topics IT will be talking about, SD-WAN is entering a new generation that’s focused on scale, security, and performance. With this new generation, IT needs a new understanding of how to monitor SD-WAN effectively for the long term, bearing in mind nuances around the technology and why…

Are You Unwillingly Placing Your “Trusted” Digital Certificates in the Hands of Unauthorized Users?

In an increasingly digital world, digital certificates become the identity of a particular enterprise. Who trusts this digital identity? Almost every entity that is connected to the internet, including browsers and their underlying operating systems. Basically, certificates are like our passports; they are widely accepted as proof of identity. A digital (or “identity”) certificate is also used to securely exchange information over the internet using the entity’s public key. Due to this, digital certificates have garnered a significant amount of trust over the years, and…

Three Best Practices for Managing Your Network Security in the Age of Digital Transformation

Digital transformation is impacting every industry—and it’s now essential to staying competitive. But as you digitally transform your enterprise, new complexities and challenges will continually emerge. And that makes network security more important than ever. In this new landscape, the organizations that are most prepared will survive. But it’s about more than just survival—you need true resilience to thrive and get ahead of the competition. The arena you’re operating in is transforming, so your approach needs to adapt. Here are three things you should consider…

Digital Transformation Must Include Network Architecture to Get Ahead of Attackers

Digital transformation is sweeping every aspect of business from IT to customer engagement to partner integrations. Its drivers are less about the demands of an increasingly digital-native audience and more about efficiency and scale in the face of a dearth of technical talent. Whether we’re transforming network and application service infrastructure to support “as code” pipelines or digitally encoding business processes in shiny, sparkly apps, digital transformation is here to stay. Organizations are aiming for IT optimization, faster time to value, and a reduction in…

The Zero-Trust Mandate: Never Trust, Continually Verify

The traditional network security model was designed to connect workers at headquarters or a branch office to the resources they needed in data centers. At that time, there were relatively few remote workers and they connected back into their home network using an operationally complex VPN. Today, most employees work remotely at least one day a week and virtually all organizations also make use of multiple public cloud services. Those factors combined with the security vulnerabilities associated with VPNs means that the traditional model is…

Five Cloud Deployment Best Practices for IT in 2018

Cloud deployment is in a critical period. The entire process must be highly agile and seamlessly integrated into the existing architecture to create a platform that allows users to access your services on demand. Since technology is constantly developing, you also need to keep track of the latest innovations to make your cloud deployment strategy successful. To stay informed about recent developments, these are the top five cloud deployment best practices for IT enterprises in 2018 you should look out for. 1. Creating Agile Environments…

Top 5 Hottest Topics Every IT Executive Will Be Talking About After ONUG Fall 2018

Every Global 2000 corporation is on its own digital transformation journey that’s unique to its industry, market, corporate strengths and positioning. Make no mistake about it, this a global economic mega trend. Every corporate board in the Global 2000 is focused on defining their digital strategy, thanks to greater margins and market capitalization valuations that being digital offers. Consider this: analyst firms predict that 41% of enterprise revenue will come from digital business by 2020; that’s only two years away. The digital economy supports some…

Observability and Analytics: How to Manage Multi-Cloud Infrastructure

Hybrid multi-cloud models of infrastructure are the new norm. More and more companies are choosing a multi-cloud model as their primary strategy. The “State of the Cloud” report by RightScale shows that 81% of enterprises preferred multi-cloud models and 51% used hybrid models in 2018. In some cases, the popularity of multi-cloud infrastructure comes down to a company’s desire to decrease dependability on only just one vendor when leveraging the model to add higher value to the enterprise. In others, it is to cut expenses…