The Onug Blog
Enterprise Cloud 2.0 Technology Solutions, Strategy and Use Cases

Subscribe

ONUG Launches Private 5G Working Group

Working groups serve as ONUG’s vehicle for generating industry change, with members of the ONUG Community – IT professionals, vendors, service providers and solutions integrators – joining together to address the business and technical challenges that enterprises must overcome on their digital transformation journey. Working groups engage in a collaborative process to develop recommended solutions for the top-priority use cases for typical deployment scenarios in complex enterprise networking environments. Based on the strong interest in private 5G networks at the recent ONUG Spring 2023 event…

The ONUG Fall 2023 Hackathon – “Capture-the-Flag” Event

ONUG’s Cloud Security Notification Framework (CSNF) solution plays a pivotal role in enhancing cloud security across CSPs. CSNF and its related Canonical Data Model (CDM) enables the enterprise to address evolving threats while reducing toil for the SOC by facilitating integration with SIEM/SOAR platforms and bolstering incident detection and response capabilities.  Learn more about CSNF here, then get ready for the ONUG Fall 2023 Hackathon! Description In support of the CSNF initiative and on behalf of its membership, ONUG is excited to announce the first-ever…

Help Build a Full-Stack Observability Platform in the ONUG Hyperautomation Working Group

We are delighted to announce the formation of the Full-Stack Observability effort in the Hyperautomation Working Group, an initiative devoted to pioneering advancements in multi-layered, multi-domain analytics capabilities. This initiative is driven by the urgency to bridge the gap in cybersecurity, particularly focusing on integrated full-stack solutions that consolidate endpoint and network security telemetry. Despite the indispensability of visibility and observability in protecting digital assets, the current lack of a unified platform solution hampers comprehensive threat detection and response, posing a significant risk across organizations….

Meeting Productivity Demands While Enduring Talent Scarcity with an Automation-First Mindset

Introduction It’s no secret that great engineers are difficult to find. As technology disciplines become increasingly siloed and advances continue at a rapid pace, talent acquisition is likely to remain challenging. From an engineer’s perspective, mastery is always temporary and learning emerging technologies is laborious. Meanwhile, business demands are pushing those same engineers to provide ever greater levels of service quality. Customers expect an interaction that is frictionless, secure, and rapid: an expectation that can only be met with the latest technologies. These demands require…

Hyper Scalable Security for Hyper Agile Infrastructures: What You Need to Know

Agile Infrastructures bring hyper scale challenges Once narrowly defined as applications specifically built to run and scale on the cloud, the term “cloud native” has evolved to encompass any app built using cloud services. This broadening of the definition has led to the emergence of new terminology such as “hyper-scale” and “agile infrastructure” to describe cloud workloads designed to handle infinite scale – workloads built with containers, Kubernetes and serverless technologies.  By design, hyper-scale applications are highly modular, with each component running in its own…

Essential Considerations for Your Multi-Cloud Network Security Strategy

Public cloud providers have really begun to step up their game when it comes to security. Each provider offers a tool kit of cloud-native services to ensure that you’re able to adequately safeguard your applications and data that reside in their infrastructure. But as the industry begins to leverage services and storage from multiple cloud providers, building secure network connectivity that can transcend proprietary cloud networking constructs and work across multiple clouds can become increasingly challenging.  In this article, we investigate the crucial factors and…

The Pivotal Role of Hyperautomation in Enterprise Observability

In today’s interconnected digital landscape, network and security operations have become increasingly complex and critical for organizations across industries. The proliferation of cloud technologies, the Internet of Things (IoT) and remote work environments has necessitated robust network infrastructure and heightened security measures. To effectively manage and safeguard these intricate systems, observability has emerged as a vital practice. And now, with the advent of hyperautomation, observability is undergoing a revolutionary transformation, enabling enhanced efficiency, agility and proactive decision-making. Observability refers to the ability to gain insights…

People Get Ready!: Mapping Zero Trust Principles to Zero Day Realities

Two of the most relevant, if trendy, topics in cybersecurity today relate to the starting point — the “ground zero” of attacks — from both the attacker’s and the defender’s perspective. The most useful weapons in the attacker’s arsenal are Zero Day attacks; that is, previously unknown or unseen attacks. Such attacks are especially pernicious because there is no bespoke, pre-existing defender countermeasure. There is no snort signature, no specifically predefined pattern of behavior to look for, no TCP port to lock down. In that…

Spotlight on Key Trends and Insights from ONUG Spring 2023

The recently concluded ONUG Spring 2023 in Dallas was a resounding success, marked by insightful discussions, vibrant networking, and a deep dive into emerging trends and practices. The keynotes by Merck and Cigna were standout moments of the conference. Merck’s talk provided unique insights into leveraging technology to optimize operations within the pharmaceutical sector, while Cigna gave a compelling presentation on the power of data analytics and personalized customer experiences in the health services industry. Nick Lippis and Dr. Alex Shulman kicked off the conference…

Private 5G Network Ecosystem Partners

Deploying a private 5G network is a complex undertaking that presents a steep learning curve for even the most capable IT teams. Enterprise decision-makers need to work with partners who can help them climb this learning curve and realize private 5G’s full potential. Here I present an overview of the private 5G network ecosystem and outline the roles of the types of companies that enterprises can partner with to achieve successful outcomes. I’ll start by grouping players in the private 5G network ecosystem into three…