Industry thought leaders consider DevOps practices essential to the successful delivery of software-driven business value at scale. Yet despite the significant embrace of DevOps over the past decade, many organizations struggle to move beyond the middle stages of their DevOps journey. Many find it difficult to scale DevOps beyond their initial preliminary deployment, failing to achieve the degree of enterprise lift needed to realize DevOps’ full potential. Why is this the case? What can organizations do to salvage their DevOps deployments? This session brings together…
Every corporation is building their own security data consumption systems of significant size, complexity, cost and staffing to answer specific security and governance control related questions. These systems are typically called a Security Data Lake with the goal of ingesting curated events from across CSP’s and on-prem devices; then enriching, filtering, applying ML and retaining this data for short to medium term. The ONUG Collaborative, feels strongly of the importance of partnering with CSPs in creating a standardized security information model (and related outputs)….
According to the business press and industry industry buzz, advanced cloud services that use AI and ML have engendered a digital transformation that is elevating IT from a service organization into a central part of all business activity. It seems that every corporation is moving business processes to the cloud en masse. Business continuity planning forms a key use case. But is it really true? Detractors claim that many large corporations still only have 10-15% of their workloads in the public cloud, and argue that…
In an increasingly complex enterprise environment with multiple fragmented sources of telemetry, AI/ML has the potential to enable a highly automated, secure, self-healing data center that requires little human intervention, is highly efficient and always available. For this vision to be remotely possible we have to have access to a credible source of truth when it comes to telemetry—a full view (not fragmented or sampled) of all telemetry – North/South and East/West in the Data Center. In this session, Pensando’s Scott Stevens will discuss how…
The cloud and mobility are powerful enablers of digital transformation, but many IT organizations are grappling with legacy architectures and processes that haven’t evolved much in decades. When applications lived in the data center and users were connected to the network, it made sense to invest in a hub-and-spoke architecture and protect it with a castle-and-moat security perimeter. But today, a new approach to security is needed, one built from the ground up with zero trust to securely enable businesses to take full advantage of…
Business processes continue to digitize and transform, driven by a new wave of “modern” applications and more recently by global conditions. User experience, security and end-to-end visibility have never been more front and center. This, along with the new application capabilities enabled by microservices and containers, is creating a fundamental shift — or extension — of cloud architecture to embrace the edge and get workloads closer to users. In this fireside chat, we will discuss the shifts in application and cloud architectures towards the edge,…
Elastic network infrastructure is essential for many digital transformation initiatives such as cloud migration, work from anywhere, and pervasive zero-trust security. But, how do you get there? IT teams today are burdened by technical debt, piles of legacy products, and mounting pressures on skills and resources. In short, today’s networks are rigid, constrained, and expensive. In this session, Cato Networks’ Yishay Yovel talks with Vitesco Technologies, a division of Continental AG, about their journey to migrate off their legacy network to a converged, global SASE…
2020 brought unprecedented expansion of cloud consumption, thanks to remote workforce infrastructure build out. However, traditional access models (virtual desktop, VPN, MPLS etc) ruled for the growth of edge services, especially in support of employees working from home. What is the future of edge services? Will virtual desktop, VPNs give way to zero-trust, 5G and cloud edge services?
The stock market has seen records after records, but while the Dow is way up during the pandemic, not all enterprise tech companies have enjoyed the upward ride. Cloud providers have gained of course, but legacy tech not so much. If a company’s stock price reflects its customer’s sentiment on its future prospectus then enterprise IT is restructuring for the digital enterprise. In this panel, we discuss the new landscape of enterprise IT suppliers that are helping IT organizations build, run and secure their digital…
The network landscape has changed significantly in recent years. After a long period of a relatively standardized, static model of layer 2 and layer 3 services based on LAN and core network topologies, new capabilities have become more prevalent. These include technologies like public/private/hybrid cloud networking, SDN, SD-WAN, virtualization/containerization of network functions, and the explosive growth in demand for fully functional, remote worker access. Due to these new technology additions, the CLI-centric network of the past has been disrupted by dynamic, virtualized, API-centric functions and…