Publications
Network Insight.
- Premium Consultancy, Ebooks, Videos and Elearning
Secure SD-WAN: The security vendors and their SD-WAN offerings
A networking vendor simply can’t jump into this space. Some SD-WANs add stateful packet filters and call this security.
AI and 5G: Entering a new world of data
The deployment model of vendor-centric equipment cannot sustain this exponential growth in traffic.
The evolution to Secure Access Service Edge (SASE) is being driven by necessity
The users and devices are everywhere. As a result, secure access services also need to be everywhere.
The software-defined data center drives agility
The value of SDN is doing as much as possible in the software so you don’t depend on the delivery of new features to come from a new generation of the hardware.
Secure Access Service Edge (SASE): A reflection of our times
Gartner makes the claim that the shift to SASE will make obsolete existing networking and security models.
A Virtual WAN: Moving closer to the enterprise
Virtual WAN will radically change the telecom environment, including how circuits are procured and who procures them.
Software-defined perimeter – the essence of trust
Within a zero-trust environment, there is no implicit trust. Thus, trust must be sourced from somewhere else in order to gain access to protected resources.
Intent-Based Networking (IBN): Bridging the gap on network complexity
Intent-Based Networking was a result of the need for greater network automation.
How edge computing is driving a new era of CDN
A CDN is an edge application and an edge application is a superset of what your CDN is doing.
Software Defined Perimeter (SDP): The deployment
After discussing with numerous SDP vendors, I have discovered that the current SDP landscape tends to be based on specific use cases and projects, as opposed to a technology that has to be implemented globally.
Software Defined Perimeter (SDP): Creating a new network perimeter
Considering the way networks work today and the change in traffic patterns; both internal and to the cloud, this limits the effect of the fixed perimeter.