SlideShare a Scribd company logo
1 of 4
Download to read offline
/
How to deal with the impact of digital transformation on networks
To unleash the promise of digital transformation, businesses need to embrace automation and
software-defined networking as well as improve security.
By Zeus Kerravala
Network World |
JAN 13, 2020 3:00 AM PST
Also in this series:
The state of digital transformation in 2020
(CIO)
6 digital transformation success stories
(CIO)
What is security's role in digital
transformation? (CSO)
How to deal with the impact of digital
transformation on networks (Network
World)
How to get started with CI/CD (Infoworld)
Making the connection: The role of
collaboration apps in digital
transformation (Computerworld)
Digital transformation has increased the importance of the network, particularly the edge, where customers, employees, cloud
applications and IoT devices connect to the enterprise. The legacy static and non-di erentiated network edge of years past is no
longer su icient for many reasons, so as companies embark on digital-transformation plans, their networks must evolve.
Networking pros should be looking at, among other things, improving security and embracing so ware-defined networking (SDN)
that supports propagating changes quickly across the network in order to accommodate the many challenges digital transformation
creates.
Digital-transformation hurdles
Applications have been reengineered and are moving to public and private clouds,
and at the same time applications now rely on services located across clouds. These
cloud services are tied together by the network, which must be always available
because any disruption of the network means applications won’t perform as
expected.
The internet of things (IoT) has moved out of the operational-technology shadows
and has become a core component of most businesses’ digital-transformation strategies. As IoT adoption increases, so will the
number of connected endpoints.
Almost all of these devices connect at the network edge, so problems at the edge could significantly impair IoT applications.
Historically, network value was considered highest in the data center and lowest at the edge because the data center is where
applications and data resided. IoT changes that and evenly distributes the value of the network.
Wireless advances also have an impact. With Wi-Fi 6 access speeds at parity with wired connections, Wi-Fi is shi ing from a
convenience to an essential method of connecting to the network. In addition, many mobile and IoT devices are wireless-only – they
have no wired interface. The combination of these trends has made Wi-Fi the primary access method, with the edge being where all
BrandPost Sponsored by HPE
Take the Intelligent Route with
Consumption-Based Storage
/
these devices connect with the company network.
Mobile devices, IoT endpoints and cloud computing have created many new entry points and shi ed them to the network edge, which
creates new security issues. Legacy networks had a single ingress/egress point, which meant putting a massive firewall there and
scanning all tra ic coming and going. Now network security must shi to the network to maximize its e ectiveness.
Here’s what to do.
Automate
Manual processes have been the norm as long as there have been networks, but they will be the death knell for companies if they
aren’t replaced by faster, forward-looking automation. First, automation removes a time-consuming burden and enables network
engineers to focus on more strategic initiatives.  Also, automating repetitive tasks involved in running a network is the first step in
evolving to an intent-based network where the network responds automatically to admins’ requests.
Many things could be automated, but a good first step would be to automate tasks that are most time consuming, including firmware
updates, operating-system upgrades, applying patches and implementing policy changes.
Embrace SDN for agility
Today’s networks need to be highly agile so changes can be propagated across the network in near real-time, enabling it to keep up
with the demands of the business. Network agility comes from having centralized control where configuration changes can be made
once and propagated across the network instantly. Ideally, network changes could be coordinated with application changes so the
lagging performance doesn’t slow the business down.
IT INSIGHTS
What is intent-based networking? (2:08)
/
Achieving a higher level of agility will likely require a refresh of the infrastructure if the network is more than five years old, and that
means adopting SDN. Traditional infrastructure had an integrated control and data plane, so changes had to be made on a box-by-box
basis. This is why networks took so long to configure and lacked agility.
With an SDN model, the control plane is separated from the data plane, centralizing control so network engineers define a change and
push it out across the entire network at once.
Older equipment isn’t designed to be so ware-first, so look for infrastructure that is built on a modernized operating system like Linux
and that can be programmed using current languages such as Python and Ruby. 
Learn the APIs on networking gear
As the network moves to so ware, it needs to take on so ware characteristics. One of these is exposed APIs that let the network talk
directly to applications, which can create a higher level of automation. For example, a videoconferencing application could signal to
the network to reserve bandwidth while a call is taking place and then remove the reserve when the call ends.
Network engineers should seek out infrastructure with a rich set of APIs and, importantly, learn the necessary skills to take advantage
of them. Most network engineers have never made an API call and have relied on home-grown scripts. It’s critical to learn modern
so ware skills in order to leverage the simplicity and speed of APIs.
Intrinsic security
Rather than being implemented as an overlay, intrinsic security is tightly coupled with the network. With this type of security, the
network itself acts as a security platform that incorporates a broad ecosystem of best-of-breed tools that can deliver integrated and
automated compliance checks, threat detection, and mitigation. Intrinsic security protects networks from the moment a new device is
onboarded until its session is terminated.
While the network will never take the place of a next-generation firewall, there is a tremendous amount of security that the network
can provide. Because network infrastructure sees all tra ic flows, it can gather enough data to determine when tra ic deviates from
the norm, which could indicate a breach.
/
Copyright © 2020 IDG Communications, Inc.
  
For example, if an IoT device communicates with the same cloud service daily and then one day tries to interface with an accounting
server, that could signal a malicious intrusion. A network with intrinsic security could quarantine the device and direct a security tool
to further diagnose the issue.
Refresh for success
Success in the digital world requires investment in many new technologies, all of which are highly dependent on the network.
Networks currently in place were never designed for the rigors of digital business, and they need to be refreshed but also operated
and managed di erently. Businesses willing to invest in the network and re-train engineers will maximize their success with digital
transformation. Those that don’t will struggle because application performance and user experience will su er, and the likelihood of a
breaches will grow exponentially. 
Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
▻ Take IDG’s 2020 IT Salary Survey: You’ll provide important data and have a chance to win $500.
Follow 👤   
ZeusKerravalaisthefounderandprincipalanalystwithZKResearch.
SECURITY
How have network firewalls evolved?
dtSearch® instantly searches terabytes of files, emails, databases, web data. See site for hundreds of reviews; enterprise &
developer evaluations
Unisys Security Solutions: Protect What is Most Critical to You
SPONSORED LINKS

More Related Content

What's hot

Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinarZscaler
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinarZscaler
 
Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance NETSCOUT
 
Cloud Computing for SMBs
Cloud Computing for SMBsCloud Computing for SMBs
Cloud Computing for SMBswhite paper
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019Zscaler
 
Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Wheatstone
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT StackPubNub
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsZscaler
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly servicesZscaler
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Unify Internet Of Things with Clayster
Unify Internet Of Things with ClaysterUnify Internet Of Things with Clayster
Unify Internet Of Things with Claysterclaysterworld
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudZscaler
 

What's hot (20)

Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance
 
Cloud Computing for SMBs
Cloud Computing for SMBsCloud Computing for SMBs
Cloud Computing for SMBs
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
 
Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT Stack
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
 
IoT
IoTIoT
IoT
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Unify Internet Of Things with Clayster
Unify Internet Of Things with ClaysterUnify Internet Of Things with Clayster
Unify Internet Of Things with Clayster
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
Enterprise, Architecture and IoT
Enterprise, Architecture and IoTEnterprise, Architecture and IoT
Enterprise, Architecture and IoT
 

Similar to How to deal with digital transformation impact on networks

Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies Shamima Akther
 
NTT i3 Point of View: Network Infrastructure Elasticity
NTT i3 Point of View:  Network Infrastructure ElasticityNTT i3 Point of View:  Network Infrastructure Elasticity
NTT i3 Point of View: Network Infrastructure ElasticityNTT Innovation Institute Inc.
 
IoT Benefits of Cloud Platform.pdf
IoT Benefits of Cloud Platform.pdfIoT Benefits of Cloud Platform.pdf
IoT Benefits of Cloud Platform.pdfPridesys IT Ltd.
 
Deep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of ThingsDeep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of Thingsijtsrd
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfAnil
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Ericsson
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsCerebrum Infotech
 
Modern computer network technology
Modern computer network technologyModern computer network technology
Modern computer network technologyMH Shihab
 
Iot App Demt (2).pdf
Iot App Demt (2).pdfIot App Demt (2).pdf
Iot App Demt (2).pdfNextbrain
 
Transforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesTransforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesRehanShrivastav
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsJuniper Networks
 
Software panel
Software panelSoftware panel
Software panelMassTLC
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringInfyiot Solutions
 
NI Trend Watch 2015
NI Trend Watch 2015NI Trend Watch 2015
NI Trend Watch 2015Hank Lydick
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-ITIdan Hershkovich
 
Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computingCirro
 

Similar to How to deal with digital transformation impact on networks (20)

Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Networking Expertise
Networking ExpertiseNetworking Expertise
Networking Expertise
 
5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
 
NTT i3 Point of View: Network Infrastructure Elasticity
NTT i3 Point of View:  Network Infrastructure ElasticityNTT i3 Point of View:  Network Infrastructure Elasticity
NTT i3 Point of View: Network Infrastructure Elasticity
 
IoT Benefits of Cloud Platform.pdf
IoT Benefits of Cloud Platform.pdfIoT Benefits of Cloud Platform.pdf
IoT Benefits of Cloud Platform.pdf
 
Deep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of ThingsDeep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of Things
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network”
 
A Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business OperationsA Guide to Edge Computing Technology For Business Operations
A Guide to Edge Computing Technology For Business Operations
 
Modern computer network technology
Modern computer network technologyModern computer network technology
Modern computer network technology
 
Iot App Demt (2).pdf
Iot App Demt (2).pdfIot App Demt (2).pdf
Iot App Demt (2).pdf
 
Transforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan servicesTransforming enterprise network infrastructure with sd wan services
Transforming enterprise network infrastructure with sd wan services
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
 
Software panel
Software panelSoftware panel
Software panel
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
 
NI Trend Watch 2015
NI Trend Watch 2015NI Trend Watch 2015
NI Trend Watch 2015
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
 
Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computing
 

More from Abaram Network Solutions

Why Cloud Technology Is Expected To Dominate 2021
Why Cloud Technology Is Expected To Dominate 2021Why Cloud Technology Is Expected To Dominate 2021
Why Cloud Technology Is Expected To Dominate 2021Abaram Network Solutions
 
The Real Year of 5G: What it Means For Cloud Technology
The Real Year of 5G: What it Means For Cloud TechnologyThe Real Year of 5G: What it Means For Cloud Technology
The Real Year of 5G: What it Means For Cloud TechnologyAbaram Network Solutions
 
10 Tips for protecting your cloud accounts
10 Tips for protecting your cloud accounts10 Tips for protecting your cloud accounts
10 Tips for protecting your cloud accountsAbaram Network Solutions
 
An Architect's Guide to Hybrid Cloud Storage
An Architect's Guide to Hybrid Cloud StorageAn Architect's Guide to Hybrid Cloud Storage
An Architect's Guide to Hybrid Cloud StorageAbaram Network Solutions
 
Cloud storage tips: Pro advice for power users
Cloud storage tips: Pro advice for power usersCloud storage tips: Pro advice for power users
Cloud storage tips: Pro advice for power usersAbaram Network Solutions
 
Cloud Computing Trends in 2021: Optimization is #1 Priority
Cloud Computing Trends in 2021: Optimization is #1 PriorityCloud Computing Trends in 2021: Optimization is #1 Priority
Cloud Computing Trends in 2021: Optimization is #1 PriorityAbaram Network Solutions
 
Cloud computing is the inventible future of data analytics
Cloud computing is the inventible future of data analyticsCloud computing is the inventible future of data analytics
Cloud computing is the inventible future of data analyticsAbaram Network Solutions
 
What does the future hold for cloud and edge computing?
What does the future hold for cloud and edge computing?What does the future hold for cloud and edge computing?
What does the future hold for cloud and edge computing?Abaram Network Solutions
 
How cloud-based AI is set transform mobile apps
How cloud-based AI is set transform mobile appsHow cloud-based AI is set transform mobile apps
How cloud-based AI is set transform mobile appsAbaram Network Solutions
 
This cutting-edge cloud-computing service is helping researchers track COVID'...
This cutting-edge cloud-computing service is helping researchers track COVID'...This cutting-edge cloud-computing service is helping researchers track COVID'...
This cutting-edge cloud-computing service is helping researchers track COVID'...Abaram Network Solutions
 
This cloud computing certification bundle is on sale for 98% off
This cloud computing certification bundle is on sale for 98% offThis cloud computing certification bundle is on sale for 98% off
This cloud computing certification bundle is on sale for 98% offAbaram Network Solutions
 
What does the future with cloud computing look like
What does the future with cloud computing look likeWhat does the future with cloud computing look like
What does the future with cloud computing look likeAbaram Network Solutions
 
The Dos and Don'ts for SMB Cybersecurity in 2021
The Dos and Don'ts for SMB Cybersecurity in 2021The Dos and Don'ts for SMB Cybersecurity in 2021
The Dos and Don'ts for SMB Cybersecurity in 2021Abaram Network Solutions
 
These are the top cybersecurity challenges of 2021
These are the top  cybersecurity challenges of 2021These are the top  cybersecurity challenges of 2021
These are the top cybersecurity challenges of 2021Abaram Network Solutions
 
What's in store for cybersecurity in 2021?
What's in store for cybersecurity in 2021?What's in store for cybersecurity in 2021?
What's in store for cybersecurity in 2021?Abaram Network Solutions
 
How To Level Up Your Cybersecurity In 2021
How To Level Up Your Cybersecurity In 2021How To Level Up Your Cybersecurity In 2021
How To Level Up Your Cybersecurity In 2021Abaram Network Solutions
 
The growing role of AI anf ML in cybersecurity
The growing role of AI anf ML in cybersecurityThe growing role of AI anf ML in cybersecurity
The growing role of AI anf ML in cybersecurityAbaram Network Solutions
 

More from Abaram Network Solutions (20)

Why Cloud Technology Is Expected To Dominate 2021
Why Cloud Technology Is Expected To Dominate 2021Why Cloud Technology Is Expected To Dominate 2021
Why Cloud Technology Is Expected To Dominate 2021
 
The Real Year of 5G: What it Means For Cloud Technology
The Real Year of 5G: What it Means For Cloud TechnologyThe Real Year of 5G: What it Means For Cloud Technology
The Real Year of 5G: What it Means For Cloud Technology
 
10 Tips for protecting your cloud accounts
10 Tips for protecting your cloud accounts10 Tips for protecting your cloud accounts
10 Tips for protecting your cloud accounts
 
An Architect's Guide to Hybrid Cloud Storage
An Architect's Guide to Hybrid Cloud StorageAn Architect's Guide to Hybrid Cloud Storage
An Architect's Guide to Hybrid Cloud Storage
 
Cloud storage tips: Pro advice for power users
Cloud storage tips: Pro advice for power usersCloud storage tips: Pro advice for power users
Cloud storage tips: Pro advice for power users
 
How to Optimize Cloud Storage Costs
How to Optimize Cloud Storage CostsHow to Optimize Cloud Storage Costs
How to Optimize Cloud Storage Costs
 
Cloud Computing Trends in 2021: Optimization is #1 Priority
Cloud Computing Trends in 2021: Optimization is #1 PriorityCloud Computing Trends in 2021: Optimization is #1 Priority
Cloud Computing Trends in 2021: Optimization is #1 Priority
 
Cloud computing is the inventible future of data analytics
Cloud computing is the inventible future of data analyticsCloud computing is the inventible future of data analytics
Cloud computing is the inventible future of data analytics
 
What does the future hold for cloud and edge computing?
What does the future hold for cloud and edge computing?What does the future hold for cloud and edge computing?
What does the future hold for cloud and edge computing?
 
How cloud-based AI is set transform mobile apps
How cloud-based AI is set transform mobile appsHow cloud-based AI is set transform mobile apps
How cloud-based AI is set transform mobile apps
 
This cutting-edge cloud-computing service is helping researchers track COVID'...
This cutting-edge cloud-computing service is helping researchers track COVID'...This cutting-edge cloud-computing service is helping researchers track COVID'...
This cutting-edge cloud-computing service is helping researchers track COVID'...
 
This cloud computing certification bundle is on sale for 98% off
This cloud computing certification bundle is on sale for 98% offThis cloud computing certification bundle is on sale for 98% off
This cloud computing certification bundle is on sale for 98% off
 
What does the future with cloud computing look like
What does the future with cloud computing look likeWhat does the future with cloud computing look like
What does the future with cloud computing look like
 
The Dos and Don'ts for SMB Cybersecurity in 2021
The Dos and Don'ts for SMB Cybersecurity in 2021The Dos and Don'ts for SMB Cybersecurity in 2021
The Dos and Don'ts for SMB Cybersecurity in 2021
 
These are the top cybersecurity challenges of 2021
These are the top  cybersecurity challenges of 2021These are the top  cybersecurity challenges of 2021
These are the top cybersecurity challenges of 2021
 
What's in store for cybersecurity in 2021?
What's in store for cybersecurity in 2021?What's in store for cybersecurity in 2021?
What's in store for cybersecurity in 2021?
 
5 cybersecurity predictions for 2021
5 cybersecurity predictions for 20215 cybersecurity predictions for 2021
5 cybersecurity predictions for 2021
 
How To Level Up Your Cybersecurity In 2021
How To Level Up Your Cybersecurity In 2021How To Level Up Your Cybersecurity In 2021
How To Level Up Your Cybersecurity In 2021
 
The growing role of AI anf ML in cybersecurity
The growing role of AI anf ML in cybersecurityThe growing role of AI anf ML in cybersecurity
The growing role of AI anf ML in cybersecurity
 
Top cloud computing tips of 2020
Top cloud computing tips of 2020Top cloud computing tips of 2020
Top cloud computing tips of 2020
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

How to deal with digital transformation impact on networks

  • 1. / How to deal with the impact of digital transformation on networks To unleash the promise of digital transformation, businesses need to embrace automation and software-defined networking as well as improve security. By Zeus Kerravala Network World | JAN 13, 2020 3:00 AM PST Also in this series: The state of digital transformation in 2020 (CIO) 6 digital transformation success stories (CIO) What is security's role in digital transformation? (CSO) How to deal with the impact of digital transformation on networks (Network World) How to get started with CI/CD (Infoworld) Making the connection: The role of collaboration apps in digital transformation (Computerworld) Digital transformation has increased the importance of the network, particularly the edge, where customers, employees, cloud applications and IoT devices connect to the enterprise. The legacy static and non-di erentiated network edge of years past is no longer su icient for many reasons, so as companies embark on digital-transformation plans, their networks must evolve. Networking pros should be looking at, among other things, improving security and embracing so ware-defined networking (SDN) that supports propagating changes quickly across the network in order to accommodate the many challenges digital transformation creates. Digital-transformation hurdles Applications have been reengineered and are moving to public and private clouds, and at the same time applications now rely on services located across clouds. These cloud services are tied together by the network, which must be always available because any disruption of the network means applications won’t perform as expected. The internet of things (IoT) has moved out of the operational-technology shadows and has become a core component of most businesses’ digital-transformation strategies. As IoT adoption increases, so will the number of connected endpoints. Almost all of these devices connect at the network edge, so problems at the edge could significantly impair IoT applications. Historically, network value was considered highest in the data center and lowest at the edge because the data center is where applications and data resided. IoT changes that and evenly distributes the value of the network. Wireless advances also have an impact. With Wi-Fi 6 access speeds at parity with wired connections, Wi-Fi is shi ing from a convenience to an essential method of connecting to the network. In addition, many mobile and IoT devices are wireless-only – they have no wired interface. The combination of these trends has made Wi-Fi the primary access method, with the edge being where all BrandPost Sponsored by HPE Take the Intelligent Route with Consumption-Based Storage
  • 2. / these devices connect with the company network. Mobile devices, IoT endpoints and cloud computing have created many new entry points and shi ed them to the network edge, which creates new security issues. Legacy networks had a single ingress/egress point, which meant putting a massive firewall there and scanning all tra ic coming and going. Now network security must shi to the network to maximize its e ectiveness. Here’s what to do. Automate Manual processes have been the norm as long as there have been networks, but they will be the death knell for companies if they aren’t replaced by faster, forward-looking automation. First, automation removes a time-consuming burden and enables network engineers to focus on more strategic initiatives.  Also, automating repetitive tasks involved in running a network is the first step in evolving to an intent-based network where the network responds automatically to admins’ requests. Many things could be automated, but a good first step would be to automate tasks that are most time consuming, including firmware updates, operating-system upgrades, applying patches and implementing policy changes. Embrace SDN for agility Today’s networks need to be highly agile so changes can be propagated across the network in near real-time, enabling it to keep up with the demands of the business. Network agility comes from having centralized control where configuration changes can be made once and propagated across the network instantly. Ideally, network changes could be coordinated with application changes so the lagging performance doesn’t slow the business down. IT INSIGHTS What is intent-based networking? (2:08)
  • 3. / Achieving a higher level of agility will likely require a refresh of the infrastructure if the network is more than five years old, and that means adopting SDN. Traditional infrastructure had an integrated control and data plane, so changes had to be made on a box-by-box basis. This is why networks took so long to configure and lacked agility. With an SDN model, the control plane is separated from the data plane, centralizing control so network engineers define a change and push it out across the entire network at once. Older equipment isn’t designed to be so ware-first, so look for infrastructure that is built on a modernized operating system like Linux and that can be programmed using current languages such as Python and Ruby.  Learn the APIs on networking gear As the network moves to so ware, it needs to take on so ware characteristics. One of these is exposed APIs that let the network talk directly to applications, which can create a higher level of automation. For example, a videoconferencing application could signal to the network to reserve bandwidth while a call is taking place and then remove the reserve when the call ends. Network engineers should seek out infrastructure with a rich set of APIs and, importantly, learn the necessary skills to take advantage of them. Most network engineers have never made an API call and have relied on home-grown scripts. It’s critical to learn modern so ware skills in order to leverage the simplicity and speed of APIs. Intrinsic security Rather than being implemented as an overlay, intrinsic security is tightly coupled with the network. With this type of security, the network itself acts as a security platform that incorporates a broad ecosystem of best-of-breed tools that can deliver integrated and automated compliance checks, threat detection, and mitigation. Intrinsic security protects networks from the moment a new device is onboarded until its session is terminated. While the network will never take the place of a next-generation firewall, there is a tremendous amount of security that the network can provide. Because network infrastructure sees all tra ic flows, it can gather enough data to determine when tra ic deviates from the norm, which could indicate a breach.
  • 4. / Copyright © 2020 IDG Communications, Inc.    For example, if an IoT device communicates with the same cloud service daily and then one day tries to interface with an accounting server, that could signal a malicious intrusion. A network with intrinsic security could quarantine the device and direct a security tool to further diagnose the issue. Refresh for success Success in the digital world requires investment in many new technologies, all of which are highly dependent on the network. Networks currently in place were never designed for the rigors of digital business, and they need to be refreshed but also operated and managed di erently. Businesses willing to invest in the network and re-train engineers will maximize their success with digital transformation. Those that don’t will struggle because application performance and user experience will su er, and the likelihood of a breaches will grow exponentially.  Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind. ▻ Take IDG’s 2020 IT Salary Survey: You’ll provide important data and have a chance to win $500. Follow 👤    ZeusKerravalaisthefounderandprincipalanalystwithZKResearch. SECURITY How have network firewalls evolved? dtSearch® instantly searches terabytes of files, emails, databases, web data. See site for hundreds of reviews; enterprise & developer evaluations Unisys Security Solutions: Protect What is Most Critical to You SPONSORED LINKS