Aruba Integrates Cloud-Managed SD-WAN Into Its Software-Defined Branch

JESSICA LYONS HARDCASTLE | June 19, 2018 | 39 views

Aruba, a Hewlett Packard Enterprise (HPE) company, bundled SD-WAN, wired, and wireless networking technologies, along with unified security and policy enforcement, into a new edge offering it calls Software-Defined Branch (SD-Branch).“Software-Defined Branch is a unified, software-defined architecture that spans the entire branch, ranging all the way from WiFi to SD-WAN,” said Lissa Hollinger, VP of product and solution marketing for Aruba, during a press conference at HPE Discover, today. “It’s cloud-managed by Aruba Central and also includes policy management and enforcement.”

Spotlight

Tangent Logic

Tangent Logic is a bespoke SW development firm based in Palo Alto. Established in 2004, with 100+ employees in Palo Alto, New York, Israel and Russia, our clients range from Fortune 500 to top startups. Whether it's software architecture, development or implementation, short project or long term commitment, on-site at your offices or remote off shore projects, core technology or adjacent extensions, Tangent Logic provides top service and top engineering talent in competitive rates. Our secret sauce is professionalism and serviceability. Our U.S-based pool of engineers allows us to offer our clients on-site engineering workforce in places where top local talent is hard to find or too expensive.

OTHER ARTICLES
STORAGE MANAGEMENT

Data Center as a Service Is the Way of the Future

Article | July 11, 2022

Data Center as a Service (DCaaS) is a hosting service that gives clients access to actual data center infrastructure and amenities. Through a Wide-Area Network, DCaaS enables clients to remotely access the provider's storage, server, and networking capabilities (WAN). Businesses can tackle their on-site data center's logistical and financial issues by outsourcing to a service provider. Many enterprises rely on DCaaS to overcome the physical constraints of their on-site infrastructure or to offload the hosting and management of non-mission-critical applications. Businesses that require robust data management solutions but lack the necessary internal resources can adopt DCaaS. DCaaS is the perfect answer for companies that are struggling with a lack of IT help or a lack of funding for system maintenance. Added benefits data Center as a Service allows businesses to be independent of their physical infrastructure: A single-provider API Data centers without Staff Effortlessly handle the influx of data Data centers in regions with more stable climates Data Center as a Service helps democratize the data center itself, allowing companies that could never afford the huge investments that have gotten us this far to benefit from these developments. This is perhaps the most important, as Infrastructure-as-a-Service enables smaller companies to get started without a huge investment. Conclusion Data center as a service (DCaaS) enables clients to access a data center remotely and its features, whereas data center services might include complete management of an organization's on-premises infrastructure resources. IT can be outsourced using data center services to manage an organization's network, storage, computing, cloud, and maintenance. The infrastructure of many businesses is outsourced to increase operational effectiveness, size, and cost-effectiveness. It might be challenging to manage your existing infrastructure while keeping up with the pace of innovation, but it's critical to be on the cutting edge of technology. Organizations may stay future-ready by working with a vendor that can supply DCaaS and data center services.

Read More
IT SYSTEMS MANAGEMENT

Enhancing Rack-Level Security to Enable Rapid Innovation

Article | August 8, 2022

IT and data center administrators are under pressure to foster quicker innovation. For workers and customers to have access to digital experiences, more devices must be deployed, and larger enterprise-to-edge networks must be managed. The security of distributed networks has suffered as a result of this rapid growth, though. Some colocation providers can install custom locks for your cabinet if necessary due to the varying compliance standards and security needs for distinct applications. However, physical security measures are still of utmost importance because theft and social engineering can affect hardware as well as data. Risk Companies Face Remote IT work continue on the long run Attacking users is the easiest way into networks IT may be deploying devices with weak controls When determining whether rack-level security is required, there are essentially two critical criteria to take into account. The first is the level of sensitivity of the data stored, and the second is the importance of the equipment in a particular rack to the facility's continuing functioning. Due to the nature of the data being handled and kept, some processes will always have a higher risk profile than others. Conclusion Data centers must rely on a physically secure perimeter that can be trusted. Clients, in particular, require unwavering assurance that security can be put in place to limit user access and guarantee that safety regulations are followed. Rack-level security locks that ensure physical access limitations are crucial to maintaining data center space security. Compared to their mechanical predecessors, electronic rack locks or "smart locks" offer a much more comprehensive range of feature-rich capabilities.

Read More
APPLICATION INFRASTRUCTURE

Infrastructure Lifecycle Management Best Practices

Article | August 3, 2022

As your organization scales, inevitably, so too will its infrastructure needs. From physical spaces to personnel, devices to applications, physical security to cybersecurity – all these resources will continue to grow to meet the changing needs of your business operations. To manage your changing infrastructure throughout its entire lifecycle, your organization needs to implement a robust infrastructure lifecycle management program that’s designed to meet your particular business needs. In particular, IT asset lifecycle management (ITALM) is becoming increasingly important for organizations across industries. As threats to organizations’ cybersecurity become more sophisticated and successful cyberattacks become more common, your business needs (now, more than ever) to implement an infrastructure lifecycle management strategy that emphasizes the security of your IT infrastructure. In this article, we’ll explain why infrastructure management is important. Then we’ll outline steps your organization can take to design and implement a program and provide you with some of the most important infrastructure lifecycle management best practices for your business. What Is the Purpose of Infrastructure Lifecycle Management? No matter the size or industry of your organization, infrastructure lifecycle management is a critical process. The purpose of an infrastructure lifecycle management program is to protect your business and its infrastructure assets against risk. Today, protecting your organization and its customer data from malicious actors means taking a more active approach to cybersecurity. Simply put, recovering from a cyber attack is more difficult and expensive than protecting yourself from one. If 2020 and 2021 have taught us anything about cybersecurity, it’s that cybercrime is on the rise and it’s not slowing down anytime soon. As risks to cybersecurity continue to grow in number and in harm, infrastructure lifecycle management and IT asset management are becoming almost unavoidable. In addition to protecting your organization from potential cyberattacks, infrastructure lifecycle management makes for a more efficient enterprise, delivers a better end user experience for consumers, and identifies where your organization needs to expand its infrastructure. Some of the other benefits that come along with comprehensive infrastructure lifecycle management program include: More accurate planning; Centralized and cost-effective procurement; Streamlined provisioning of technology to users; More efficient maintenance; Secure and timely disposal. A robust infrastructure lifecycle management program helps your organization to keep track of all the assets running on (or attached to) your corporate networks. That allows you to catalog, identify and track these assets wherever they are, physically and digitally. While this might seem simple enough, infrastructure lifecycle management and particularly ITALM has become more complex as the diversity of IT assets has increased. Today organizations and their IT teams are responsible for managing hardware, software, cloud infrastructure, SaaS, and connected device or IoT assets. As the number of IT assets under management has soared for most organizations in the past decade, a comprehensive and holistic approach to infrastructure lifecycle management has never been more important. Generally speaking, there are four major stages of asset lifecycle management. Your organization’s infrastructure lifecycle management program should include specific policies and processes for each of the following steps: Planning. This is arguably the most important step for businesses and should be conducted prior to purchasing any assets. During this stage, you’ll need to identify what asset types are required and in what number; compile and verify the requirements for each asset; and evaluate those assets to make sure they meet your service needs. Acquisition and procurement. Use this stage to identify areas for purchase consolidation with the most cost-effective vendors, negotiate warranties and bulk purchases of SaaS and cloud infrastructure assets. This is where lack of insights into actual asset usage can potentially result in overpaying for assets that aren’t really necessary. For this reason, timely and accurate asset data is crucial for effective acquisition and procurement. Maintenance, upgrades and repair. All assets eventually require maintenance, upgrades and repairs. A holistic approach to infrastructure lifecycle management means tracking these needs and consolidating them into a single platform across all asset types. Disposal. An outdated or broken asset needs to be disposed of properly, especially if it contains sensitive information. For hardware, assets that are older than a few years are often obsolete, and assets that fall out of warranty are typically no longer worth maintaining. Disposal of cloud infrastructure assets is also critical because data stored in the cloud can stay there forever. Now that we’ve outlined the purpose and basic stages of infrastructure lifecycle management, it’s time to look at the steps your organization can take to implement it.

Read More
APPLICATION INFRASTRUCTURE

The Drive with Direction: The Path of Enterprise IT Infrastructure

Article | June 6, 2022

Introduction It is hard to manage a modern firm without a convenient and adaptable IT infrastructure. When properly set up and networked, technology can improve back-office processes, increase efficiency, and simplify communication. IT infrastructure can be utilized to supply services or resources both within and outside of a company, as well as to its customers. IT infrastructure when adequately deployed aids organizations in achieving their objectives and increasing profits. IT infrastructure is made up of numerous components that must be integrated for your company's infrastructure to be coherent and functional. These components work in unison to guarantee that your systems and business as a whole run smoothly. Enterprise IT Infrastructure Trends Consumption-based pricing models are becoming more popular among enterprise purchasers, a trend that began with software and has now spread to hardware. This transition from capital to operational spending lowers risk, frees up capital, and improves flexibility. As a result, infrastructure as a service (IaaS) and platform as a service (PaaS) revenues increased by 53% from 2015 to 2016, making them the fastest-growing cloud and infrastructure services segments. The transition to as-a-service models is significant given that a unit of computing or storage in the cloud can be quite cheaper in terms of the total cost of ownership than a unit on-premises. While businesses have been migrating their workloads to the public cloud for years, there has been a new shift among large corporations. Many companies, including Capital One, GE, Netflix, Time Inc., and others, have downsized or removed their private data centers in favor of shifting their operations to the cloud. Cybersecurity remains a high priority for the C-suite and the board of directors. Attacks are increasing in number and complexity across all industries, with 80% of technology executives indicating that their companies are unable to construct a robust response. Due to lack of cybersecurity experts, many companies can’t get the skills they need on the inside, so they have to use managed security services. Future of Enterprise IT Infrastructure Companies can adopt the 'As-a-Service' model to lower entry barriers and begin testing future innovations on the cloud's basis. Domain specialists in areas like healthcare and manufacturing may harness AI's potential to solve some of their businesses' most pressing problems. Whether in a single cloud or across several clouds, businesses want an architecture that can expand to support the rapid evolution of their apps and industry for decades. For enterprise-class visibility and control across all clouds, the architecture must provide a common control plane that supports native cloud Application Programming Interfaces (APIs) as well as enhanced networking and security features. Conclusion The scale of disruption in the IT infrastructure sector is unparalleled, presenting enormous opportunities and hazards for industry stakeholders and their customers. Technology infrastructure executives must restructure their portfolios and rethink their go-to-market strategies to drive growth. They should also invest in the foundational competencies required for long-term success, such as digitization, analytics, and agile development. Data center companies that can solve the industry's challenges, as well as service providers that can scale quickly without limits and provide intelligent outcome-based models. This helps their clients achieve their business objectives through a portfolio of 'As-a-Service' models, will have a bright future.

Read More

Spotlight

Tangent Logic

Tangent Logic is a bespoke SW development firm based in Palo Alto. Established in 2004, with 100+ employees in Palo Alto, New York, Israel and Russia, our clients range from Fortune 500 to top startups. Whether it's software architecture, development or implementation, short project or long term commitment, on-site at your offices or remote off shore projects, core technology or adjacent extensions, Tangent Logic provides top service and top engineering talent in competitive rates. Our secret sauce is professionalism and serviceability. Our U.S-based pool of engineers allows us to offer our clients on-site engineering workforce in places where top local talent is hard to find or too expensive.

Related News

Software security flaws and human behavior are major network vulnerability points, Ixia finds

RCRWireless News | April 22, 2019

Software security flaws — including those with available fixes that haven’t been applied — and human behavior continue to be the top sources of network vulnerabilities, according to a new report from Keysight Technologies’ Ixia group. In its third annual security report, Ixia’s Application and Threat Intelligence Research Center (a legacy of Ixia’s 2012 acquisition of BreakingPoint, which established ATI in 2005)) said that “poor cyber hygiene continues to persist year after year,” including the use of default login and password credentials; and that attacks that date back as far as 2009 remain effective because vulnerabilities are either unpatched or because patches aren’t available for legacy systems. “Software security flaws contributed to a record number of security incidents in 2018. We saw more new devices than ever before, but we also saw more devices designed and deployed without proper measures to stop, or even limit, threats,” Ixia said. Phishing that exploits human behavior continues to be a reliable first step toward compromising network systems, Ixia found, noting that “a well-crafted and well-timed phishing attempt can confuse even the most tech-savvy expert into making a mistake that leads to a network compromise.” The company said that it detected 662,618 phishing pages in the wild, and 8,546,295 pages hosting or infected by malware.

Read More

Fortinet Debuts SD-WAN ASIC to Power Latest FortiGate Appliance

sdxcentral | April 09, 2019

Fortinet today released a SoC4 SD-WAN ASIC, which will power the latest iteration of its FortiGate appliance, 100F. The company also updated its operating system and security fabric to power what it calls security-driven networking, including new features for SD-WAN and other edge and multi-cloud environments. FortiGate is the firm’s next-generation firewall appliance, which is what it offers its SD-WAN features through. Fortinet began selling SD-WAN directly to its customers (through this appliance) last July. Nirav Shah, the senior director of network security products and solutions at Fortinet, said the company has been focused for three years on building SD-WAN functionality as a software, but this is the first announcement being made in terms of redesigning the architecture and building an ASIC

Read More

Belgian Carriers Grapple With 5G Spectrum Auction Delay and Radiation Concerns

sdxcentral | April 09, 2019

Belgium’s three mobile carriers have in recent months been ramping up their 5G network plans, but hurdles still lie in their way. These include growing concerns about radiation levels of new 5G antennas and the seeming inability of the country’s ruling bodies to agree on a 5G auction process. Former telecom incumbent Proximus is working with Nokia to upgrade the capacity of its IP transport network tenfold to prepare for new services including 5G and IoT. The carrier has been working with Nokia on the Terabit IP Transport and Aggregation Network (TITAN) project since last August, and just switched on the Nokia 7750 SR-14s multi-terabit router that uses the Nokia FP4 network processor.

Read More

Software security flaws and human behavior are major network vulnerability points, Ixia finds

RCRWireless News | April 22, 2019

Software security flaws — including those with available fixes that haven’t been applied — and human behavior continue to be the top sources of network vulnerabilities, according to a new report from Keysight Technologies’ Ixia group. In its third annual security report, Ixia’s Application and Threat Intelligence Research Center (a legacy of Ixia’s 2012 acquisition of BreakingPoint, which established ATI in 2005)) said that “poor cyber hygiene continues to persist year after year,” including the use of default login and password credentials; and that attacks that date back as far as 2009 remain effective because vulnerabilities are either unpatched or because patches aren’t available for legacy systems. “Software security flaws contributed to a record number of security incidents in 2018. We saw more new devices than ever before, but we also saw more devices designed and deployed without proper measures to stop, or even limit, threats,” Ixia said. Phishing that exploits human behavior continues to be a reliable first step toward compromising network systems, Ixia found, noting that “a well-crafted and well-timed phishing attempt can confuse even the most tech-savvy expert into making a mistake that leads to a network compromise.” The company said that it detected 662,618 phishing pages in the wild, and 8,546,295 pages hosting or infected by malware.

Read More

Fortinet Debuts SD-WAN ASIC to Power Latest FortiGate Appliance

sdxcentral | April 09, 2019

Fortinet today released a SoC4 SD-WAN ASIC, which will power the latest iteration of its FortiGate appliance, 100F. The company also updated its operating system and security fabric to power what it calls security-driven networking, including new features for SD-WAN and other edge and multi-cloud environments. FortiGate is the firm’s next-generation firewall appliance, which is what it offers its SD-WAN features through. Fortinet began selling SD-WAN directly to its customers (through this appliance) last July. Nirav Shah, the senior director of network security products and solutions at Fortinet, said the company has been focused for three years on building SD-WAN functionality as a software, but this is the first announcement being made in terms of redesigning the architecture and building an ASIC

Read More

Belgian Carriers Grapple With 5G Spectrum Auction Delay and Radiation Concerns

sdxcentral | April 09, 2019

Belgium’s three mobile carriers have in recent months been ramping up their 5G network plans, but hurdles still lie in their way. These include growing concerns about radiation levels of new 5G antennas and the seeming inability of the country’s ruling bodies to agree on a 5G auction process. Former telecom incumbent Proximus is working with Nokia to upgrade the capacity of its IP transport network tenfold to prepare for new services including 5G and IoT. The carrier has been working with Nokia on the Terabit IP Transport and Aggregation Network (TITAN) project since last August, and just switched on the Nokia 7750 SR-14s multi-terabit router that uses the Nokia FP4 network processor.

Read More

Events