SASE adoption among organizations is on the rise, according to research independently conducted by leading security research firm Ponemon Institute, sponsored by Hewlett Packard Enterprise.
In the report, The 2023 Global Study on Closing the IT Security Gap: Addressing Cybersecurity Gaps from Edge to Cloud, 30% of organizations indicate they have adopted the Secure Access Service Edge (SASE) architecture. Nearly the same amount (29%) plan to deploy SASE.
To read this article in full, please click here
//m.banksfrench.com/article/3704155/what-s-the-state-of-sase.html tk.rss_allAccording to a 2022 survey by McKinsey , 58% of Americans have the opportunity to work from home at least one day a week. This trend is accelerating a shift from traditional IT solutions to cloud-based alternatives that are better suited to supporting a distributed workforce. Gartner predicts that enterprise IT spending on public cloud computing will overtake spending on traditional IT in 2025 in four key market segments.
The last few years have seen an explosion of interest in Zero Trust Network Access (ZTNA). The zero trust approach replaces the perimeter defense model with a "least privilege" framework where users authenticate to access specific data and applications, and their activities are continuously monitored.
ZTNA gained a boost in the wake of the COVID-19 pandemic, with more employees working remotely. The old perimeter defense model, exemplified by VPNs, provides a secured internet connection that gives remote users privileges as if they were on an internal private network. This doesn't match up with a zero trust mindset; and to make things worse, many organizations found that their infrastructure couldn't handle the traffic loads created by large numbers of remote workers connecting via VPN.
An interesting alliance has been struck, with Nvidia partnering with IT consultancy Accenture and helpdesk vendor ServiceNow to offer what the vendors are calling the AI Lighthouse, a program designed to help ServiceNow customers quickly adopt generative AI tools.
The IT service management and customer service markets seem a natural fit for generative AI. When customers or employees need help with something, that’s where generative AI can shine.
Dell Technologies is the latest IT vendor to jump on the generative AI bandwagon with a range of new AI offerings that span its hardware, software and services lineup.
In May, Dell announced plans to develop integrated AI services in partnership with Nvidia. That service has come to fruition with this portfolio, dubbed Dell Generative AI Solutions. As part of the program, the company announced validated designs with Nvidia that are aimed at helping enterprises deploy AI workloads on premises. The new offerings also include professional services to help enterprises determine where and how to best use generative AI services.
Typically, Nvidia GPUs go into servers for AI functions. But Dell's news isn't limited to servers. Dell is also announcing Precision workstations with expanded Nvidia GPU configurations to help users accelerate generative AI workloads locally on their devices.
Five companies that manufacture semiconductors for smartphones, automobiles and more have announced that they will form a company designed to advance the open source RISC-V architecture, in a move widely seen as being designed to reduce their dependence on licensed technology from Arm.
The companies — Qualcomm, Robert Bosch, Infineon Technologies, NXP Semiconductors and Nordic Semiconductors — have yet to name this joint venture, but said in a statement issued Friday that the company will be registered in Germany, and that its focus will be on providing reference architectures and establishing industry solutions. The initial focus, according to the statement, will be on the automotive industry, but plans are in place to expand into mobile and IoT use cases.
CoreWeave, a specialist cloud provider offering high performance computing services to meet growing corporate demand for generative AI workloads, announced Thursday that it has received a $2.3 billion debt financing package from several asset management firms.
The key to CoreWeave’s focus on the AI market is in its hardware. The company sells primarily GPU-based virtual machines, which are particularly well-suited for AI workloads. According to Gartner vice president and analyst Arun Chandrasekaran, CoreWeave’s advertised low cost is a function of its ties to Nvidia, with which, CoreWeave has said, it has a preferred supplier arrangement, enabling it to pass on savings.
Fortinet has added new features to its SD-WAN software and a next-generation firewall series that promise to help customers better monitor and protect distributed enterprise resources.
On the SD-WAN front, Fortinet is introducing two services – a network underlay and overlay option to let customers better manage WAN traffic to remote sites.
The Underlay Performance Monitoring Service for SD-WAN utilizes the vendor’s core central management system FortiManager and FortiGuard’s database of hundreds of popular SaaS and cloud implementations, to offer visibility into the performance of the underlay network. The underlay network is typically made up if the physical network infrastructure supporting traffic between distributed cloud or remote office resources.
Modern enterprises use anywhere from 10 to 100 monitoring and observability tools according to IDC. Tool sprawl and lack of visibility are real, with solutions that do not integrate well in multi-vendor, distributed environments. So are the challenges of collecting, managing, and analyzing data-driven insights related to the application stack.
“Teams and processes that support applications are deeply siloed, and lack essential business context,” said Liz Centoni, EVP, Chief Strategy Officer, and GM of Applications at Cisco. “Cisco Full-Stack Observability (FSO) reduces friction and unifies data, actions, and processes to enable truly flawless digital experiences at scale.”
Schneider Electric and Compass Datacenters have announced a partnership that's aimed at expanding the two companies' production capabilities for modular data centers. They're building a 110,000 square-foot facility where they'll integrate Schneider’s power management equipment with Compass’s prefabricated data center modules in an effort to speed deployments across the US.
It’s an ideal match. Schneider makes the infrastructure that runs data centers and Compass designs and builds data centers for hyperscalers and cloud service providers worldwide. Compass builds standard-design data centers as well as the newer modular type, which is gaining in popularity.
When working on the Linux command line, you can start a task, move it to the background, and, when you’re ready to reverse the process, bring it back to the foreground. When you run a command or script in the foreground, it occupies your time on the command line – until it’s finished. When you need to do something else while still allowing that first task to complete, you can move it to the background where it will continue processing and spend your time working on something else.
The easiest way to do this is by typing ^z (hold the Ctrl key and press “z”) after starting the process. This stops the process. Then type “bg” to move it to the background. The jobs command will show you that it is still running.
As data, applications, and workloads continue to move to the cloud, demand for IaaS networking is surging. The market for cloud-based IaaS networking will reach $19.4 billion in total global revenues this year, according to IDC, with a compound annual growth rate of 28% projected through 2026.
Increasing cloud-native application architectures, distributed workloads, and their respective integration needs are the biggest drivers of IaaS cloud networking adoption, says IDC analyst Taranvir Singh.
"Traditional network architectures, transports and operational models are no longer able to meet the growing requirements and objectives of enterprises’ modern networking needs," he says. "Networks need to be aligned with cloud principles."
Aiming to bolster its assessment of Internet traffic health, Cisco has acquired Code BGP, a privately held BGP monitoring startup, for an undisclosed amount.
Code BGP will slide into Cisco’s ThousandEyes network intelligence product portfolio and bring a cloud-based platform that, among other features, maintains an inventory of IP address prefixes, peerings and outbound policies of an organization via configured sources, like BGP feeds. Border Gateway Protocol (BGP) tells Internet traffic what route to take, and the BGP best-path selection algorithm determines the optimal routes to use for traffic forwarding.
Then, the system lets customers see and interact with this inventory in real-time through an open API and bring real-time detection of BGP hijacking, route leaks, and other BGP issues according to the company. Adding such capabilities will let ThousandEyes further expand its BGP monitoring and incident analysis capabilities to maintain health of the Internet as well as key applications and services, according to Joe Vaccaro vice president of products for Cisco’s ThousandEyes in a blog about the acquisition.
By: Stuart Strickland, Wireless CTO and Fellow, HPE Aruba Networking and Pingping Zong, Senior Distinguished Technologist, HPE Aruba Networking
As we discussed in an earlier post, over the coming years private cellular is expected to join enterprise Wi-Fi in delivering wireless mobility. Regulatory and technological factors have converged to make private cellular an attractive solution to specific enterprise networking needs.
In this post, we’ll expand upon an opportunity to leverage private 5G (and LTE) to solve a common challenge faced by the vast majority of enterprises -- gaps in public cellular coverage that inhibit business productivity, frustrate employees, and degrade visitor experiences -- by using neutral host technology.