<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/network-security/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #network security</title><description>Cloud 9 Advisers - News #network security</description><link>https://www.cloud9advisers.com/News/tag/network-security</link><lastBuildDate>Sat, 28 Feb 2026 13:50:49 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Redefining Connectivity in the Digital Age]]></title><link>https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age</link><description><![CDATA[The B2B landscape is defined by the age of AI, cloud, and ubiquitous mobility. We explore how SDWAN and SASE are transforming the network from a cost center into the core strategic asset that drives advanced digital initiatives and fuels the AI gold rush.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_XA3OhJvvT1aZzVTrdhkPvQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_agzUTmSTQT-QxVGsMF3BAw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_5e4krQ7FR46xJ9t8_i2rmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_YBx_lEe_SEu1iNDKjj3CVA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;"><span>How SDWAN and SASE Fuel the Age of AI and Digital Strategy</span></span></h1></div>
<div data-element-id="elm_XYcZkgPcD2dDwzRMfWrKlQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-weight:bold;">Advanced Networking: The Foundational Requirement for the AI Era</span></p><p><span><span><span><span>The convergence of network optimization and cloud security transforms connectivity from a simple utility into the core strategic asset that enables mobility, IoT, and AI-driven growth.</span></span><br/></span></span></p><p><span><span><span><span><br/></span></span></span></span></p><p style="text-align:center;"><span><span><span><span><span><span style="font-style:italic;">Updated!&nbsp;</span></span><br/></span></span></span></span></p></div>
</div><div data-element-id="elm_vJ5mW9dYeQgXO9wbRdHiSw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_vJ5mW9dYeQgXO9wbRdHiSw"] .zpimage-container figure img { width: 1110px ; height: 369.42px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/artificial-intelligence-3706562_1280.jpg" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_osL2YtKZiEz20jz4t8Tfow" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>The modern network acts as an intelligent traffic control layer, prioritizing real-time AI data while securing every access point.</span></span></p></div>
</div><div data-element-id="elm_25RamFwwTPLd9yAdqGubMw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_25RamFwwTPLd9yAdqGubMw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_25RamFwwTPLd9yAdqGubMw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_aemv--3tH0aCZMkIizO-Bw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_9YoBLdTWISYfJc6Z5AkZDg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_sUYmup9gNv3NurUxkrujhg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-size:12pt;"></span></p><div><h1><span>Advanced Networking: The Foundational Requirement for the AI Era</span></h1><p><span>The modern B2B technology landscape is defined by two relentless forces: the shift of critical applications to the cloud, and the universal need for advanced, real-time data analysis. As customer needs evolve, driven by demands for instant communication, ubiquitous mobility, and sophisticated analytics, network architecture is no longer a back-office utility—it is the ultimate strategic enabler.</span></p><p><span><br/></span></p><p><span>Advanced solutions like cloud infrastructure, sophisticated cybersecurity defense, and transformative Customer Experience (CX) platforms are reshaping how network management operates. Without a high-performing, flexible, and secure network foundation, these initiatives cannot deliver their promised value. In fact, a brittle, legacy network architecture quickly becomes the single biggest bottleneck that cripples digital transformation.</span></p><p><span><br/></span></p><p><span>This realization is driving the rapid adoption and evolution of </span><strong>Software-Defined Wide Area Networking (SDWAN)</strong><span> and the mandatory shift to </span><strong>Secure Access Service Edge (SASE)</strong><span>. These are the twin pillars of advanced connectivity, transforming the network from a cost center into a true competitive asset.</span></p><h3><span><br/></span></h3><h3><span>The AI Gold Rush and the Network Bottleneck</span></h3><p><span>The excitement surrounding Artificial Intelligence (AI) and Machine Learning (ML) is palpable. From large language models (LLMs) used for generative tasks to predictive analytics driving operational efficiencies, every business is exploring how to harness this power. This technological pursuit can be described as the </span><strong>AI Gold Rush</strong><span>, and the fuel for this rush is </span><strong>data</strong><span>.</span></p><p><span><br/></span></p><p><span>However, the reality of deploying and scaling AI is harsh: AI models are voracious consumers and producers of data.</span></p><ul><li><p><strong>Training Data Load:</strong><span> Training new models requires moving massive, multi-petabyte datasets, often between enterprise locations, cloud storage, and specialized compute clusters. These sustained, heavy data streams place an immense strain on conventional wide area networks.</span></p></li><li><p><strong>Real-Time Inference:</strong><span> When models are deployed for real-time use (e.g., fraud detection, robotic process automation, or instant translation), the network must handle constant, bidirectional streams of </span><em>inference</em><span> data. This traffic demands extremely low latency, as milliseconds of delay can render the AI's result useless or too late for the human decision-maker.</span></p></li><li><p><strong>Edge AI and IoT:</strong><span> The proliferation of IoT devices and edge computing—essential for modern industrial operations or retail analytics—means AI is often deployed outside the data center. The network must aggregate data from thousands of endpoints, securely transport it for analysis, and then deliver inference back to the edge with near-zero delay.</span></p></li></ul><p><span>Legacy networks, designed primarily for static user-to-data-center traffic, are simply not equipped to handle the sheer volume, velocity, and priority requirements of these diverse AI data loads.</span></p><h3><span><br/></span></h3><h3><span>SDWAN’s AI Role: From Bandwidth to Intelligent Transport</span></h3><p><span>This is where the evolution of </span><strong>SDWAN</strong><span> becomes critical. SDWAN is moving beyond simply pooling bandwidth; it is now integrating </span><strong>AI and Machine Learning</strong><span> to enable a level of control that manual configuration could never achieve.</span></p><p><span><br/></span></p><p><span>The network must become self-aware and adaptive:</span></p><ol><li><p><strong>Adaptive Routing:</strong><span> Integrated ML capabilities allow the SDWAN solution to constantly monitor the quality of every available link (fiber, broadband, 5G, satellite) in real-time. If it detects a spike in jitter or packet loss on one link, it doesn't just failover; it instantly and preemptively steers critical traffic—like that associated with a remote AI inference operation or a vital cloud application—to a healthier path, often without any human intervention or network interruption.</span></p></li><li><p><strong>Application-Tailored Performance:</strong><span> Clients are prioritizing </span><strong>application-tailored performance</strong><span> over generalized capacity. A network built for the AI era must be intelligent enough to identify a large, non-urgent data backup (which can handle some latency) versus a sensitive UCaaS voice packet or a critical AI data stream. It uses its </span><strong>prioritization, optimization, and acceleration</strong><span> capabilities to allocate resources based on the business criticality of the application, ensuring that the most valuable traffic always wins.</span></p></li><li><p><strong>Convergence of Network, Mobility, and IoT:</strong><span> SDWAN facilitates the convergence of these three domains into a cohesive transport solution. By providing flexible, policy-driven connectivity, it ensures that real-time data transmission from mobile devices, manufacturing sensors, and cloud services flows efficiently. This integration is essential for providing the seamless, user-friendly experience modern businesses demand.</span></p></li></ol><p><span>SDWAN is no longer about getting more data through the pipe; it’s about making the pipe smarter, turning it into a dynamic data delivery system that is a prerequisite for successful AI adoption.</span></p><h3><span><br/></span></h3><h3><span>SASE and Security: Unifying the New Perimeter</span></h3><p><span>A conversation about advanced networking, especially one related to enabling AI and mobility, is fundamentally incomplete without addressing cybersecurity. As the network shifts to the cloud, the perimeter dissolves, and the risk surface expands exponentially. This is the driving force behind the mandatory shift to </span><strong>SASE (Secure Access Service Edge)</strong><span>.</span></p><p><span><br/></span></p><p><span>SASE and </span><strong>CASB (Cloud Access Security Broker)</strong><span> frameworks are transforming organizational security approaches by replacing fragmented, appliance-based security with a unified, cloud-native platform. This is the only way to manage the complexity and scale of modern threats.</span></p><p><span><br/></span></p><p><span>The integration of network optimization (SDWAN) and security convergence (SASE) delivers profound advantages:</span></p><ul><li><p><strong>Zero Trust Enforcement:</strong><span> A true SASE architecture embeds </span><strong>Zero Trust Network Access (ZTNA)</strong><span>. Instead of relying on the physical IP address of a location—which is obsolete in the mobile world—access policy is tied to the </span><strong>user's identity</strong><span> and the real-time posture of their device. This is crucial for protecting the sensitive data fueling AI, ensuring that only verified identities can access the massive data lakes required for model training and deployment.</span></p></li><li><p><strong>The Single Pane of Glass:</strong><span> SASE integrates multiple security functions (Firewall-as-a-Service, Secure Web Gateway, CASB) into a single software stack delivered from the cloud. This unified management platform greatly reduces the complexity, operational overhead, and security gaps inherent in multi-vendor, disparate solutions. Monitoring and managing security risks through a single interface provides unparalleled visibility and consistency across all endpoints and cloud resources.</span></p></li><li><p><strong>Pervasive, Low-Latency Security:</strong><span> Because SASE is delivered via a global network of PoPs (Points of Presence), security inspection happens close to the user, eliminating the need to &quot;backhaul&quot; traffic. This ensures that the security layer does not introduce performance-crippling latency, preserving the speed and efficiency required by AI and real-time cloud applications.</span></p></li></ul><p><span>In the advanced network, security is not an afterthought; it is an inseparable, integrated function of connectivity.</span></p><h3><span><br/></span></h3><h3><span>Understanding the Client Imperative</span></h3><p><span>The reality is that these advanced solutions are not a plug-and-play, one-size-fits-all commodity. They require a rigorous, third-party assessment to ensure they align with the unique needs and growth objectives of each business.</span></p><p><span><br/></span></p><p><span>Designing effective networking solutions in the age of AI and SASE requires:</span></p><ol><li><p><strong>Thorough Needs Assessment:</strong><span> Moving past simple link capacity metrics to understanding application requirements, data flow patterns (where the AI and IoT data is being generated and consumed), and specific security mandates (compliance, PII, etc.).</span></p></li><li><p><strong>Strategic Alignment:</strong><span> Ensuring that networking capabilities are not just meeting technical requirements but are directly enabling broader business objectives, such as a major cloud migration, the implementation of a new AI strategy, or the expansion of a mobile sales force.</span></p></li><li><p><strong>Vendor Neutrality:</strong><span> The market is saturated with vendors, each claiming a unique flavor of SDWAN or SASE. A trusted adviser is required to cut through the marketing noise, evaluate the true integration of the underlying technology, and shortlist providers that offer a genuinely unified, high-performing solution.</span></p></li></ol><p><span><br/></span></p><p><span>The digital age demands constant vigilance and architectural foresight. The successful organizations are those that view their network not as an expenditure, but as the core platform for innovation.</span></p><p><span><br/></span></p><p>At Cloud 9 Advisers<span>, we have a deep understanding of the challenges and opportunities at the intersection of AI, security, and connectivity. We are committed to providing our clients with the vendor-neutral insights and strategic solutions they need to navigate this complexity, achieve their business goals, and stay competitive in a rapidly evolving digital environment.</span></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div><span style="font-size:12pt;"><br/></span></div></div>
</div></div><div data-element-id="elm_Edv7AMMBMLmbT7rwjmCOWw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_Z_qMGMmzSOu_Ql2SHXbiBw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan"><span class="zpbutton-content">SD-WAN</span></a></div>
</div><div data-element-id="elm_yWHw1INNI6zc517E9iPpRg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""></a></p><p><a href="https://www.cloud9advisers.com/News/post/ai-engine" title="The Engine that Drives AI" rel="">The Engine that Drives AI</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 07 Feb 2025 13:17:45 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Aryaka]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-aryaka</link><description><![CDATA[Today, most organizations are concluding that SD-WAN is the best way to add the controls necessary for the digital age. But, do you build your own SD-WAN or buy it as a managed service?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OEUqXd3aStuX8UaceNbNMQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_9c1PY-ZJS0m-221Cj-s8NA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_de_9MvQ6RtGcUnRmphhDoA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_SkZqBucE_pxJ45bT9N3K1Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_SkZqBucE_pxJ45bT9N3K1Q"].zprow{ border-radius:1px; } </style><div data-element-id="elm_pHWLJSoDByNjZMYpIZRc4Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_pHWLJSoDByNjZMYpIZRc4Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_aTE4VqAEzdTNqSWttWf8Zg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_aTE4VqAEzdTNqSWttWf8Zg"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Consume or Construct Your SD-WAN?</span></h1></div>
<div data-element-id="elm_eoaUvM4T2V6_wK_GflMQDA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_eoaUvM4T2V6_wK_GflMQDA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/house-of-cards-3894985_640.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_EcINu7GpMgJNb687I2e8ig" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EcINu7GpMgJNb687I2e8ig"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:18px;">Cloud 9 Supplier Spotlight:&nbsp; <a href="https://www.aryaka.com/" title="Aryaka" target="_blank" style="font-weight:bold;">Aryaka</a></span></p></div>
</div><div data-element-id="elm_HK9aCSKbBhWmFwn5msjoqQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_HK9aCSKbBhWmFwn5msjoqQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/SD%20aryaka%20logo.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_APXKHMw4gYgHRh1SvNgISQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_APXKHMw4gYgHRh1SvNgISQ"].zpelem-text { border-radius:1px; margin-block-start:39px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"><span style="font-weight:700;">The Cloud-First managed WAN</span></span><br></p></div>
</div><div data-element-id="elm_uEoTnqX97zKTnUUHUV_9qA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_uEoTnqX97zKTnUUHUV_9qA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Consume or Construct Your SD-WAN?</span></h2></div>
<div data-element-id="elm_vAy1DHlUmWUk593lgtXP9w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vAy1DHlUmWUk593lgtXP9w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">Why a Cloud-First Managed SD-WAN is Better than a DIY Approach</span></div></div>
</div><div data-element-id="elm_y8aLpbpn1XXSN51cU04cIQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_y8aLpbpn1XXSN51cU04cIQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:12px;"><span>By:&nbsp;</span><span style="color:inherit;">Syed Ghayur, Aryaka<br></span></span></p><div><span style="font-size:12px;">Syed is Vice President of Global Systems Engineering at Aryaka, and has over 20 years of experience within networking and engineering industries.</span></div></div>
</div><div data-element-id="elm_9Tl2yPY288BDvcZWp1f7Rw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_9Tl2yPY288BDvcZWp1f7Rw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>If your company is beginning to embark on a digital transformation journey, ultimately, you’ll have to confront the question of how to modernize the Wide Area Network (WAN) and ensure it is up to the task of supporting the transformation effort.</div><p><br></p><div>Today, most organizations are concluding that Software Defined-WAN (SD-WAN) is the best way to add the controls necessary for the digital age.</div><p><span style="color:inherit;"><br></span></p><div>The next question becomes, do you build your own SD-WAN (the DIY approach) or buy it as a managed service? While doing it yourself has been the go-to method for decades now, the transformation efforts sweeping through enterprises worldwide, and the shift to cloud, is causing a fundamental rethink of this approach.</div><p><span style="color:inherit;"><br></span></p><div>It comes down to this: If the goal is to move the organization from Point A to Point B, do you want to take the time to build the road to the new destination or get on a private fast lane quickly so you can focus on how to capitalize on the new capabilities?</div><p><br></p><div>In world of computing, that question has largely been answered: Companies are migrating en-masse to the cloud consumption model and getting out of the business of focusing capital expenses on infrastructure. They are using those resources instead to better serve customers, differentiate the organization, and grow the business. And increasingly, that model is proving to be the answer for SD-WAN as well.</div></div>
</div><div data-element-id="elm_Y6VbQ8TP0SKiaS1s1iokkg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Y6VbQ8TP0SKiaS1s1iokkg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Great Power Comes with Great Responsibility</span></h3></div>
<div data-element-id="elm_3Da3q9f0I9yejKx9aCWo9A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3Da3q9f0I9yejKx9aCWo9A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Large organizations may have sufficient IT resources and network infrastructure in place to deploy SD-WAN in-house, but this self-management of the network holds with it some great consequences, especially if you’re embarking on a large digital transformation strategy.</div><p><br></p><div>The DIY SD-WAN approach still places more of the headache to manage, maintain, and support the network on IT by introducing additional complexity on an existing network.</div><p><br></p><div>One CIO I spoke with recently said his IT department was managing over 21 MPLS providers worldwide. He felt his networking organization was feeling like a telco because they not only have to manage and maintain these contracts, they must also deal with Internet providers, plus configure WAN optimization and SD-WAN devices at each location. Then they had to buy and implement monitoring software to check the health of their network. On top of all that, everything has to be re-configured each time a new application rolls out.</div></div>
</div><div data-element-id="elm_3yCxslQy1l46S1ScFjwNzA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3yCxslQy1l46S1ScFjwNzA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>Do-It-Yourself SDWAN</p></div>
</div><div data-element-id="elm_ZjMNH6fWlj6jnrjqRRE0pA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_ZjMNH6fWlj6jnrjqRRE0pA"].zpelem-image { border-radius:1px; margin-block-start:3px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Aryaka-DIY%20SWAN.png" size="original" alt="Do-It-Yourself SDWAN" data-lightbox="true" style="height:412px;width:689.35px;"/></picture></span></figure></div>
</div><div data-element-id="elm_2oxi5NVMKiteMJaHZWIcCA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_2oxi5NVMKiteMJaHZWIcCA"] div.zpspacer { height:85px; } @media (max-width: 768px) { div[data-element-id="elm_2oxi5NVMKiteMJaHZWIcCA"] div.zpspacer { height:calc(85px / 3); } } </style><div class="zpspacer " data-height="85"></div>
</div><div data-element-id="elm_fFUZaoby44xh2KSVr8f4DQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fFUZaoby44xh2KSVr8f4DQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>Aryaka, Cloud-First, Managed SDWAN</p></div>
</div><div data-element-id="elm_OyFmeo5rp5NXxL8x5CmpoA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_OyFmeo5rp5NXxL8x5CmpoA"].zpelem-image { border-radius:1px; margin-block-start:-3px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Aryaka%20Mgd%20SDWAN.png" size="original" alt="Aryaka, Cloud-First, Managed SDWAN" data-lightbox="true" style="height:450px;width:688.2px;"/></picture></span></figure></div>
</div><div data-element-id="elm_Ei2cEFl_e2rR4yYoQ2iEoA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ei2cEFl_e2rR4yYoQ2iEoA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>The task of maintaining the scenario above is a full-time task for any IT department. There’s hardly any room left for more strategic initiatives in a digital transformation strategy.</div><p><br></p><div>The task of maintaining the scenario above is a full-time task for any IT department. There’s hardly any room left for more strategic initiatives in a digital transformation strategy.</div><p><span style="color:inherit;"><br></span></p><div>If your enterprise is aiming to transform into a global digital powerhouse, here’s why SD-WAN delivered as a fully managed service would be right for you:</div><div><ul><li><span style="font-weight:bold;">Time to value</span>. The DIY approach to SD-WAN requires your IT department to learn about the technology, analyze the players, and procure and deploy the equipment in-house. Buying SD-WAN as a managed service gets you up and running in a fraction of the time, usually in days. Your staff doesn’t need to become network experts, learn how to operate the equipment, or troubleshoot the network. With a managed SD-WAN as a Service, all they need to do is learn how to use a single network portal to assess their needs.</li><li><span style="font-weight:bold;">Built-in capabilities</span>. Any DIY approach will typically require sets of ancillary tools to optimize and secure the network to meet the organizational needs. That adds additional cost and complexity, and makes the initial learning curve even steeper, slowing implementation.<br></li><li>A <span style="font-weight:bold;">cloud-first SD-WAN</span> delivered as a service, such as one deployed by Aryaka, uses patented optimization technology that is baked into the network, providing faster application performance from anywhere in the world. Since we’re also in partnership with leading security firms, a number of best-of-breed security options are available that can be easily implemented.<br></li><li><span style="font-weight:bold;">Cloud off ramps</span>. If you are building the SD-WAN yourself, it will be up to you to figure out how to link the network to the increasingly long list of cloud/SaaS service providers the company uses. That becomes difficult if you have layered in multiple optimization and security boxes because the cloud/SaaS suppliers won’t accommodate those appliances.<br>As a managed service, Aryaka has connectivity into nearly every major cloud/SaaS application and can deliver secure, end-to-end optimized SD-WAN services directly into these mission-critical resources.</li><li><span style="font-weight:bold;">Problem resolution</span>. In the DIY SD-WAN world, you’ll be using a range of hardware from a mix of suppliers, as well as a variety of service providers. When issues crop up the potential for finger pointing is high, taxing your staff and prolonging problem resolution.</li><li><span style="font-weight:bold;">A key benefit we provide</span> at Aryaka is that the network is proactively monitored by a 24x7x365 support staff. If something goes wrong, we will likely notice it before you do. What’s more, we have the staff expertise to address issues quickly. For example, if there is a transport service issue, we have the end-to-end network visibility to identify exactly where the problem lies and the customer clout to hold the service providers accountable.<br></li><li><span style="font-weight:bold;">Performance</span>. Most all DIY SD-WAN kits use the public, best-effort Internet for transport, which is susceptible to latency and packet loss, particularly over longer spans. The result is long application response times, unpredictable application performance, and in the case of real-time collaboration tools, degraded voice/video calls, and dropped sessions.<br>Aryaka’s cloud-first SD-WAN service, delivered over a global private network and optimized end-to-end, makes it possible to deliver consist application performance for employees anywhere in the world, regardless if the application resource they’re using is hosted on-premises or in the cloud.</li></ul></div><div><br></div><div>The old model of building the network yourself is simply outdated as companies shift to consumption models for IT and focus on transformation. The simple fact of the matter is, just like your data center can’t compete with the capabilities and the pace of innovation delivered by the likes of Amazon AWS, Google Cloud, and Microsoft Azure, if you opt to build your SD-WAN, it won’t be as complete, agile and support as many functions as an SD-WAN delivered as a managed service.</div><p><br></p><div>In order to fully enable your company’s digital transformation, focus on what you do best and let a company that specializes in Global WAN services provide the highway to get you there.</div></div>
</div><div data-element-id="elm_BcUN5cCcPnlGLRnNzwlu_A" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_BcUN5cCcPnlGLRnNzwlu_A"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div><div data-element-id="elm_OrU_Qnwx6NzJq0pZDdXEWQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_OrU_Qnwx6NzJq0pZDdXEWQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_fGzSQphT2eRWv87zUYEMjw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_fGzSQphT2eRWv87zUYEMjw"] div.zpspacer { height:1021px; } @media (max-width: 768px) { div[data-element-id="elm_fGzSQphT2eRWv87zUYEMjw"] div.zpspacer { height:calc(1021px / 3); } } </style><div class="zpspacer " data-height="1021"></div>
</div><div data-element-id="elm_4zJFXIx9HDe2dGgiqEAE7w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_4zJFXIx9HDe2dGgiqEAE7w"].zpelem-imagetext{ border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; margin:10px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" alt="Technology Experts" data-lightbox="false" style="width:1800px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">Aryaka is one of our leading global SDWAN and high-performance middle-mile providers in the Cloud 9&nbsp;<a href="https://sitebuilder-662896043.zohositescontent.com/solutions">Supplier Portfolio</a>. Our curated list of over 200 companies provides all the recommended daily vitamins a growing company needs for their technology: Cybersecurity, Communications, Connectivity, and Cloud. Our SDWAN, SASE, network and cybersecurity experts are vendor-agnostic and will help uncover the right solutions and the right companies to explore for you needs. We can even help reduce your monthly technology operating costs and create new efficiencies you may have never thought possible.&nbsp;</span><br></p></div>
</div></div></div></div><div data-element-id="elm_9XIfHsTfQ3S5tpISQz0f6g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_9XIfHsTfQ3S5tpISQz0f6g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Aryaka is one of our leading global SDWAN and high-performance middle-mile providers in the Cloud 9&nbsp;<a href="https://sitebuilder-662896043.zohositescontent.com/solutions">Supplier Portfolio</a>. Our curated list of over 200 companies provides all the recommended daily vitamins and nutrients a growing company needs for their technology: Cybersecurity, Communications, Connectivity, and Cloud. Our SDWAN, SASE, network and cybersecurity experts are vendor-agnostic and will help uncover the right solutions and the right companies to explore for you needs. We can even help reduce your monthly technology operating costs and create new efficiencies you may have never thought possible.&nbsp;</span><br></p></div>
</div><div data-element-id="elm__rSEVtvaOnH8tUVp_EiKlA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm__rSEVtvaOnH8tUVp_EiKlA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_7kqOKfVqN1DOgosKQKfsaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_7kqOKfVqN1DOgosKQKfsaw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_VmTA0vcZKJsgYP5gq69pOg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_VmTA0vcZKJsgYP5gq69pOg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline zpbutton-full-width " href="/sdwan"><span class="zpbutton-content">SDWAN Overview</span></a></div>
</div></div><div data-element-id="elm_0W8maJAAeL2o8urtBd6P9g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_0W8maJAAeL2o8urtBd6P9g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_HWtKqEkLEbbUdzQS-4q6iQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_HWtKqEkLEbbUdzQS-4q6iQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-full-width " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about Cloud 9 and Aryaka" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn more about Aryaka</span></a></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 12 Feb 2020 12:20:48 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: CloudGenix]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-cloudgenix</link><description><![CDATA[An ESG survey of 600 senior IT decision makers showing that 76% of respondents had already deployed multi-cloud environments, and as many as 67% were already using SaaS-delivered business applications. How do you keep it secure?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_gMTjFHMQQouCTEvm73pVXg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_a552PfiNQ2abz9vN3GgR5w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_laFE2tfZRsmIS8FcYW3UGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_gyqi8LfZTZKuQmzFl-cngQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gyqi8LfZTZKuQmzFl-cngQ"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Secure SD-WAN from CloudGenix and Palo Alto</h1></div>
<div data-element-id="elm_p17pdP2b981AR5BSqjP8uA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_p17pdP2b981AR5BSqjP8uA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1447752875215-b2761acb3c5d?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_AWuxccOpSCnL4M1Toqwfrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_AWuxccOpSCnL4M1Toqwfrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">By:</span></p></div>
</div><div data-element-id="elm_r5J9FG4pQbu39ghdN1XCCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_r5J9FG4pQbu39ghdN1XCCQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:18px;">Cloud 9 Supplier Spotlight:&nbsp; <span style="font-weight:bold;"><a href="https://www.cloudgenix.com/" title="CloudGenix" target="_blank">CloudGenix</a></span></span></p></div>
</div><div data-element-id="elm__kx0Mkn2HCQ-xDeyaLhGnA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm__kx0Mkn2HCQ-xDeyaLhGnA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.cloudgenix.com/" target="_blank" title="www.cloudgenix.com" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/SD%20CloudGenix2.png" size="medium" style="width:800px;"/></picture></a></figure></div>
</div><div data-element-id="elm_eM_fCvnwabg7idsbREHIJQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_eM_fCvnwabg7idsbREHIJQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_fy_61GMWyfO5YQIF8gBjTw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_fy_61GMWyfO5YQIF8gBjTw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_pWf02sJh-65p9yMYlI6l5w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pWf02sJh-65p9yMYlI6l5w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Secure SD-WAN from CloudGenix and Palo Alto</span></h2></div>
<div data-element-id="elm_PD5xx7UrDuj5zcKllqxSVg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PD5xx7UrDuj5zcKllqxSVg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>By now, most organizations have extended their IT infrastructure to the cloud. And many are using multiple clouds. ESG, in a recent webinar presented by CloudGenix and Palo Alto Networks, shared findings from a survey of 600 senior IT decision makers showing that 76% of respondents had already deployed multi-cloud environments, and nearly as many – 67% – were already using SaaS-delivered business applications.</div><p><br></p><div>ESG also talked about the challenges of not only ensuring network performance in these complex multi-cloud environments, but also making sure that SaaS-delivered apps are always on, are always secure, and always perform how employees need them to – especially employees in remote office locations.</div><p><br></p><div>In a traditional network architecture, applications are housed in an on-premise data center. Remote office workers access those apps via MPLS VPN connections. Routers enable the underlying network between geographically diverse locations, and firewalls deployed at both the central data center and at each remote office create a security perimeter.</div><p><br></p><div>But this approach simply doesn’t work in the world of cloud. Here’s why:</div><ul><li><span style="font-weight:bold;">Cost</span> – more routers are needed to deploy and manage as well as additional MPLS fees.<br></li><li><span style="font-weight:bold;">Complexity</span> – already overcommitted teams must manage multiple systems to fulfill network and security needs across multiple locations, and traditional MPLS-based networks are notoriously hard to provision or modify.<br></li><li><span style="font-weight:bold;">Performance</span> – with the rise of SaaS-based apps comes a need to not only ensure that networks are performing as needed, but that the apps critical for employees and customers are as well.<br></li><li>Security – data breaches and attacks are part of today’s reality, and in the world of cloud services where data is traveling over the public internet, there is no fixed perimeter to patrol.</li></ul><p><span style="color:inherit;"><br></span></p><div><span style="font-weight:bold;">Opportunities and Obstacles of SD-WAN</span></div><div>Many organizations have adopted SD-WAN solutions to solve for these issues, but they too present their own challenges. Most solutions require multiple hardware products for SD-WAN and security, which once again means more complexity and more cost. Others are mediocre “all-in-one” solutions that have separate roadmaps for features related to network and security, making it near impossible for an organization to simultaneously meet both networking and security needs.</div><p><br></p><p>So how can organizations cost-effectively and securely meet the needs of remote branch offices? In reality, overcoming the challenges presented by centralized network architecture or legacy SD-WANs means re-imagining remote office IT infrastructure. It needs to be cloud-delivered rather than based on complex hardware or software stacks, and:<br></p><ul><li>WANs have to be unconstrained and highly reliable<br></li><li>Security has to be pervasive across multi-cloud, SaaS, and data centers<br></li><li>Unified Communications as a Service (UCaaS), voice, and video have to be highly reliable<br></li><li>Multi-cloud access has to be high-speed<br></li><li>IT operations have to be proactive</li></ul><p><br></p><p><span style="font-weight:bold;">Next-gen WANs: The CloudGenix Autonomous WAN</span><br></p><p>The CloudGenix Autonomous SD-WAN uses global intelligence to deliver performance and security SLAs for all applications over any WAN-type. By providing app-policies aligned to business intent, direct access to multi-cloud and dev-ops frameworks, it delivers significant productivity gains and cost-savings compared to gen-1 SD-WAN alternatives.<br></p><p><br></p><div>Our new joint solution with Palo Alto Networks – and validated by ESG in the Secure SD-WAN: 7 Best Practices from Palo Alto Networks and CloudGenix webinar – combines CloudGenix Autonomous WAN with Palo Alto Networks Prisma Access, enabling organizations to deploy best-of-breed secure SD-WAN that is pre-integrated, requires no additional hardware or software to provision at the remote office, and lays the foundation for a zero-trust security architecture.</div><p><br></p><div>The joint secure SD-WAN solution enables organizations to:</div><ul><li><span style="font-weight:bold;">Apply traffic policy to application traffic</span>. No longer are they restricted to applying policy within the on-premise network. L3 is insufficient in a multi-cloud, hybrid model. L3 – L7 is ideal.<br></li><li><span style="font-weight:bold;">Ensure consistent performance</span> and high availability by automatically monitoring performance metrics against threshold, minimizing the need for manual intervention.<br></li><li><span style="font-weight:bold;">Create policies in the cloud</span> once and deploy them everywhere without the need for backhauling traffic to a controller<br></li><li><span style="font-weight:bold;">Via an easy-to-use platform</span>, integrate other services to be used in conjunction with SD-WAN and deploy them with a few clicks</li></ul><p><span style="color:inherit;"><br></span></p><div>To hear experts at Palo Alto and ESG talk more about this solution, as well as explain the 7 best practices for a secure SD-WAN, check out the on-demand webinar Secure SD-WAN: 7 Best Practices from Palo Alto Networks and CloudGenix.</div></div>
</div></div><div data-element-id="elm_A-lBT1Y6As9HumgAyzMyeQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_A-lBT1Y6As9HumgAyzMyeQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_KpJsJMIwQZe99o87fTfMSw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_KpJsJMIwQZe99o87fTfMSw"] div.zpspacer { height:279px; } @media (max-width: 768px) { div[data-element-id="elm_KpJsJMIwQZe99o87fTfMSw"] div.zpspacer { height:calc(279px / 3); } } </style><div class="zpspacer " data-height="279"></div>
</div><div data-element-id="elm_ABIoVtigkJ-BLbKZY8fjvg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_ABIoVtigkJ-BLbKZY8fjvg"].zpelem-imagetext{ border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:6px; padding:10px; margin:10px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">CloudGenix is a leading SDWAN company in the Cloud 9&nbsp;<a href="https://sitebuilder-662896043.zohositescontent.com/solutions">Supplier Portfolio</a>. Our curated list of over 200 companies provides all the nutrients and daily vitamins a growing company needs for their technology: Cybersecurity, Communications, Connectivity, and Cloud. Our SDWAN, SASE, network and cybersecurity experts are vendor-agnostic and will help uncover the right solutions and the right companies to look at for you needs. We can even help reduce your monthly technology operating costs and create new efficiencies you may have never thought possible.&nbsp;</span><br></p></div>
</div></div><div data-element-id="elm_TUAl_srLIP6w17iCVFvufw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_TUAl_srLIP6w17iCVFvufw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9 Advisers</span></a></div>
</div></div></div><div data-element-id="elm_RzwdkzSMYXKc2kbBGdg6lQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_RzwdkzSMYXKc2kbBGdg6lQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_yqFUQ700ZvaSEpXuju79zg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_yqFUQ700ZvaSEpXuju79zg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>CloudGenix is a leading SDWAN company in the Cloud 9 <a href="/solutions" title="Supplier Portfolio">Supplier Portfolio</a>. Our curated list of over 200 companies provides all the&nbsp;<span style="color:inherit;">daily&nbsp;</span>nutrients and&nbsp; vitamins a growing company needs for their technology: Cybersecurity, Communications, Connectivity, and Cloud. Our SDWAN, SASE, network and cybersecurity experts are vendor-agnostic and will help uncover the right solutions and the right companies to look at for you needs. We can even help reduce your monthly technology operating costs and create new efficiencies you may have never thought possible.&nbsp;</p></div>
</div><div data-element-id="elm_5l-viDwzFM5A_NZRRQ9lCA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_5l-viDwzFM5A_NZRRQ9lCA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_-n6E9JzfP30QReuiUcIYvQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-n6E9JzfP30QReuiUcIYvQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6tBU5e2aGC2aXOds3yok7A" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_6tBU5e2aGC2aXOds3yok7A"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn more about CloudGenix </span></a></div>
</div></div><div data-element-id="elm_qTeK158sEXmavPgOwvCj-g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_qTeK158sEXmavPgOwvCj-g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_mRNsOujEa2-aBsozBuQM7w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_mRNsOujEa2-aBsozBuQM7w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="/sdwan"><span class="zpbutton-content">Learn more about SDWAN</span></a></div>
</div></div></div><div data-element-id="elm_HcG71hnznhzCd528q6RWsQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_HcG71hnznhzCd528q6RWsQ"].zpelem-divider{ border-radius:1px; margin-block-start:37px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_-WGKbl7YqFDmgMj-KFhBIw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-WGKbl7YqFDmgMj-KFhBIw"].zpelem-heading { border-radius:1px; margin-block-start:78px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About CloudGenix</h2></div>
<div data-element-id="elm_mzTYL4JpaPBsyxnTPuyWbQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mzTYL4JpaPBsyxnTPuyWbQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>We have a deep understanding of complex networking issues and designs. We know the only way to truly solve networking issues that surface with next-generation application architectures, rich media, cloud, and SaaS, is to approach the problem top-down with a transformational networking architecture. An architecture that abstracts the complexity of low-level networking rules and configurations away in favor of top-down business policies for applications, sites, performance, security, and compliance. We built the CloudGenix AppFabric™ from the ground up for exactly this purpose.</div></div>
</div><div data-element-id="elm_WxKyFdhP0kno0x7dv_fBww" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WxKyFdhP0kno0x7dv_fBww"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">CloudGenix: Cloud Blades Platform</span></div><div>Build branch locations with best-of-breed infrastructure services that are pre-integrated and can be turned on with one click. <br>No additional hardware or software required.</div></div>
</div><div data-element-id="elm_PcLrJ3b2D-xaoGAyExJPew" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_PcLrJ3b2D-xaoGAyExJPew"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/cgx-cloudbld_1-intro-2x-1500x528.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 11 Feb 2020 09:45:59 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Open Systems]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-open-systems</link><description><![CDATA[Enterprise WAN and security doesn’t have to devolve into an impossible game of Whac-a-Mole. SASE services can help. Strategically framed and tactically applied, they can restore a sense of order. Contact Cloud 9 to learn more about Open Systems.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_cWIUPIOfQB2qOwLE1GVuFQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_egL1yYWOR_iNip2h46eUag" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_QXO7lh1STMKCiPqCLX3fBw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qp5hPukmQIaMfnKDc5W4kA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qp5hPukmQIaMfnKDc5W4kA"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><div>SD-WAN and Security Services Get Integrated</div></span></h1></div>
<div data-element-id="elm_dJjzgA894sJ2Z2myzWvODQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_dJjzgA894sJ2Z2myzWvODQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1492515114975-b062d1a270ae?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_k-ZUHAaqvsWCK4WHUvY4gA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_k-ZUHAaqvsWCK4WHUvY4gA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;"><span>By:&nbsp;<span style="color:inherit;">Dr. Serge Droz,&nbsp;</span></span>Cybersecurity Expert at Open Systems<span style="color:inherit;">&nbsp;(see the article </span><a href="https://open-systems.com/blog/sdwan-security-services-get-integrated" title="here" target="_blank">here</a><span style="color:inherit;">)</span></span></p></div>
</div><div data-element-id="elm_FLMS2ObaQwixOq4DBPHP1g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FLMS2ObaQwixOq4DBPHP1g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:18px;">Cloud 9 Supplier Spotlight:&nbsp; <a href="https://open-systems.com/" title="Open Systems" target="_blank">Open Systems</a></span></p></div>
</div><div data-element-id="elm_LUnlmvZHC5JJYEKM0ZB1Yg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_LUnlmvZHC5JJYEKM0ZB1Yg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/SD%20Open%20Systems%20Logo.jpg" size="medium" data-lightbox="true" style="width:1600px;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_NG6RbRtn2OcTPmwMzqgv_A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NG6RbRtn2OcTPmwMzqgv_A"].zpelem-text { border-radius:1px; margin-block-start:53px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><span style="font-size:18px;font-weight:bold;color:rgb(34, 135, 76);">Open Systems Secure SD-WAN and SOC-as-a-Service solutions are designed specifically to simplify your network and security operations and accelerate business growth.</span></div></div>
</div><div data-element-id="elm_nSHrgdbMyqIQ_tBkvGmgZw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_nSHrgdbMyqIQ_tBkvGmgZw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_nSHrgdbMyqIQ_tBkvGmgZw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_de0nroATf4zshviiyV2PCg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_de0nroATf4zshviiyV2PCg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">SD-WAN and Security Services Get Integrated</span></h2></div>
<div data-element-id="elm_N7HTKJxCCN6SdvGJfkbZXw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_N7HTKJxCCN6SdvGJfkbZXw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>It sometimes seems that enterprise security is a zero-sum game. Every time you add a tool or specialized application, new issues and problems emerge — sometimes faster than you can address them. But security doesn’t have to devolve into an impossible game of Whac-a-Mole. Managed cloud-delivered security services can help. Strategically framed and tactically applied, they can restore a sense of order.</div><p><br></p><div>Part of the problem with conventional security is that every point solution solves a specific problem, but a collection of point solutions creates a far bigger problem: gaps, new vulnerabilities, and overall complexity. A conventional approach might also lead to technical debt — an inability to stay current with rapidly evolving tools, applications, and solutions. The result is that many organizations fall further and further behind the security curve.</div><p><br></p><div>Fortunately, managed SD-WAN has matured and transformed into a holistic, security-integrated cloud-based framework that can address a network and all of its components. Gartner recently dubbed this type of integrated solution Secure Access Service Edge (SASE). This is important because today’s enterprise computing environments require a more sophisticated and streamlined approach to security.</div><p><br></p><div><span style="font-weight:bold;">The Clouds Roll In</span></div><p>A major advantage of SD-WANs is greater network flexibility. But clouds elevate the concept to a more complex level. Today, about half of all network traffic passes through clouds, and organizations that rank themselves as very successful users of WAN technology have upwards of 60 percent of traffic passing through a cloud versus about 39 percent for less successful networking organizations. Simply put, the ability to manage resources in a more flexible and comprehensive manner is nothing short of crucial. It’s a barometer for success.<br></p><p><br></p><div>The urgency of the situation shouldn’t escape business and IT leaders. When an enterprise can establish a central unified view — and protection framework — it fundamentally tips the equation toward better network performance and protection at a lower cost. This approach also boosts network availability and aids in integrating clouds.</div><p><br></p><div>A tightly integrated network security platform inspects traffic once and applies consistent policies across the board — and across clouds. This replaces the far more complicated task of applying enterprise policies as data crosses separate network borders, which often introduces security and compliance gaps. A more advanced approach to SD-WAN and network security ensures integrated security features at every layer — at the edge as well as in the cloud. All traffic must be inspected without latency, and security measures like next-generation firewalls, intrusion detection and anti-malware scanning should be supported and applied with consistent policies.</div><p><br></p><div>An integrated end-to-end network offers other advantages. It means that you don’t have to upgrade, patch, and rethink things constantly. On the other hand, a DIY approach often leads to inefficiencies, particularly in security. It means you have to maintain a center of expertise and have staff available at all times. At Open Systems, we have a Level 3 operations team that continually monitors and detects threats inside the SD-WAN. Not only does this approach aid in detecting threats, but it also allows specialists to remediate or contain them inside the network. This compliments AI-assisted automation that can detect more than 80 percent of networks problems without human involvement.</div><p><br></p><div><span style="font-weight:bold;">A Clear View</span></div><p>Costs are another consideration for organizations. The accumulation of security products doesn’t just ratchet up complexity; it hits the bottom line. We’ve found that, on average, organizations use 32 different security products. At large enterprises, we’ve seen as many as 400 different point solutions in place. Not surprisingly, this often results in higher than necessary licensing costs, repetitive and redundant tools, and added staff time and training expenses to manage things.<br></p><p><br></p><div>It’s not unusual for organizations to resist change — and modernization — because of the enormous time and energy required to adapt. But this too has consequences. OpEx costs often accelerate over time as technical debt and legacy technology accumulate. The challenge of interacting with numerous vendors, each with proprietary tools and methods, can prove daunting.</div><p><br></p><div>A secure platform that delivers SD-WAN, SOC, and cloud security as a service offers a simpler, more holistic, and more secure way to approach enterprise security. It ultimately makes it easier to scale resources, provide greater flexibility, broaden coverage, consolidate visibility, and deliver a framework that makes it simpler to enforce policies and identify non-compliant assets. It can cut costs and deliver the newest and best tools and technologies. No less important: Managed networking and security can aid organizations as they adopt emerging tech, such as AI, IoT, and SaaS solutions.</div><p><br></p><div>A more advanced networking infrastructure simplifies and improves IT and business operations. It promotes flexibility and agility, so that your enterprise can rapidly adapt the network to the speed of business. In the end, it allows organizations to focus on what matters most: business growth and digital transformation.</div></div>
</div><div data-element-id="elm_PRblLS7arQuudX_U7AkW0w" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_PRblLS7arQuudX_U7AkW0w"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_M7mUr-nyArR2-T3lHr55GQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_M7mUr-nyArR2-T3lHr55GQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div>Contact Cloud 9 Advisers for more information about the advantages of a cloud-based SD-WAN and the security protections it can deliver and to see if Open Systems is the right SD-WAN/SASE solution for your business. Our vendor-agnostic network and cybersecurity experts will uncover the right solutions and the right companies for your needs. (we may even save you a ton of money in the process!). Check out our <a href="/suppliers" title="Supplier Portfolio">Supplier Portfolio</a> with over 200 companies covering everything in cybersecurity, communications, connectivity, and cloud.&nbsp;<br></div></div></div>
</div><div data-element-id="elm_vhxBnljyTYaBXWpepkNdZg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_vhxBnljyTYaBXWpepkNdZg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more and see how Cloud 9 can help" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn more about Cloud 9 and Open Systems</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 10 Feb 2020 17:07:02 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: CATO Networks]]></title><link>https://www.cloud9advisers.com/News/post/Supplier-Spotlight-CATO-Networks</link><description><![CDATA[Traditional firewall security simply can’t keep up with the challenges created by new network paradigms. As a result, when discussing netwrok security with enterprises today, there are three reoccurring themes: visibility, scalability, and convergence.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_QTViEJNcSI2meFoutamzCQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_zuKbViDUSey3Whdol8y7JA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_zuKbViDUSey3Whdol8y7JA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_fCuC5-2tSqWmQLmUAMAYzA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_WBjKlx08RGu3lzfb3xXLiw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_WBjKlx08RGu3lzfb3xXLiw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Network &amp; Firewall Security for the Modern Enterprise</span></h2></div>
<div data-element-id="elm_Nuomcodnk7G31T9Mf9LcXQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_Nuomcodnk7G31T9Mf9LcXQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/CATO%20SASE%20SDWAN%20Blog.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_rNr-eb0iX72m-FcrHyjkqg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rNr-eb0iX72m-FcrHyjkqg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">by:&nbsp;&nbsp;</span><span style="color:inherit;font-size:12px;">Dave Greenfield, CATO Networks (see the article <a href="https://www.catonetworks.com/blog/network-firewall-security-for-the-modern-enterprise/" title="here" target="_blank">here</a>)</span></p></div>
</div><div data-element-id="elm_TeK_fzLnTwWAixhqU0k2Kg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_TeK_fzLnTwWAixhqU0k2Kg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Supplier Spotlight:&nbsp; &nbsp;<span style="font-weight:bold;"><a href="https://www.catonetworks.com/" title="CATO Networks" target="_blank">CATO Networks</a></span></p></div>
</div><div data-element-id="elm_04sjGa3AGj_-rrDFO03bnA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_04sjGa3AGj_-rrDFO03bnA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/SD%20CATO%20Networks.png" size="medium" data-lightbox="true" style="height:147px;width:294px;"/></picture></span></figure></div>
</div><div data-element-id="elm_L7vH0V8cxkOTNOpVO_V-ng" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_L7vH0V8cxkOTNOpVO_V-ng"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Network &amp; Firewall Security for the Modern Enterprise</span></h2></div>
<div data-element-id="elm_cid4PRinOKO9qrFV8cMImQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cid4PRinOKO9qrFV8cMImQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Edge computing and the distributed cloud both cracked Gartner’s Top 10 Strategic Technology Trends for 2020, reminding me of a recent discussion on the challenges enterprises face when securing the modern WAN. Traditional firewall security simply can’t keep up with the challenges created by these new network paradigms. As a result, when I discuss firewall security with enterprises today, there are three reoccurring themes: visibility, scalability, and convergence.</div><p><br></p><div>Next-Generation Firewall (NGFW) appliances help solve these problems, but deploying multiple appliances adds significant complexity and creates operational and security challenges of its own. Fortunately, when converged with the larger network infrastructure, cloud-based firewalls, or Firewall-as-a-Service (FWaaS), can address these challenges.</div><p><br></p><div>So, how exactly can enterprises seamlessly integrate security to their networks without adding unnecessary complexity? Let’s find out.</div></div>
</div><div data-element-id="elm_k6bCKUV1XGVzIBbmC1-kXQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_k6bCKUV1XGVzIBbmC1-kXQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">The Basics of Firewalls</span></h3></div>
<div data-element-id="elm_XDeDvRuWUV1mbXHcdTadZg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XDeDvRuWUV1mbXHcdTadZg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Before we dive into the challenges of appliance-based firewalls and benefits of FWaaS, let’s look at some of the basics of modern firewalls. Traditionally, firewalls were used to block or allow network traffic based on predefined rules. They could effectively block ports, isolate network segments, and enable basic enforcement of security policies. This same basic premise holds true for firewalls today, but the dynamic nature of modern enterprise networks has created a need for more flexible, granular, and intelligent firewall security.</div><p><br></p><div><span style="font-weight:bold;">Three Main Types of Firewall Software and Appliances</span></div><p>So, what sort of firewall software and appliances exist to meet these demands? In addition to the software-based endpoint firewalls that can run on network endpoints, there are three main firewall appliance types enterprises can deploy.<br></p><p><br></p><div><ul><li><span style="font-weight:bold;">Packet-filtering firewalls: <br></span>Traditional firewalls that block traffic at the protocol, port, or IP address levels.</li><li><span style="font-weight:bold;">Stateful firewalls: <br></span>Like packet-filtering firewalls with the added benefit of analyzing end-to-end traffic flows.</li><li><span style="font-weight:bold;">Next-Generation Firewalls (NGFWs): <br></span>Offer all the functionality of stateful firewalls plus features such as deep-packet inspection (DPI), Intrusion Detection System/Intrusion Prevention System (IPS/IDS), anti-virus, and website filtering.</li></ul></div><p><br></p><p>Given the sophistication of modern security threats, NGFW appliances are commonplace within modern WANs, and for good reason. They’re able to detect malicious behavior and provide protection legacy firewall security solutions can’t. However, there are still several pain points enterprises face with physical and virtual firewall appliances.</p></div>
</div><div data-element-id="elm_spZSadk5fCvZXxUj6vqi0Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_spZSadk5fCvZXxUj6vqi0Q"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">The Shortcomings of Firewall Appliances</span></h3></div>
<div data-element-id="elm_3LqtCD-6_disC4tnKJMo9w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3LqtCD-6_disC4tnKJMo9w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>The problem with firewall appliances stems from the fact that appliances inherently require distributed deployments across sites. NGFWs are just one of a number of network appliances that enterprises must maintain, and integrating them at scale comes with challenges including:</div><p><br></p><div><span style="font-weight:bold;">Blind spots &amp; reduced visibility:&nbsp;</span>Since appliances are tied to a single location, they can only inspect data flows that go through them. This leads to one of two suboptimal outcomes: appliance sprawl or inefficient backhauling to have traffic routed through specific appliances for auditing. Further, since appliances are scattered throughout the network, as opposed to integrated with it, blind spots can become a real challenge.</div><p><br></p><div><ul><li><span style="font-weight:bold;">Limited scalability</span><br>NGFWs and UTMs have a limited amount of capacity to run engines for anti-malware, IPS, and secure web gateway (SWG). These resource constraints can lead to some functionality being sacrificed, create bottlenecks, or require additional appliances to be deployed.</li><li><span style="font-weight:bold;">Silos &amp; disjointed security policies</span><br></li><li>Multiple appliances and security solutions for cloud, mobile, and on-premises lead to communications silos between teams, limit visibility, and prevent the implementation of consistent security policies across the network.</li><li><span style="font-weight:bold;">Complex and resource-intensive maintenance</span><span style="font-weight:700;"><br></span>Maintaining and patching a network of firewall appliances leads to a significant IT workload that doesn’t drive core business forward. Installations, configurations, upgrades, integrations, and patch management take time and divert resources from activities that could add business-specific value.</li></ul></div></div>
</div><div data-element-id="elm_FbJ4m7MZF9cjmdCBfph-Kg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_FbJ4m7MZF9cjmdCBfph-Kg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Integrating Firewall Security: Firewall as a Service and the Secure Access Service Edge</span></h3></div>
<div data-element-id="elm_OZovfe5lFHOj4yp2m0pv5A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OZovfe5lFHOj4yp2m0pv5A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Cato solves this problem by providing FWaaS, with all the functionality of an enterprise-grade application-aware NGFW, as a part of a broader holistic approach to networking and security known as Secure Access Service Edge (SASE). Because Cato’s SASE platform integrates the networking and security functionality that used to require multiple different appliances into a multitenant cloud-native infrastructure, the fundamental problem associated with NGFW appliances goes away. As a result, enterprises can implement network &amp; firewall security that provides:</div><ul><li><span style="font-weight:bold;">Complete visibility</span><span style="font-weight:700;"><br></span>As all WAN traffic on the Cato Cloud traverses the cloud-native infrastructure, there are no blind spots and no need for backhauling. Multiple security engines and DPI are baked-in to the network.</li><li><span style="font-weight:bold;">Unrestricted scalability<br></span>The Cato Cloud provides the unrestricted scalability of a cloud service to the WAN. Not only does this eliminate capex and ensure security isn’t sacrificed due to limited capacity, it means deployments that may have otherwise taken days or weeks can occur in minutes or hours.</li><li><span style="font-weight:bold;">Enterprise-wide policy enforcement</span><span style="font-weight:700;"><br></span>A converged software stack and mobile clients ensure that all users benefit from the same level of security and policies span the entire network.</li><li><span style="font-weight:bold;">Simple maintenance and management</span><span style="font-weight:700;"><br></span>Because the entire security stack is integrated into a single solution, maintenance and management are a fraction of what they were with firewall appliances. This leads to reduced costs and more resources to dedicate to business-specific tasks that can positively impact the bottom line.</li></ul></div>
</div><div data-element-id="elm_wNOgpgumRh6tbLrN3xrMZA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_wNOgpgumRh6tbLrN3xrMZA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Cato’s SASE Platform Integrates Networking and Security at Scale</span></h3></div>
<div data-element-id="elm_fowbP1C3fehSObu3vZsGxQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fowbP1C3fehSObu3vZsGxQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>In short, the Cato SASE platform delivers firewall security in a scalable, holistic, and future-proof manner. Not only does the Cato cloud solve the challenge of securing the distributed cloud and edge computing deployments common to the modern digital business, it does so while enabling IT to focus less on busy work and more on core business functions. Case in point: according to Todd Park, Vice President, W&amp;W-AFCO Steel, “Cato firewall is much easier to manage than a traditional firewall and the mobile client was much easier to deploy and configure than our existing approach” after W&amp;W-AFCO Steel replaced Internet-based VPN and firewall appliances with Cato Cloud.</div></div>
</div><div data-element-id="elm_or_JEuEtqr4_gT3KK4Kuow" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_or_JEuEtqr4_gT3KK4Kuow"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_VfKr8csehZ11umRVLdSvAQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VfKr8csehZ11umRVLdSvAQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Contact your vendor-agnostic SDWAN and SASE experts at Cloud 9 Advisers to learn more about securing modern enterprise networks. Additionally, be sure to subscribe to our blog for the latest on SD-WAN, networking, IT security, and other technology. If you’d like to discuss the Cato platform with one of our experts or schedule a demonstration, don’t hesitate to contact us.</div></div>
</div><div data-element-id="elm_IKGteih9KW8MKQ8LtBhDeA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_IKGteih9KW8MKQ8LtBhDeA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_22f65i2b5pt6V00el_iowQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_22f65i2b5pt6V00el_iowQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_YE9nDm3wQKGajJraC2n5jQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_YE9nDm3wQKGajJraC2n5jQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@cloud9advisers.com?subject=I'd like to learn more about Cloud 9" title="email us: consulting@cloud9advisers.com"><span class="zpbutton-content">Learn More about CATO</span></a></div>
</div></div><div data-element-id="elm_nEBPPwfk43WRBPRa2Ss2Sg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nEBPPwfk43WRBPRa2Ss2Sg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_HUJvPZ30Zcc1usJUQHS3Zg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_HUJvPZ30Zcc1usJUQHS3Zg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="/sdwan"><span class="zpbutton-content">Learn More about SDWAN</span></a></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 10 Feb 2020 16:11:31 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Thrive Networks]]></title><link>https://www.cloud9advisers.com/News/post/Healthcare-Company-Set-Free</link><description><![CDATA[Cloud 9 Advisers Supplier Spotlight: Thrive Networks CHALLENGE Password security and Multi-Factor Authentication are two of the best lines of defense fo ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_qsR8A58CTwau-JYVrqttwA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_t4DoM0R9RLeMpcGsxj8Xlg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__5uW2EmqTjuNb5MM2c25XQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_4YzAcxkGTPCjbfk2A42Idw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4YzAcxkGTPCjbfk2A42Idw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><div><span style="color:inherit;">Thrive Networks' Cybersecurity&nbsp;</span><span style="color:inherit;">Forensic Team&nbsp;</span>quickly releases&nbsp;</div></span>leading Healthcare company&nbsp; from&nbsp;cryptolocker threat<span style="color:inherit;"><br></span></h2></div>
<div data-element-id="elm_2ytMlq4-V0hgTrCrny7ppg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_2ytMlq4-V0hgTrCrny7ppg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/infosecmonitoring.jpeg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_CVFhyfsnClp3vBVmGjWmCA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CVFhyfsnClp3vBVmGjWmCA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Advisers Supplier Spotlight: <span style="font-weight:bold;">Thrive Networks</span></p></div>
</div><div data-element-id="elm_XMNbaDpMCsquBlWrw5H9Qg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_XMNbaDpMCsquBlWrw5H9Qg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/IT%20Thrive2.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_hT2c-joNBY8lOt4j06PTLw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_hT2c-joNBY8lOt4j06PTLw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_hT2c-joNBY8lOt4j06PTLw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_eg9LYYAiI5b2uHfSs_GQKQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_eg9LYYAiI5b2uHfSs_GQKQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>CHALLENGE</div><p>Password security and Multi-Factor Authentication are two of the best lines of defense for users to protect themselves against bad actors. After a weak default password without Multi-Factor Authentication (MFA) allowed a hacker to gain access to the company’s network, a large healthcare provider’s data was encrypted and inaccessible; which halted their operations for nearly twenty-four hours across multiple locations. Ransomware was discovered by the Thrive team on upwards of twenty of the company’s servers.</p><p><br></p><div>SOLUTION</div><p>Thrive’s Cybersecurity Forensic Analysts team took quick action to source the bad actor and work towards remediation. Utilizing best-of-breed tools, they were able to identify the IP addresses in which the attack was originating and effectively block them from the network. Simultaneously, the Thrive team was able to configure restoration on the servers and perform back up measures. Within twenty-four hours of the original incident the critical servers were restored, and the remaining were all operational within four days.</p><p><br></p><div>RESULT</div><p>The immediate results of the remediation of the servers were that the healthcare provider became operational once again and able to serve their patients. After the event was resolved the organization enlisted Thrive to perform a Security Health Assessment across their environment. Thrive’s cybersecurity team was able to identify vulnerable target areas in the company’s infrastructure and architect customized solutions. All of these being actionable items, the organization has been able to further leverage Thrive’s services to strengthen their security framework to prevent future incidents.</p><p><br></p><div>Thrive’s NextGen Managed Services provide customers with a technology advantage on all aspects of digital infrastructure, including strategy, application performance, cloud, cybersecurity, networking, disaster recovery, and more. Thrive’s Cybersecurity Services leverage best-in-class security platforms from multiple security vendors to deliver a holistic end-user NextGen solution that helps prevent against both network-based and social-based attacks.&nbsp;</div></div>
</div><div data-element-id="elm_WhHG0Q2EL506IgB3tEGesw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_WhHG0Q2EL506IgB3tEGesw"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_t64rH5f6Xu5izA9WRPtkNA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_t64rH5f6Xu5izA9WRPtkNA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">How can Cloud 9 Advisers help your business?</span></div><p><span style="color:inherit;"><br></span></p><div>Thrive is a leading provider of next generation Managed IT and Cybersecurity services and is one of the top Managed Services vendors in the Cloud 9 Supplier Portfolio. Contact Cloud 9 today to see if Thrive is the right fit for your business. We'll identify your needs, wants, and desires, and match them up to find the vendor that fits your needs. Read on to find out more, or...</div></div>
</div><div data-element-id="elm_Z9bAYGxnTmytoXp-iKBkSQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Z9bAYGxnTmytoXp-iKBkSQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=Can Cloud 9 help me, please?" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Us</span></a></div>
</div><div data-element-id="elm_A8fOxWA9SPTMugdT918GUQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_A8fOxWA9SPTMugdT918GUQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_c7ZBQ_YUwYk4RUpo9288pQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_c7ZBQ_YUwYk4RUpo9288pQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:11pt;">Every company wants to be your partner, but let’s face it, if they are selling you something, they’re not your partner, they’re just another vendor. Cloud 9 is different. We don’t actually sell anything and we don't charge our clients. We become a complementary extension of your team and help manage the often overwhelming process of finding, evaluating, and selecting the right technologies and competitive providers. Cloud 9, together with our distributors, is made up of more than two-hundred and fifty staff, all devoted to helping you save time and money. Our curated Supplier Portfolio contains nearly two-hundred of the best service provider companies. We are one of the largest buyers of technology in the country. Through us, you’ll get the collective buying power of thousands of other clients. Consider us your informed buyers, strategic partners, and technology advisers. We are impartial, unbiased, and vendor-agnostic. We sit on your side of the table to help you find, evaluate, and negotiate with service provider companies. We’ll help you design the right solution and identify the best technologies. We’ll get pricing from multiple competing companies, then guide you through the evaluation and procurement process. Use our evaluation tools for documentation and due diligence. Plus, have our entire team at your disposal before, during, and after the acquisition of your new services, for as long as you’re in business.</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="text-align:center;"><span style="font-size:11pt;font-weight:700;">Technology Partners. Strategic Advisers.</span><span style="font-size:11pt;">&nbsp;</span></p><p><span style="color:inherit;"></span></p><div><span style="font-size:11pt;"><br></span></div></div>
</div></div><div data-element-id="elm_OVy-o5MUFTNYY5YZgtrEfw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_OVy-o5MUFTNYY5YZgtrEfw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=Can Cloud 9 help me, please?" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Us</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 23 Jan 2020 10:35:52 -0500</pubDate></item><item><title><![CDATA[SASE, the next-gen SD-WAN?]]></title><link>https://www.cloud9advisers.com/News/post/Is-SASE-the-next-gen-SDWAN</link><description><![CDATA[Gartner claims SASE will make legacy networking obsolete. This is not hyperbole. We cut through the marketing noise to define the four non-negotiable requirements of a true SASE architecture and why identity, not the IP address, is the new network anchor.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_aVn03PLjTPC2C0--suORlg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_oY8K_nMGQwKzWiHm9mR4mA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YJlc6Aw3R--ufTdeEYFGlA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_UwRnoKqwSXqUs1DqV3gR6g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_UwRnoKqwSXqUs1DqV3gR6g"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;"><div><span>The Four Pillars of SASE: Why Your Legacy Network Architecture is Obsolete</span></div></span></h1></div>
<div data-element-id="elm_I1dOk7MZXI2b2D5bRFjL6g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:center;"><span>Gartner makes the claim that the shift to SASE will make obsolete existing networking and security models.</span><br/></p><p style="text-align:left;"><span><br/></span></p><p style="text-align:left;"><span>Secure Access Service Edge (SASE): The Foundational Shift Driven by Cloud, Mobility, and the Demise of the Traditional Perimeter<br/></span></p><p style="text-align:left;"><span>A true SASE framework moves security policy from the physical office location to the user’s identity, fundamentally transforming how enterprises connect and protect their digital assets.</span></p></div><p></p></div>
</div><div data-element-id="elm_0RjKUZh11XaAKusROPkYlw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_0RjKUZh11XaAKusROPkYlw"] .zpimagetext-container figure img { width: 1024px !important ; height: 576px !important ; } } [data-element-id="elm_0RjKUZh11XaAKusROPkYlw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/infosecmonitoring.jpeg" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><span><span>The SASE architecture is a fundamental shift, moving the security perimeter from a physical location to a cloud-native, identity-centric service edge.</span></span></div>
</div></div><div data-element-id="elm_MiJR7M7sK9og5Q6EWEJbNQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_MiJR7M7sK9og5Q6EWEJbNQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_ziZwRssE0coI-arTeb4D0Q" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_ziZwRssE0coI-arTeb4D0Q"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_W8xv7NeDY6YcbyevKlOYZA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_W8xv7NeDY6YcbyevKlOYZA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div></div><div><h2><span>Secure Access Service Edge (SASE): The Foundational Shift Driven by Cloud, Mobility, and the Demise of the Traditional Perimeter</span></h2><p><span>In 2019, Gartner introduced the Secure Access Service Edge (SASE) model, describing it as a fundamental architectural shift that would eventually render existing networking and security models obsolete. While many in the industry initially treated it as hype, the events of the last few years—namely, the explosion of cloud application usage and the permanence of the dispersed, mobile workforce—have made this prediction an undeniable reality.</span></p><p><span><br/></span></p><p><span>Today, every enterprise is facing unprecedented pressure on its legacy network and security architecture. Users, applications, and data have migrated from the confines of the corporate network to the cloud and the edge. This digital transformation improves agility and competitiveness, but it requires a corresponding evolution in how we connect and, more importantly, how we secure those connections.</span></p><p><span><br/></span></p><p><span>The SASE category represents this necessary evolution. It converges the capabilities of the WAN edge (networking) with network security (security) into a single, unified, cloud-native service. However, the market is crowded with vendors claiming SASE capabilities, when, in reality, they are offering little more than traditional products loosely &quot;service-chained&quot; together.</span></p><p><span><br/></span></p><p><span>To cut through this noise and ensure you are making a strategic, future-proof investment, you must evaluate solutions against the </span><strong>four non-negotiable pillars</strong><span> of a true SASE architecture.</span></p><h3><span><br/></span></h3><h3><span>The Problem: When SDWAN Alone Is Not Enough</span></h3><p><span>SDWAN is a critical part of the modern network, solving performance, resilience, and efficiency problems. But as valuable as it is, it is only </span><em>one part</em><span> of the larger SASE story.</span></p><p><span><br/></span></p><p><span>The traditional approach to security—regardless of whether you use SDWAN—was to </span><strong>backhaul</strong><span> all traffic from remote users and branch offices back to a central, on-premise security stack. This approach is fatally flawed today:</span></p><ol><li><p><strong>High Latency:</strong><span> For users accessing cloud applications like Microsoft 365, forcing traffic halfway across the country just to hit a corporate firewall and then turn back to the cloud introduces unacceptable latency and degrades performance.</span></p></li><li><p><strong>Inconsistent Security:</strong><span> Creating a patchwork of appliances (VPN concentrators, firewalls, web gateways) and physically stringing them together via &quot;service chaining&quot; results in fragmented visibility, inconsistent policy enforcement, and complex management. As Gartner noted, service chaining is emphatically </span><strong>not</strong><span> SASE.</span></p></li><li><p><strong>The IP Address Conundrum:</strong><span> Legacy security is tied to a network anchor, typically the IP address of a device or location. In a world where the office can be a coffee shop, an airport, or a home network, an IP address is useless as a hook for security enforcement.</span></p></li></ol><p><span>To overcome these structural limitations, the architecture must evolve beyond the old data center and embrace the cloud-native design principles of SASE.</span></p><h3><span><br/></span></h3><h3><span>Pillar I: Converged WAN Edge and Network Security</span></h3><p><span>A true SASE architecture is defined by convergence. It cannot be a collection of disparate appliances or services loosely managed by different dashboards.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> The WAN edge (SDWAN functionality, traffic optimization, and routing) and the comprehensive network security stack (Firewall-as-a-Service, Secure Web Gateway, CASB, ZTNA) must be folded into a single, cloud-native software fabric.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> This convergence delivers the simplicity, scalability, and pervasive security that customers demand. By operating as a single software stack, the platform can perform </span><strong>single-pass architecture</strong><span> inspection, where traffic is decrypted, inspected against all security and networking policies simultaneously, and then re-encrypted. This greatly reduces processing time and latency compared to chaining separate security devices, ensuring high performance while maintaining security coverage.</span></p><p><span><br/></span></p><p><span>In essence, SASE mandates that networking and security cannot be two separate domains managed by different tools; they must be a single, centrally controlled entity.</span></p><h3><span><br/></span></h3><h3><span>Pillar II: Cloud-Native, Global Service Delivery</span></h3><p><span>The nature of cloud applications—specifically, their sensitivity to latency—demands that networking and security be delivered as close to the endpoint as possible. The edge is the new cloud, and it requires a distributed approach.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> SASE offerings must be purpose-built for </span><strong>scale-out, cloud-native, and cloud-based delivery</strong><span>. This means relying on a vast, globally distributed network of Points of Presence (PoPs) to minimize the physical distance between the user and the security enforcement point.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> The geographical footprint is critical. It is not sufficient to simply run the service on a hyper-scaler with a limited number of PoPs, as this still forces users in remote regions to connect over long distances. A true SASE solution requires providers with a deep, global footprint and the agility to instantiate a PoP in response to emerging customer demands. This optimized, low-latency delivery ensures that security inspection does not negatively impact the performance of real-time applications.</span></p><h3><span><br/></span></h3><h3><span>Pillar III: A Network Designed for All Edges</span></h3><p><span>The traditional network focused almost exclusively on the site (the branch office or the headquarters). The modern enterprise must focus on securing </span><strong>all edges</strong><span> equally—the site, the cloud, and the individual mobile user.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> SASE services must be capable of connecting and securing more than just physical sites. This requires an agent-based capability, managed as a cloud service, that can be installed on laptops and mobile devices to extend the full security stack to the individual user, regardless of their connecting network.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> Offerings that rely solely on on-premises, box-oriented delivery or only cater to a limited number of fixed cloud PoPs will inevitably fail to meet the requirements of an increasingly mobile workforce and emerging latency-sensitive edge applications. A genuine SASE architecture ensures that an employee working from a home office or a client site receives the same level of security and performance optimization as if they were sitting in the corporate headquarters.</span></p><h3><span><br/></span></h3><h3><span>Pillar IV: Identity and Real-Time Condition</span></h3><p><span>This is arguably the most revolutionary pillar of SASE, representing the complete departure from the legacy model.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> Security access and policy enforcement must be based on the </span><strong>user's identity</strong><span> and their real-time context (device type, time of day, location, and posture of the device), not the static IP address.</span></p><p><strong><br/></strong></p><p><strong>The IP Address Conundrum:</strong><span> Anything tied to a physical IP address is useless for security policy enforcement when users and resources are constantly moving. The legacy data center is no longer the center of the network universe. The new center of secure access networking design is the </span><strong>Identity</strong><span>—with the policy following that identity wherever they go.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> SASE allows IT leaders to customize the security level and network experience based on risk. For example:</span></p><ul><li><p><span>A user accessing a critical financial application from a corporate laptop in the office receives </span><strong>full access</strong><span>.</span></p></li><li><p><span>The same user attempting to access that application from an unmanaged personal device (different identity/condition) from a foreign country receives </span><strong>restricted, or zero, access</strong><span>.</span></p></li></ul><p><span>All policies are tied to the user's validated identity (which can be a person, a device, or an IoT entity), eliminating the vulnerability inherent in IP-based enforcement and fully embodying the principles of </span><strong>Zero Trust Network Access (ZTNA)</strong><span>.</span></p><h3><span><br/></span></h3><h3><span>A Pragmatic Call to Action</span></h3><p><span>The introduction of SASE is not marketing buzz; it is a true reflection of our times. The technologies have changed considerably, forcing a profound rethinking of legacy enterprise networks.</span></p><p><span><br/></span></p><p><span>As this market category matures, the marketing noise will continue to grow. Your responsibility as a technology leader is to move past the vendor claims and evaluate potential solutions against these four non-negotiable architectural pillars. If the solution cannot prove a </span><strong>cloud-native, globally converged architecture</strong><span> where policy is tied to </span><strong>identity</strong><span>, it will not deliver the simplicity, scale, or security your business needs to thrive in the cloud-first era.</span></p><p><strong><br/></strong></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div></div>
</div></div><div data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_InOaHn6hN9Y0q2v9O4yaaw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_InOaHn6hN9Y0q2v9O4yaaw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/sase"><span class="zpbutton-content">Learn about &quot;Sassy&quot;</span></a></div>
</div><div data-element-id="elm_sNE3REWav7IN4moRylK3kA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_sNE3REWav7IN4moRylK3kA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_sNE3REWav7IN4moRylK3kA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_CM4zod7TxypCvspafJfz9w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel="">Redefining Connectivity in the Digital Age</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div><div data-element-id="elm_bIxD0GfgDnkGtzPLuDaPyA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_bIxD0GfgDnkGtzPLuDaPyA"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 15 Oct 2019 12:47:06 -0500</pubDate></item><item><title><![CDATA[China Tops List as Top Risk (duh!)]]></title><link>https://www.cloud9advisers.com/News/post/China-Tops-List-as-Top-Risk</link><description><![CDATA[It probably goes without saying, but China is a major risk for most US business and certainly anyone conduction any sort of business online. Read more and contact Cloud 9 to learn ways to protect your digital assets]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rVgB2_y6QFqaWlc7I3Es5w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_fZQ618y0S0yVuwgeACBtZw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mvhK6RVoT6WNKbwJ9O62dA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_TvGgmdI9QxWu0zeFEB5rnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_TvGgmdI9QxWu0zeFEB5rnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">China Tops List of U.S. Cybersecurity Agency’s Top Risks</span></h2></div>
<div data-element-id="elm_LlaFodsMQDCrC-k-IMbRHA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LlaFodsMQDCrC-k-IMbRHA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"><span style="font-size:12.6px;">By William Turton |&nbsp;August 23, 2019 - see the full article at <a href="https://www.insurancejournal.com/news/national/2019/08/23/537801.htm?utm_source=Partner%2BAug%2B%2719%2BNewsletter&utm_campaign=Partner%2BNewsletters&utm_medium=email" title="InsuranceJournal.com" target="_blank">InsuranceJournal.com</a></span></span><br></p></div>
</div><div data-element-id="elm_wpQyrPryRuPCab8mdi4FTw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_wpQyrPryRuPCab8mdi4FTw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1501621185719-221c3312e3ba?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_-l1px7zed5YDyx5NhzqrHA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-l1px7zed5YDyx5NhzqrHA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="color:inherit;">Cybersecurity and Infrastructure Security Agency (CISA), a</span>&nbsp;newly created U.S. cybersecurity agency said Thursday that China represents the greatest strategic risk to the U.S., and as a result, the agency’s top operational priority is reducing the risks from Chinese compromises to the global supply chain, including emerging 5G technology. The statement was part of a report outlining CISA's strategic intent for the next five years. The agency is responsible for protecting America’s critical infrastructure, like election systems and power grids, from hackers and other cybersecurity threats.</div><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;"><div>Besides China, the agency’s other priorities include federal cybersecurity and reducing risks for industrial control systems.&nbsp;<span style="color:inherit;">Christopher Krebs, the agency’s director, said in a speech Thursday that his agency is the nation’s “risk adviser,” which doesn’t have its hands on the keyboards of computer networks but rather seeks to make other agencies and companies do a better job managing risks against cyberattacks.</span></div><div><br></div><div>The priorities reflect the work CISA has already been doing since the agency was established in November 2018, a time during which the Chinese manufacturer Huawei Technologies Co. was blacklisted by the Trump administration amid security concerns and Russian agents were indicted for seeking to manipulate the 2016 presidential election.</div><div><br></div><div>“When we think about Russia, they’re trying to disrupt the system,” Krebs said, at an event at Auburn University in Alabama. “And China is trying to manipulate the system, so that requires us to take different approaches.”</div><div><br></div><div>CISA is currently offering services to election equipment vendors to find potential vulnerabilities in its systems. CISA’s work also includes protecting state and local governments from ransomware attacks, like the one that hit 22 towns in Texas last week. “Ransomware is not going anywhere,” Krebs said. “It’s only getting worse.”</div><br><div><span style="color:inherit;"><p style="margin-bottom:20px;font-size:16px;">CISA sits within the Department of Homeland Security. Krebs, the agency’s first director, joined the DHS in 2017 and was nominated to lead the agency by President Donald Trump in 2018. Before that, he was the Director for Cybersecurity Policy on Microsoft Corp.’s U.S. Government Affairs team.</p></span></div></span></div></div>
</div><div data-element-id="elm_-1UHAxSaRVedFTzaYPhd5Q" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_-1UHAxSaRVedFTzaYPhd5Q"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/cybersecurity" target="_blank"><span class="zpbutton-content">Learn how Cloud 9 can help you protect your business</span></a></div>
</div><div data-element-id="elm_GBLZRdyGuzXxZ0cX1GzQ6g" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_GBLZRdyGuzXxZ0cX1GzQ6g"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_2haLWEezyEXAZAWFZIYwGw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_2haLWEezyEXAZAWFZIYwGw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="false" style="width:1800px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">Every company wants to be your partner, but let’s face it, if they are selling you something, they’re not your partner, they’re just another vendor. Cloud 9 is different. We don’t actually sell anything and we don't charge our clients. We become an extension of your team and help manage the often overwhelming process of finding, evaluating, and selecting the right technologies and competitive providers.&nbsp;</span></span><br></p><p><span style="color:inherit;"><span style="font-size:11pt;"><br></span></span></p><ul><li><span style="font-size:11pt;"><span style="font-weight:bold;">Save Time: </span>We manage everything by becoming an extension of your team and do the legwork for you.</span><br></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Save Money: </span>We save you big by getting the buying power of thousands of other clients.</span></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Get Confidence: </span>We evaluate and negotiate to get you the best solution, best supplier, and the best price.</span></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Get Clarity:</span> We find the right companies, distill the information, and clear the clutter.</span></li></ul><div><span style="font-size:11pt;"><br></span></div><div><span style="color:inherit;"><p style="text-align:center;"><span style="font-size:11pt;font-weight:bold;">Technology Partners. Strategic Advisers.</span></p></span></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 08 Oct 2019 04:02:04 -0500</pubDate></item></channel></rss>