<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/sase/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #SASE</title><description>Cloud 9 Advisers - News #SASE</description><link>https://www.cloud9advisers.com/News/tag/sase</link><lastBuildDate>Sat, 28 Feb 2026 00:36:15 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Redefining Connectivity in the Digital Age]]></title><link>https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age</link><description><![CDATA[The B2B landscape is defined by the age of AI, cloud, and ubiquitous mobility. We explore how SDWAN and SASE are transforming the network from a cost center into the core strategic asset that drives advanced digital initiatives and fuels the AI gold rush.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_XA3OhJvvT1aZzVTrdhkPvQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_agzUTmSTQT-QxVGsMF3BAw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_5e4krQ7FR46xJ9t8_i2rmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_YBx_lEe_SEu1iNDKjj3CVA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;"><span>How SDWAN and SASE Fuel the Age of AI and Digital Strategy</span></span></h1></div>
<div data-element-id="elm_XYcZkgPcD2dDwzRMfWrKlQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-weight:bold;">Advanced Networking: The Foundational Requirement for the AI Era</span></p><p><span><span><span><span>The convergence of network optimization and cloud security transforms connectivity from a simple utility into the core strategic asset that enables mobility, IoT, and AI-driven growth.</span></span><br/></span></span></p><p><span><span><span><span><br/></span></span></span></span></p><p style="text-align:center;"><span><span><span><span><span><span style="font-style:italic;">Updated!&nbsp;</span></span><br/></span></span></span></span></p></div>
</div><div data-element-id="elm_vJ5mW9dYeQgXO9wbRdHiSw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_vJ5mW9dYeQgXO9wbRdHiSw"] .zpimage-container figure img { width: 1110px ; height: 369.42px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/artificial-intelligence-3706562_1280.jpg" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_osL2YtKZiEz20jz4t8Tfow" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>The modern network acts as an intelligent traffic control layer, prioritizing real-time AI data while securing every access point.</span></span></p></div>
</div><div data-element-id="elm_25RamFwwTPLd9yAdqGubMw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_25RamFwwTPLd9yAdqGubMw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_25RamFwwTPLd9yAdqGubMw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_aemv--3tH0aCZMkIizO-Bw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_9YoBLdTWISYfJc6Z5AkZDg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_sUYmup9gNv3NurUxkrujhg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-size:12pt;"></span></p><div><h1><span>Advanced Networking: The Foundational Requirement for the AI Era</span></h1><p><span>The modern B2B technology landscape is defined by two relentless forces: the shift of critical applications to the cloud, and the universal need for advanced, real-time data analysis. As customer needs evolve, driven by demands for instant communication, ubiquitous mobility, and sophisticated analytics, network architecture is no longer a back-office utility—it is the ultimate strategic enabler.</span></p><p><span><br/></span></p><p><span>Advanced solutions like cloud infrastructure, sophisticated cybersecurity defense, and transformative Customer Experience (CX) platforms are reshaping how network management operates. Without a high-performing, flexible, and secure network foundation, these initiatives cannot deliver their promised value. In fact, a brittle, legacy network architecture quickly becomes the single biggest bottleneck that cripples digital transformation.</span></p><p><span><br/></span></p><p><span>This realization is driving the rapid adoption and evolution of </span><strong>Software-Defined Wide Area Networking (SDWAN)</strong><span> and the mandatory shift to </span><strong>Secure Access Service Edge (SASE)</strong><span>. These are the twin pillars of advanced connectivity, transforming the network from a cost center into a true competitive asset.</span></p><h3><span><br/></span></h3><h3><span>The AI Gold Rush and the Network Bottleneck</span></h3><p><span>The excitement surrounding Artificial Intelligence (AI) and Machine Learning (ML) is palpable. From large language models (LLMs) used for generative tasks to predictive analytics driving operational efficiencies, every business is exploring how to harness this power. This technological pursuit can be described as the </span><strong>AI Gold Rush</strong><span>, and the fuel for this rush is </span><strong>data</strong><span>.</span></p><p><span><br/></span></p><p><span>However, the reality of deploying and scaling AI is harsh: AI models are voracious consumers and producers of data.</span></p><ul><li><p><strong>Training Data Load:</strong><span> Training new models requires moving massive, multi-petabyte datasets, often between enterprise locations, cloud storage, and specialized compute clusters. These sustained, heavy data streams place an immense strain on conventional wide area networks.</span></p></li><li><p><strong>Real-Time Inference:</strong><span> When models are deployed for real-time use (e.g., fraud detection, robotic process automation, or instant translation), the network must handle constant, bidirectional streams of </span><em>inference</em><span> data. This traffic demands extremely low latency, as milliseconds of delay can render the AI's result useless or too late for the human decision-maker.</span></p></li><li><p><strong>Edge AI and IoT:</strong><span> The proliferation of IoT devices and edge computing—essential for modern industrial operations or retail analytics—means AI is often deployed outside the data center. The network must aggregate data from thousands of endpoints, securely transport it for analysis, and then deliver inference back to the edge with near-zero delay.</span></p></li></ul><p><span>Legacy networks, designed primarily for static user-to-data-center traffic, are simply not equipped to handle the sheer volume, velocity, and priority requirements of these diverse AI data loads.</span></p><h3><span><br/></span></h3><h3><span>SDWAN’s AI Role: From Bandwidth to Intelligent Transport</span></h3><p><span>This is where the evolution of </span><strong>SDWAN</strong><span> becomes critical. SDWAN is moving beyond simply pooling bandwidth; it is now integrating </span><strong>AI and Machine Learning</strong><span> to enable a level of control that manual configuration could never achieve.</span></p><p><span><br/></span></p><p><span>The network must become self-aware and adaptive:</span></p><ol><li><p><strong>Adaptive Routing:</strong><span> Integrated ML capabilities allow the SDWAN solution to constantly monitor the quality of every available link (fiber, broadband, 5G, satellite) in real-time. If it detects a spike in jitter or packet loss on one link, it doesn't just failover; it instantly and preemptively steers critical traffic—like that associated with a remote AI inference operation or a vital cloud application—to a healthier path, often without any human intervention or network interruption.</span></p></li><li><p><strong>Application-Tailored Performance:</strong><span> Clients are prioritizing </span><strong>application-tailored performance</strong><span> over generalized capacity. A network built for the AI era must be intelligent enough to identify a large, non-urgent data backup (which can handle some latency) versus a sensitive UCaaS voice packet or a critical AI data stream. It uses its </span><strong>prioritization, optimization, and acceleration</strong><span> capabilities to allocate resources based on the business criticality of the application, ensuring that the most valuable traffic always wins.</span></p></li><li><p><strong>Convergence of Network, Mobility, and IoT:</strong><span> SDWAN facilitates the convergence of these three domains into a cohesive transport solution. By providing flexible, policy-driven connectivity, it ensures that real-time data transmission from mobile devices, manufacturing sensors, and cloud services flows efficiently. This integration is essential for providing the seamless, user-friendly experience modern businesses demand.</span></p></li></ol><p><span>SDWAN is no longer about getting more data through the pipe; it’s about making the pipe smarter, turning it into a dynamic data delivery system that is a prerequisite for successful AI adoption.</span></p><h3><span><br/></span></h3><h3><span>SASE and Security: Unifying the New Perimeter</span></h3><p><span>A conversation about advanced networking, especially one related to enabling AI and mobility, is fundamentally incomplete without addressing cybersecurity. As the network shifts to the cloud, the perimeter dissolves, and the risk surface expands exponentially. This is the driving force behind the mandatory shift to </span><strong>SASE (Secure Access Service Edge)</strong><span>.</span></p><p><span><br/></span></p><p><span>SASE and </span><strong>CASB (Cloud Access Security Broker)</strong><span> frameworks are transforming organizational security approaches by replacing fragmented, appliance-based security with a unified, cloud-native platform. This is the only way to manage the complexity and scale of modern threats.</span></p><p><span><br/></span></p><p><span>The integration of network optimization (SDWAN) and security convergence (SASE) delivers profound advantages:</span></p><ul><li><p><strong>Zero Trust Enforcement:</strong><span> A true SASE architecture embeds </span><strong>Zero Trust Network Access (ZTNA)</strong><span>. Instead of relying on the physical IP address of a location—which is obsolete in the mobile world—access policy is tied to the </span><strong>user's identity</strong><span> and the real-time posture of their device. This is crucial for protecting the sensitive data fueling AI, ensuring that only verified identities can access the massive data lakes required for model training and deployment.</span></p></li><li><p><strong>The Single Pane of Glass:</strong><span> SASE integrates multiple security functions (Firewall-as-a-Service, Secure Web Gateway, CASB) into a single software stack delivered from the cloud. This unified management platform greatly reduces the complexity, operational overhead, and security gaps inherent in multi-vendor, disparate solutions. Monitoring and managing security risks through a single interface provides unparalleled visibility and consistency across all endpoints and cloud resources.</span></p></li><li><p><strong>Pervasive, Low-Latency Security:</strong><span> Because SASE is delivered via a global network of PoPs (Points of Presence), security inspection happens close to the user, eliminating the need to &quot;backhaul&quot; traffic. This ensures that the security layer does not introduce performance-crippling latency, preserving the speed and efficiency required by AI and real-time cloud applications.</span></p></li></ul><p><span>In the advanced network, security is not an afterthought; it is an inseparable, integrated function of connectivity.</span></p><h3><span><br/></span></h3><h3><span>Understanding the Client Imperative</span></h3><p><span>The reality is that these advanced solutions are not a plug-and-play, one-size-fits-all commodity. They require a rigorous, third-party assessment to ensure they align with the unique needs and growth objectives of each business.</span></p><p><span><br/></span></p><p><span>Designing effective networking solutions in the age of AI and SASE requires:</span></p><ol><li><p><strong>Thorough Needs Assessment:</strong><span> Moving past simple link capacity metrics to understanding application requirements, data flow patterns (where the AI and IoT data is being generated and consumed), and specific security mandates (compliance, PII, etc.).</span></p></li><li><p><strong>Strategic Alignment:</strong><span> Ensuring that networking capabilities are not just meeting technical requirements but are directly enabling broader business objectives, such as a major cloud migration, the implementation of a new AI strategy, or the expansion of a mobile sales force.</span></p></li><li><p><strong>Vendor Neutrality:</strong><span> The market is saturated with vendors, each claiming a unique flavor of SDWAN or SASE. A trusted adviser is required to cut through the marketing noise, evaluate the true integration of the underlying technology, and shortlist providers that offer a genuinely unified, high-performing solution.</span></p></li></ol><p><span><br/></span></p><p><span>The digital age demands constant vigilance and architectural foresight. The successful organizations are those that view their network not as an expenditure, but as the core platform for innovation.</span></p><p><span><br/></span></p><p>At Cloud 9 Advisers<span>, we have a deep understanding of the challenges and opportunities at the intersection of AI, security, and connectivity. We are committed to providing our clients with the vendor-neutral insights and strategic solutions they need to navigate this complexity, achieve their business goals, and stay competitive in a rapidly evolving digital environment.</span></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div><span style="font-size:12pt;"><br/></span></div></div>
</div></div><div data-element-id="elm_Edv7AMMBMLmbT7rwjmCOWw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_Z_qMGMmzSOu_Ql2SHXbiBw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan"><span class="zpbutton-content">SD-WAN</span></a></div>
</div><div data-element-id="elm_yWHw1INNI6zc517E9iPpRg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""></a></p><p><a href="https://www.cloud9advisers.com/News/post/ai-engine" title="The Engine that Drives AI" rel="">The Engine that Drives AI</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 07 Feb 2025 13:17:45 -0500</pubDate></item><item><title><![CDATA[SD-WAN and SASE]]></title><link>https://www.cloud9advisers.com/News/post/sd-wan-and-sase</link><description><![CDATA[SDWAN optimizes your network. SASE secures your edge. We demystify the two fastest-growing acronyms in networking, clarify their distinct benefits for single and multi-location companies, and explain the components that create a truly unified SASE platform.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_1jXyK-BxSzyrWaKP8RqrUA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iT5zEM8tTIydTEbJVk5i1A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_gS4hskNZS06uKMpuP2R1QQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_5E1mk1d-aq_UX3M_nNC1YA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>SDWAN &amp; SASE: The Essential Guide to Converging Connectivity and Cloud Security</span></h1></div>
<div data-element-id="elm_EaYOe5_uT1Wkw5nbmuKiqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EaYOe5_uT1Wkw5nbmuKiqQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div style="color:inherit;"><div><span><span>Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network</span></span></div><div><span><span><br/></span></span></div><div><span><span><span><span>Cloud-first operations demand a new network model. Understanding the roles of Software-Defined Wide Area Networking (SDWAN) and Secure Access Service Edge (SASE) is the first step toward building a truly resilient and secure edge.</span></span><br/></span></span></div><div><span><span><span><span><br/></span></span></span></span></div><div><span><span><span><span><span><span>SASE and SDWAN represent the necessary convergence of security (the perimeter) and networking (the pathway) in the age of cloud and hybrid work.</span></span><br/></span></span></span></span></div></div></div>
</div><div data-element-id="elm_jkUNxYuneitwIK_sewBFAg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_jkUNxYuneitwIK_sewBFAg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_jkUNxYuneitwIK_sewBFAg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_BbiI0m9bI29ZdapwOsEbpw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"> [data-element-id="elm_BbiI0m9bI29ZdapwOsEbpw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dcjweYy9nV-YMoK-K7qnZA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dcjweYy9nV-YMoK-K7qnZA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_WblXvipEFTmJ2j7HnywXfw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WblXvipEFTmJ2j7HnywXfw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;"></span></p><div><h2><span>Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network</span></h2><p><span>For many IT leaders, the networking and security landscape over the past few years has felt like an endless alphabet soup. Two acronyms, in particular, have dominated strategic conversations: </span><strong>SDWAN</strong><span> and </span><strong>SASE</strong><span>.</span></p><p><span><br/></span></p><p><span>Both are frequently discussed in the context of modernization, cloud migration, and supporting the hybrid workforce. This has led to widespread confusion, with many vendors incorrectly presenting them as competing solutions, or worse, claiming that one automatically includes the other without proper implementation.</span></p><p><span><br/></span></p><p><span>At Cloud 9 Advisers, we act as pragmatic, expert advisers to help you cut through this noise. Simply put: </span><strong>SDWAN optimizes the network; SASE secures the edge.</strong><span> They are not competing technologies, but essential components that, when unified correctly, form the foundation of a modern, secure, and resilient network.</span></p><p><span>Understanding their individual roles is the first step to making the right strategic investment.</span></p><h3><span><br/></span></h3><h3><span>Part 1: Demystifying SDWAN (Software-Defined Wide Area Network)</span></h3><p><span>SDWAN is fundamentally a revolutionary approach to Wide Area Networking (WAN). Traditionally, WANs relied on complex hardware—specific routers, expensive leased lines (like MPLS), and manual configurations—to connect separate locations.</span></p><p><span><br/></span></p><p><span>SDWAN separates the control plane (the intelligence of the network) from the data plane (the physical connections). By shifting control to software, it gains two critical advantages: </span><strong>intelligence</strong><span> and </span><strong>flexibility</strong><span>.</span></p><p><span><br/></span></p><p><span>The SDWAN appliance at each location becomes application-aware, meaning it knows the difference between a voice packet, an email, or a large file download. This intelligence is then used to optimize traffic flow in real time across any combination of underlying links (fiber, broadband, 4G/5G, etc.).</span></p><h4><span><br/></span></h4><h4><span>The Pragmatic Benefits of SDWAN</span></h4><p><span>While SDWAN was originally designed to connect </span><strong>multiple locations</strong><span> effectively, it offers distinct and significant benefits even for </span><strong>companies with a single location</strong><span>:<br/><br/></span></p><table><tbody><tr><th style="width:13.516%;"><p><span style="font-weight:bold;">Audience</span></p></th><th style="width:25.137%;"><p><span>Primary Problem Solved</span></p></th><th style="width:59.5205%;"><p><span>Core SDWAN Benefit</span></p></th></tr><tr><td style="width:13.516%;"><p><strong>Single Location</strong></p></td><td style="width:25.137%;" class="zp-selected-cell"><p><span>Internet instability, QoS issues for real-time apps, reliance on expensive single circuits.</span></p></td><td style="width:59.5205%;"><p><strong>Reliability &amp; Efficiency:</strong><span> It aggregates multiple, low-cost internet links into a unified connection. It uses that power to ensure mission-critical applications (like UCaaS or a cloud ERP system) always have the bandwidth they need, while less critical traffic is given lower priority. It provides a more robust, stable connection than any single circuit ever could.</span></p></td></tr><tr><td style="width:13.516%;"><p><strong>Multiple Locations</strong></p></td><td style="width:25.137%;"><p><span>High cost of traditional WAN (MPLS), complex management, and traffic backhauling for security.</span></p></td><td style="width:59.5205%;"><p><strong>Virtual Network &amp; Cost Reduction:</strong><span> This is the original design intent. It creates a seamless, virtual network that spans multiple physical locations, making management centralized and simple. Critically, it allows companies to swap expensive MPLS with low-cost broadband, reducing ongoing network costs while improving agility and allowing for dynamic, automated routing around outages or congestion.</span></p></td></tr></tbody></table><p><span><br/></span></p><p><span>SDWAN’s value is in </span><strong>resilience</strong><span> and </span><strong>performance</strong><span>. It is the key to providing the high-quality, low-latency connectivity required for the sensitive, real-time applications we discussed in our last article on Call Survivability.</span></p><h3><span><br/></span></h3><h3><span>Part 2: Demystifying SASE (Secure Access Service Edge)</span></h3><p><span>If SDWAN is the intelligent highway, then </span><strong>SASE (Secure Access Service Edge)</strong><span> is the integrated, cloud-native security perimeter applied to that highway's entrance and exit ramps.</span></p><p><span><br/></span></p><p><span>SASE is an architectural framework, not a single product. It was introduced to address the reality that the traditional network perimeter—the firewall in your server room—is obsolete. Users now access corporate data from home, coffee shops, and client sites using personal devices, reaching applications hosted in multiple clouds.</span></p><p><span><br/></span></p><p><span>The goal of SASE is simple: </span><strong>Secure and reliable access to corporate resources from any location, without sacrificing user experience or performance.</strong></p><p><span><br/></span></p><p><span>A comprehensive, robust SASE solution is built upon the convergence of several key security and networking components, all delivered via a single, cloud-based platform. If a vendor is missing even one of these components, they are selling a partial, non-SASE solution.</span></p><h4><span><br/></span></h4><h4><span>The Five Essential Components of a True SASE Platform</span></h4><p><span>A good SASE solution brings together the following technologies into a unified stack:</span></p><ol><li><p><strong>Secure Web Gateway (SWG):</strong><span> Provides secure, cloud-based internet access. It acts as the first line of defense, blocking malicious websites, filtering URLs, and applying advanced malware detection before traffic even reaches the user’s device or the corporate network.</span></p></li><li><p><strong>Cloud Access Security Broker (CASB):</strong><span> The CASB provides critical visibility and control over cloud applications (SaaS). It monitors user activity within apps like Microsoft 365, Salesforce, and Dropbox, enforces security policies, and prevents data leakage by encrypting sensitive data both in transit and at rest.</span></p></li><li><p><strong>Firewall-as-a-Service (FWaaS):</strong><span> This replaces the traditional physical, on-premise firewall. FWaaS is a cloud-native security layer that controls access to corporate resources and blocks unauthorized traffic, applying consistent security policies to users regardless of their location.</span></p></li><li><p><strong>Zero Trust Network Access (ZTNA):</strong><span> This is the modern replacement for traditional VPNs. ZTNA is critical because it never grants blanket access to the entire network. Instead, it operates on a principle of &quot;never trust, always verify,&quot; granting users access only to the specific applications they need, only after identity verification, and only from a compliant device. This hides corporate resources from the public internet entirely.</span></p></li><li><p><strong>Identity and Access Management (IAM):</strong><span> An integral part of the Zero Trust model. IAM provides the centralized control over user identities, authentication (often multi-factor, or MFA), and authorization. It is the engine that validates who a user is and what they are allowed to access, enforcing policy consistently across the entire SASE stack.</span></p></li></ol><p><span><br/></span></p><p><span>And finally, the often-misunderstood component:</span></p><ul><li><p><strong>Software-Defined Wide Area Networking (SDWAN):</strong><span> A true SASE architecture </span><strong>includes</strong><span> SDWAN functionality. The networking side of SASE is responsible for optimizing the transport layer—selecting the best path for traffic based on business requirements and dynamically routing it across various links (broadband, 5G, private connections). It ensures the high-performance delivery of traffic to and from the secure SASE cloud edge.</span></p></li></ul><h3><span><br/></span></h3><h3><span>SDWAN + SASE: The Convergence Strategy</span></h3><p><span>The modern B2B enterprise is defined by dispersed data, dispersed users, and dispersed applications. The only way to manage this complexity effectively is through convergence.</span></p><p><span><br/></span></p><p><span>The strategic relationship can be summarized simply:</span></p><ul><li><p><strong>SDWAN is the foundation of high-performance connectivity.</strong><span> It delivers the path optimization, quality of service (QoS), and resilience (call survivability) that your business demands.</span></p></li><li><p><strong>SASE is the strategic security framework.</strong><span> It delivers the identity-centric access control (ZTNA), threat prevention (SWG, FWaaS), and data protection (CASB) that your business requires, regardless of where the user is located.</span></p></li></ul><p><span><br/></span></p><p><span>By consolidating these functions into a unified, cloud-based platform—the core tenet of SASE—businesses gain:</span></p><ol><li><p><strong>Simplified Management:</strong><span> Moving from managing six different boxes (router, firewall, VPN concentrator, web filter, etc.) to managing one policy stack in the cloud.</span></p></li><li><p><strong>Consistent Security:</strong><span> Every user, no matter where they are or how they connect, gets the exact same security inspection and policy enforcement.</span></p></li><li><p><strong>Cost Efficiency:</strong><span> Reducing hardware footprints and maintenance costs, leveraging lower-cost internet links, and consolidating vendor contracts.</span></p></li><li><p><strong>Agility:</strong><span> The network scales instantly to accommodate mergers, acquisitions, or sudden shifts to remote work, without needing to deploy physical hardware.</span></p></li></ol><h3><span><br/></span></h3><h3><span>Simplifying the Strategic Choice</span></h3><p><span>The choice between SDWAN and SASE is a false one; the correct answer is a converged solution.</span></p><p><span><br/></span></p><p><span>However, the vendor landscape is complex, with providers offering partial solutions that may excel at the &quot;SDWAN&quot; part but provide poor, bolt-on security, or vice versa. The strategic challenge is identifying the partner that can deliver a </span><strong>truly unified SASE platform</strong><span>—one where the networking and security components are built to work together seamlessly, eliminating gaps and preserving performance.</span></p><p><span><br/></span></p><p><span>Don’t get stuck in the alphabet soup of acronyms. Focus on the required outcomes: </span><strong>resilient performance and secure access from anywhere.</strong></p><p><span><br/></span></p><p><span>At Cloud 9 Advisers, we help technology leaders sift through the noise, evaluate the true integration level of SASE vendors, and select the platform that meets the specific demands of their single or multi-location business model.</span></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div><span style="font-size:12pt;"><br/></span></div>
</div></div><div data-element-id="elm_CV5VuMRYDmcEvhmfgMYM2w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_CV5VuMRYDmcEvhmfgMYM2w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sase" target="_blank"><span class="zpbutton-content">Learn more about SASE</span></a></div>
</div><div data-element-id="elm_FxB8pAckLtzq7zPAwodPLg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_FxB8pAckLtzq7zPAwodPLg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan" target="_blank"><span class="zpbutton-content">Learn more about SDWAN</span></a></div>
</div><div data-element-id="elm_-M6o_rd5AoLrhwfddyyoDQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-M6o_rd5AoLrhwfddyyoDQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel="">Redefining Connectivity in the Digital Age</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" title="The 'Real' SDWAN Test:" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div></div><div data-element-id="elm_bFHrnBjhtb96Vh5CJTGcZQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_bFHrnBjhtb96Vh5CJTGcZQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_oF0HDA0tROSZN17dhE2uvg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_oF0HDA0tROSZN17dhE2uvg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-left zpbutton-align-tablet-left"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 15 Jun 2023 09:40:58 -0500</pubDate></item><item><title><![CDATA[Case Study: Nonprofit]]></title><link>https://www.cloud9advisers.com/News/post/case-study-nonprofit</link><description><![CDATA[Cloud 9 was able to introduce the customer to four top service providers that were able to provide and manage all the internet circuits, even though they we from several different carriers, a far superior security stack with the SASE platform, and fully manage and support the entire solution.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_mq5D7izSTpiBt3P6s4ljOA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_RiDP_m8vT3aUtFluU_UwKQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_7Z_CpCTMSFKAoSdJ4PAlLQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_KcDZiPaYT6q4ALvClxvxVw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_KcDZiPaYT6q4ALvClxvxVw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Nonprofit needed unstoppable Internet and Security</span></h1></div>
<div data-element-id="elm_I-GtGN3va5DaYPdDpoPfwg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_I-GtGN3va5DaYPdDpoPfwg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1527192491265-7e15c55b1ed2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDc1fHxvZmZpY2V8ZW58MHx8fHwxNjE3MzIzODQ3&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" size="original" alt="Nonprofit office expansion needed strong security and bulletproof internet. Cloud 9 saved the day!" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Gp5uJp01Sq2rLEXupA1Sdg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Gp5uJp01Sq2rLEXupA1Sdg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_gdWqQPTcZi-XxAibycg2tA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_gdWqQPTcZi-XxAibycg2tA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Rc3x_ZAmoERyE1dl5yQylg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Rc3x_ZAmoERyE1dl5yQylg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:15px;">A long-time Nonprofit client of Cloud 9 Advisers was looking for a budget-conscious solution to improve connectivity as they added new locations across the country and to correct problematic reoccurring outages and “brownouts” they’d been having with their high-speed broadband cable provider. With a handful of critical applications and a lean IT staff, they needed a solution that would streamline their network management and generally improve security. While they had your typical set of security solutions, it was aging and they found themselves managing more than they’d like and didn’t have the staff or the skillset to manage a complex security solution. While they hadn’t had any security incidents, they decided up-to-date services made sense but didn’t want to spend any more than they had in the past. A new and modern managed security solution would be a “nice-to-have” if it fit the budget.</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-weight:bold;font-size:15px;">Dual Bandwidth connections</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">With their two current locations and two more coming on board along the East Coast, they wanted to ensure each site had solid, reliable internet connectivity especially considering their recent experiences. They’d been pushing more apps to the cloud, especially communications and collaboration tools so a high-quality connection was important at each site, but they wanted to avoid the higher costs of Direct Internet Access (DIA) Fiber circuits, if possible. Plus they still had a few highly proprietary database servers running at their headquarters in the Washington, DC area with off-site cloud backups.&nbsp;</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">They got lucky at the original two locations, their two largest, and the winning provider was able to find both broadband cable <span style="font-style:italic;">and broadband <span style="font-weight:bold;">fiber</span></span>. The two new locations were going to be smaller satellite locations, so broadband cable and a cheap strong secondary connection were chosen. One site had cable and DSL, the other site had cable and a 4G LTE mobile data-only device.&nbsp;</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-weight:bold;font-size:15px;">Secure Access Service Edge (SASE)</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">Cloud 9 vendor-neutral engineers realized that dual bandwidth connected to a solid SD-WAN solution would address the customer connectivity requirements by providing rock-solid, bulletproof connectivity (to the point were even if a connection dropped during a VoIP call, the call would stay active) and be able to fully control video and call quality. We also want to address their security &quot;nice-to-haves&quot; as well.&nbsp;</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">A real and proper SDWAN solution is arguably the best option for any video and VoIP communication apps, and considerably improved VPN performance.</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">The customer-selected winning provider included a Secure Access Service Edge (SASE, pronounced sassy)&nbsp; platform that combined all the benefits of a top SD-WAN, plus was able to replace the customer’s entire security stack and even endpoint protection agents. SASE improves security, boosts network performance, and reduces the number of vendors and devices businesses and IT have to deal with. The winning provider's SASE (security) solution had five key ingredients: SDWAN, Zero-Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), Next-Gen Firewall (NGFW), and Secure Web Gateway (SWG) for devices--and all cloud-based.</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><blockquote style="margin-left:40px;border:none;"><div><span style="font-size:15px;">As an added and unforeseen bonus especially during the pandemic shutdowns, the SASE solution was able to allow all end-users and devices to authenticate and gain secure access to all the resources both cloud and on-premise, that they are authorized to reach protected by security, located close to them. Once authenticated, the end-users had direct access to those resources, rather than having to be routed to a central location via traditional firewall and VPN. This dramatically reduced latency issues for all users working from home.&nbsp;</span></div></blockquote><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="color:inherit;font-size:15px;"><p style="margin-bottom:8pt;">As the Cloud 9 engineering team dug deeper into solutions options the project ballooned and the customer realized they would be able to cover far more than they had originally expected.&nbsp;</p><p style="margin-bottom:8pt;">Cloud 9 was able to present and introduce the customer to four top service providers that were able to provide and manage all the internet circuits, even though they we from several different carriers, a far superior security stack with the SASE platform, and fully manage and support&nbsp; the entire solution. All things considered there was only a minor increase in the total new solution price compared to what the customer was previously spending. However, even better, the customer had originally planned on a 35% increase due to the fact that they knew they wanted dual connections, assumed DIA fiber would be required, and had planned on replacing some of their original security appliances and software. The customer was absolutely thrilled with the entire experience.</p></span></div></div>
</div></div><div data-element-id="elm_ITNOG8te8_xLdDm8YV_LXw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ITNOG8te8_xLdDm8YV_LXw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_ixgWQsXDhpzM7CFY181hrQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_ixgWQsXDhpzM7CFY181hrQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_I8gER0OcvBuIyWrarfltwQ" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> [data-element-id="elm_I8gER0OcvBuIyWrarfltwQ"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/C9-Logo1.t-all%20200x103.png" data-src="/C9-Logo1.t-all%20200x103.png" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">About Cloud 9 Advisers</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">Cloud 9 Advisers helps business leaders make IT buying decisions quickly and confidently. Whether you need impartial advice on the best new tech, or assistance with a project outside your wheelhouse, we have expertise in four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. We work with you to identify, research, evaluate, and compare appropriate solutions and vendors; eliminating months of labor trying to do it on your own.</span><br></p></div>
</div></div></div><div data-element-id="elm_HdZzg6dsRiKIWKq2Y7JM7A" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 01 Apr 2021 19:47:36 -0500</pubDate></item><item><title><![CDATA[Never Trust and Always Verify]]></title><link>https://www.cloud9advisers.com/News/post/never-trust-and-always-verify</link><description><![CDATA[Never Trust and Always Verify. Hmm, doesn't sound very productive in most business situations, but if you're talking about technology and security, I think we might be on to something.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_TAHtRM7MTwyz93DQF4vulQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_EK0C27GDQIeK-T7DwhG40g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_1wDa-H2ITMKidvNyBIDVAg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6xmd7dxZROuVXa4jR6sTrg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6xmd7dxZROuVXa4jR6sTrg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Zero Trust Picking up Steam in the Enterprise</h2></div>
<div data-element-id="elm_MurS2mZbgH6qIQkLiZMx9g" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_MurS2mZbgH6qIQkLiZMx9g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/ZeroTrustSecurity.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_3MYoUag1of7CYIZHqfMTrA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_3MYoUag1of7CYIZHqfMTrA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_KX-DnESpwPeszGZSn0xybQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_KX-DnESpwPeszGZSn0xybQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_gmq_CGqL3txZQszRpkTkTg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gmq_CGqL3txZQszRpkTkTg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:16px;">Never Trust and Always Verify. Hmm, doesn't sound very productive in most business situations, but if you're talking about technology and security, I think we might be on to something. </p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">&quot;The traditional perimeter-based security model is dead. It has been overtaken by an era of cloud, mobility, and BYOD that requires a new approach to network access control.&quot;</span><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">The Zero Trust Network Access (ZTNA) model is a new method of access control that considers all network connections untrusted. This is a shift from the traditional concept of an inside/outside network where only some connections were considered trusted. The ZTNA model requires organizations to consider all traffic as potential threats, which means security controls must be in place at every stage of the attack lifecycle and beyond the firewall layer into your environment.</span><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">Never Trust and Always Verify</span>&nbsp;is the general premise behind Zero Trust Network Access (ZTNA). A strong proponent for the replacement of traditional remote access like Virtual Private Networking (VPN), where a secure tunnel straight into the corporate network is created and anything that goes through that tunnel is presumed &quot;safe&quot; and &quot;trusted&quot;. There are a number of &quot;faith-based&quot; assumptions that take place when using&nbsp; VPN. One big one being the remote device creating the tunnel is <span style="font-style:italic;">still</span>&nbsp;a trusted device. ZTNA takes a different approach: nothing is trusted and everything must be verified. This might seem laborious, but the user experience is minimally affected and security benefits are significant.</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">ZTNA is starting to turn heads with IT for its protection of applications, data, and networks, easier control, and innate simplicity allowing access to remote staff, suppliers, and contractors. Some providers offer client and clientless versions for far greater flexibility and no need to constantly update Active Directory just to let a supplier in for two hours worth of work. And even provided secure access to users' personal devices without the typically required &quot;big brother'&quot;intrusions.&nbsp;</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">The real power of ZTNA comes when its combined with the power of a Secure Access Service Edge (SASE) solution. These two put together forms a full security barrier and flexible perimeter thoroughly protecting endpoints and users.&nbsp;</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">Using disparate/separate SASE and ZTNA platforms can certainly be done, but should only be done so by the most adept and experience security professionals. The management interface and integration of these separated systems is highly complex. Many solutions exist&nbsp; that combine both SASE and ZTNA together with a single management interface. Some providers also offer a completely managed solutions as well.&nbsp;</p><p style="font-size:16px;"><br></p><p><span style="color:inherit;"></span></p><p style="font-size:16px;">Regardless there is a lot to consider. Contact us and we'll get you in contact with a Strategic Tech Expert to wal you through all of the options and find out who the best vendors are for your business</p></div>
</div></div><div data-element-id="elm_PcKNyCs_ulmjRBw_z99Axw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_PcKNyCs_ulmjRBw_z99Axw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_iS6O_iNXLx1VEelRIBau9w" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_iS6O_iNXLx1VEelRIBau9w"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_XnQzp6JOozkRcfrmluvmQQ" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> [data-element-id="elm_XnQzp6JOozkRcfrmluvmQQ"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/C9-Logo1.t-all.png" data-src="/C9-Logo1.t-all.png" size="medium" data-lightbox="true" style="height:140px;width:271.85px;"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">About Cloud 9 Advisers</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Cloud 9 Advisers helps business leaders and understaffed IT teams that need a strategic partner, not just another vendor. We help decision-makers buy great technology. We work with you to rationalize and reduce technology spending without sacrificing the technology itself and employ sound digital transformation principles and strategies.</div><p><span style="color:inherit;"><br></span></p><div>We do not sell solutions, we help you buy the right solutions. We are not a vendor, we help you find the right vendors. We diagnose problems, prescribe solutions, and facilitate decisions.</div><p><span style="color:inherit;"><br></span></p><div>We are impartial, unbiased, and vendor-neutral technology practitioners with expertise in four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. Our proprietary software contains decades of data and analytics on all of the 250+ vendors in our Supplier Portfolio. We’ll help you quickly identify, research, evaluate, and compare appropriate solutions and vendors; eliminating months of labor trying to do it on your own. We’ll help you make confident decisions quickly.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>To learn more contact us today and book an appointment.</div><p><span style="color:inherit;"><br></span></p><div><br></div></div>
</div></div></div><div data-element-id="elm_80PupHh1TDWfZ5tzNRuEVw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_80PupHh1TDWfZ5tzNRuEVw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 16 Mar 2021 17:11:26 -0500</pubDate></item><item><title><![CDATA[Control Costs (revisited)]]></title><link>https://www.cloud9advisers.com/News/post/control-costs-revisited</link><description><![CDATA[We are now almost one-year into this ridiculous pandemic. There is certainly the smell of rebound in the air. As talks of rebooting and restarting take root, executives are already feeling the pressure to optimize, reinvest, and continue to reduce costs to help keep their companies moving forward.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_2AhBaZ6VSVGSakU_iTa1Kg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_nhmg2nHGTVuE1JjXYfoq-A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_RqfbNAz6S7mALJsfwmnLcA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_iV2o0i-ERUmFtF1oGOCrLQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_iV2o0i-ERUmFtF1oGOCrLQ"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Controlling Costs:&nbsp; A Year Into This</h1></div>
<div data-element-id="elm_PSwbDijlV1hTOQ4KIZAYMA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_PSwbDijlV1hTOQ4KIZAYMA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/money.jpeg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_LI0rUeayQfqPQppWnms4nw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LI0rUeayQfqPQppWnms4nw"].zpelem-text { border-radius:1px; margin-inline-end:100px; margin-inline-start:100px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>That could be light at the end of the tunnel. There is certainly the smell of rebound in the air. There is no question things are different; some thing may go back to normal, plenty will be changed forever.&nbsp;</p></div>
</div><div data-element-id="elm_agbfvo6v9F5akvq0fskRlA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_agbfvo6v9F5akvq0fskRlA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Rn_uc8dMvEDNnLdvH7X7wQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Rn_uc8dMvEDNnLdvH7X7wQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Yesvs6WzWWK57RbqS-WPvA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Yesvs6WzWWK57RbqS-WPvA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Revisit. Rethink. Revise.</h2></div>
<div data-element-id="elm_kwv8sUhgwYhggChL1QHfNw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kwv8sUhgwYhggChL1QHfNw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:15px;">We are now almost one-year into this ridiculous pandemic. Who could’ve imagined anything this crazy and far-reaching would happen and last this long? There’s a buzz, a feeling, and it’s almost palpable. Is that… could that be hope? There is certainly the smell of rebound in the air. As talks of rebooting and restarting take root, executives are already feeling the pressure to optimize, reinvest, and continue to reduce costs to help keep their companies moving forward.</span></p><p><span style="color:inherit;font-size:15px;"><br></span></p><p><span style="font-size:15px;">According to PwC, managing the financial impacts of COVID—operations, future periods, liquidity, and capital resources— are the main concern for 75 percent of CFOs. Early on, executives had been concerned about a global recession, reduced workforce productivity, low consumer confidence, and supply chain disruptions. It has been and somewhat remains a “wait and see” economy.</span></p><p><span style="color:inherit;font-size:15px;"><br></span></p><p><span style="font-size:15px;">Seventy-four percent of respondents in PwC’s study said they are prepared for a potentially “significant” impact on productivity. 39% of respondents in PwC’s study said that if COVID-19 were to end immediately, it would take one to three months for their company to get back to business as usual. That sentiment is changing as executives have realized that business as usual will no longer be usual.&nbsp;</span></p><p><span style="color:inherit;font-size:15px;"><br></span></p><p><span style="font-size:15px;font-weight:bold;">How are CFOs Responding to COVID-19?</span></p><p><span style="color:inherit;font-size:15px;"><br></span></p><p><span style="font-size:15px;">“Cautiously optimistic” seems to be the theme for 2021, says most CFOs interviewed. Compared to early summer 2020 when sixty-seven percent of CFOs said they are considering canceling planned investments due to COVID-19, this is a big step in the right direction. At that time executives anticipated making cuts to facilities and general capital expenditures (82%), their workforce (67%), and operations (55%). Those cuts seem to be reversing with operational expenditures being the first to be revived.&nbsp;</span></p><p><span style="color:inherit;font-size:15px;"><br></span></p><p><span style="font-size:15px;">What’s more, 53 percent of CFOs claimed that IT investments were in the crosshairs, while 25 percent were looking to reduce or eliminate digital transformation. And 15 percent considered reducing customer experience spend with just 2 percent looking to reduce cybersecurity spend. But it seems this is no longer the case!</span></p><p><span style="color:inherit;font-size:15px;"><br></span></p><p><span style="font-size:15px;">Management is revisiting, rethinking, and revising the way they do things. 2021, while cautiously optimistic, will also be the year of reinvention. The pandemic shook many organizations to the core, breaking the bonds of apathy and compelling them to embrace radical changes. Many businesses are on the path to consolidate the previous years’ insights and accelerate response to new ideas and innovations and it seems a solid digital transformation strategy at its core. Much of that strategy will be to continue to find creative ways to cut costs without sacrificing technology itself.&nbsp;</span></p><p><span style="font-size:15px;"><span style="color:inherit;"></span></span></p></div>
</div><div data-element-id="elm_QgIv0o2QdfsIXcF8MUNzKQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_QgIv0o2QdfsIXcF8MUNzKQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Tips for Reducing Technology Costs</span></h3></div>
<div data-element-id="elm_L1XCG8kvjJYcMPHlRXJIxA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_L1XCG8kvjJYcMPHlRXJIxA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span>CFOs need to understand, though, that it is possible to reduce technology expenses significantly, while maintaining — and even improving —operational stability. Doing so could free more capital to spend on staff, protecting jobs, and preventing the need to part ways with top talent.</span></p><p><span style="color:inherit;"><br></span></p><p><span>But relying on understaffed, overworked IT may not deliver the best results. Especially considering many of the technologies, strategies, and tactics fall outside ITs wheelhouse. This is where it pays to have access to an independent Strategic Partner and Technology Expert. With the help of Cloud 9 Advisers, consultants can identify possible areas of waste and strategically re-allocate funding. Cloud 9 can provide access to a variety of key suppliers and technologies to help with this process. Protecting these budgets will determine how companies spend these resources and ensure the best outcome for all involved.</span></p><p><span style="color:inherit;"><br></span></p><p><span>Here are some recommendations that companies should consider during this tough time, and how Cloud 9 can help:</span></p><p><span style="color:inherit;"><br></span></p><p><span style="font-weight:700;font-size:16px;">Leverage Technology/Telecom Expense Management (TEM)</span></p><p><span style="font-weight:700;font-size:16px;"><br></span></p><p><span>Businesses have a rat’s nest of bills ranging from network, phone, mobile, and everything in between. With complex, cryptic, and hard-to-understand bills, businesses often spend far too much money each month on unnecessary telecom expenses that can be reduced or, in some cases, eliminated. It can be challenging for CFOs to adjust plans and eliminate certain technologies, though, due to limited visibility or insight.</span></p><p><span style="color:inherit;"><br></span></p><p><span>Cloud 9 Advisers has several vendors that specialize in these areas. We have access to TEM experts that can help a company get its digital infrastructure ‘house’ in order by assisting them in identifying waste and prioritizing what they need to be using — making it easier to slash costs.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span>This exact concept also applies to corporate Mobile/Wireless plans as well. Sometimes referred to specifically as Wireless Expense Management (WEM).&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="font-weight:700;font-size:16px;">Take a closer look at Corporate Mobile Carrier Spend</span></p><p><span style="font-weight:700;font-size:16px;"><br></span></p><p><span>Company-provided mobile phone and data plans are easy targets for finding savings without changing carriers, contracts, or eliminating plans altogether. Data overages make up, on average, over 35 percent of a business’ mobile bill. You can fix this by either modifying the plan to accommodate the higher data utilization, or you can try asking employees to minimize their data consumption. Add to the problem a complete lack of billing transparency (you can’t tell if an employee is using their data on work-related activities or giving their phone to a child who is watching hours of Netflix and YouTube on the company’s tab).</span></p><p><span style="color:inherit;"><br></span></p><p><span>One of the best ways to prevent employees from blowing through their data limits is to deploy a back-end firewall and traffic-shaping service that deploys directly into the mobile carrier’s network, giving insight to application use and allowing clients the ability to limit specific app usage to avoid expensive overage penalties without any changes to phones, plans, or SIM cards. This service integrates with the carriers directly so there is no reduction in performance of user devices like with other enterprise deployed options.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span>Other Cloud 9 vendors in Enterprise Mobility Management (EMM), Managed Mobility Services (MMS), and Wireless Expense Management (WEM) can provide incredible savings through mobile carrier management, cost optimization, in-depth tracking, daily/weekly/monthly plan optimization, and continual analysis of the overall corporate mobility environment. All of which can be done without changing the carrier, agreement, or service itself. These services are also budget-neutral where they only get paid if and when they have realized savings on your mobile carrier bill, then they’ll get paid from a portion of your savings.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span>Another option may be to switch to a Mobile Virtual Network Operator (MVNO). Unlike the “big three” these mobile carriers are not hindered by the limits of their own towers, coverage, and networks. Rather, MVNOs can utilize the networks of all three of the big-three carriers simultaneously. The MVNO <span style="font-style:italic;">is</span> the mobile carrier from the customer perspective but MVNOs are able to pool minutes and data across all three major carriers and give you far more flexibility for each of your corporate mobile users. MVNOs also purchase enormous amounts of data and minutes from these main carriers at the wholesale-level, so they can pass on significant savings and unique plans to customers. Switching to an MVNO can often save customers 25 to 40% on corporate mobile plans.</span></p><p><span style="color:inherit;"><br></span></p><p><span>Cloud 9’s in-house team of vendor-neutral mobility and IoT experts can help find the right options for you and the best vendors to fulfill the plan.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="font-weight:700;font-size:16px;">Migrate to SD-WAN and/or SASE Where Possible</span></p><p><span style="font-weight:700;font-size:16px;"><br></span></p><p><span>Far too many companies are still using old, limited, and very expensive MPLS, Point-to-Point, and other legacy and carrier-based, WAN technologies where some will limit speeds to guarantee quality. SD-WAN can help companies leverage nearly any type of available connection, including inexpensive and very fast broadband connections, that emulate and often exceed MPLS quality, with massive increases in speed at far less cost. It accomplishes this by controlling and strategically allocating multiple connected links, for peak performance and maximum cost savings, across an entire global network. In many instances, it could make sense to replace expiring MPLS contracts that customers have with the large telcos with SD-WAN.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span>Some SD-WAN service providers can add their service to augment an existing MPLS network, increase its speed, agility, and uptime, and make the transition far easier when it’s time to dump the MPLS. Enterprises with a need for global WAN should especially pay attention to SDWAN and SASE solutions.</span></p><p><span style="color:inherit;"><br></span></p><p><span>A relatively new term, coined by Gartner, Secure Access Service Edge or SASE (pronounced “sassy”) might be considered the next-generation of SDWAN, bringing with it a host of advanced security features. While SASE and SDWAN can exist separately they work exceptionally well together, like bread and butter. SASE is especially appealing to hybrid, remote, distributed enterprises. In addition to next-gen firewall capabilities, SASE adds a special gatekeeper where users and their requests for data will be stopped to check for correct identity and access. This gatekeeper is much smarter than a typical firewall alone and can deploy stateful filtering by examining the data inside the requests and make intelligent decisions based upon these values.</span></p><p><span style="color:inherit;"><br></span></p><p><span>Cloud 9 employs a team of unbiased network, connectivity, and WAN experts to help clients sort out all the options, choices, variants, and vendors in both the SASE and SDWAN markets. Our vendors are Gartner quadrant leaders and others and thoroughly vetted and scrutinized.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="font-weight:700;font-size:16px;">Revisit SIP</span></p><p><span style="font-weight:700;font-size:16px;"><br></span></p><p><span>For enterprise customers that still run on-premise PBX systems and trying to get the most out of those investments, it’s time to pull out that last bill. Session Initiation Protocol (SIP) trunk pricing has substantially decreased in recent years, providing another easy target for cost-savings. Cloud 9’s communications and telecom experts can help sort out the best options for you.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="font-weight:700;font-size:16px;">Explore Mid-Term Renewal</span></p><p><span style="font-weight:700;font-size:16px;"><br></span></p><p><span>Another way to save money is to lock in today’s rates and by committing to a longer-term with a telecom provider. This is called mid-term renewal, and it’s a strategy that companies tend to overlook because they aren’t aware that it’s possible.</span></p><p><span style="color:inherit;"><br></span></p><p><span>Cloud 9 Advisers can help negotiate telecom rates, positioning customers for long-term financial savings on essential services.</span></p><p><span style="color:inherit;"><br></span></p><p><span style="font-weight:700;font-size:16px;">Managed Services</span></p><p><span style="font-weight:700;"><br></span></p><p><span>Across the board, IT departments are understaffed, overworked, and exhausted right now — working nights and weekends to keep employees up and running on remote networks. COVID has been a nightmare for IT staff. Yet, most companies can’t afford to hire more full-time IT due to the current economic climate.</span></p><p><span style="color:inherit;"><br></span></p><p><span>One approach is to keep a small core of IT staff and then augment them with help from third-party managed service providers at a fraction of the cost. Managed services can be used for everything from helpdesk support to network security to WAN management. This is a flexible, affordable, and scalable approach to specialized help or for general, broad-based IT support. Cloud 9 offers a wide range of managed services from a robust portfolio of providers such as Synoptek, Thrive Networks, Quest Technology Management, Netrio, and Splice.</span></p><p><span style="color:inherit;"><br></span></p><p><span>A Managed Security Service Provider (MSSP), as defined by Gartner, provides outsourced monitoring and management of security devices and systems. Common services include managed firewall, intrusion detection, virtual private network, vulnerability scanning, and antiviral services. MSSPs use high-availability security operation centers (SOC) to provide 24/7 services designed to reduce the number of operational security personnel an enterprise needs to hire, train and retain to maintain an acceptable security posture.</span></p><p><span style="color:inherit;"><br></span></p><p><span>Most MSSPs go much further than just monitoring to provide full risk and security assessments, penetration testing, and remediation services. The MSSP can provide significant peace-of-mind to executives, get organizations compliant, and be a significant load off in-house IT that likely doesn’t have the training or expertise to perform high-level security strategies and tactics suited from many enterprises.</span></p><p><span style="color:inherit;"><br></span></p><p><span style="font-weight:700;font-size:16px;">Re-think and Consolidate Maintenance Agreements</span></p><p><span style="font-weight:700;"><br></span></p><p><span>Telecom hardware and other system maintenance agreements typically arise once every few years. And while they’re necessary for system stability and performance, they’re also costly —and companies tend to pay far too much.</span></p><p><span style="color:inherit;"><br></span></p><p><span>Consolidating multiple system maintenance agreements may reduce costs by up to 25%. Work with Cloud 9 to find appropriate third-party maintenance &amp; support providers to consolidate agreements and improve terms and service.</span></p><p><span style="color:inherit;"><br></span></p><p><span style="font-weight:700;font-size:16px;">Deploy Automated Assistants</span></p><p><span style="font-weight:700;"><br></span></p><p><span>As we mentioned, CFOs are looking to reduce Customer Experience (CX) spend to save money. However, this can be risky. Customers still expect reliable service, even during challenging times. Many recent surveys reveal that customers reward businesses that meet them when, where, and how they want. Customers want to look up, research, explore, and ultimately buy the way that best suits them, The demand for seamless service hasn’t gone away —and certain technologies can boost CX while allowing companies to re-allocate staff members to tackle more pressing needs.</span></p><p><span style="color:inherit;"><br></span></p><p><span>Tasks like answering phones and chat help, for instance, can now be off-loaded using virtual live-answer receptionists and chat assistants. Sometimes referred to as an “answering service”, these automated assistants don’t come with any additional salary or benefits but come to you as a service and as a virtually unlimited team to provide 24/7 customer support by highly trained humans!</span></p><p><span>Other, more involved, considerations might be to look at Business Process Outsourcing (BPO). These services can off-load many tasks including customer service itself. Domestic and international staff augmentation is available by highly trained and certified professionals, medical billing experts, and even registered nurses.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span>Cloud 9 Advisers specializes in communications technology and solutions related to Customer Experience and Contact Center to help clients rationalize and reduce technology spending without sacrificing technology itself.&nbsp;</span></p><p><span>&nbsp;</span></p><p><span style="font-weight:700;font-size:16px;">Explore the Internet of Things (IoT)</span></p><p><span style="font-weight:700;"><br></span></p><p><span>It may seem hard to justify spending money on new connected technologies right now. However, certain IoT solutions can prove to make a big difference in reducing operational costs, especially when deployed on a large scale.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span>For example, an HVAC &amp; Refrigeration company that services restaurants and grocery stores may use connected sensors to monitor and control refrigerator and freezer unit temperatures and other critical metrics across all of its serviced customers — based on certain thresholds, the company would be able to better predict when units need maintenance, reducing the need for costly manual inspections and wasted truck-rolls, and greatly improved customer service.</span></p><p><span style="color:inherit;"><br></span></p><p><span>Other examples include trash dumpster load sensors, moister, humidity and water leak detectors for a range of applications, and numerous “smart building” solutions that produce immediate and obvious cost savings.</span></p><p><span style="color:inherit;"><br></span></p><p><span>IoT costs have also fallen in recent years, and connected technologies are now very accessible to businesses of all sizes and budgets. Making a small technology investment now could produce significant financial savings and ROI in a short time.</span></p><p><span style="color:inherit;"><br></span></p><p><span>Contact our Mobility/IoT experts to learn more about creative ways to apply IoT.&nbsp; in your business.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="font-weight:bold;font-size:16px;">Be Innovative</span></p><p><span style="font-weight:bold;"><br></span></p><p><span>It’s normal during strange and unusual times like these to be conservative, but it is clear at this point that the pandemic isn’t going anywhere and when it is finally over everything will be different in many respects. We can no longer consider it a temporary setback. It’s time to review, rethink, and revise. Even minor investments in smart innovations will make a huge impact.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span>A conservative mindset to protect spend and budgets is absolutely the right emotion; however, leaders that take this catalyst to find new and creative ways to accomplish critical tasks, saving money doing so, and enable their companies to take advantage of new technologies to make them more competitive will have powerful advantages over their competitors that attempt to survive the status quo.</span></p><p></p><p></p><div><span style="font-size:12pt;"><br></span></div><p></p><p></p><p></p><p></p><p><span style="color:inherit;"></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p><span style="color:inherit;"></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p></p><p></p><p></p><p><span style="color:inherit;"></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p><span style="color:inherit;"></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p><span style="color:inherit;"></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p><span style="color:inherit;"></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p></p><p></p><p></p><p><span style="color:inherit;"></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p><span><span style="color:inherit;"></span></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p><span style="color:inherit;"></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p><span style="color:inherit;"></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p></p><p></p><p></p><p><span style="color:inherit;"></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p><span><span style="color:inherit;"></span></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p><span style="color:inherit;"></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p><span><span style="color:inherit;"></span></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p></p><p></p><p></p><p><span><span style="color:inherit;"></span></span></p><p></p><p><span style="color:inherit;"></span></p><p></p><p></p><p></p><p><span style="font-size:15px;"><span style="color:inherit;"></span></span></p></div>
</div></div><div data-element-id="elm_DgP8c1dxT8Z1fIbfDdUcgw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_DgP8c1dxT8Z1fIbfDdUcgw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_PLOtJ1fXXutF5T8Ho0pEPw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_PLOtJ1fXXutF5T8Ho0pEPw"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_FHt2fWEWJ4Zuz_SKTq2AQg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FHt2fWEWJ4Zuz_SKTq2AQg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Cloud 9 Advisers helps business leaders and understaffed IT teams that need a strategic partner, not just another vendor. We help decision-makers buy the right technology solutions and not “get sold” on the wrong ones. We work with you to rationalize and reduce technology spending without sacrificing technology itself and employ sound digital transformation principles and strategies.</div><p><br></p><div>We do not sell solutions, we help you buy the right solutions. We are not a vendor, we help you find the right vendors. We facilitate decisions by diagnosing problems then prescribing the right procedures and “medication”.&nbsp;</div><p><br></p><div>We are impartial, unbiased, and vendor-neutral technology practitioners with expertise in four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. Our proprietary software contains decades of data and analytics on all of the 250+ vendors in our Supplier Portfolio. We’ll help you quickly identify, research, evaluate, and compare appropriate solutions and vendors; eliminating months of labor trying to do it on your own. We’ll help you make confident decisions quickly.</div><p><br></p><p><span style="font-size:11pt;">To learn more about any of the topics, technologies, and solutions discussed in this article click on &quot;Get Started Now&quot;</span></p></div>
</div><div data-element-id="elm_pFJNoRYXSaKxH2-XeCZJ9w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_pFJNoRYXSaKxH2-XeCZJ9w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" title="contact us page"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 18 Feb 2021 15:03:35 -0500</pubDate></item><item><title><![CDATA[New WFH Workforce protections]]></title><link>https://www.cloud9advisers.com/News/post/new-wfh-workforce-protections</link><description><![CDATA[There may be some light at the end of this pandemic tunnel… Remote work has evolved into a permanent fixture and must be included in long-term planning. This introduces more risks around access as employees connect in new ways.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_gOkdvbyBQHmEWjHApA_8Yg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yKOJH6bdT4Kih8kIJe9BNg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_cu0WdtFoSMmdkIG_5G0nZg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_76bglzXFREWUAAmjFAUoPw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_76bglzXFREWUAAmjFAUoPw"].zpelem-heading { border-radius:1px; margin-inline-end:100px; margin-inline-start:100px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Tech and </span>Techniques<span style="color:inherit;">&nbsp;to Protect the New WFH Workforce</span></h1></div>
<div data-element-id="elm_gcpkrgEkLQamaqvEWaQIKQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gcpkrgEkLQamaqvEWaQIKQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;font-size:18px;">Even if the pandemic ends tomorrow, everything has changed. It’s time to revisit, rethink, and revise. A look at a few technologies to better secure systems, data, and a permanent home-based/hybrid workforce.</span><br></p></div>
</div><div data-element-id="elm__Pb-ylLvJSD-xb-PJzIf3w" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm__Pb-ylLvJSD-xb-PJzIf3w"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/WFCS-1.jpeg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_qR7Kf7k6Tu2pp0eKBQIphg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qR7Kf7k6Tu2pp0eKBQIphg"].zpelem-text { border-radius:1px; margin-block-start:22px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;font-size:18px;">Remote work has evolved into a permanent fixture and must be included in long-term planning. This introduces more risks around access as employees connect in new ways.</span><br></p></div>
</div><div data-element-id="elm_iwvkwHvYmsrlUt5gSyTMEg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_iwvkwHvYmsrlUt5gSyTMEg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_iwvkwHvYmsrlUt5gSyTMEg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_umLn4meYqa32K95-tLgY6g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_umLn4meYqa32K95-tLgY6g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_xzz7Ap_QxTWfrfeJ-b-mkg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_xzz7Ap_QxTWfrfeJ-b-mkg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_lXzHN7r4Qcla3nvsYpHnmA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lXzHN7r4Qcla3nvsYpHnmA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:15px;">There may be some light at the end of this pandemic tunnel… oh wait, no. That’s just a guy on a bicycle with a flashlight coming this way to tell us it ain’t over yet. Nevermind.&nbsp; ...but it is clear that many companies will never go back to demanding employees come to the office once this thing is finally over. The thought of not coming back to the office at all has crossed the minds of some owners, founders, and executives, leaving the open question “do we still need to pay all that money for all that space?”</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">We can no longer assume the current environment is temporary and we must start planning and investing accordingly. The systems and tools that once supported the occasional road-warrior workforce and coincidentally served companies so well during the initial season of COVID now need to be revisited, rethought, and revised.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The glorious benefits and ability to work from anywhere has been in the vernacular of tech company sales teams for ages now. I remember, just a few years ago, being required to chant “anytime, anywhere, any device” in every sales meeting I had back when I was pedaling phone systems. Even if it was just for a 50 site gas station franchise.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Once relegated to traveling executives and sales teams, now the anytime, anywhere, any device mantra is the prevailing, and often only, option for many people. But enterprise tech needs to go much further than a decent cloud phone system and a VPN connection if companies want to pivot and make real and lasting changes.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Digital transformation is the promise of fundamentally changing how businesses operate and deliver value to customers by integrating “digital” into all areas of the business. It is no longer a distant pipe dream to keep pushing to the back burner. It is real, it is important, and it is necessary for change. Of the many categories, parts, and tactics to an overall digital transformation strategy, a solid security foundation might be the most important and therefore the best place to start.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Those systems and tools that once served so well in the beginning of the pandemic now need closer inspection. Creating an extended and enhanced secure foundation is critical. One that is nimble and flexible, able to support the “new normal” hybrid/remote workforce, able to provide access to all the company’s workflows, and enhance collaboration for dispersed teams.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The following sections are elements and excerpts from the article “6 top security technologies to protect remote workers” from our friends at <a href="https://www.csoonline.com">www.CSOonline.com</a> and written by Peter Wayner, Contributing Editor. We’ve embellished, elaborated, added, and removed some to fit here better. They illustrate a few basic security tools and technologies to support the new age of full-time and hybrid remote workers.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Multi-factor authentication (MFA)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">One of the first challenges will be identifying the users. The old-fashioned password may be sufficient within the confines of a trusted office but adding a layer of assurance is better. The simplest solution is to require a second level of authentication such as the employees’ mobile phones. Some service providers like 8x8, GoTo, Vonage, Ooma, and RingCentral offer a wide range of communications channels to users including business SMS text messaging.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">More sophisticated solutions use apps running locally on the mobile device that can generate single-use passwords based upon the time. Tools like Google Authenticator, DuoLingo, FreeOTP, and LinOTP store a shared secret when the user first initializes them and then uses this to generate a new password each time the user wants to log in.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">For the hyper-secure, there is increased interest in dedicated hardware tokens that apply all encryption and authentication algorithms inside a special piece of hardware. Tools like the RSA SecurID, Yubikey, or Onlykey aren’t susceptible to attacks that are able to infiltrate the desktop or mobile operating systems. They offer increased security but at the cost of requiring users to juggle one more device.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Identity and access management</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The tools for multi-factor authentication (MFA) need to work closely with enterprise applications, and this is a challenge for in-house developers who will need to adjust the local codebase. Some teams are turning to identity and access management (IAM) services. They are often referred to as Identity as a Service (IDaaS) or authentication as a service (but AaaS is not really a thing)&nbsp; IAM is&nbsp; designed to be easily integrated into any codebase. Software from companies like Auth0 or Okta handles identity and access management with the best algorithms, allowing the in-house developers to concentrate on the business logic.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Auth0, for instance, offers a collection of quick-start examples that let a developer cut and paste a few lines of code and secure everything inside the application. The code from Auth0 adds a login dialog box and then the Auth0 servers check the password and enforce any stronger rules like a requirement for two-factor authentication. If you need to trigger a mobile app or send an SMS, Auth0’s servers do the work. When it is satisfied, it passes control back to your application.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Okta offers a similar set of services and likes to call its approach an “identity engine” for testing anyone who wants access. It rolls together a collection of authentication and management tools into a flexible pipeline that simplifies creating accounts and granting the owners correct access. The steps can be configured to include a variety of options like tracking the user’s specific laptop or phone to reduce the focus on the password alone.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The companies also simplify the work of juggling all the accounts by providing a dashboard for tracking users, adding new accounts and adjusting access roles. The developer can add a sophisticated layer that organizes both identity and authentication with the pre-tested code.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Zero Trust Network Access (ZTNA)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">If you use a virtual private network (VPN), you already know that you must be able to trust the endpoint. Keep in mind that just because the company bought the asset three years ago doesn’t necessarily mean that it is still a trusted endpoint.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">While still widely used, VPN itself leaves much to be desired and is beginning to show its age. Today, VPN is not the best model for a world where there are no clear lines that mark where the office begins and where it ends. Growing in popularity as an alternative, some organizations are adopting a zero-trust model, which assumes that all employees are logging in from a dangerous place like, say, a coffee shop whose WiFi is compromised by an evil hacker collective. ZTNA always assumes that all packets are flowing through enemy territory.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">This wary attitude is not just for bits and bytes traveling over the network. Many inward-facing applications are constructed with the assumption that they will live in a secure network because some firewall or other tool has filtered out dangerous packets. The old paradigm of a strong perimeter made it possible for application developers to ignore security concerns.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Moving to zero trust means shifting attitudes. Todd Thiemann, vice president of marketing at threat intelligence firm HYAS, says, “The perimeter is thoroughly dead. If you are relying on gateway security, you are not watching all the traffic flowing in and out of the work-from-home [and other remote] endpoints.”</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Secure Access Service Edge (SASE)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Another way to rework existing applications for staff on the open internet is to add a special gatekeeper where users and their requests for data will be stopped to check for correct identity and access. One growing architectural model for this kind of smart, pan-enterprise filter is a process that some vendors call “Secure Access Service Edge” or SASE (pronounced “sassy”). This gatekeeper is much smarter than a typical firewall and can deploy stateful filtering by examining the data inside the requests and make intelligent decisions based upon these values. SASE aims to remove the outdated idea of a site-centric network to a more user-centric approach.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">This new layer can be added to protect any of the various cloud and web services including many that might even be hosted outside the company. The user’s computer talks only to the SASE gatekeeper and the other services only answer to requests that have been checked by the SASE gatekeeper.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Solutions from companies like CATO Networks, Cloud Genix (Palo Alto), Open Systems, and others not only combine all the benefits of SDWAN and Next-Gen Firewall technologies but also track users over time and make decisions about access to all services even if they aren’t hosted in the same location or the same cloud.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Software-Defined Perimeter (SDP)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">If it isn’t evident by now, allow me to reiterate. Networks operate far differently than in the past and especially so these days. Considering the dramatic increase in and changing patterns of traffic; both internal and external, the traditional “fixed” perimeter is severely limited. The traditional perimeter usually and simply deemed the internal network as trustworthy and the external network as hostile. Visibility and accessibility were the basis of that traditional approach.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">SDP is an extension of an overall zero-trust methodology and effectively creates a new flexible network perimeter. Rather than a fixed, static perimeter, SDP functionality deploys multiple dynamic perimeters to account for cloud, multi-cloud, hybrid environments, and on-premise and heavily relies on two important things; authentication and authorization. SDP can also be especially useful for the required dynamic access of today’s (and tomorrow’s) mostly permanent remote workforce.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Cloud applications and storage</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Employees’ remote computers can’t become regular storage locations for sensitive documents and data. Employees should not be able to work with sensitive information with unencrypted thumb drives or other hardware and leave the data in locations where thieves could prey upon them. Ransomware continues to be a serious threat for destroying remote data.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Many companies are shifting to web-based office tools like Google Workspace (formerly G Suite) or Microsoft Teams where cloud storage with encryption is available. These platforms are very flexible, perfect for dispersed teams, and relatively easy to deploy to a large workforce, but the security details are still not completely understood. While the major companies employ large security teams, the model of shipping code to people’s browsers is still evolving. Google, for example, suffered an embarrassing leak of private documents. And Microsoft has had its share of awkward moments and outages.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">On the other hand, from a security perspective, these two giants have cleared several strict Federal cloud security programs like FedRAMP and others. FedRAMPs mission is to “promote the adoption of secure cloud services across the Federal Government by providing a standardized approach to security and risk assessment.” Ultra-security conscience agencies and contractors often rely on FedRAMP approved vendors and service providers because of the strict minimum standards required.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">TLS certificates</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">When employees log in remotely, they should use encrypted connections. Make sure websites have updated TLS certificates and the sites use HTTPS for all communications. Installing certificates to enable encrypted web connections couldn’t be easier thanks to the efforts of projects like Let’s Encrypt. Certificates offering more elaborate guarantees like organization are found with other certificate authorities like DigiCert, GeoTrust and Comodo. Many cloud providers and colocation services will resell certificates.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Review assumptions about remote security</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Some of the most important steps are not technical; they’re emotional and personal. “Everybody went home very rapidly and now I think we're in an era where we have to formalize procedures,” says Greg Conti, a co-founder of cybersecurity research firm Kopidlon. “We can’t assume it's temporary, then we need to develop policies for the long haul.&quot;&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">One important premise behind digital transformation is user and customer accessibility. The best foundation for digital transformation is “distributed” security. The best strategy for security is a layered approach. Combining a few, or in some cases all, of the technologies and techniques here may be the right approach for your organization. For example ZTNA and SDP work well together, when done right. In many instances, these technologies can completely replace existing legacy solutions and methodologies. Caution should be taken so that things don’t get unnecessarily complicated and undermine goals and objectives..&nbsp;</span></p><p style="margin-bottom:10pt;"></p><p style="margin-bottom:10pt;"></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span><span style="color:inherit;"></span></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Everyone should pause and revisit all decisions made in haste. The pandemic forced everyone to act quickly and in some cases rashly. It’s no longer a matter of holding on until this thing is over. Even if it’s all ends tomorrow it has changed everything and those changes aren’t going away.</span></p><p style="margin-bottom:10pt;"></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;"><span style="color:inherit;"></span></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span><span style="color:inherit;"></span></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;"><span style="color:inherit;"></span></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;"><span style="color:inherit;"></span></span></p><div></div>
<p></p><p><span style="font-size:15px;"><span style="color:inherit;"></span></span></p></div>
</div></div><div data-element-id="elm_f7K7eJjHlgYw6e-1oTIOEg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_f7K7eJjHlgYw6e-1oTIOEg"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_g-T-HgQvSlz8clQaDUusZw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_g-T-HgQvSlz8clQaDUusZw"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_HHGclGAVB56BMinShtsYYg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HHGclGAVB56BMinShtsYYg"].zpelem-text { border-radius:1px; margin-inline-end:60px; margin-inline-start:60px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="color:inherit;"><div>Cloud 9 Advisers helps business leaders and understaffed IT teams that need a strategic partner, not just another vendor. We help you buy the right technology solutions and not “get sold” on the wrong ones. We work with you to rationalize and reduce technology spending without sacrificing technology by employing sound digital transformation principles and strategies.</div><div><br></div><div>We do not sell solutions, we help you buy solutions. We are not a vendor, we help you find the right vendors. We facilitate decisions by diagnosing the problems and pains you’re currently facing then prescribing the right procedures and “medication”.&nbsp;</div><div><br></div><div>We are impartial, unbiased, and vendor-neutral experts in Cybersecurity, Communications, Connectivity, and Cloud technologies and solutions. Our proprietary software contains decades of data and analytics on all of the 250+ vendors in our Supplier Portfolio. We will quickly discover, refine, then match your requirements with the vendors’ capabilities; eliminating months of research trying to do it on your own.&nbsp;</div><div><br></div><div>Contact us and book an appointment today to learn more</div></span></div>
</div></div><div data-element-id="elm_4_ArpSxEQo29V4AfwGb_Fw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_4_ArpSxEQo29V4AfwGb_Fw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 12 Feb 2021 12:20:10 -0500</pubDate></item><item><title><![CDATA[SASE for Security]]></title><link>https://www.cloud9advisers.com/News/post/sase-for-security</link><description><![CDATA[Because of SASEs agility, security and 'no hardware' for remote users montra, companies formerly on the fence are quickly falling to the 'adopt now' side.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_FM7eJ5bRS7uRYCkDttmpZw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_tyX08GnORE-boF7wOYkkqg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_wfKpoEWSQriTCAIg9o49eQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_nRVHQAoESRWGRcF4E_mPVQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_nRVHQAoESRWGRcF4E_mPVQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:36px;">Companies look to SASE to bolster security for remote workers</span></span></h2></div>
<div data-element-id="elm_crjaM4hDP3zgE1uKVma9QQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_crjaM4hDP3zgE1uKVma9QQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Cloud9-Get-SASE-for-Security-GettyImages.jpg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_GTqdU4joT6SwWyDrb7qsmg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GTqdU4joT6SwWyDrb7qsmg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><span style="font-size:20px;">Surge in telework drives interest in Secure Access Service Edge (SASE), which combines SD-WAN capabilities with network security services.</span></div></div>
</div><div data-element-id="elm_4Dj8sMAD85LMW-vuFt5SfQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_4Dj8sMAD85LMW-vuFt5SfQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_RCOc0cMz9vuPqcg9a245mg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_RCOc0cMz9vuPqcg9a245mg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_m5epAFDbk4Z4VjZL84HRtg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_m5epAFDbk4Z4VjZL84HRtg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:10px;">From our friends at Network World</span></div><div><div><span style="font-size:10px;">By Maria Korolov, Contributing Writer, Network World, see the original article<a href="https://www.networkworld.com/article/3545778/enterprises-look-to-sase-to-bolster-security-for-remote-workers.html?utm_source=Adestra&utm_medium=email&utm_content=Read%20more%3A%20Enterprises%20look%20to%20SASE%20to%20bolster%20security%20for%20remote%20workers&utm_campaign=IDG%27s%20Top%20Enterprise%20Stories&utm_term=Editorial%20-%20IDG%27s%20Top%20Enterprise%20Stories&utm_date=20200528151031" title=" here" target="_blank"> here</a></span></div></div></div>
</div><div data-element-id="elm_wJMGzZF0T18RI9ZP2UW_mQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wJMGzZF0T18RI9ZP2UW_mQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:16px;">Last summer, Gartner estimated SASE adoption at less than 1% of enterprises and said it would take five to 10 years before the technology&nbsp;<a href="https://www.gartner.com/doc/reprints?id=1-6QW0Z4A&ct=190528&st=sb" rel="nofollow">reaches mainstream</a>. But today, SASE is one of the&nbsp;<a href="https://blogs.gartner.com/john-wheeler/top-ten-gartner-client-topics-for-emerging-technologies-q1-2020/" rel="nofollow">main topics</a>&nbsp;of client interest, according to Gartner analyst John Wheeler.<br></p><div>Gartner coined the term SASE, pronounced &quot;sassy,&quot; to describe a technology category that converges network and security services, including SD-WAN, secure web gateway (SWG), cloud access security broker (CASB), DNS protection, and cloud-based firewall. COVID-19 has boosted interest in SASE as enterprises scramble to support a suddenly remote workforce. The surge in telework has taxed legacy network architectures that depend on traffic being routed through the enterprise data center for inspection. With SASE, access decisions are based on user identity and enforced at the endpoint, while policies are centrally defined and managed in the cloud. (Read more about how SASE works here)</div><div><br></div><p style="margin-bottom:16px;">&quot;Companies that were on the fence about whether to upgrade to SASE, they're falling over to the 'adopt now' side,&quot; says Zeus Kerravala, founder and principal analyst at ZK Research. &quot;If I'm trying to move to a modernized application infrastructure, why am I still using a network architecture designed for client-server from 30 years ago? A lot of my apps are now in the cloud, I've got people working from everywhere. This transition would have happened with or without the pandemic, but the pandemic has accelerated it.&quot;</p><div>While it's too early to tell if adoption spikes will continue after the pandemic abates, individual SASE vendors are reporting dramatic changes so far. Versa Networks, for example, saw remote user traffic increase by 800% to 900% since the pandemic hit. &quot;Around March 22 is when we began to see these stats appear at this level,&quot; says Mike Wood, Versa Networks' CMO.<br></div><p style="margin-bottom:16px;"><br>Sanjay Uppal, senior vice president and general manager of the VeloCloud business unit at VMware, says that use of the company's SASE network has gone up five-fold since the pandemic hit. &quot;It's a dramatic increase,&quot; he says. &quot;We had one company that has deployed 5,000 employees at home in less than one week. Another customer called up and said they had to send 500 nurses and diagnosticians [to work from] home.&quot;</p><div>Anand Oswal, senior vice president of product management and engineering for firewall as a platform at Palo Alto Networks, says that more than 1,000 trials have been activated of the company's Prisma Access SASE platform in response to the pandemic.</div><p style="margin-bottom:16px;"><br></p><p style="margin-bottom:16px;"><span style="color:inherit;font-weight:bold;font-size:18px;">Networking without new hardware&nbsp;</span></p><p style="margin-bottom:16px;">For new SASE customers, the biggest delay is typically on the hardware side. Employees may need new SASE edge devices to handle networking and security in employee homes. In addition, corporate data centers may need new hardware to connect to the SASE networks.</p><p style="margin-bottom:16px;">But there are also ways to deploy SASE without any new hardware. CloudCheckr, a 200-person software company that makes cloud management tools, uses Zscaler's SASE platform to connect its employees to the cloud services they need to do their jobs, including AWS infrastructure, in a secure way.</p><div>CloudCheckr is entirely cloud-based, says Travis Rehl, senior director of product at the Rochester, N.Y.-based company. &quot;We have no servers, no routers, nothing in our offices,&quot; he says.</div><div><br></div><div>Meanwhile, when at home, employees don't require any additional network or security devices either. &quot;We don't use printers or other devices much,&quot; Rehl says. &quot;Besides laptops, the only other thing people brought home was monitors, but that isn't a network device.&quot;</div><div><br></div><div>So, on the user side, the SASE client could be all software.</div><div><br></div><div><span style="color:inherit;"><div>Before the pandemic hit, half of CloudCheckr's employees were working remotely, using the Zscaler SASE platform for the only home SASE connection. Teleworkers used laptops that had the Zscaler client installed on the machine, with no additional hardware necessary.</div><div><br></div><div>Traffic would be routed from the employee directly to the Zscaler network. &quot;We did not go through the corporate network,&quot; Rehl says.</div><div><br></div><div>Zscaler would then route the traffic directly to the cloud apps that the employees were accessing.</div><div><br></div><div>Because the SASE infrastructure was already in place, the transition to a fully work-from-home workplace was seamless. The employees already had company-issued laptops, and all that was needed was the client software. Other than an additional authentication step when signing in from home for the first time, employees get the same exact work environment as they would in the office, Rehl says. &quot;We had zero downtime for our teams because we were all set up already,&quot; he says. &quot;People just went home.&quot;</div><div><br></div><div>When first logging into the network, the employees would need to authenticate once to the Zscaler system, which then controlled the traffic flow to the applications specific to each particular employee, he says. That's the same as the process that was in place before the pandemic.</div><div><br></div><div><div><span style="color:inherit;font-weight:bold;font-size:18px;">SASE enables agility</span><br></div></div><div><span style="color:inherit;font-size:18px;"><span style="color:inherit;"><div><div><span style="color:inherit;"><span style="color:inherit;"><div><span style="font-size:15px;">Speed of deployment has been a big draw for companies that turned to SASE as COVID-19 disrupted work patterns.</span></div><div><br></div><div><span style="font-size:15px;">&quot;One organization we work with had 95% of their employees coming into an office, sitting in a cubicle, and working on premises,&quot; says Jeremy Nelson, director of networking services at Tempe, Ariz.-based Insight, a technology consulting and system-integration firm. &quot;They had to go to only 5% of the workforce in the office, the ones with essential functions that require them to come on-premises. Now we have people trying to access applications that they never had to access remotely before.&quot;</span></div><div><br></div><div><span style="font-size:15px;">That company didn't have the broadband capacity in their traditional data center to handle the increase in remote traffic, and it would have taken several weeks to provision new circuits from their service providers. By deploying SASE, they were able to leverage the infrastructure of their vendor's cloud-based platform. &quot;It was highly flexible, scales based on user access, and would only route traffic to the destinations it needed to go,&quot; Nelson says. And the deployment took about two weeks, he says.</span></div><div><br></div><div><span style="font-size:15px;">Nelson warns, however, that not all SASE platforms are created equal. &quot;There are gaps in each individual offering,&quot; Nelson says. &quot;You'll hear that they have the entire SASE thing solved end to end, but it's still very much a best-of-breed approach, as opposed to being wholly holistic.&quot;</span></div></span></span></div></div></span></span></div></span></div></div>
</div></div><div data-element-id="elm_MzelVNYMd88ugL-2LI1zFA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_MzelVNYMd88ugL-2LI1zFA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jJTH662-_utp0M_iR0NEtQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_jJTH662-_utp0M_iR0NEtQ"] div.zpspacer { height:534px; } @media (max-width: 768px) { div[data-element-id="elm_jJTH662-_utp0M_iR0NEtQ"] div.zpspacer { height:calc(534px / 3); } } </style><div class="zpspacer " data-height="534"></div>
</div><div data-element-id="elm_aCkVO9Pc9Pkk5Gf1ipBG-w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_aCkVO9Pc9Pkk5Gf1ipBG-w"].zpelem-imagetext{ border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p>We are experts. Learn more about SASE, Cybersecurity, SDWAN, and more from a vendor-agnostic and neutral third-party, for free.&nbsp;</p><p><br></p><p>Our engineering and design team will help you discover the right solution, the right providers, and we'll fight to get you the best pricing and terms.&nbsp;</p><p><br></p><p>Skip the long, impersonal, and entirely unnecessary RFP process. Cloud 9 will satisfy your due diligence requirements and find you the perfect solution, for free.</p><p><br></p><p>Here are just a few of SASE / SDWAN suppliers in our portfolio:&nbsp;</p><p></p><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p>Aryaka</p><p>Barracuda&nbsp;</p><p>Bigleaf Networks</p><p>Cato Networks</p><p>CloudGenix</p><p>Ecessa</p><p>Fortinet</p><p>Masergy</p><p>MetTel</p><p>Nitel</p><p>Open Systems</p><p>Palo Alto Networks</p><p>QOS Networks</p><p>SimpleWAN</p><p>Versa Networks</p><p>Velocloud (VMware)</p><p>Zenlayer</p></blockquote><br><p></p><p>Learn more and find out if SASE or SDWAN is right for your business.</p></div>
</div></div><div data-element-id="elm_95lHEZYVGsIm0xIw24Ftjg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_95lHEZYVGsIm0xIw24Ftjg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-full-width " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about SASE" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn more about SASE / SDWAN</span></a></div>
</div></div></div><div data-element-id="elm_T8mnQftMQ9SCmCIlne46WQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_T8mnQftMQ9SCmCIlne46WQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-full-width " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about SASE" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9 to learn more about SASE</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 28 May 2020 21:00:59 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: ECESSA]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-ecessa</link><description><![CDATA[You may be able to get all the bandwidth you need from one provider, on one circuit, but that introduces a huge risk of network outages. Fiber is great, but it’s not invincible! Being single-threaded puts you just one backhoe mishap or transformer explosion away from extended, expensive downtime.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_MVE6g-InT_-OnyS0SZ7lsw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2ScaT640RnGh7nO8Ke88Ow" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ivSAehZyS064VbPRYBZMHw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_4VdH17AoTzeS5SsWr_uG7g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4VdH17AoTzeS5SsWr_uG7g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">You Need More Than Just Fiber in Your Diet!</span></h2></div>
<div data-element-id="elm_yyqPPgGzK80j_uHPPml5dg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_yyqPPgGzK80j_uHPPml5dg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/54e0d2444355aa14f6da8c7dda79367f103cd9ed55536c4870277ad1944dcd58bf_1280.jpg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_JYuycZzUs_wErdSCYxNJ3g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JYuycZzUs_wErdSCYxNJ3g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:18px;">Cloud 9 Supplier Spotlight:&nbsp; <span style="font-weight:bold;"><a href="https://www.ecessa.com/" title="ECESSA" target="_blank">ECESSA</a></span></span></p></div>
</div><div data-element-id="elm_eKM7knIzWNLSvvmxvzprag" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_eKM7knIzWNLSvvmxvzprag"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.ecessa.com/" target="_blank" title="www.ecessa.com" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/SD%20ecessa.jpg" size="original"/></picture></a></figure></div>
</div><div data-element-id="elm_D4XlaUyoNI_j1rB1RZyRmQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_D4XlaUyoNI_j1rB1RZyRmQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_GdnIlqHVKi9y-MMfwRsjFA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_GdnIlqHVKi9y-MMfwRsjFA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Uslcba_zGK6GTjFcJ32h2g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Uslcba_zGK6GTjFcJ32h2g"].zpelem-heading { border-radius:1px; margin-block-start:95px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">You Need More Than Fiber in Your Diet!</span></h2></div>
<div data-element-id="elm_rEq0vzhQRLrr-PapCu4dfQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rEq0vzhQRLrr-PapCu4dfQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:18px;font-weight:bold;">The Case for SD-WAN and Internet Redundancy</span></div></div>
</div><div data-element-id="elm_FTOI-5pQ2nbawTtC_nlcbQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FTOI-5pQ2nbawTtC_nlcbQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:12px;">By:&nbsp;<span style="color:inherit;">Mike Siegler, CEO, ECESSA</span></span></p></div>
</div><div data-element-id="elm_KsvpyfdA_Lh07pASnQMkHw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KsvpyfdA_Lh07pASnQMkHw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>These days, most organizations rely heavily on cloud-based services for everything from phones and email to billing, inventory management, customer relationship management, training and more. We are leveraging Software as a Service (SaaS) more and loading less onto local servers. As a result, bandwidth requirements have skyrocketed.</div><p><br></p><div>Fortunately, fiber optic and other Gig speed services are available in many areas around the globe. In fact, you may be able to get all the bandwidth you need from one provider, on one circuit. But that introduces a huge risk of network outages. Fiber is great, but it’s not invincible! On the contrary, being single-threaded puts you just one backhoe mishap or transformer explosion away from extended, expensive downtime.</div><p><br></p><div><span style="font-weight:bold;">Redundant Connections Are Essential</span></div><p>Networking best practices include installing redundant Internet connections from different providers and a device to facilitate automatic failover. The secondary connection doesn’t have to be as robust as your fiber ring – but it does need to handle core business functions while repairs are being made on that primary circuit. Remember, those repairs could take hours – or days.</p></div>
</div><div data-element-id="elm_DxsivLT1DZ5ugquM26m-0Q" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_DxsivLT1DZ5ugquM26m-0Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/underground-Fiber-Optic-Cable-Repair.jpg" size="original" data-lightbox="true" style="height:409px;width:727.22px;"/></picture></span></figure></div>
</div><div data-element-id="elm_gRoX9QxuoFLfGVTLmZa6kQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gRoX9QxuoFLfGVTLmZa6kQ"].zpelem-text { border-radius:1px; margin-block-start:4px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">It can often take&nbsp;<span style="font-style:italic;">days</span>&nbsp;to repair damaged fiber optic cables.&nbsp;</span></p></div>
</div><div data-element-id="elm_FeIRSsy6BgvqZYzjCq30vA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FeIRSsy6BgvqZYzjCq30vA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>This is particularly true for businesses with remote locations that rely on the HQ data center or the cloud for mission-critical resources. If the Internet connection goes down, so does access to vital business services. When the “beyond fast” service stops working, productivity grinds to a halt and users get beyond frustrated.</div><p><br></p><div>What does this mean for network infrastructure? It’s not safe to have a single Internet connection feeding an office, no matter how much bandwidth it supplies. Especially in the case of organizations that rely on Citrix, SaaS, UCaaS and other cloud-based services, provisioning multiple communication links from multiple providers is now an essential part of the technological infrastructure. If one carrier is having intermittent issues or their service drops altogether, you must have a secondary line from a diverse carrier onto which outbound and inbound traffic can failover.</div><p><br></p><div><span style="font-weight:bold;">The Case For Multiple Carriers</span></div><p>Even the most reliable telecommunications providers acknowledge some probability of service disruption. Most public broadband Internet providers do not offer any service level guarantees. Unless your area is hit with a major disaster like a hurricane or forest fire, it’s unlikely two providers will experience service issues at the same time. By leveraging two or more providers, organizations mitigate the risk of an outage or intermittent service disruptions. Redundancy and automatic link failover, provided by an intelligent SD-WAN controller, should be a critical piece of every organization’s business continuity planning, as well as a key to optimizing daily performance.<br></p><p><br></p><div><span style="font-weight:bold;">Leverage All The Bandwidth of Standby Links</span></div><div>When you move applications and services to the cloud to increase IT efficiency, you’ll need additional network bandwidth to ensure proper application performance. It doesn’t do much good to launch a cool new initiative only to have it creep, crawl or crash. So use all the bandwidth you have, all the time. Make a standby line an active part of your network.</div><p><br></p><div>It’s easy to manage multiple connections with an intelligent SD-WAN controller. This allows an organization to spread Internet traffic and user applications across all the communication links and use all the available bandwidth – up to 20 Gbps in the case of Ecessa solutions – all the time. If one line fails or suffers degradation, traffic is automatically moved from that line to the better performing lines until service is restored.</div><p><br></p><div><span style="font-weight:bold;">The Bottom Line – Keep Business in Business With Redundancy</span></div><div>An increase in Internet bandwidth and automatic failover to a secondary link ensures that staff members can carry out all their online processes, without delays or interruptions. As one of our customers put it, “My primary vendor had a fiber cut, which of course dropped our services immediately. The Ecessa appliance was flawless with all traffic switched over to the secondary service within a second. Guess what, exactly ZERO people called in about the outage! A couple months earlier and I would’ve had over 100 calls and been unable to do anything. Now it was (almost) a normal day. That was cool!”</div><p><br></p><div>Another client, Sunstone Circuits, shared a similar experience. Their fiber line was cut during bridge construction, but they were able to continue operations thanks to automatic failover. You can read how redundancy saved the day in their case study.</div><p><br></p></div>
</div></div><div data-element-id="elm_q2sLO5ngxoaRl8qdbL0Y2A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_q2sLO5ngxoaRl8qdbL0Y2A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_vJWRcBHlGU-w3j6Y6Y6SXA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_vJWRcBHlGU-w3j6Y6Y6SXA"] div.zpspacer { height:152px; } @media (max-width: 768px) { div[data-element-id="elm_vJWRcBHlGU-w3j6Y6Y6SXA"] div.zpspacer { height:calc(152px / 3); } } </style><div class="zpspacer " data-height="152"></div>
</div><div data-element-id="elm_VNn16wqIzNSBPF9wthLUkA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VNn16wqIzNSBPF9wthLUkA"].zpelem-text { border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; margin-block-start:422px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Find out more about Ecessa's Secure SDWAN for internet optimization and redundancy solutions by reaching out to Cloud 9 Advisers. Ecessa is one of only a handful of &quot;SDWAN-only&quot; and &quot;SDWAN-focused&quot; providers in the market today, where the only thing they do is SDWAN, and all of those providers are available through the Cloud 9 Supplier Portfolio. Contact Cloud 9 today to find out if SDWAN and Ecessa are right for your business.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_JSAex58uXecv15LADcGcOA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_JSAex58uXecv15LADcGcOA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div></div><div data-element-id="elm_AFWJb5iZ4mbfX4ykfp-HQA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_AFWJb5iZ4mbfX4ykfp-HQA"].zpelem-divider{ border-radius:1px; margin-block-start:38px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_CilD3zPiSIqXNBes3XqqjQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CilD3zPiSIqXNBes3XqqjQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Find out more about Ecessa's Secure SDWAN for internet optimization and redundancy solutions by reaching out to Cloud 9 Advisers. Ecessa is one of only a handful of &quot;SDWAN-only&quot; and &quot;SDWAN-focused&quot; providers in the market today, where the only thing they do is SDWAN,&nbsp;<span style="color:inherit;">and all of those providers are available through the Cloud 9 Supplier Portfolio</span>. Contact Cloud 9 today to find out if SDWAN and Ecessa are right for your business.&nbsp;</div></div>
</div><div data-element-id="elm_HklqIdekj0wdh2vldtU8gg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_HklqIdekj0wdh2vldtU8gg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dXxZM5wyyb31Rx_-FoEXYg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dXxZM5wyyb31Rx_-FoEXYg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_qh4MmTidbj8Uep8YgFz8gw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_qh4MmTidbj8Uep8YgFz8gw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-full-width " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more and see if Cloud 9 can help" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn more about ECESSA</span></a></div>
</div></div><div data-element-id="elm_SjhWCJ-8qAlNjocVI5Nyig" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_SjhWCJ-8qAlNjocVI5Nyig"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_gDlQMEqA6U2ryPX4WV82bA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_gDlQMEqA6U2ryPX4WV82bA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline zpbutton-full-width " href="/sdwan" target="_blank"><span class="zpbutton-content">Learn More about SD-WAN</span></a></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 12 Feb 2020 13:42:06 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Aryaka]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-aryaka</link><description><![CDATA[Today, most organizations are concluding that SD-WAN is the best way to add the controls necessary for the digital age. But, do you build your own SD-WAN or buy it as a managed service?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OEUqXd3aStuX8UaceNbNMQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_9c1PY-ZJS0m-221Cj-s8NA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_de_9MvQ6RtGcUnRmphhDoA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_SkZqBucE_pxJ45bT9N3K1Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_SkZqBucE_pxJ45bT9N3K1Q"].zprow{ border-radius:1px; } </style><div data-element-id="elm_pHWLJSoDByNjZMYpIZRc4Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_pHWLJSoDByNjZMYpIZRc4Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_aTE4VqAEzdTNqSWttWf8Zg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_aTE4VqAEzdTNqSWttWf8Zg"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Consume or Construct Your SD-WAN?</span></h1></div>
<div data-element-id="elm_eoaUvM4T2V6_wK_GflMQDA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_eoaUvM4T2V6_wK_GflMQDA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/house-of-cards-3894985_640.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_EcINu7GpMgJNb687I2e8ig" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EcINu7GpMgJNb687I2e8ig"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:18px;">Cloud 9 Supplier Spotlight:&nbsp; <a href="https://www.aryaka.com/" title="Aryaka" target="_blank" style="font-weight:bold;">Aryaka</a></span></p></div>
</div><div data-element-id="elm_HK9aCSKbBhWmFwn5msjoqQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_HK9aCSKbBhWmFwn5msjoqQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/SD%20aryaka%20logo.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_APXKHMw4gYgHRh1SvNgISQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_APXKHMw4gYgHRh1SvNgISQ"].zpelem-text { border-radius:1px; margin-block-start:39px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"><span style="font-weight:700;">The Cloud-First managed WAN</span></span><br></p></div>
</div><div data-element-id="elm_uEoTnqX97zKTnUUHUV_9qA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_uEoTnqX97zKTnUUHUV_9qA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Consume or Construct Your SD-WAN?</span></h2></div>
<div data-element-id="elm_vAy1DHlUmWUk593lgtXP9w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vAy1DHlUmWUk593lgtXP9w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">Why a Cloud-First Managed SD-WAN is Better than a DIY Approach</span></div></div>
</div><div data-element-id="elm_y8aLpbpn1XXSN51cU04cIQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_y8aLpbpn1XXSN51cU04cIQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:12px;"><span>By:&nbsp;</span><span style="color:inherit;">Syed Ghayur, Aryaka<br></span></span></p><div><span style="font-size:12px;">Syed is Vice President of Global Systems Engineering at Aryaka, and has over 20 years of experience within networking and engineering industries.</span></div></div>
</div><div data-element-id="elm_9Tl2yPY288BDvcZWp1f7Rw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_9Tl2yPY288BDvcZWp1f7Rw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>If your company is beginning to embark on a digital transformation journey, ultimately, you’ll have to confront the question of how to modernize the Wide Area Network (WAN) and ensure it is up to the task of supporting the transformation effort.</div><p><br></p><div>Today, most organizations are concluding that Software Defined-WAN (SD-WAN) is the best way to add the controls necessary for the digital age.</div><p><span style="color:inherit;"><br></span></p><div>The next question becomes, do you build your own SD-WAN (the DIY approach) or buy it as a managed service? While doing it yourself has been the go-to method for decades now, the transformation efforts sweeping through enterprises worldwide, and the shift to cloud, is causing a fundamental rethink of this approach.</div><p><span style="color:inherit;"><br></span></p><div>It comes down to this: If the goal is to move the organization from Point A to Point B, do you want to take the time to build the road to the new destination or get on a private fast lane quickly so you can focus on how to capitalize on the new capabilities?</div><p><br></p><div>In world of computing, that question has largely been answered: Companies are migrating en-masse to the cloud consumption model and getting out of the business of focusing capital expenses on infrastructure. They are using those resources instead to better serve customers, differentiate the organization, and grow the business. And increasingly, that model is proving to be the answer for SD-WAN as well.</div></div>
</div><div data-element-id="elm_Y6VbQ8TP0SKiaS1s1iokkg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Y6VbQ8TP0SKiaS1s1iokkg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Great Power Comes with Great Responsibility</span></h3></div>
<div data-element-id="elm_3Da3q9f0I9yejKx9aCWo9A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3Da3q9f0I9yejKx9aCWo9A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Large organizations may have sufficient IT resources and network infrastructure in place to deploy SD-WAN in-house, but this self-management of the network holds with it some great consequences, especially if you’re embarking on a large digital transformation strategy.</div><p><br></p><div>The DIY SD-WAN approach still places more of the headache to manage, maintain, and support the network on IT by introducing additional complexity on an existing network.</div><p><br></p><div>One CIO I spoke with recently said his IT department was managing over 21 MPLS providers worldwide. He felt his networking organization was feeling like a telco because they not only have to manage and maintain these contracts, they must also deal with Internet providers, plus configure WAN optimization and SD-WAN devices at each location. Then they had to buy and implement monitoring software to check the health of their network. On top of all that, everything has to be re-configured each time a new application rolls out.</div></div>
</div><div data-element-id="elm_3yCxslQy1l46S1ScFjwNzA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3yCxslQy1l46S1ScFjwNzA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>Do-It-Yourself SDWAN</p></div>
</div><div data-element-id="elm_ZjMNH6fWlj6jnrjqRRE0pA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_ZjMNH6fWlj6jnrjqRRE0pA"].zpelem-image { border-radius:1px; margin-block-start:3px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Aryaka-DIY%20SWAN.png" size="original" alt="Do-It-Yourself SDWAN" data-lightbox="true" style="height:412px;width:689.35px;"/></picture></span></figure></div>
</div><div data-element-id="elm_2oxi5NVMKiteMJaHZWIcCA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_2oxi5NVMKiteMJaHZWIcCA"] div.zpspacer { height:85px; } @media (max-width: 768px) { div[data-element-id="elm_2oxi5NVMKiteMJaHZWIcCA"] div.zpspacer { height:calc(85px / 3); } } </style><div class="zpspacer " data-height="85"></div>
</div><div data-element-id="elm_fFUZaoby44xh2KSVr8f4DQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fFUZaoby44xh2KSVr8f4DQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>Aryaka, Cloud-First, Managed SDWAN</p></div>
</div><div data-element-id="elm_OyFmeo5rp5NXxL8x5CmpoA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_OyFmeo5rp5NXxL8x5CmpoA"].zpelem-image { border-radius:1px; margin-block-start:-3px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Aryaka%20Mgd%20SDWAN.png" size="original" alt="Aryaka, Cloud-First, Managed SDWAN" data-lightbox="true" style="height:450px;width:688.2px;"/></picture></span></figure></div>
</div><div data-element-id="elm_Ei2cEFl_e2rR4yYoQ2iEoA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ei2cEFl_e2rR4yYoQ2iEoA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>The task of maintaining the scenario above is a full-time task for any IT department. There’s hardly any room left for more strategic initiatives in a digital transformation strategy.</div><p><br></p><div>The task of maintaining the scenario above is a full-time task for any IT department. There’s hardly any room left for more strategic initiatives in a digital transformation strategy.</div><p><span style="color:inherit;"><br></span></p><div>If your enterprise is aiming to transform into a global digital powerhouse, here’s why SD-WAN delivered as a fully managed service would be right for you:</div><div><ul><li><span style="font-weight:bold;">Time to value</span>. The DIY approach to SD-WAN requires your IT department to learn about the technology, analyze the players, and procure and deploy the equipment in-house. Buying SD-WAN as a managed service gets you up and running in a fraction of the time, usually in days. Your staff doesn’t need to become network experts, learn how to operate the equipment, or troubleshoot the network. With a managed SD-WAN as a Service, all they need to do is learn how to use a single network portal to assess their needs.</li><li><span style="font-weight:bold;">Built-in capabilities</span>. Any DIY approach will typically require sets of ancillary tools to optimize and secure the network to meet the organizational needs. That adds additional cost and complexity, and makes the initial learning curve even steeper, slowing implementation.<br></li><li>A <span style="font-weight:bold;">cloud-first SD-WAN</span> delivered as a service, such as one deployed by Aryaka, uses patented optimization technology that is baked into the network, providing faster application performance from anywhere in the world. Since we’re also in partnership with leading security firms, a number of best-of-breed security options are available that can be easily implemented.<br></li><li><span style="font-weight:bold;">Cloud off ramps</span>. If you are building the SD-WAN yourself, it will be up to you to figure out how to link the network to the increasingly long list of cloud/SaaS service providers the company uses. That becomes difficult if you have layered in multiple optimization and security boxes because the cloud/SaaS suppliers won’t accommodate those appliances.<br>As a managed service, Aryaka has connectivity into nearly every major cloud/SaaS application and can deliver secure, end-to-end optimized SD-WAN services directly into these mission-critical resources.</li><li><span style="font-weight:bold;">Problem resolution</span>. In the DIY SD-WAN world, you’ll be using a range of hardware from a mix of suppliers, as well as a variety of service providers. When issues crop up the potential for finger pointing is high, taxing your staff and prolonging problem resolution.</li><li><span style="font-weight:bold;">A key benefit we provide</span> at Aryaka is that the network is proactively monitored by a 24x7x365 support staff. If something goes wrong, we will likely notice it before you do. What’s more, we have the staff expertise to address issues quickly. For example, if there is a transport service issue, we have the end-to-end network visibility to identify exactly where the problem lies and the customer clout to hold the service providers accountable.<br></li><li><span style="font-weight:bold;">Performance</span>. Most all DIY SD-WAN kits use the public, best-effort Internet for transport, which is susceptible to latency and packet loss, particularly over longer spans. The result is long application response times, unpredictable application performance, and in the case of real-time collaboration tools, degraded voice/video calls, and dropped sessions.<br>Aryaka’s cloud-first SD-WAN service, delivered over a global private network and optimized end-to-end, makes it possible to deliver consist application performance for employees anywhere in the world, regardless if the application resource they’re using is hosted on-premises or in the cloud.</li></ul></div><div><br></div><div>The old model of building the network yourself is simply outdated as companies shift to consumption models for IT and focus on transformation. The simple fact of the matter is, just like your data center can’t compete with the capabilities and the pace of innovation delivered by the likes of Amazon AWS, Google Cloud, and Microsoft Azure, if you opt to build your SD-WAN, it won’t be as complete, agile and support as many functions as an SD-WAN delivered as a managed service.</div><p><br></p><div>In order to fully enable your company’s digital transformation, focus on what you do best and let a company that specializes in Global WAN services provide the highway to get you there.</div></div>
</div><div data-element-id="elm_BcUN5cCcPnlGLRnNzwlu_A" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_BcUN5cCcPnlGLRnNzwlu_A"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div><div data-element-id="elm_OrU_Qnwx6NzJq0pZDdXEWQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_OrU_Qnwx6NzJq0pZDdXEWQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_fGzSQphT2eRWv87zUYEMjw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_fGzSQphT2eRWv87zUYEMjw"] div.zpspacer { height:1021px; } @media (max-width: 768px) { div[data-element-id="elm_fGzSQphT2eRWv87zUYEMjw"] div.zpspacer { height:calc(1021px / 3); } } </style><div class="zpspacer " data-height="1021"></div>
</div><div data-element-id="elm_4zJFXIx9HDe2dGgiqEAE7w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_4zJFXIx9HDe2dGgiqEAE7w"].zpelem-imagetext{ border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; margin:10px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" alt="Technology Experts" data-lightbox="false" style="width:1800px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">Aryaka is one of our leading global SDWAN and high-performance middle-mile providers in the Cloud 9&nbsp;<a href="https://sitebuilder-662896043.zohositescontent.com/solutions">Supplier Portfolio</a>. Our curated list of over 200 companies provides all the recommended daily vitamins a growing company needs for their technology: Cybersecurity, Communications, Connectivity, and Cloud. Our SDWAN, SASE, network and cybersecurity experts are vendor-agnostic and will help uncover the right solutions and the right companies to explore for you needs. We can even help reduce your monthly technology operating costs and create new efficiencies you may have never thought possible.&nbsp;</span><br></p></div>
</div></div></div></div><div data-element-id="elm_9XIfHsTfQ3S5tpISQz0f6g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_9XIfHsTfQ3S5tpISQz0f6g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Aryaka is one of our leading global SDWAN and high-performance middle-mile providers in the Cloud 9&nbsp;<a href="https://sitebuilder-662896043.zohositescontent.com/solutions">Supplier Portfolio</a>. Our curated list of over 200 companies provides all the recommended daily vitamins and nutrients a growing company needs for their technology: Cybersecurity, Communications, Connectivity, and Cloud. Our SDWAN, SASE, network and cybersecurity experts are vendor-agnostic and will help uncover the right solutions and the right companies to explore for you needs. We can even help reduce your monthly technology operating costs and create new efficiencies you may have never thought possible.&nbsp;</span><br></p></div>
</div><div data-element-id="elm__rSEVtvaOnH8tUVp_EiKlA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm__rSEVtvaOnH8tUVp_EiKlA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_7kqOKfVqN1DOgosKQKfsaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_7kqOKfVqN1DOgosKQKfsaw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_VmTA0vcZKJsgYP5gq69pOg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_VmTA0vcZKJsgYP5gq69pOg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline zpbutton-full-width " href="/sdwan"><span class="zpbutton-content">SDWAN Overview</span></a></div>
</div></div><div data-element-id="elm_0W8maJAAeL2o8urtBd6P9g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_0W8maJAAeL2o8urtBd6P9g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_HWtKqEkLEbbUdzQS-4q6iQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_HWtKqEkLEbbUdzQS-4q6iQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-full-width " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about Cloud 9 and Aryaka" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn more about Aryaka</span></a></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 12 Feb 2020 12:20:48 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: CloudGenix]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-cloudgenix</link><description><![CDATA[An ESG survey of 600 senior IT decision makers showing that 76% of respondents had already deployed multi-cloud environments, and as many as 67% were already using SaaS-delivered business applications. How do you keep it secure?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_gMTjFHMQQouCTEvm73pVXg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_a552PfiNQ2abz9vN3GgR5w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_laFE2tfZRsmIS8FcYW3UGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_gyqi8LfZTZKuQmzFl-cngQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gyqi8LfZTZKuQmzFl-cngQ"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Secure SD-WAN from CloudGenix and Palo Alto</h1></div>
<div data-element-id="elm_p17pdP2b981AR5BSqjP8uA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_p17pdP2b981AR5BSqjP8uA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1447752875215-b2761acb3c5d?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_AWuxccOpSCnL4M1Toqwfrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_AWuxccOpSCnL4M1Toqwfrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">By:</span></p></div>
</div><div data-element-id="elm_r5J9FG4pQbu39ghdN1XCCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_r5J9FG4pQbu39ghdN1XCCQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:18px;">Cloud 9 Supplier Spotlight:&nbsp; <span style="font-weight:bold;"><a href="https://www.cloudgenix.com/" title="CloudGenix" target="_blank">CloudGenix</a></span></span></p></div>
</div><div data-element-id="elm__kx0Mkn2HCQ-xDeyaLhGnA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm__kx0Mkn2HCQ-xDeyaLhGnA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.cloudgenix.com/" target="_blank" title="www.cloudgenix.com" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/SD%20CloudGenix2.png" size="medium" style="width:800px;"/></picture></a></figure></div>
</div><div data-element-id="elm_eM_fCvnwabg7idsbREHIJQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_eM_fCvnwabg7idsbREHIJQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_fy_61GMWyfO5YQIF8gBjTw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_fy_61GMWyfO5YQIF8gBjTw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_pWf02sJh-65p9yMYlI6l5w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pWf02sJh-65p9yMYlI6l5w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Secure SD-WAN from CloudGenix and Palo Alto</span></h2></div>
<div data-element-id="elm_PD5xx7UrDuj5zcKllqxSVg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PD5xx7UrDuj5zcKllqxSVg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>By now, most organizations have extended their IT infrastructure to the cloud. And many are using multiple clouds. ESG, in a recent webinar presented by CloudGenix and Palo Alto Networks, shared findings from a survey of 600 senior IT decision makers showing that 76% of respondents had already deployed multi-cloud environments, and nearly as many – 67% – were already using SaaS-delivered business applications.</div><p><br></p><div>ESG also talked about the challenges of not only ensuring network performance in these complex multi-cloud environments, but also making sure that SaaS-delivered apps are always on, are always secure, and always perform how employees need them to – especially employees in remote office locations.</div><p><br></p><div>In a traditional network architecture, applications are housed in an on-premise data center. Remote office workers access those apps via MPLS VPN connections. Routers enable the underlying network between geographically diverse locations, and firewalls deployed at both the central data center and at each remote office create a security perimeter.</div><p><br></p><div>But this approach simply doesn’t work in the world of cloud. Here’s why:</div><ul><li><span style="font-weight:bold;">Cost</span> – more routers are needed to deploy and manage as well as additional MPLS fees.<br></li><li><span style="font-weight:bold;">Complexity</span> – already overcommitted teams must manage multiple systems to fulfill network and security needs across multiple locations, and traditional MPLS-based networks are notoriously hard to provision or modify.<br></li><li><span style="font-weight:bold;">Performance</span> – with the rise of SaaS-based apps comes a need to not only ensure that networks are performing as needed, but that the apps critical for employees and customers are as well.<br></li><li>Security – data breaches and attacks are part of today’s reality, and in the world of cloud services where data is traveling over the public internet, there is no fixed perimeter to patrol.</li></ul><p><span style="color:inherit;"><br></span></p><div><span style="font-weight:bold;">Opportunities and Obstacles of SD-WAN</span></div><div>Many organizations have adopted SD-WAN solutions to solve for these issues, but they too present their own challenges. Most solutions require multiple hardware products for SD-WAN and security, which once again means more complexity and more cost. Others are mediocre “all-in-one” solutions that have separate roadmaps for features related to network and security, making it near impossible for an organization to simultaneously meet both networking and security needs.</div><p><br></p><p>So how can organizations cost-effectively and securely meet the needs of remote branch offices? In reality, overcoming the challenges presented by centralized network architecture or legacy SD-WANs means re-imagining remote office IT infrastructure. It needs to be cloud-delivered rather than based on complex hardware or software stacks, and:<br></p><ul><li>WANs have to be unconstrained and highly reliable<br></li><li>Security has to be pervasive across multi-cloud, SaaS, and data centers<br></li><li>Unified Communications as a Service (UCaaS), voice, and video have to be highly reliable<br></li><li>Multi-cloud access has to be high-speed<br></li><li>IT operations have to be proactive</li></ul><p><br></p><p><span style="font-weight:bold;">Next-gen WANs: The CloudGenix Autonomous WAN</span><br></p><p>The CloudGenix Autonomous SD-WAN uses global intelligence to deliver performance and security SLAs for all applications over any WAN-type. By providing app-policies aligned to business intent, direct access to multi-cloud and dev-ops frameworks, it delivers significant productivity gains and cost-savings compared to gen-1 SD-WAN alternatives.<br></p><p><br></p><div>Our new joint solution with Palo Alto Networks – and validated by ESG in the Secure SD-WAN: 7 Best Practices from Palo Alto Networks and CloudGenix webinar – combines CloudGenix Autonomous WAN with Palo Alto Networks Prisma Access, enabling organizations to deploy best-of-breed secure SD-WAN that is pre-integrated, requires no additional hardware or software to provision at the remote office, and lays the foundation for a zero-trust security architecture.</div><p><br></p><div>The joint secure SD-WAN solution enables organizations to:</div><ul><li><span style="font-weight:bold;">Apply traffic policy to application traffic</span>. No longer are they restricted to applying policy within the on-premise network. L3 is insufficient in a multi-cloud, hybrid model. L3 – L7 is ideal.<br></li><li><span style="font-weight:bold;">Ensure consistent performance</span> and high availability by automatically monitoring performance metrics against threshold, minimizing the need for manual intervention.<br></li><li><span style="font-weight:bold;">Create policies in the cloud</span> once and deploy them everywhere without the need for backhauling traffic to a controller<br></li><li><span style="font-weight:bold;">Via an easy-to-use platform</span>, integrate other services to be used in conjunction with SD-WAN and deploy them with a few clicks</li></ul><p><span style="color:inherit;"><br></span></p><div>To hear experts at Palo Alto and ESG talk more about this solution, as well as explain the 7 best practices for a secure SD-WAN, check out the on-demand webinar Secure SD-WAN: 7 Best Practices from Palo Alto Networks and CloudGenix.</div></div>
</div></div><div data-element-id="elm_A-lBT1Y6As9HumgAyzMyeQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_A-lBT1Y6As9HumgAyzMyeQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_KpJsJMIwQZe99o87fTfMSw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_KpJsJMIwQZe99o87fTfMSw"] div.zpspacer { height:279px; } @media (max-width: 768px) { div[data-element-id="elm_KpJsJMIwQZe99o87fTfMSw"] div.zpspacer { height:calc(279px / 3); } } </style><div class="zpspacer " data-height="279"></div>
</div><div data-element-id="elm_ABIoVtigkJ-BLbKZY8fjvg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_ABIoVtigkJ-BLbKZY8fjvg"].zpelem-imagetext{ border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:6px; padding:10px; margin:10px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">CloudGenix is a leading SDWAN company in the Cloud 9&nbsp;<a href="https://sitebuilder-662896043.zohositescontent.com/solutions">Supplier Portfolio</a>. Our curated list of over 200 companies provides all the nutrients and daily vitamins a growing company needs for their technology: Cybersecurity, Communications, Connectivity, and Cloud. Our SDWAN, SASE, network and cybersecurity experts are vendor-agnostic and will help uncover the right solutions and the right companies to look at for you needs. We can even help reduce your monthly technology operating costs and create new efficiencies you may have never thought possible.&nbsp;</span><br></p></div>
</div></div><div data-element-id="elm_TUAl_srLIP6w17iCVFvufw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_TUAl_srLIP6w17iCVFvufw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9 Advisers</span></a></div>
</div></div></div><div data-element-id="elm_RzwdkzSMYXKc2kbBGdg6lQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_RzwdkzSMYXKc2kbBGdg6lQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_yqFUQ700ZvaSEpXuju79zg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_yqFUQ700ZvaSEpXuju79zg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>CloudGenix is a leading SDWAN company in the Cloud 9 <a href="/solutions" title="Supplier Portfolio">Supplier Portfolio</a>. Our curated list of over 200 companies provides all the&nbsp;<span style="color:inherit;">daily&nbsp;</span>nutrients and&nbsp; vitamins a growing company needs for their technology: Cybersecurity, Communications, Connectivity, and Cloud. Our SDWAN, SASE, network and cybersecurity experts are vendor-agnostic and will help uncover the right solutions and the right companies to look at for you needs. We can even help reduce your monthly technology operating costs and create new efficiencies you may have never thought possible.&nbsp;</p></div>
</div><div data-element-id="elm_5l-viDwzFM5A_NZRRQ9lCA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_5l-viDwzFM5A_NZRRQ9lCA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_-n6E9JzfP30QReuiUcIYvQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-n6E9JzfP30QReuiUcIYvQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6tBU5e2aGC2aXOds3yok7A" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_6tBU5e2aGC2aXOds3yok7A"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn more about CloudGenix </span></a></div>
</div></div><div data-element-id="elm_qTeK158sEXmavPgOwvCj-g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_qTeK158sEXmavPgOwvCj-g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_mRNsOujEa2-aBsozBuQM7w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_mRNsOujEa2-aBsozBuQM7w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="/sdwan"><span class="zpbutton-content">Learn more about SDWAN</span></a></div>
</div></div></div><div data-element-id="elm_HcG71hnznhzCd528q6RWsQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_HcG71hnznhzCd528q6RWsQ"].zpelem-divider{ border-radius:1px; margin-block-start:37px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_-WGKbl7YqFDmgMj-KFhBIw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-WGKbl7YqFDmgMj-KFhBIw"].zpelem-heading { border-radius:1px; margin-block-start:78px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About CloudGenix</h2></div>
<div data-element-id="elm_mzTYL4JpaPBsyxnTPuyWbQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mzTYL4JpaPBsyxnTPuyWbQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>We have a deep understanding of complex networking issues and designs. We know the only way to truly solve networking issues that surface with next-generation application architectures, rich media, cloud, and SaaS, is to approach the problem top-down with a transformational networking architecture. An architecture that abstracts the complexity of low-level networking rules and configurations away in favor of top-down business policies for applications, sites, performance, security, and compliance. We built the CloudGenix AppFabric™ from the ground up for exactly this purpose.</div></div>
</div><div data-element-id="elm_WxKyFdhP0kno0x7dv_fBww" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WxKyFdhP0kno0x7dv_fBww"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">CloudGenix: Cloud Blades Platform</span></div><div>Build branch locations with best-of-breed infrastructure services that are pre-integrated and can be turned on with one click. <br>No additional hardware or software required.</div></div>
</div><div data-element-id="elm_PcLrJ3b2D-xaoGAyExJPew" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_PcLrJ3b2D-xaoGAyExJPew"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/cgx-cloudbld_1-intro-2x-1500x528.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 11 Feb 2020 09:45:59 -0500</pubDate></item></channel></rss>