<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/sd-wan/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #SD-WAN</title><description>Cloud 9 Advisers - News #SD-WAN</description><link>https://www.cloud9advisers.com/News/tag/sd-wan</link><lastBuildDate>Tue, 24 Feb 2026 23:06:59 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[The Best Cloud DR Plan]]></title><link>https://www.cloud9advisers.com/News/post/the-best-cloud-dr-plan</link><description><![CDATA[The failures of AWS and Azure make IT resilience a fiduciary imperative. We show you how the mid-market can close the Multi-Cloud implementation gap by strategically sourcing specialized expertise. The best defense is a vendor-neutral, low-risk procurement strategy.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_TvHzj3wgTkaUlWwkJSjumA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_9nDVb4pxSfqOzHcaE-Xz4A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_HfXMYKsgTfaIi6WNddYS1g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_14kQWUb1RfyiCBON03h-5g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Your Procurement Strategy is Your Best Disaster Recovery Plan (The C9 Advantage)</span></h1></div>
<div data-element-id="elm_YcIWeEeJJfN-vGl9GINV8Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_YcIWeEeJJfN-vGl9GINV8Q"] .zpimage-container figure img { width: 1110px ; height: 637.27px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/3clouds.jpg" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_S6roIkkGSPuauhvCZknBxg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span>The C-suite has a fiduciary duty to protect business continuity. The solution to systemic cloud failure isn't hastily migrating to another vendor; it's a calm, strategic procurement roadmap that leverages specialized Multi-Cloud and Hybrid expertise.&nbsp;</span>The double gut-punch failure of Big Tech creates an Implementation Gap. We explain how strategic sourcing and specialized expertise is the only pragmatic path for the mid-market to achieve necessary resilience.</span></p><p><span><br/></span></p><p><span style="font-style:italic;">a seven to nine minute read</span></p></div>
</div><div data-element-id="elm_0pRpHWG0d468YEy8zcS4Yw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_0pRpHWG0d468YEy8zcS4Yw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_0pRpHWG0d468YEy8zcS4Yw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_dp3X9n5tvaUZJvzjv_I2NQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_-qDcZwW7nziX7O-hNLj2iw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_g5HWQJ8uncpca2p4FlOQEA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>The Last Mile of Resilience:</span> Strategic Procurement</span></h2></div>
<div data-element-id="elm_tiCTGRjCMxgAFJ6SmPjnog" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span></span></p><div><p><strong>The C-suite has a fiduciary duty to protect the business's continuity.</strong> After the back-to-back failures of the world's two largest providers, simply choosing a &quot;safe&quot; vendor is no longer enough. The only sustainable solution is to pivot your strategic focus from <em>design</em> to <em>execution</em>—and that begins at the procurement table.</p><p><br/></p><p>In <strong>Part 1</strong>, we defined <strong>Concentration Risk</strong> using the massive AWS outage. In <strong>Part 2</strong>, we formalized the <strong>Mandate for Multi-Cloud</strong> resilience, confirmed by the subsequent Azure failure. We know the only way to build systemic protection is to move beyond single-vendor dependency.</p><p><br/></p><p>But knowing what to do and having the capacity to do it are two very different things.</p><p><br/></p><p>The systemic failures of the cloud giants are a clear, non-negotiable call for change. However, <strong>hasty, emotional decisions are the enemy of good strategy.</strong> The next step in your resilience plan must not be a rash, costly migration. It must be a <strong>prudent, strategic plan</strong> to close the implementation gap.</p><p><br/></p><p>For the mid-market, the journey to Multi-Cloud resilience hits an immediate wall: the <strong>Implementation Gap</strong>. You may have designed a brilliant, diversified architecture, but how do you effectively deploy, optimize, and manage two or more hyper-scale cloud platforms—or a complex <strong>Hybrid Cloud</strong> environment—without hiring a large, specialized internal team?</p><p><br/></p><p>Your <strong>procurement strategy</strong> must become your most powerful Disaster Recovery plan.</p><h2><strong><br/></strong></h2><h2><strong>The Fiduciary Mandate and the Unrealistic Build</strong></h2><p>Protecting the business from systemic failure—which the AWS and Azure events prove is an operational reality—is a core responsibility of the CIO, CFO, and CEO.</p><p><br/></p><p>The goal is a resilient design (Multi-Region failover, Hybrid, or Multi-Cloud), but the cost and risk of the traditional implementation path introduce a new, unmanageable risk: the <strong>Human Resources Gap.</strong></p><h3><strong><br/></strong></h3><h3><strong>The Cost of the Internal Build</strong></h3><p>Achieving true Multi-Cloud or Hybrid resilience requires specialized expertise in several distinct, highly complex areas:</p><ul><li><p><strong>Multi-Platform Certification:</strong> Engineers who can seamlessly manage, optimize, and troubleshoot environments across AWS, Azure, and potentially other clouds (like GCP).</p></li><li><p><strong>Automated Failover Management:</strong> Experts dedicated to configuring and testing the automation scripts that govern Multi-Region failover and recovery.</p></li><li><p><strong>Cost and Licensing Optimization:</strong> Specialists skilled in managing the wildly disparate pricing and licensing models of multiple hyper-scale vendors to prevent uncontrolled cost creep.</p></li></ul><p><br/></p><p>For a mid-market company, finding and retaining staff with this combination of expertise is extremely difficult. The process is slow, costly, and introduces a crippling dependency on a few highly paid internal resources. This creates a new, unmanageable <strong>HR risk</strong> where the departure of one key architect could halt your entire resilience strategy.</p><p><br/></p><p>The strategic decision must pivot: <strong>the best way to close the Implementation Gap is not through internal hiring, but through strategic, external procurement.</strong> The question is not, &quot;What cloud platform do we buy?&quot; but rather, &quot;who can manage our resilient, multi-vendor architecture simply and affordably?&quot;</p><h2><strong><br/></strong></h2><h2><strong>The Practical Solution: Specialized Managed Services Providers (MSPs)</strong></h2><p>The specialized Managed Services Provider (MSP), or more specifically Managed Cloud Provider (MCP), is the pragmatic, low-cost solution to the Implementation Gap. These providers exist specifically to manage complex, diversified architectures at scale, including fully <strong>Hybrid (On-Prem + Cloud) and Multi-Cloud deployments</strong>, allowing mid-market teams to gain world-class expertise without the hiring risk.</p><h3><strong><br/></strong></h3><h3><strong>What Multi-Cloud MSPs Deliver</strong></h3><p>A truly specialized Multi-Cloud MSP offers services that go far beyond basic monitoring and patching. They deliver the necessary expertise-on-demand to make a resilient design operational:</p><ul><li><p><strong>Expertise-on-Demand:</strong> You gain access to full teams of certified architects and engineers across all major platforms, adept at managing the complexities of both Multi-Cloud and Hybrid Environments. This eliminates your HR risk and ensures your resilience strategy is managed by people who practice Multi-Cloud deployment every day.</p></li><li><p><strong>Simplified Operations:</strong> They consolidate the management, monitoring, and optimization of disparate environments into a single, predictable relationship. This allows your internal IT team to focus on core business objectives, not on complex vendor management.</p></li><li><p><strong>Guaranteed Objectives:</strong> The right MSP guarantees specific Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO). Your Disaster Recovery plan is no longer a set of internal promises; it's a contractual guarantee managed by an external specialist.</p></li><li><p><strong>Cost Optimization:</strong> Specialized MSPs are experts at optimizing costs across multiple platforms, often using their deep knowledge of volume discounts and utilization strategies to ensure your resilient architecture runs efficiently. This predictable, scalable operational expense is far superior to the high, volatile cost of internal staffing.</p></li></ul><p><br/></p><p>By strategically outsourcing the management of the Multi-Cloud environment, you immediately close the Implementation Gap and transform your resilience from an ambitious blueprint into a functioning, guaranteed service.</p><h2><strong><br/></strong></h2><h2><strong>Strategic Sourcing: A Competitive Advantage</strong></h2><p>The decision to utilize an MSP is clear, but the challenge remains: <strong>the MSP market is vast, opaque, and complex.</strong> The mid-market client cannot easily screen the hundreds of providers available to find the few who truly specialize in your required Multi-Region/Multi-Cloud failover architecture.</p><p><br/></p><p>This is the final, critical step where <strong>vendor-neutral procurement and expertise</strong> delivers its highest value.</p><h3><strong><br/></strong></h3><h3><strong>The Vendor-Neutral Imperative</strong></h3><p>Our role is defined by one core principle: <strong>sourcing solutions that drive outcomes, not providers and products.</strong> We are paid to ensure our client executes the resilient design (Part 2) by sourcing the <strong>best combination of specialized MSPs</strong> that meet the architectural need.</p><p><br/></p><p>We act as your expert agent, bringing unparalleled market intelligence to the sourcing table. We leverage our deep portfolio access to <strong>shortlist</strong> only the most appropriate specialist MSPs—those with proven track records in:</p><ul><li><p><strong>Successfully deploying cross-cloud failover solutions</strong> (e.g., AWS to Azure, Azure to GCP).</p></li><li><p><strong>Incorporating Tertiary Cloud Platforms:</strong> Sourcing providers who can strategically incorporate Google Cloud Platform (GCP) or other niche public cloud environments to ensure your resilience strategy has a third or fourth point of defense outside the two providers who just experienced global failures.</p></li><li><p><strong>Guaranteeing the RTO/RPO metrics</strong> essential for your business continuity.</p></li><li><p><strong>Demonstrating specific experience</strong> in your industry (e.g., finance, healthcare, logistics).</p></li></ul><p><br/></p><p>By providing this vendor-neutral filter, we remove the guesswork and the <strong>Complexity Fatigue</strong> from the procurement process. Instead of spending months on market research and evaluation, you can make a confident, simplified decision within weeks.</p><h3><strong><br/></strong></h3><h3><strong>The Low-Risk, No-Cost Partnership</strong></h3><p>This strategic advisory service—which delivers drastic risk reduction and complexity removal—is delivered with <strong>minimal direct cost to the client.</strong></p><p><br/></p><p>Because we are compensated by the distributors (TSDs), our expert guidance on sourcing the best-fit MSP is delivered as part of the total solution. You gain immediate access to specialized market intelligence, guaranteed contract alignment with your DR plan, and the power of vendor-neutral expertise, all while simplifying and streamlining your IT spend.</p><p><br/></p><p>Your procurement desk becomes your most effective Disaster Recovery plan.</p><h2><strong><br/></strong></h2><h2><strong>Finally: From Reactive Anxiety to Strategic Confidence</strong></h2><p>The failures of AWS and Azure were a clear, expensive, and non-negotiable mandate for change. Resilience is no longer a technology feature; it is a <strong>strategic imperative</strong>, and it is executed through <strong>smart procurement.</strong></p><p><br/></p><p>The challenge for the mid-market is clear: the Implementation Gap. The solution is clear: strategically sourcing <strong>Specialized Multi-Cloud and Hybrid MSPs.</strong></p><p><br/></p><p>Your Disaster Recovery plan is not a document you review annually; it's the right mix of technology and management expertise, sourced by a trusted, neutral advisor.</p><p><br/></p><p>The mandate for Multi-Cloud resilience is clear. <strong>If you're ready to close the implementation gap and source the specialized MSP / MCP expertise you need—without increasing internal complexity—let's have a clear, candid conversation about your resilient sourcing roadmap today.</strong></p></div><div><p></p></div><p></p></div>
</div></div><div data-element-id="elm_-8edeuNsCD_rK8QqOmQRPg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_lmk9Dc9ZC6Xg7FafucbS2g" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_lmk9Dc9ZC6Xg7FafucbS2g"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_lmk9Dc9ZC6Xg7FafucbS2g"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_QrONriPgHLwSA0mcF_jy0w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-right zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-weight:bold;">Read our other related posts:</span></p><p><a href="https://www.cloud9advisers.com/News/post/cloud-migration" title="Cloud Migration: The 6 Rs" target="_blank" rel="">Cloud Migration: The 6 Rs</a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/cloud-failure-double-punch" title="Cloud Failure Double Punch" target="_blank" rel="">Cloud Failure Double Punch</a><a href="https://www.cloud9advisers.com/News/post/cloud-failure-double-punch" title="Cloud Failure Double Punch" target="_blank" rel=""><br/></a></p><p><a href="https://www.cloud9advisers.com/News/post/the-day-the-cloud-blinked" title="The Day the Cloud Blinked" target="_blank" rel="">The Day the Cloud Blinked</a><a href="https://www.cloud9advisers.com/News/post/the-day-the-cloud-blinked" title="The Day the Cloud Blinked" target="_blank" rel=""><br/></a></p><p><a href="https://www.cloud9advisers.com/News/post/Multi-Cloud-Strategy" title="Multi-Cloud Strategy (from CIO.com)" rel="">Multi-Cloud Strategy (from CIO.com)</a><a href="https://www.cloud9advisers.com/News/post/Multi-Cloud-Strategy" title="Multi-Cloud Strategy (from CIO.com)" rel=""><br/></a></p><p><a href="https://www.cloud9advisers.com/News/post/biggest-cloud-providers" title="Biggest Public Cloud Providers" rel="">Biggest Public Cloud Providers</a><br/></p></div>
</div><div data-element-id="elm_aea42fEUFhbxUE59h0CZBg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/hyperscale"><span class="zpbutton-content">Hypercloud / Hyperscale</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 03 Nov 2025 10:04:00 -0500</pubDate></item><item><title><![CDATA[Cloud Failure Double Punch]]></title><link>https://www.cloud9advisers.com/News/post/cloud-failure-double-punch</link><description><![CDATA[The back-to-back failures of AWS and Azure prove that no single hyper-scale vendor can eliminate risk. This guide moves beyond blaming the cloud to providing pragmatic, architectural solutions. We simplify Multi-Region and Hybrid-Cloud strategies to build true, diversified resilience.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_R2kO0tKFRxCAlzYgFmYKng" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_papd1mmiToegkuTk5XFUVw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_D2j-7ZQ0SmeXCsYhlavbsg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Ii8UKBrKSTKV6oMvDaH11Q" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span><span>Beyond the Cloud Blame Game: <span>Why Multi-Vendor Resilience is Now a Non-Negotiable</span></span></span></h2></div>
<div data-element-id="elm_LboPuqwqG3OS7FgJtMUQDw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_LboPuqwqG3OS7FgJtMUQDw"] .zpimage-container figure img { width: 1110px ; height: 484.05px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Cloud%20double%20punch.jpg" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_mQ037iTkTxSenLOpHIMv8A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>The double punch of the AWS and Azure outages confirms the inevitable: your biggest threat is systemic concentration risk. We simplify the only true countermeasure: Multi-Region, Multi-Cloud, and Hybrid-Cloud design.</span></p><p><span><br/></span></p><p><span style="font-style:italic;">a six to eight minute read</span></p></div>
</div><div data-element-id="elm_i7pjievqI0lVeq8nYYD1Kg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_i7pjievqI0lVeq8nYYD1Kg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_i7pjievqI0lVeq8nYYD1Kg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_AJZjGpdesrqwjCTEfVPy3w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_R2wk7r6EMKzyqRa9ez0BnQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_CWN0Iw_64YdUl2FjdV1KrQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The Mid-Market Guide to a Resilient Cloud Strategy</span></h1></div>
<div data-element-id="elm_JbQLhhzHD2ff44Wtq3WmXw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>In Part 1, we established that the AWS US-EAST-1 outage was a massive, expensive lesson in <strong>Concentration Risk</strong>. A single regional failure, often triggered by simple human error, can paralyze a global economy.</p><p><br/></p><p>But the subsequent, widespread <strong>Microsoft Azure outage</strong>—caused by an inadvertent global configuration change that impacted M365 and key enterprise services—delivered a decisive double gut-punch.</p><p><br/></p><p>This back-to-back sequence of failures from the two largest hyperscalers proves a critical point: <strong>this is not about a bad vendor; it's about systemic risk.</strong> The question is no longer &quot;Which vendor is safer?&quot; but rather, &quot;How do we design our business to survive when the largest vendors fail simultaneously or systemically?&quot;</p><p><br/></p><p>Blame is irrelevant. Resilience is everything. The only way to protect your business is to design your architecture to be <strong>vendor-agnostic</strong> at the points of critical failure.</p><h2><br/></h2><h2>Architecture 1: Multi-Region Redundancy (Defense Against Localized Failure)</h2><p>The first, essential layer of defense remains <strong>Multi-Region Redundancy</strong>.</p><h3><br/></h3><h3>The Necessity of Geographic Separation</h3><p>Multi-Region means placing copies of your mission-critical applications and data in <strong>physically distant geographic zones</strong> within the <em>same</em> cloud platform. If your primary deployment is in US-EAST-1, your failover is in US-WEST-2.</p><p><br/></p><p>This setup is the direct countermeasure to the risk exposed by the AWS outage. Since the root cause was geographically confined (a regional human error), having a properly configured Multi-Region backup would ensure your Recovery Time Objective (RTO) is met.</p><h3><br/></h3><h3>The Single-Vendor Limitation</h3><p>However, the Azure outage exposed the flaw in stopping at this level of defense.</p><p><br/></p><p>Azure's failure was tied to a global configuration error affecting services like Azure Front Door. This type of systemic, vendor-wide mistake—a governance flaw at the core of the provider's network—can sometimes <strong>transcend regions and Availability Zones (AZs)</strong> within the <em>same</em> platform. If your primary and failover regions are governed by the same flawed configuration, they can both be rendered inoperable by the same systemic event.</p><p><strong><br/></strong></p><p><strong>The pragmatic takeaway is clear:</strong> Multi-Region design is necessary, but it is no longer sufficient. It defends against local error, but not always systemic vendor error.</p><h2><br/></h2><h2>Architecture 2: Hybrid and Multi-Cloud (Defense Against Systemic Failure)</h2><p>To neutralize the risk of a single vendor’s systemic failure (the &quot;Azure problem&quot;), you must diversify your critical points of failure across distinct <strong>governance boundaries</strong>. This requires a strategy that moves beyond a single provider.</p><h3><br/></h3><h3>The Ultimate Anti-Concentration Strategy</h3><p>This is where <strong>Hybrid-Cloud</strong> and <strong>Multi-Cloud</strong> become non-negotiable for any mid-market business serious about resilience:</p><ul><li><p><strong>Hybrid Cloud:</strong> Combining a public cloud environment (e.g., AWS or Azure) with a dedicated on-premise or private data center. This provides a completely separate, non-vendor-dependent failover layer, often used for highly sensitive data or applications with strict latency requirements.</p></li><li><p><strong>Multi-Cloud:</strong> The intentional use of two or more distinct public cloud vendors for different functions or applications. For example, using AWS for one mission-critical application and Azure for another, or leveraging Vendor X for UCaaS and Vendor Y for your ERP.</p></li></ul><p><br/></p><p>Multi-Cloud is the ultimate defense against vendor-specific Concentration Risk. When a root cause is a global DNS or configuration issue on Vendor A, having your failover or business-critical application running on Vendor B ensures true continuity. By distributing your critical functions, you maintain leverage and agility.</p><h3><br/></h3><h3>Practical Sourcing for Resilience (The C9 Principle)</h3><p>Adopting a Multi-Cloud approach does not have to mean a massive increase in complexity or cost. In fact, when done strategically, it often simplifies operations through <strong>Strengths-Based Sourcing</strong>.</p><p><br/></p><p>Instead of accepting a single vendor's &quot;good-enough&quot; solution for every application, you gain the power to select the absolute best-fit vendor for each job. This commitment to intentional, diversified sourcing is one of our core <strong>principles</strong> in action: reducing risk by choosing technology that fits your architectural need, not just the vendor you already have a contract with.</p><h2><br/></h2><h2>The C9 Value Bridge: From Design to Decision</h2><p>The blueprints for resilience are clear: utilize Multi-Region for localized defense and implement a Hybrid or Multi-Cloud strategy for systemic defense.</p><p><br/></p><p>However, designing this architecture is only half the battle. The new complexity barrier for the mid-market is <strong>implementing these diverse architectures without dramatically increasing management complexity and cost</strong>.</p><p><br/></p><p>This is where the need for strategic guidance becomes apparent. You need an expert adviser to help you:</p><ol><li><p><strong>Map Dependencies:</strong> Clarify which of your critical applications must be diversified.</p></li><li><p><strong>Define Architecture:</strong> Clearly define the non-negotiable resilient design for each application.</p></li><li><p><strong>Source Intentionally:</strong> Navigate the multi-vendor ecosystem to procure the precise mix of services and contracts needed to execute the resilient design efficiently.</p></li></ol><p><br/></p><p>Seek out a neutral, expert <strong>adviser</strong>, removing the Complexity Fatigue and Decision Paralysis that lead to Concentration Risk in the first place. We ensure your resilient architecture is purchased strategically, reducing both your risk exposure and your overall technology spend.</p><h3><br/></h3><h3>What's Next?</h3><p>You have the architectural blueprints. The AWS and Azure failures have given you a clear mandate to diversify.</p><p><br/></p><p>The final, critical step is making sure your budget and contracts actually align with this resilient design. In <strong>Part 3</strong>, we shift the focus entirely to the procurement table, demonstrating how your <strong>sourcing strategy</strong> is your most powerful Disaster Recovery plan, and how neutral advisory simplifies that final, crucial move.</p></div>
<p></p></div></div></div><div data-element-id="elm_wF9Es3ynBy00aCv2AZVD0A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_VHC2JQUYmnxThYoKGH9Piw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_VHC2JQUYmnxThYoKGH9Piw"] div.zpspacer { height:110px; } @media (max-width: 768px) { div[data-element-id="elm_VHC2JQUYmnxThYoKGH9Piw"] div.zpspacer { height:calc(110px / 3); } } </style><div class="zpspacer " data-height="110"></div>
</div><div data-element-id="elm_8YWA9FCluqjUGLOUcczdvw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-right zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p>More to read:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/the-day-the-cloud-blinked" title="The Day the Cloud Blinked" rel="">The Day the Cloud Blinked</a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/Multi-Cloud-Strategy" title="Multi-Cloud Strategy: Pros, cons and tips" rel="">Multi-Cloud Strategy: Pros, cons and tips</a></p><p><a href="https://www.cloud9advisers.com/News/post/Google-an-alternative" title="Google: an alternative" rel="">Google: an alternative</a><br/></p></div>
</div><div data-element-id="elm_pDsPN3Oj5c018cSgtGLnZg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_pDsPN3Oj5c018cSgtGLnZg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_pDsPN3Oj5c018cSgtGLnZg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_z6Ib36g_bJCmmh_KLSW9pQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/cloud" target="_blank"><span class="zpbutton-content">Cloud?</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 29 Oct 2025 23:07:12 -0500</pubDate></item><item><title><![CDATA[Redefining Connectivity in the Digital Age]]></title><link>https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age</link><description><![CDATA[The B2B landscape is defined by the age of AI, cloud, and ubiquitous mobility. We explore how SDWAN and SASE are transforming the network from a cost center into the core strategic asset that drives advanced digital initiatives and fuels the AI gold rush.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_XA3OhJvvT1aZzVTrdhkPvQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_agzUTmSTQT-QxVGsMF3BAw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_5e4krQ7FR46xJ9t8_i2rmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_YBx_lEe_SEu1iNDKjj3CVA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;"><span>How SDWAN and SASE Fuel the Age of AI and Digital Strategy</span></span></h1></div>
<div data-element-id="elm_XYcZkgPcD2dDwzRMfWrKlQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-weight:bold;">Advanced Networking: The Foundational Requirement for the AI Era</span></p><p><span><span><span><span>The convergence of network optimization and cloud security transforms connectivity from a simple utility into the core strategic asset that enables mobility, IoT, and AI-driven growth.</span></span><br/></span></span></p><p><span><span><span><span><br/></span></span></span></span></p><p style="text-align:center;"><span><span><span><span><span><span style="font-style:italic;">Updated!&nbsp;</span></span><br/></span></span></span></span></p></div>
</div><div data-element-id="elm_vJ5mW9dYeQgXO9wbRdHiSw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_vJ5mW9dYeQgXO9wbRdHiSw"] .zpimage-container figure img { width: 1110px ; height: 369.42px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/artificial-intelligence-3706562_1280.jpg" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_osL2YtKZiEz20jz4t8Tfow" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>The modern network acts as an intelligent traffic control layer, prioritizing real-time AI data while securing every access point.</span></span></p></div>
</div><div data-element-id="elm_25RamFwwTPLd9yAdqGubMw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_25RamFwwTPLd9yAdqGubMw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_25RamFwwTPLd9yAdqGubMw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_aemv--3tH0aCZMkIizO-Bw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_9YoBLdTWISYfJc6Z5AkZDg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_sUYmup9gNv3NurUxkrujhg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-size:12pt;"></span></p><div><h1><span>Advanced Networking: The Foundational Requirement for the AI Era</span></h1><p><span>The modern B2B technology landscape is defined by two relentless forces: the shift of critical applications to the cloud, and the universal need for advanced, real-time data analysis. As customer needs evolve, driven by demands for instant communication, ubiquitous mobility, and sophisticated analytics, network architecture is no longer a back-office utility—it is the ultimate strategic enabler.</span></p><p><span><br/></span></p><p><span>Advanced solutions like cloud infrastructure, sophisticated cybersecurity defense, and transformative Customer Experience (CX) platforms are reshaping how network management operates. Without a high-performing, flexible, and secure network foundation, these initiatives cannot deliver their promised value. In fact, a brittle, legacy network architecture quickly becomes the single biggest bottleneck that cripples digital transformation.</span></p><p><span><br/></span></p><p><span>This realization is driving the rapid adoption and evolution of </span><strong>Software-Defined Wide Area Networking (SDWAN)</strong><span> and the mandatory shift to </span><strong>Secure Access Service Edge (SASE)</strong><span>. These are the twin pillars of advanced connectivity, transforming the network from a cost center into a true competitive asset.</span></p><h3><span><br/></span></h3><h3><span>The AI Gold Rush and the Network Bottleneck</span></h3><p><span>The excitement surrounding Artificial Intelligence (AI) and Machine Learning (ML) is palpable. From large language models (LLMs) used for generative tasks to predictive analytics driving operational efficiencies, every business is exploring how to harness this power. This technological pursuit can be described as the </span><strong>AI Gold Rush</strong><span>, and the fuel for this rush is </span><strong>data</strong><span>.</span></p><p><span><br/></span></p><p><span>However, the reality of deploying and scaling AI is harsh: AI models are voracious consumers and producers of data.</span></p><ul><li><p><strong>Training Data Load:</strong><span> Training new models requires moving massive, multi-petabyte datasets, often between enterprise locations, cloud storage, and specialized compute clusters. These sustained, heavy data streams place an immense strain on conventional wide area networks.</span></p></li><li><p><strong>Real-Time Inference:</strong><span> When models are deployed for real-time use (e.g., fraud detection, robotic process automation, or instant translation), the network must handle constant, bidirectional streams of </span><em>inference</em><span> data. This traffic demands extremely low latency, as milliseconds of delay can render the AI's result useless or too late for the human decision-maker.</span></p></li><li><p><strong>Edge AI and IoT:</strong><span> The proliferation of IoT devices and edge computing—essential for modern industrial operations or retail analytics—means AI is often deployed outside the data center. The network must aggregate data from thousands of endpoints, securely transport it for analysis, and then deliver inference back to the edge with near-zero delay.</span></p></li></ul><p><span>Legacy networks, designed primarily for static user-to-data-center traffic, are simply not equipped to handle the sheer volume, velocity, and priority requirements of these diverse AI data loads.</span></p><h3><span><br/></span></h3><h3><span>SDWAN’s AI Role: From Bandwidth to Intelligent Transport</span></h3><p><span>This is where the evolution of </span><strong>SDWAN</strong><span> becomes critical. SDWAN is moving beyond simply pooling bandwidth; it is now integrating </span><strong>AI and Machine Learning</strong><span> to enable a level of control that manual configuration could never achieve.</span></p><p><span><br/></span></p><p><span>The network must become self-aware and adaptive:</span></p><ol><li><p><strong>Adaptive Routing:</strong><span> Integrated ML capabilities allow the SDWAN solution to constantly monitor the quality of every available link (fiber, broadband, 5G, satellite) in real-time. If it detects a spike in jitter or packet loss on one link, it doesn't just failover; it instantly and preemptively steers critical traffic—like that associated with a remote AI inference operation or a vital cloud application—to a healthier path, often without any human intervention or network interruption.</span></p></li><li><p><strong>Application-Tailored Performance:</strong><span> Clients are prioritizing </span><strong>application-tailored performance</strong><span> over generalized capacity. A network built for the AI era must be intelligent enough to identify a large, non-urgent data backup (which can handle some latency) versus a sensitive UCaaS voice packet or a critical AI data stream. It uses its </span><strong>prioritization, optimization, and acceleration</strong><span> capabilities to allocate resources based on the business criticality of the application, ensuring that the most valuable traffic always wins.</span></p></li><li><p><strong>Convergence of Network, Mobility, and IoT:</strong><span> SDWAN facilitates the convergence of these three domains into a cohesive transport solution. By providing flexible, policy-driven connectivity, it ensures that real-time data transmission from mobile devices, manufacturing sensors, and cloud services flows efficiently. This integration is essential for providing the seamless, user-friendly experience modern businesses demand.</span></p></li></ol><p><span>SDWAN is no longer about getting more data through the pipe; it’s about making the pipe smarter, turning it into a dynamic data delivery system that is a prerequisite for successful AI adoption.</span></p><h3><span><br/></span></h3><h3><span>SASE and Security: Unifying the New Perimeter</span></h3><p><span>A conversation about advanced networking, especially one related to enabling AI and mobility, is fundamentally incomplete without addressing cybersecurity. As the network shifts to the cloud, the perimeter dissolves, and the risk surface expands exponentially. This is the driving force behind the mandatory shift to </span><strong>SASE (Secure Access Service Edge)</strong><span>.</span></p><p><span><br/></span></p><p><span>SASE and </span><strong>CASB (Cloud Access Security Broker)</strong><span> frameworks are transforming organizational security approaches by replacing fragmented, appliance-based security with a unified, cloud-native platform. This is the only way to manage the complexity and scale of modern threats.</span></p><p><span><br/></span></p><p><span>The integration of network optimization (SDWAN) and security convergence (SASE) delivers profound advantages:</span></p><ul><li><p><strong>Zero Trust Enforcement:</strong><span> A true SASE architecture embeds </span><strong>Zero Trust Network Access (ZTNA)</strong><span>. Instead of relying on the physical IP address of a location—which is obsolete in the mobile world—access policy is tied to the </span><strong>user's identity</strong><span> and the real-time posture of their device. This is crucial for protecting the sensitive data fueling AI, ensuring that only verified identities can access the massive data lakes required for model training and deployment.</span></p></li><li><p><strong>The Single Pane of Glass:</strong><span> SASE integrates multiple security functions (Firewall-as-a-Service, Secure Web Gateway, CASB) into a single software stack delivered from the cloud. This unified management platform greatly reduces the complexity, operational overhead, and security gaps inherent in multi-vendor, disparate solutions. Monitoring and managing security risks through a single interface provides unparalleled visibility and consistency across all endpoints and cloud resources.</span></p></li><li><p><strong>Pervasive, Low-Latency Security:</strong><span> Because SASE is delivered via a global network of PoPs (Points of Presence), security inspection happens close to the user, eliminating the need to &quot;backhaul&quot; traffic. This ensures that the security layer does not introduce performance-crippling latency, preserving the speed and efficiency required by AI and real-time cloud applications.</span></p></li></ul><p><span>In the advanced network, security is not an afterthought; it is an inseparable, integrated function of connectivity.</span></p><h3><span><br/></span></h3><h3><span>Understanding the Client Imperative</span></h3><p><span>The reality is that these advanced solutions are not a plug-and-play, one-size-fits-all commodity. They require a rigorous, third-party assessment to ensure they align with the unique needs and growth objectives of each business.</span></p><p><span><br/></span></p><p><span>Designing effective networking solutions in the age of AI and SASE requires:</span></p><ol><li><p><strong>Thorough Needs Assessment:</strong><span> Moving past simple link capacity metrics to understanding application requirements, data flow patterns (where the AI and IoT data is being generated and consumed), and specific security mandates (compliance, PII, etc.).</span></p></li><li><p><strong>Strategic Alignment:</strong><span> Ensuring that networking capabilities are not just meeting technical requirements but are directly enabling broader business objectives, such as a major cloud migration, the implementation of a new AI strategy, or the expansion of a mobile sales force.</span></p></li><li><p><strong>Vendor Neutrality:</strong><span> The market is saturated with vendors, each claiming a unique flavor of SDWAN or SASE. A trusted adviser is required to cut through the marketing noise, evaluate the true integration of the underlying technology, and shortlist providers that offer a genuinely unified, high-performing solution.</span></p></li></ol><p><span><br/></span></p><p><span>The digital age demands constant vigilance and architectural foresight. The successful organizations are those that view their network not as an expenditure, but as the core platform for innovation.</span></p><p><span><br/></span></p><p>At Cloud 9 Advisers<span>, we have a deep understanding of the challenges and opportunities at the intersection of AI, security, and connectivity. We are committed to providing our clients with the vendor-neutral insights and strategic solutions they need to navigate this complexity, achieve their business goals, and stay competitive in a rapidly evolving digital environment.</span></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div><span style="font-size:12pt;"><br/></span></div></div>
</div></div><div data-element-id="elm_Edv7AMMBMLmbT7rwjmCOWw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_Z_qMGMmzSOu_Ql2SHXbiBw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan"><span class="zpbutton-content">SD-WAN</span></a></div>
</div><div data-element-id="elm_yWHw1INNI6zc517E9iPpRg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""></a></p><p><a href="https://www.cloud9advisers.com/News/post/ai-engine" title="The Engine that Drives AI" rel="">The Engine that Drives AI</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 07 Feb 2025 13:17:45 -0500</pubDate></item><item><title><![CDATA[VMware impact on CSPs]]></title><link>https://www.cloud9advisers.com/News/post/vmware-impact-on-csps</link><description><![CDATA[The acquisition of VMware by Broadcom has left many scratching their heads and customers very concerned for many reasons. Not to worry Cloud 9 has you covered. Our experts and Supplier Portfolio are ready to help.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__MRtWHv1SBmltC3NHExSWw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ewoZ1VuXR1S_Iw56dVjpdw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_lf91I67uTuWLXuNokt_XFA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_JnSz6duZQCqvsWd0xEbqxw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_JnSz6duZQCqvsWd0xEbqxw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Impact on VMware Cloud Service Providers</span></h1></div>
<div data-element-id="elm_cUN_8yQxg8uUqqrYSm685w" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"] .zpimage-container figure img { width: 509px !important ; height: 319px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"] .zpimage-container figure img { width:509px ; height:319px ; } } @media (max-width: 767px) { [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"] .zpimage-container figure img { width:509px ; height:319px ; } } [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/VMware%20issue.png" width="509" height="319" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_yxdgSpcOCczdxf0W_eDuKg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_yxdgSpcOCczdxf0W_eDuKg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_I46ohUnYg2dKYogKcP5KxA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_I46ohUnYg2dKYogKcP5KxA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_JLrE7ut6KX_k2MussBwCuA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_JLrE7ut6KX_k2MussBwCuA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Broadcom + VMware BIG Partner changes</h2></div>
<div data-element-id="elm_cxQsTmnb-qhlsuz1XVM7JA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cxQsTmnb-qhlsuz1XVM7JA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-left:1pt;margin-right:9.1pt;"><span style="font-size:12pt;">The acquisition of VMware by Broadcom has left many scratching their heads and customers very concerned for many reasons. Not to worry Cloud 9 has you covered. Our experts and Supplier Portfolio are ready to help.&nbsp;</span></p><p style="margin-left:1pt;margin-right:9.1pt;"><span style="font-size:12pt;"><br></span></p><p style="margin-left:1pt;margin-right:9.1pt;"><span style="font-size:12pt;">One of the many changes have led to tension within the VMware partner community, with reports of numerous terminated reseller and cloud service provider agreements.</span></p><p style="margin-left:1pt;margin-right:9.1pt;"><span style="font-size:12pt;color:inherit;"><br></span></p><p style="margin-left:1pt;margin-right:9.1pt;"><span style="font-size:12pt;color:inherit;">VMware’s cloud service provider program is being reduced from approx. 4500 service providers globally to about 400 on May 1, 2024. There will be two Partner/CSP tiers going forward under the new program:</span></p><p style="font-size:13px;"><span style="color:inherit;"><span><br></span></span></p><ul><li style="font-size:12pt;margin-left:7pt;"><p><span style="font-size:12pt;font-weight:700;">Pinnacle </span><span style="font-size:12pt;">–&nbsp;100 globally partners and only 12 in the US</span></p></li><ul><li style="font-size:12pt;font-weight:700;margin-left:36pt;"><p><span style="font-size:12pt;">6 of the 12 providers are currently in our portfolio</span></p></li></ul></ul><p style="font-size:13px;"><span style="color:inherit;"><span><br></span></span></p><ul><li style="font-size:12pt;margin-left:7pt;"><p style="margin-right:33.25pt;"><span style="font-size:12pt;font-weight:700;">Premier </span><span style="font-size:12pt;">– 400 globally, approx. 135 in the U.S.</span></p></li><ul><li style="font-size:12pt;margin-left:36pt;"><p style="margin-right:33.25pt;"><span style="font-size:12pt;">Numerous suppliers already portfolio members</span></p></li></ul></ul><p style="font-size:13px;"><span style="color:inherit;"><br></span></p></div></div>
</div></div><div data-element-id="elm_rjaIA02rv5euDPkW5tZeng" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_rjaIA02rv5euDPkW5tZeng"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_NZbnm1gqi_xKgyODh688yQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_NZbnm1gqi_xKgyODh688yQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">VMware Resources</h2></div>
<div data-element-id="elm_iO50EIfdn3ybtFfCoH10hg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iO50EIfdn3ybtFfCoH10hg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:12pt;">Why Our Resources Are a Game-Changer for You</span></p><p><span style="color:inherit;"><span><br></span></span></p><ol><li style="font-size:12pt;"><p><span style="font-size:12pt;">Comprehensive Coverage: Our resources provide an all-encompassing look at VMware’s latest changes - from subscription models to the new VMware Cloud Foundation (VCF) and VMware vSphere Foundation (VVF).</span></p></li></ol><p><span style="color:inherit;"><span><br></span></span></p><ol start="2"><li style="font-size:12pt;"><p><span style="font-size:12pt;">Expert Insights: Get insights from industry experts and thought leaders on what these changes mean for your business and how to leverage them effectively.</span></p></li></ol><p><span style="color:inherit;"><span><br></span></span></p><ol start="3"><li style="font-size:12pt;"><p><span style="font-size:12pt;">Actionable Strategies: We don’t just inform; we equip you with actionable strategies to turn these changes into opportunities for growth and innovation.</span></p></li></ol><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-left:1pt;"><span style="font-size:12pt;">The changes at VMware have created significant confusion for existing VMware customers. Reach out to us for our guidebook to learn more. We'll help create a clear path forward and to increase your success and value to your own customers.</span><br></p><p><span style="color:inherit;"></span></p><div><span style="font-size:12pt;"><br></span></div></div>
</div><div data-element-id="elm_3xhas9MyT4ip2H8eE7iucQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_3xhas9MyT4ip2H8eE7iucQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Contact Us</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 30 Apr 2024 06:39:00 -0500</pubDate></item><item><title><![CDATA[How to truly go Passwordless]]></title><link>https://www.cloud9advisers.com/News/post/how-to-go-passwrodless</link><description><![CDATA[Patented AI technology provides the strongest end-to-end identity verification authentication and continuous risk management for human and machine identities]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_1vVp8-DgQeWOMNaA3e6Gzg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_8FBft7QyROeNdLd6eb5TTQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_cE8HA9WfTAOLcGM0bMrTFg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_jjqr4wvERnquS4wEfNtDgA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jjqr4wvERnquS4wEfNtDgA"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Go beyond the Passwordless hype</h1></div>
<div data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ"] .zpimage-container figure img { width: 509px !important ; height: 339px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ"] .zpimage-container figure img { width:509px ; height:339px ; } } @media (max-width: 767px) { [data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ"] .zpimage-container figure img { width:509px ; height:339px ; } } [data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/time-to-change-strong-password-from-weak-notepad-with-passwords.webp" width="509" height="339" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_YOWvBLpgR1yJZxofWJwJRg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YOWvBLpgR1yJZxofWJwJRg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div>Replace dreaded passwords with an intelligent authentication system that learns how people work and keeps them more secure.</div></div></div>
</div><div data-element-id="elm_hya_yFgP14G8U6pDyg21OQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_hya_yFgP14G8U6pDyg21OQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_iQEf6p3WoOGrSTi732FwGg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_iQEf6p3WoOGrSTi732FwGg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_YCl7YNHLCR6O53l9oFxSYg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_YCl7YNHLCR6O53l9oFxSYg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>Enterprises need better security.</div></div></h2></div>
<div data-element-id="elm_332vUH6gFM0bwCGFlPCgPQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_332vUH6gFM0bwCGFlPCgPQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">We all know human error is still the largest security &quot;threat&quot;. Fortunately, awareness and training are starting to chip away at the problem. However, at the root of some 81% of data <span style="font-style:italic;">breaches</span>, compromised identity and credentials are the biggest attack vector in the modern enterprise. $16B was spent on Identity and Access Management (IAM) solutions in 2020 yet the problem is only getting worse. Existing solutions are simply not sufficient. Enterprises need better security.</span><br></div></div></div>
</div><div data-element-id="elm_p-6oOnBtVa8sCeXbBrmFXg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_p-6oOnBtVa8sCeXbBrmFXg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>Are you and your users tired of being bombed with MFA requests?&nbsp;</div></div></h2></div>
<div data-element-id="elm_roJiE9FgXnktIjb09qmcfg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_roJiE9FgXnktIjb09qmcfg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Reach out to your Cloud 9 solutions specialist for an introduction to one of our newest, exclusive cybersecurity providers. They combine the strongest identity proofing, presence, biometrics, and behavioral markers in one continuous engine to deliver the most comprehensive passwordless solution on the planet (a little poetic license, but we’re pretty sure that is Tru).</span><br></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Patented AI technology provides the strongest end-to-end identity verification authentication and continuous risk management for human and machine identities. In combination with your current or a new Security Awareness Training program it will help companies eliminate the most significant causes of data breaches - social engineering attacks, human errors, and misuse.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Passwordless </span><span style="font-size:12pt;">- eliminate passwords as a means of authentication and enable clever and usable biometrics for authentication instead–without new hardware and systems</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Continuous Adaptive Trust / Continuous Authentication (</span><span style="font-size:12pt;font-weight:700;">CAT</span><span style="font-size:12pt;">) - Extend passwordless access beyond just point-in-time authentication, provide identity device and environmental risk assessment at multiple points in time during user sessions. Using patented ML and AI based learning systems that fuse biometrics, behavioral, device, and environmental signals to determine true identity </span><span style="font-size:12pt;font-style:italic;">continuously</span><span style="font-size:12pt;">, in a globally compliant manner.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Converged </span><span style="font-size:12pt;">- merge the digital and physical world by enabling trusted physical access to buildings, server rooms, restricted physical areas, and all integrated with Passwordless and CAT solutions.&nbsp;</span></p></div>
</div><div data-element-id="elm_f6mVQE2akrizEl3caEj6ew" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_f6mVQE2akrizEl3caEj6ew"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">COMPLETE</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Cover all work scenarios with support for Windows, Mac, Linux, and servers; web and native mobile apps; and passwordless VDI and network access (VPN, wireless)</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">CONTINUOUS</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Go beyond point-in-time initial authentication and extend security within the working session, continuously learning and assessing behavioral risk</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">CONNECTED</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Easy to deploy into any environment with rich, standards-based, pre-built integrations</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">COORDINATED</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Enjoy workflow and policy-driven self-service identity proofing, onboarding, and account recovery</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">CONVERGED</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Unify physical and digital security into the same solution, allowing for greater flexibility in workplace design and management</span></p><p><span style="color:inherit;"></span></p><div><span style="font-size:12pt;"><br></span></div></div>
</div></div><div data-element-id="elm_vfwcVpEXiljVBG8nlTtxgw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vfwcVpEXiljVBG8nlTtxgw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_etFWwvUfSBe7Gp7SWB42lw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_etFWwvUfSBe7Gp7SWB42lw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div><div data-element-id="elm_qXBMZ2llVHUL6vml-zNM8A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qXBMZ2llVHUL6vml-zNM8A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cloud 9</h2></div>
<div data-element-id="elm_G9bSP9GAd49YZ5yVjoYMPA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_G9bSP9GAd49YZ5yVjoYMPA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Cloud 9 Advisers exists to help organizations make smart IT decisions quickly and confidently. We work with leadership and understaffed IT teams who are embarking on projects outside their wheelhouse and help to rationalize IT spend. We are objective, impartial, and unbiased technology sourcing experts with vendor-neutral engineering teams that focus on four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. We do not sell solutions, we work with you to identify and research solutions. We are not another vendor, we are your partner helping you evaluate and compare vendors; so you can solve problems and achieve business outcomes, fast.</div><br><div><br></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 26 Apr 2024 17:08:43 -0500</pubDate></item><item><title><![CDATA[VMware journey]]></title><link>https://www.cloud9advisers.com/News/post/vmware-journey</link><description><![CDATA[Get the guide. Get a plan. Changes to VMware will be impactful to many.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__MRtWHv1SBmltC3NHExSWw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ewoZ1VuXR1S_Iw56dVjpdw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_lf91I67uTuWLXuNokt_XFA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_JnSz6duZQCqvsWd0xEbqxw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_JnSz6duZQCqvsWd0xEbqxw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">VMware: Change is inevitable</h1></div>
<div data-element-id="elm_cUN_8yQxg8uUqqrYSm685w" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"] .zpimage-container figure img { width: 800px !important ; height: 800px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"] .zpimage-container figure img { width:800px ; height:800px ; } } @media (max-width: 767px) { [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"] .zpimage-container figure img { width:800px ; height:800px ; } } [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/BroadcomVMware.jpg" width="800" height="800" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_yxdgSpcOCczdxf0W_eDuKg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_yxdgSpcOCczdxf0W_eDuKg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_I46ohUnYg2dKYogKcP5KxA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_I46ohUnYg2dKYogKcP5KxA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_JLrE7ut6KX_k2MussBwCuA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_JLrE7ut6KX_k2MussBwCuA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Broadcom + VMware get the guide</h2></div>
<div data-element-id="elm_cxQsTmnb-qhlsuz1XVM7JA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cxQsTmnb-qhlsuz1XVM7JA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="font-size:13px;">Exciting news! Contact us to get the guidebook and everything you need to know to manage the quickly changing Broadcom VMware landscape. Building on the invaluable insights shared in our comprehensive VMware guidebook, we have now developed a customer-facing version that you can personalize. This tailored guidebook is crafted to spark impactful discussions with stakeholders and open new avenues for your IT operations.&nbsp;</p><p style="font-size:13px;">&nbsp;<span style="color:inherit;">&nbsp;</span></p><p style="font-size:13px;">We are your authority in the VMware ecosystem.&nbsp;</p><p style="font-size:13px;">Get equipped with essential knowledge on:</p><ul><li><strong>Latest VMware Innovations:</strong>&nbsp;An exploration of new core offerings and how they can revolutionize your IT environment</li><li><strong>Adjustments in Products, Support, and Services:</strong>&nbsp;Key updates that could influence your IT operations and strategies for adaptation.</li><li><strong>Insights for Cloud Service Providers:</strong>&nbsp;How the latest VMware developments impact cloud solutions and advice on leveraging these changes for growth.</li><li style="margin-bottom:13px;"><strong>Guidance on Migrating Off VMware:</strong>&nbsp;Expert tips for a seamless transition, ensuring a smooth experience</li></ul></div></div>
</div></div><div data-element-id="elm_rjaIA02rv5euDPkW5tZeng" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_rjaIA02rv5euDPkW5tZeng"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_NZbnm1gqi_xKgyODh688yQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_NZbnm1gqi_xKgyODh688yQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">VMware Resources</h2></div>
<div data-element-id="elm_iO50EIfdn3ybtFfCoH10hg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iO50EIfdn3ybtFfCoH10hg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:12pt;">Why Our Resources Are a Game-Changer for You</span></p><p><span style="color:inherit;"><span><br></span></span></p><ol><li style="font-size:12pt;"><p><span style="font-size:12pt;">Comprehensive Coverage: Our resources provide an all-encompassing look at VMware’s latest changes - from subscription models to the new VMware Cloud Foundation (VCF) and VMware vSphere Foundation (VVF).</span></p></li></ol><p><span style="color:inherit;"><span><br></span></span></p><ol start="2"><li style="font-size:12pt;"><p><span style="font-size:12pt;">Expert Insights: Get insights from industry experts and thought leaders on what these changes mean for your business and how to leverage them effectively.</span></p></li></ol><p><span style="color:inherit;"><span><br></span></span></p><ol start="3"><li style="font-size:12pt;"><p><span style="font-size:12pt;">Actionable Strategies: We don’t just inform; we equip you with actionable strategies to turn these changes into opportunities for growth and innovation.</span></p></li></ol><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-left:1pt;"><span style="font-size:12pt;">The changes at VMware have created significant confusion for existing VMware customers. Reach out to us for our guidebook to learn more. We'll help create a clear path forward and to increase your success and value to your own customers.</span><br></p><p><span style="color:inherit;"></span></p><div><span style="font-size:12pt;"><br></span></div></div>
</div><div data-element-id="elm_3xhas9MyT4ip2H8eE7iucQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_3xhas9MyT4ip2H8eE7iucQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Contact Us</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 26 Apr 2024 15:27:00 -0500</pubDate></item><item><title><![CDATA[VMware changes]]></title><link>https://www.cloud9advisers.com/News/post/vmware-changes</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cloud9advisers.com/vmware logo.png"/>Change can be scary. VMware changes don't have to be a nightmare. Our team of experts is ready.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_tNiqQB8KRty4vbqaRBhOKQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yQdjLPGoS3i0q_3FTfJrnQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_0Ex1_AxlSL-YHf32GcuGNg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_oHtXCyknRWiQ5KxZUIM-Gg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_oHtXCyknRWiQ5KxZUIM-Gg"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">VMware’s Transition to Subscription-Based</span></h1></div>
<div data-element-id="elm_HZtBkXZlYCuPlbK8U37hiw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_HZtBkXZlYCuPlbK8U37hiw"] .zpimage-container figure img { width: 404px !important ; height: 125px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_HZtBkXZlYCuPlbK8U37hiw"] .zpimage-container figure img { width:404px ; height:125px ; } } @media (max-width: 767px) { [data-element-id="elm_HZtBkXZlYCuPlbK8U37hiw"] .zpimage-container figure img { width:404px ; height:125px ; } } [data-element-id="elm_HZtBkXZlYCuPlbK8U37hiw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/vmware%20logo.png" width="404" height="125" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_22FxwdC-5AjoSDMauTV_4A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_22FxwdC-5AjoSDMauTV_4A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_NNjJ2nkS85y3n-nFvyHw9Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_NNjJ2nkS85y3n-nFvyHw9Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_TNDUKiEgNY1olFbqieKz9w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_TNDUKiEgNY1olFbqieKz9w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Overview of VMware’s Transition to Subscription-Based Models</span></h2></div>
<div data-element-id="elm_sz-DDhgmoddkFF3bRNA8IA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sz-DDhgmoddkFF3bRNA8IA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Recently, VMware announced significant changes to its product portfolio and licensing models related to Broadcom’s acquisition. The company has transitioned to a subscription model, introducing VMware Cloud Foundation (VCF) and VMware vSphere Foundation (VVF) as its core offerings. This shift means many VMware solutions will only be available as part of VCF or VVF, rather than as standalone products. Add-on services enhance these offerings covering storage, security, disaster recovery, and other specific needs.</div><br><div><span style="color:inherit;">Additionally, VMware is planning a &quot;Bring Your Own License&quot; option, allowing flexible deployment of subscriptions. This change aims to simplify the portfolio, enhance customer value, and accelerate innovation delivery. For those using products now at End of Availability (EOA), VMware will continue support until the end of existing subscription terms, after which customers will need to transition to the new models. The update includes a comprehensive list of products affected by these changes, indicating their replacement or integration within the new structure.</span><br></div><div style="color:inherit;"><br></div></div><div style="color:inherit;"><div><br></div></div></div>
</div><div data-element-id="elm_0OXKYGf9AVXEi865sOLUrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0OXKYGf9AVXEi865sOLUrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:bold;">On the horizon from Broadcom / VMware:&nbsp;<br></span><br></div><div><ul><li>New Core Offerings and Changes</li><li>Series of products&nbsp;End of Availability (EOA)</li><li>Purchasing &amp; Licensing Changes</li><li>Customer and Partner Success</li><li>Support Program Changes</li><li><span style="color:inherit;">&quot;Bring Your Own License” Options</span><br></li><li><span style="color:inherit;">Impact on Cloud Service Providers<br></span></li></ul></div></div></div>
</div></div><div data-element-id="elm_4-gNIMTA9QWmiCvOlxOJcw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4-gNIMTA9QWmiCvOlxOJcw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_JI6tPSdoONwknYbqBaTbYQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_JI6tPSdoONwknYbqBaTbYQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Get Expert VMware help - Cloud 9 Advisers Supplier community</h2></div>
<div data-element-id="elm_Sr-U_ZbCrG6Lq7tQHRoWcg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Sr-U_ZbCrG6Lq7tQHRoWcg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-left:1pt;"><span style="font-size:20pt;font-weight:700;">Resources</span></p><p><span style="color:inherit;"><span><br></span></span></p><p><span style="font-size:12pt;">Why Our Resources Are a Game-Changer for You</span></p><p><span style="color:inherit;"><span><br></span></span></p><ol><li style="font-size:12pt;"><p><span style="font-size:12pt;">Comprehensive Coverage: Our resources provide an all-encompassing look at VMware’s latest changes - from subscription models to the new VMware Cloud Foundation (VCF) and VMware vSphere Foundation (VVF).</span></p></li></ol><p><span style="color:inherit;"><span><br></span></span></p><ol start="2"><li style="font-size:12pt;"><p><span style="font-size:12pt;">Expert Insights: Get insights from industry experts and thought leaders on what these changes mean for your business and how to leverage them effectively.</span></p></li></ol><p><span style="color:inherit;"><br></span></p><ol start="3"><li style="font-size:12pt;"><p><span style="font-size:12pt;">Actionable Strategies: We don’t just inform; we equip you with actionable strategies to turn these changes into opportunities for growth and innovation.</span></p></li></ol></div>
</div><div data-element-id="elm_14Ee27C3Q06KCASH3E_hXw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_14Ee27C3Q06KCASH3E_hXw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Contact Us Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 25 Apr 2024 15:02:53 -0500</pubDate></item><item><title><![CDATA[GPT and Healthcare]]></title><link>https://www.cloud9advisers.com/News/post/gpt-and-healthcare</link><description><![CDATA[Fast-paced advancements in generative AI will change the core operations of every healthcare organization. AI-driven technology is not just a side project anymore.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_UUDbIDf5SB2o2LzApnkm9g" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm__yagZJebQ0ePibgovVix4Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_0ke-n4JES_WNocx1SszYOQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_BaTxDiVeQLqRI5J164qyag" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_BaTxDiVeQLqRI5J164qyag"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1 style="margin-bottom:24px;">Generative AI will profoundly change healthcare operations</h1></div></h1></div>
<div data-element-id="elm_qQ8sO_bZQiCKiNJkhJANLQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qQ8sO_bZQiCKiNJkhJANLQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Read the full artilce from our friends at CIO Magazine:&nbsp;<a href="https://www.cio.com/article/1293399/generative-ai-will-profoundly-change-healthcare-operations.html">https://www.cio.com/article/1293399/generative-ai-will-profoundly-change-healthcare-operations.html</a>&nbsp;</div><div><br></div><div><div><span style="color:inherit;">Key Takeaways:</span><br></div><div><div><div><ul><li style="margin-bottom:10px;">Generative AI:&nbsp;a new breed of AI capable of creating realistic content – images,&nbsp;video,&nbsp;text,&nbsp;code – is poised to dramatically reshape healthcare operations.</li><li style="margin-bottom:10px;">Impact:&nbsp;Faster administrative processes,&nbsp;reduced provider burnout,&nbsp;and improved patient satisfaction are potential outcomes.</li><li style="margin-bottom:10px;">Cost Optimization:&nbsp;Automation and improved efficiency could slash administrative costs by 40-50% within five years.</li><li style="margin-bottom:10px;">Patient Experience:&nbsp;Personalization and tailored communication can enhance patient understanding and engagement.</li><li style="margin-bottom:10px;">Challenges:&nbsp;Addressing ethical concerns,&nbsp;ensuring data privacy,&nbsp;and integrating AI seamlessly into existing systems are key hurdles.</li></ul><p style="margin-bottom:24px;">AI-powered Transformation:</p><ul><li style="margin-bottom:10px;">Automating mundane tasks:&nbsp;Scheduling appointments,&nbsp;generating reports,&nbsp;and managing insurance claims can be automated,&nbsp;freeing up staff for more complex duties.</li><li style="margin-bottom:10px;">Personalized interventions:&nbsp;Tailored patient education materials,&nbsp;medication reminders,&nbsp;and discharge instructions can improve compliance and outcomes.</li><li style="margin-bottom:10px;">Streamlined workflows:&nbsp;AI can optimize scheduling,&nbsp;resource allocation,&nbsp;and communication to reduce friction and delays.</li><li style="margin-bottom:10px;">Early disease detection:&nbsp;Advanced AI algorithms can analyze vast amounts of data to identify early signs of illness,&nbsp;enabling proactive intervention.</li></ul><p style="margin-bottom:24px;">Challenges and Considerations:</p><ul><li style="margin-bottom:10px;">Ethical questions:&nbsp;Issues like patient privacy,&nbsp;transparency,&nbsp;and potential bias in AI algorithms need careful consideration.</li><li style="margin-bottom:10px;">Data security:&nbsp;Robust cybersecurity measures are crucial to protect sensitive patient information.</li><li style="margin-bottom:10px;">Change management:&nbsp;Integrating AI requires training and buy-in from healthcare professionals and patients alike.</li></ul><p style="margin-bottom:24px;">Overall:</p><p style="margin-bottom:24px;">Generative AI has the potential to revolutionize healthcare, but its successful implementation requires addressing ethical, technical, and human factors. By embracing AI responsibly and strategically, healthcare organizations can optimize workflows, enhance patient care, and achieve significant cost savings.</p><p style="margin-bottom:24px;">Further Action:</p><p style="margin-bottom:24px;">Healthcare leaders should explore pilot projects, invest in training, and establish ethical frameworks to leverage the power of generative AI for a healthier future.</p></div><br></div><br></div><br></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 22 Jan 2024 14:01:25 -0500</pubDate></item><item><title><![CDATA[SD-WAN and SASE]]></title><link>https://www.cloud9advisers.com/News/post/sd-wan-and-sase</link><description><![CDATA[SDWAN optimizes your network. SASE secures your edge. We demystify the two fastest-growing acronyms in networking, clarify their distinct benefits for single and multi-location companies, and explain the components that create a truly unified SASE platform.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_1jXyK-BxSzyrWaKP8RqrUA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iT5zEM8tTIydTEbJVk5i1A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_gS4hskNZS06uKMpuP2R1QQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_5E1mk1d-aq_UX3M_nNC1YA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>SDWAN &amp; SASE: The Essential Guide to Converging Connectivity and Cloud Security</span></h1></div>
<div data-element-id="elm_EaYOe5_uT1Wkw5nbmuKiqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EaYOe5_uT1Wkw5nbmuKiqQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div style="color:inherit;"><div><span><span>Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network</span></span></div><div><span><span><br/></span></span></div><div><span><span><span><span>Cloud-first operations demand a new network model. Understanding the roles of Software-Defined Wide Area Networking (SDWAN) and Secure Access Service Edge (SASE) is the first step toward building a truly resilient and secure edge.</span></span><br/></span></span></div><div><span><span><span><span><br/></span></span></span></span></div><div><span><span><span><span><span><span>SASE and SDWAN represent the necessary convergence of security (the perimeter) and networking (the pathway) in the age of cloud and hybrid work.</span></span><br/></span></span></span></span></div></div></div>
</div><div data-element-id="elm_jkUNxYuneitwIK_sewBFAg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_jkUNxYuneitwIK_sewBFAg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_jkUNxYuneitwIK_sewBFAg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_BbiI0m9bI29ZdapwOsEbpw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"> [data-element-id="elm_BbiI0m9bI29ZdapwOsEbpw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dcjweYy9nV-YMoK-K7qnZA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dcjweYy9nV-YMoK-K7qnZA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_WblXvipEFTmJ2j7HnywXfw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WblXvipEFTmJ2j7HnywXfw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;"></span></p><div><h2><span>Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network</span></h2><p><span>For many IT leaders, the networking and security landscape over the past few years has felt like an endless alphabet soup. Two acronyms, in particular, have dominated strategic conversations: </span><strong>SDWAN</strong><span> and </span><strong>SASE</strong><span>.</span></p><p><span><br/></span></p><p><span>Both are frequently discussed in the context of modernization, cloud migration, and supporting the hybrid workforce. This has led to widespread confusion, with many vendors incorrectly presenting them as competing solutions, or worse, claiming that one automatically includes the other without proper implementation.</span></p><p><span><br/></span></p><p><span>At Cloud 9 Advisers, we act as pragmatic, expert advisers to help you cut through this noise. Simply put: </span><strong>SDWAN optimizes the network; SASE secures the edge.</strong><span> They are not competing technologies, but essential components that, when unified correctly, form the foundation of a modern, secure, and resilient network.</span></p><p><span>Understanding their individual roles is the first step to making the right strategic investment.</span></p><h3><span><br/></span></h3><h3><span>Part 1: Demystifying SDWAN (Software-Defined Wide Area Network)</span></h3><p><span>SDWAN is fundamentally a revolutionary approach to Wide Area Networking (WAN). Traditionally, WANs relied on complex hardware—specific routers, expensive leased lines (like MPLS), and manual configurations—to connect separate locations.</span></p><p><span><br/></span></p><p><span>SDWAN separates the control plane (the intelligence of the network) from the data plane (the physical connections). By shifting control to software, it gains two critical advantages: </span><strong>intelligence</strong><span> and </span><strong>flexibility</strong><span>.</span></p><p><span><br/></span></p><p><span>The SDWAN appliance at each location becomes application-aware, meaning it knows the difference between a voice packet, an email, or a large file download. This intelligence is then used to optimize traffic flow in real time across any combination of underlying links (fiber, broadband, 4G/5G, etc.).</span></p><h4><span><br/></span></h4><h4><span>The Pragmatic Benefits of SDWAN</span></h4><p><span>While SDWAN was originally designed to connect </span><strong>multiple locations</strong><span> effectively, it offers distinct and significant benefits even for </span><strong>companies with a single location</strong><span>:<br/><br/></span></p><table><tbody><tr><th style="width:13.516%;"><p><span style="font-weight:bold;">Audience</span></p></th><th style="width:25.137%;"><p><span>Primary Problem Solved</span></p></th><th style="width:59.5205%;"><p><span>Core SDWAN Benefit</span></p></th></tr><tr><td style="width:13.516%;"><p><strong>Single Location</strong></p></td><td style="width:25.137%;" class="zp-selected-cell"><p><span>Internet instability, QoS issues for real-time apps, reliance on expensive single circuits.</span></p></td><td style="width:59.5205%;"><p><strong>Reliability &amp; Efficiency:</strong><span> It aggregates multiple, low-cost internet links into a unified connection. It uses that power to ensure mission-critical applications (like UCaaS or a cloud ERP system) always have the bandwidth they need, while less critical traffic is given lower priority. It provides a more robust, stable connection than any single circuit ever could.</span></p></td></tr><tr><td style="width:13.516%;"><p><strong>Multiple Locations</strong></p></td><td style="width:25.137%;"><p><span>High cost of traditional WAN (MPLS), complex management, and traffic backhauling for security.</span></p></td><td style="width:59.5205%;"><p><strong>Virtual Network &amp; Cost Reduction:</strong><span> This is the original design intent. It creates a seamless, virtual network that spans multiple physical locations, making management centralized and simple. Critically, it allows companies to swap expensive MPLS with low-cost broadband, reducing ongoing network costs while improving agility and allowing for dynamic, automated routing around outages or congestion.</span></p></td></tr></tbody></table><p><span><br/></span></p><p><span>SDWAN’s value is in </span><strong>resilience</strong><span> and </span><strong>performance</strong><span>. It is the key to providing the high-quality, low-latency connectivity required for the sensitive, real-time applications we discussed in our last article on Call Survivability.</span></p><h3><span><br/></span></h3><h3><span>Part 2: Demystifying SASE (Secure Access Service Edge)</span></h3><p><span>If SDWAN is the intelligent highway, then </span><strong>SASE (Secure Access Service Edge)</strong><span> is the integrated, cloud-native security perimeter applied to that highway's entrance and exit ramps.</span></p><p><span><br/></span></p><p><span>SASE is an architectural framework, not a single product. It was introduced to address the reality that the traditional network perimeter—the firewall in your server room—is obsolete. Users now access corporate data from home, coffee shops, and client sites using personal devices, reaching applications hosted in multiple clouds.</span></p><p><span><br/></span></p><p><span>The goal of SASE is simple: </span><strong>Secure and reliable access to corporate resources from any location, without sacrificing user experience or performance.</strong></p><p><span><br/></span></p><p><span>A comprehensive, robust SASE solution is built upon the convergence of several key security and networking components, all delivered via a single, cloud-based platform. If a vendor is missing even one of these components, they are selling a partial, non-SASE solution.</span></p><h4><span><br/></span></h4><h4><span>The Five Essential Components of a True SASE Platform</span></h4><p><span>A good SASE solution brings together the following technologies into a unified stack:</span></p><ol><li><p><strong>Secure Web Gateway (SWG):</strong><span> Provides secure, cloud-based internet access. It acts as the first line of defense, blocking malicious websites, filtering URLs, and applying advanced malware detection before traffic even reaches the user’s device or the corporate network.</span></p></li><li><p><strong>Cloud Access Security Broker (CASB):</strong><span> The CASB provides critical visibility and control over cloud applications (SaaS). It monitors user activity within apps like Microsoft 365, Salesforce, and Dropbox, enforces security policies, and prevents data leakage by encrypting sensitive data both in transit and at rest.</span></p></li><li><p><strong>Firewall-as-a-Service (FWaaS):</strong><span> This replaces the traditional physical, on-premise firewall. FWaaS is a cloud-native security layer that controls access to corporate resources and blocks unauthorized traffic, applying consistent security policies to users regardless of their location.</span></p></li><li><p><strong>Zero Trust Network Access (ZTNA):</strong><span> This is the modern replacement for traditional VPNs. ZTNA is critical because it never grants blanket access to the entire network. Instead, it operates on a principle of &quot;never trust, always verify,&quot; granting users access only to the specific applications they need, only after identity verification, and only from a compliant device. This hides corporate resources from the public internet entirely.</span></p></li><li><p><strong>Identity and Access Management (IAM):</strong><span> An integral part of the Zero Trust model. IAM provides the centralized control over user identities, authentication (often multi-factor, or MFA), and authorization. It is the engine that validates who a user is and what they are allowed to access, enforcing policy consistently across the entire SASE stack.</span></p></li></ol><p><span><br/></span></p><p><span>And finally, the often-misunderstood component:</span></p><ul><li><p><strong>Software-Defined Wide Area Networking (SDWAN):</strong><span> A true SASE architecture </span><strong>includes</strong><span> SDWAN functionality. The networking side of SASE is responsible for optimizing the transport layer—selecting the best path for traffic based on business requirements and dynamically routing it across various links (broadband, 5G, private connections). It ensures the high-performance delivery of traffic to and from the secure SASE cloud edge.</span></p></li></ul><h3><span><br/></span></h3><h3><span>SDWAN + SASE: The Convergence Strategy</span></h3><p><span>The modern B2B enterprise is defined by dispersed data, dispersed users, and dispersed applications. The only way to manage this complexity effectively is through convergence.</span></p><p><span><br/></span></p><p><span>The strategic relationship can be summarized simply:</span></p><ul><li><p><strong>SDWAN is the foundation of high-performance connectivity.</strong><span> It delivers the path optimization, quality of service (QoS), and resilience (call survivability) that your business demands.</span></p></li><li><p><strong>SASE is the strategic security framework.</strong><span> It delivers the identity-centric access control (ZTNA), threat prevention (SWG, FWaaS), and data protection (CASB) that your business requires, regardless of where the user is located.</span></p></li></ul><p><span><br/></span></p><p><span>By consolidating these functions into a unified, cloud-based platform—the core tenet of SASE—businesses gain:</span></p><ol><li><p><strong>Simplified Management:</strong><span> Moving from managing six different boxes (router, firewall, VPN concentrator, web filter, etc.) to managing one policy stack in the cloud.</span></p></li><li><p><strong>Consistent Security:</strong><span> Every user, no matter where they are or how they connect, gets the exact same security inspection and policy enforcement.</span></p></li><li><p><strong>Cost Efficiency:</strong><span> Reducing hardware footprints and maintenance costs, leveraging lower-cost internet links, and consolidating vendor contracts.</span></p></li><li><p><strong>Agility:</strong><span> The network scales instantly to accommodate mergers, acquisitions, or sudden shifts to remote work, without needing to deploy physical hardware.</span></p></li></ol><h3><span><br/></span></h3><h3><span>Simplifying the Strategic Choice</span></h3><p><span>The choice between SDWAN and SASE is a false one; the correct answer is a converged solution.</span></p><p><span><br/></span></p><p><span>However, the vendor landscape is complex, with providers offering partial solutions that may excel at the &quot;SDWAN&quot; part but provide poor, bolt-on security, or vice versa. The strategic challenge is identifying the partner that can deliver a </span><strong>truly unified SASE platform</strong><span>—one where the networking and security components are built to work together seamlessly, eliminating gaps and preserving performance.</span></p><p><span><br/></span></p><p><span>Don’t get stuck in the alphabet soup of acronyms. Focus on the required outcomes: </span><strong>resilient performance and secure access from anywhere.</strong></p><p><span><br/></span></p><p><span>At Cloud 9 Advisers, we help technology leaders sift through the noise, evaluate the true integration level of SASE vendors, and select the platform that meets the specific demands of their single or multi-location business model.</span></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div><span style="font-size:12pt;"><br/></span></div>
</div></div><div data-element-id="elm_CV5VuMRYDmcEvhmfgMYM2w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_CV5VuMRYDmcEvhmfgMYM2w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sase" target="_blank"><span class="zpbutton-content">Learn more about SASE</span></a></div>
</div><div data-element-id="elm_FxB8pAckLtzq7zPAwodPLg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_FxB8pAckLtzq7zPAwodPLg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan" target="_blank"><span class="zpbutton-content">Learn more about SDWAN</span></a></div>
</div><div data-element-id="elm_-M6o_rd5AoLrhwfddyyoDQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-M6o_rd5AoLrhwfddyyoDQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel="">Redefining Connectivity in the Digital Age</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" title="The 'Real' SDWAN Test:" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div></div><div data-element-id="elm_bFHrnBjhtb96Vh5CJTGcZQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_bFHrnBjhtb96Vh5CJTGcZQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_oF0HDA0tROSZN17dhE2uvg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_oF0HDA0tROSZN17dhE2uvg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-left zpbutton-align-tablet-left"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 15 Jun 2023 09:40:58 -0500</pubDate></item><item><title><![CDATA[Case Study: Restaurant Tech]]></title><link>https://www.cloud9advisers.com/News/post/case-study-restaurant-tech</link><description><![CDATA[Case Study: A nationwide chain of fast-causal restaurants approached Cloud 9 in the midst of executing a growth strategy and needed help fast]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_tXOsGttIRWOvtFdqhkUXrA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_D4o8fbeqT2mAaUJKPuVoMw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_2Tq2k1stS6SYTV47ctdi6w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_iFnUvWt2Rh-k89AEtvye1A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_iFnUvWt2Rh-k89AEtvye1A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Restaurant needs&nbsp;</span><span style="color:inherit;">Multi-location Internet and Managed WiFi</span></h2></div>
<div data-element-id="elm_O0gu5grHERXjbrUOJZR_2w" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_O0gu5grHERXjbrUOJZR_2w"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1494346480775-936a9f0d0877?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDEyfHxjYXN1YWwlMjBkaW5pbmd8ZW58MHx8fHwxNjE2MDMwNTE3&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_F5HoqeUBFgOn2-RGH17Rvg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_F5HoqeUBFgOn2-RGH17Rvg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_lSzAHwPoWSKmjUZbFKmFIQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_lSzAHwPoWSKmjUZbFKmFIQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_eb_uCz8qtAix9lIYdBdN6Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_eb_uCz8qtAix9lIYdBdN6Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">Enable WiFi Networks to Attract Customers</span></div><p><span style="color:inherit;"><br></span></p><div>A nationwide chain of fast-causal restaurants approached Cloud 9 in the midst of executing a growth strategy that involved opening numerous additional locations on or near college campuses nationwide. As they looked to carry out their plan, they understood that providing reliable, free WiFi in their restaurants was an important way to attract customers.</div><p><span style="color:inherit;"><br></span></p><div>Using their existing arrangement, adding new branches to the network or increasing bandwidth at a location was going to be costly and time consuming.&nbsp; With locations spread across the entire United States, there would simply be too many carriers, contracts and individual projects to efficiently manage. The customer needed an affordable solution for internet connectivity that could deliver WiFi service at hundreds of locations across the country. Additionally, the customer was looking for outside expertise to help them manage each of these network components as a whole. As their current Internet contracts came due at individual locations, the customer needed a partner with the ability to cover all their locations and effectively project manage the volume. With locations throughout the continental U.S., there wasn’t a single provider that could meet their needs in each region.</div><p><span style="color:inherit;"><br></span></p><div><span style="font-weight:bold;">Customized Solution</span></div><p><span style="color:inherit;"><br></span></p><div>The client reached out to Cloud 9 Advisers to help develop a winning solution and then to identify, research, evaluate, and compare suitable vendors that could service all 274 client locations.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>Cloud 9 was able to introduce the client to several possible candidate vendors that could provide a customized solution for each location that took into support, service availability, and overall value.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>The clients hadn’t even considered seeking out a vendor that could not only deliver internet to each location but also manage each locations WiFi. The winning provider ultimately provided a solution that resulted in a combination of broadband cable and broadband fiber with SDWAN and a DSL backup connection at each site. Since the provider also had other managed services offerings the client chose to include Managed WiFi and security as well. The vendors team and Cloud 9 engineering used their overall knowledge of the telecom landscape to provide a specific location-by-location approach.</div><p><span style="color:inherit;"><br></span></p><div><span style="font-weight:bold;">Dedicated Resources Empowered to React</span></div><p><span style="color:inherit;"><br></span></p><div>As the project continued, inevitable challenges arose that threatened to significantly delay service deployment.&nbsp; While these situations are typical and, to an extent, expected in wide-scale deployments, Cloud 9 and the winning telecom and managed services provider was uniquely suited to shift gears to avoid significant delays.&nbsp; For example, several locations required a build. With dedicated vendor resources keeping a close eye on the project, the vendors project management and implementation teams could quickly move to another underlying provider. Being able to see the different options across vendors at any given location and understand the implications of one over another helped the customer avoid costly builds and unnecessary delays.</div><p><span style="color:inherit;"><br></span></p><div><span style="font-weight:bold;">All Locations Covered</span></div><p><span style="color:inherit;"><br></span></p><div>The customer has, to-date, turned up Internet access at over 200 of its 274 locations. For this customer, partnering with Cloud 9 to find the right vendor has meant not being tied to a single carrier’s network assets and not having to manage multiple suppliers. Instead, they receive the most efficient and cost-effective solution on a case-by-case basis. At the same time, they still benefit from a single provider who can assist them in deploying, managing, and supporting every location and the entire network. Add to that a team of dedicated resources to design, deliver and support the service, the experience has exceeded the customer’s expectations – delivering simplicity, flexibility and value.</div><p><span style="color:inherit;"><br></span></p><div>In the end, the customer increased their bandwidth at each of their restaurant locations while delivering more value to their customers via a better WiFi experience, all while reducing their expected costs, IT resources, and having a single call for support. Through this experience, the customer has gained tremendous confidence in Cloud 9 Advisers and the winning vendor.</div><p><span style="color:inherit;"><br></span></p><div><br></div></div>
</div></div><div data-element-id="elm_JsmNVNSLfFM_BR1J9FH7Lg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_JsmNVNSLfFM_BR1J9FH7Lg"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_pG-mMFMwBamnoZ1-5fm9kA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_pG-mMFMwBamnoZ1-5fm9kA"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_L2fBiKvkzQFG638obalcaw" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> [data-element-id="elm_L2fBiKvkzQFG638obalcaw"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/C9-Logo1.t-all%20200x103.png" data-src="/C9-Logo1.t-all%20200x103.png" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">About Cloud 9 Advisers</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div> Cloud 9 Advisers helps business leaders make technology buying decisions confidently and quickly. We also work with understaffed IT teams who are embarking on projects outside their wheelhouse. We are impartial, unbiased, and vendor-neutral technology practitioners with expertise in four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. We do not sell solutions, we help you buy the right solutions. We are not a vendor, we help you find the right vendors. We’ll help you quickly identify, research, evaluate, and compare appropriate solutions and vendors; eliminating months of labor trying to do it on your own. </div>
<div><br></div></div></div></div></div><div data-element-id="elm_y6dHcpiIRyWhPsribX-6qA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 17 Mar 2021 20:24:00 -0500</pubDate></item></channel></rss>