<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/sdn/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #SDN</title><description>Cloud 9 Advisers - News #SDN</description><link>https://www.cloud9advisers.com/News/tag/sdn</link><lastBuildDate>Tue, 24 Feb 2026 23:07:47 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Redefining Connectivity in the Digital Age]]></title><link>https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age</link><description><![CDATA[The B2B landscape is defined by the age of AI, cloud, and ubiquitous mobility. We explore how SDWAN and SASE are transforming the network from a cost center into the core strategic asset that drives advanced digital initiatives and fuels the AI gold rush.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_XA3OhJvvT1aZzVTrdhkPvQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_agzUTmSTQT-QxVGsMF3BAw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_5e4krQ7FR46xJ9t8_i2rmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_YBx_lEe_SEu1iNDKjj3CVA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;"><span>How SDWAN and SASE Fuel the Age of AI and Digital Strategy</span></span></h1></div>
<div data-element-id="elm_XYcZkgPcD2dDwzRMfWrKlQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-weight:bold;">Advanced Networking: The Foundational Requirement for the AI Era</span></p><p><span><span><span><span>The convergence of network optimization and cloud security transforms connectivity from a simple utility into the core strategic asset that enables mobility, IoT, and AI-driven growth.</span></span><br/></span></span></p><p><span><span><span><span><br/></span></span></span></span></p><p style="text-align:center;"><span><span><span><span><span><span style="font-style:italic;">Updated!&nbsp;</span></span><br/></span></span></span></span></p></div>
</div><div data-element-id="elm_vJ5mW9dYeQgXO9wbRdHiSw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_vJ5mW9dYeQgXO9wbRdHiSw"] .zpimage-container figure img { width: 1110px ; height: 369.42px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/artificial-intelligence-3706562_1280.jpg" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_osL2YtKZiEz20jz4t8Tfow" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>The modern network acts as an intelligent traffic control layer, prioritizing real-time AI data while securing every access point.</span></span></p></div>
</div><div data-element-id="elm_25RamFwwTPLd9yAdqGubMw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_25RamFwwTPLd9yAdqGubMw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_25RamFwwTPLd9yAdqGubMw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_aemv--3tH0aCZMkIizO-Bw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_9YoBLdTWISYfJc6Z5AkZDg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_sUYmup9gNv3NurUxkrujhg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-size:12pt;"></span></p><div><h1><span>Advanced Networking: The Foundational Requirement for the AI Era</span></h1><p><span>The modern B2B technology landscape is defined by two relentless forces: the shift of critical applications to the cloud, and the universal need for advanced, real-time data analysis. As customer needs evolve, driven by demands for instant communication, ubiquitous mobility, and sophisticated analytics, network architecture is no longer a back-office utility—it is the ultimate strategic enabler.</span></p><p><span><br/></span></p><p><span>Advanced solutions like cloud infrastructure, sophisticated cybersecurity defense, and transformative Customer Experience (CX) platforms are reshaping how network management operates. Without a high-performing, flexible, and secure network foundation, these initiatives cannot deliver their promised value. In fact, a brittle, legacy network architecture quickly becomes the single biggest bottleneck that cripples digital transformation.</span></p><p><span><br/></span></p><p><span>This realization is driving the rapid adoption and evolution of </span><strong>Software-Defined Wide Area Networking (SDWAN)</strong><span> and the mandatory shift to </span><strong>Secure Access Service Edge (SASE)</strong><span>. These are the twin pillars of advanced connectivity, transforming the network from a cost center into a true competitive asset.</span></p><h3><span><br/></span></h3><h3><span>The AI Gold Rush and the Network Bottleneck</span></h3><p><span>The excitement surrounding Artificial Intelligence (AI) and Machine Learning (ML) is palpable. From large language models (LLMs) used for generative tasks to predictive analytics driving operational efficiencies, every business is exploring how to harness this power. This technological pursuit can be described as the </span><strong>AI Gold Rush</strong><span>, and the fuel for this rush is </span><strong>data</strong><span>.</span></p><p><span><br/></span></p><p><span>However, the reality of deploying and scaling AI is harsh: AI models are voracious consumers and producers of data.</span></p><ul><li><p><strong>Training Data Load:</strong><span> Training new models requires moving massive, multi-petabyte datasets, often between enterprise locations, cloud storage, and specialized compute clusters. These sustained, heavy data streams place an immense strain on conventional wide area networks.</span></p></li><li><p><strong>Real-Time Inference:</strong><span> When models are deployed for real-time use (e.g., fraud detection, robotic process automation, or instant translation), the network must handle constant, bidirectional streams of </span><em>inference</em><span> data. This traffic demands extremely low latency, as milliseconds of delay can render the AI's result useless or too late for the human decision-maker.</span></p></li><li><p><strong>Edge AI and IoT:</strong><span> The proliferation of IoT devices and edge computing—essential for modern industrial operations or retail analytics—means AI is often deployed outside the data center. The network must aggregate data from thousands of endpoints, securely transport it for analysis, and then deliver inference back to the edge with near-zero delay.</span></p></li></ul><p><span>Legacy networks, designed primarily for static user-to-data-center traffic, are simply not equipped to handle the sheer volume, velocity, and priority requirements of these diverse AI data loads.</span></p><h3><span><br/></span></h3><h3><span>SDWAN’s AI Role: From Bandwidth to Intelligent Transport</span></h3><p><span>This is where the evolution of </span><strong>SDWAN</strong><span> becomes critical. SDWAN is moving beyond simply pooling bandwidth; it is now integrating </span><strong>AI and Machine Learning</strong><span> to enable a level of control that manual configuration could never achieve.</span></p><p><span><br/></span></p><p><span>The network must become self-aware and adaptive:</span></p><ol><li><p><strong>Adaptive Routing:</strong><span> Integrated ML capabilities allow the SDWAN solution to constantly monitor the quality of every available link (fiber, broadband, 5G, satellite) in real-time. If it detects a spike in jitter or packet loss on one link, it doesn't just failover; it instantly and preemptively steers critical traffic—like that associated with a remote AI inference operation or a vital cloud application—to a healthier path, often without any human intervention or network interruption.</span></p></li><li><p><strong>Application-Tailored Performance:</strong><span> Clients are prioritizing </span><strong>application-tailored performance</strong><span> over generalized capacity. A network built for the AI era must be intelligent enough to identify a large, non-urgent data backup (which can handle some latency) versus a sensitive UCaaS voice packet or a critical AI data stream. It uses its </span><strong>prioritization, optimization, and acceleration</strong><span> capabilities to allocate resources based on the business criticality of the application, ensuring that the most valuable traffic always wins.</span></p></li><li><p><strong>Convergence of Network, Mobility, and IoT:</strong><span> SDWAN facilitates the convergence of these three domains into a cohesive transport solution. By providing flexible, policy-driven connectivity, it ensures that real-time data transmission from mobile devices, manufacturing sensors, and cloud services flows efficiently. This integration is essential for providing the seamless, user-friendly experience modern businesses demand.</span></p></li></ol><p><span>SDWAN is no longer about getting more data through the pipe; it’s about making the pipe smarter, turning it into a dynamic data delivery system that is a prerequisite for successful AI adoption.</span></p><h3><span><br/></span></h3><h3><span>SASE and Security: Unifying the New Perimeter</span></h3><p><span>A conversation about advanced networking, especially one related to enabling AI and mobility, is fundamentally incomplete without addressing cybersecurity. As the network shifts to the cloud, the perimeter dissolves, and the risk surface expands exponentially. This is the driving force behind the mandatory shift to </span><strong>SASE (Secure Access Service Edge)</strong><span>.</span></p><p><span><br/></span></p><p><span>SASE and </span><strong>CASB (Cloud Access Security Broker)</strong><span> frameworks are transforming organizational security approaches by replacing fragmented, appliance-based security with a unified, cloud-native platform. This is the only way to manage the complexity and scale of modern threats.</span></p><p><span><br/></span></p><p><span>The integration of network optimization (SDWAN) and security convergence (SASE) delivers profound advantages:</span></p><ul><li><p><strong>Zero Trust Enforcement:</strong><span> A true SASE architecture embeds </span><strong>Zero Trust Network Access (ZTNA)</strong><span>. Instead of relying on the physical IP address of a location—which is obsolete in the mobile world—access policy is tied to the </span><strong>user's identity</strong><span> and the real-time posture of their device. This is crucial for protecting the sensitive data fueling AI, ensuring that only verified identities can access the massive data lakes required for model training and deployment.</span></p></li><li><p><strong>The Single Pane of Glass:</strong><span> SASE integrates multiple security functions (Firewall-as-a-Service, Secure Web Gateway, CASB) into a single software stack delivered from the cloud. This unified management platform greatly reduces the complexity, operational overhead, and security gaps inherent in multi-vendor, disparate solutions. Monitoring and managing security risks through a single interface provides unparalleled visibility and consistency across all endpoints and cloud resources.</span></p></li><li><p><strong>Pervasive, Low-Latency Security:</strong><span> Because SASE is delivered via a global network of PoPs (Points of Presence), security inspection happens close to the user, eliminating the need to &quot;backhaul&quot; traffic. This ensures that the security layer does not introduce performance-crippling latency, preserving the speed and efficiency required by AI and real-time cloud applications.</span></p></li></ul><p><span>In the advanced network, security is not an afterthought; it is an inseparable, integrated function of connectivity.</span></p><h3><span><br/></span></h3><h3><span>Understanding the Client Imperative</span></h3><p><span>The reality is that these advanced solutions are not a plug-and-play, one-size-fits-all commodity. They require a rigorous, third-party assessment to ensure they align with the unique needs and growth objectives of each business.</span></p><p><span><br/></span></p><p><span>Designing effective networking solutions in the age of AI and SASE requires:</span></p><ol><li><p><strong>Thorough Needs Assessment:</strong><span> Moving past simple link capacity metrics to understanding application requirements, data flow patterns (where the AI and IoT data is being generated and consumed), and specific security mandates (compliance, PII, etc.).</span></p></li><li><p><strong>Strategic Alignment:</strong><span> Ensuring that networking capabilities are not just meeting technical requirements but are directly enabling broader business objectives, such as a major cloud migration, the implementation of a new AI strategy, or the expansion of a mobile sales force.</span></p></li><li><p><strong>Vendor Neutrality:</strong><span> The market is saturated with vendors, each claiming a unique flavor of SDWAN or SASE. A trusted adviser is required to cut through the marketing noise, evaluate the true integration of the underlying technology, and shortlist providers that offer a genuinely unified, high-performing solution.</span></p></li></ol><p><span><br/></span></p><p><span>The digital age demands constant vigilance and architectural foresight. The successful organizations are those that view their network not as an expenditure, but as the core platform for innovation.</span></p><p><span><br/></span></p><p>At Cloud 9 Advisers<span>, we have a deep understanding of the challenges and opportunities at the intersection of AI, security, and connectivity. We are committed to providing our clients with the vendor-neutral insights and strategic solutions they need to navigate this complexity, achieve their business goals, and stay competitive in a rapidly evolving digital environment.</span></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div><span style="font-size:12pt;"><br/></span></div></div>
</div></div><div data-element-id="elm_Edv7AMMBMLmbT7rwjmCOWw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_Z_qMGMmzSOu_Ql2SHXbiBw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan"><span class="zpbutton-content">SD-WAN</span></a></div>
</div><div data-element-id="elm_yWHw1INNI6zc517E9iPpRg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""></a></p><p><a href="https://www.cloud9advisers.com/News/post/ai-engine" title="The Engine that Drives AI" rel="">The Engine that Drives AI</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 07 Feb 2025 13:17:45 -0500</pubDate></item><item><title><![CDATA[SD-WAN and SASE]]></title><link>https://www.cloud9advisers.com/News/post/sd-wan-and-sase</link><description><![CDATA[SDWAN optimizes your network. SASE secures your edge. We demystify the two fastest-growing acronyms in networking, clarify their distinct benefits for single and multi-location companies, and explain the components that create a truly unified SASE platform.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_1jXyK-BxSzyrWaKP8RqrUA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iT5zEM8tTIydTEbJVk5i1A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_gS4hskNZS06uKMpuP2R1QQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_5E1mk1d-aq_UX3M_nNC1YA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>SDWAN &amp; SASE: The Essential Guide to Converging Connectivity and Cloud Security</span></h1></div>
<div data-element-id="elm_EaYOe5_uT1Wkw5nbmuKiqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EaYOe5_uT1Wkw5nbmuKiqQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div style="color:inherit;"><div><span><span>Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network</span></span></div><div><span><span><br/></span></span></div><div><span><span><span><span>Cloud-first operations demand a new network model. Understanding the roles of Software-Defined Wide Area Networking (SDWAN) and Secure Access Service Edge (SASE) is the first step toward building a truly resilient and secure edge.</span></span><br/></span></span></div><div><span><span><span><span><br/></span></span></span></span></div><div><span><span><span><span><span><span>SASE and SDWAN represent the necessary convergence of security (the perimeter) and networking (the pathway) in the age of cloud and hybrid work.</span></span><br/></span></span></span></span></div></div></div>
</div><div data-element-id="elm_jkUNxYuneitwIK_sewBFAg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_jkUNxYuneitwIK_sewBFAg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_jkUNxYuneitwIK_sewBFAg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_BbiI0m9bI29ZdapwOsEbpw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"> [data-element-id="elm_BbiI0m9bI29ZdapwOsEbpw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dcjweYy9nV-YMoK-K7qnZA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dcjweYy9nV-YMoK-K7qnZA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_WblXvipEFTmJ2j7HnywXfw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WblXvipEFTmJ2j7HnywXfw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;"></span></p><div><h2><span>Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network</span></h2><p><span>For many IT leaders, the networking and security landscape over the past few years has felt like an endless alphabet soup. Two acronyms, in particular, have dominated strategic conversations: </span><strong>SDWAN</strong><span> and </span><strong>SASE</strong><span>.</span></p><p><span><br/></span></p><p><span>Both are frequently discussed in the context of modernization, cloud migration, and supporting the hybrid workforce. This has led to widespread confusion, with many vendors incorrectly presenting them as competing solutions, or worse, claiming that one automatically includes the other without proper implementation.</span></p><p><span><br/></span></p><p><span>At Cloud 9 Advisers, we act as pragmatic, expert advisers to help you cut through this noise. Simply put: </span><strong>SDWAN optimizes the network; SASE secures the edge.</strong><span> They are not competing technologies, but essential components that, when unified correctly, form the foundation of a modern, secure, and resilient network.</span></p><p><span>Understanding their individual roles is the first step to making the right strategic investment.</span></p><h3><span><br/></span></h3><h3><span>Part 1: Demystifying SDWAN (Software-Defined Wide Area Network)</span></h3><p><span>SDWAN is fundamentally a revolutionary approach to Wide Area Networking (WAN). Traditionally, WANs relied on complex hardware—specific routers, expensive leased lines (like MPLS), and manual configurations—to connect separate locations.</span></p><p><span><br/></span></p><p><span>SDWAN separates the control plane (the intelligence of the network) from the data plane (the physical connections). By shifting control to software, it gains two critical advantages: </span><strong>intelligence</strong><span> and </span><strong>flexibility</strong><span>.</span></p><p><span><br/></span></p><p><span>The SDWAN appliance at each location becomes application-aware, meaning it knows the difference between a voice packet, an email, or a large file download. This intelligence is then used to optimize traffic flow in real time across any combination of underlying links (fiber, broadband, 4G/5G, etc.).</span></p><h4><span><br/></span></h4><h4><span>The Pragmatic Benefits of SDWAN</span></h4><p><span>While SDWAN was originally designed to connect </span><strong>multiple locations</strong><span> effectively, it offers distinct and significant benefits even for </span><strong>companies with a single location</strong><span>:<br/><br/></span></p><table><tbody><tr><th style="width:13.516%;"><p><span style="font-weight:bold;">Audience</span></p></th><th style="width:25.137%;"><p><span>Primary Problem Solved</span></p></th><th style="width:59.5205%;"><p><span>Core SDWAN Benefit</span></p></th></tr><tr><td style="width:13.516%;"><p><strong>Single Location</strong></p></td><td style="width:25.137%;" class="zp-selected-cell"><p><span>Internet instability, QoS issues for real-time apps, reliance on expensive single circuits.</span></p></td><td style="width:59.5205%;"><p><strong>Reliability &amp; Efficiency:</strong><span> It aggregates multiple, low-cost internet links into a unified connection. It uses that power to ensure mission-critical applications (like UCaaS or a cloud ERP system) always have the bandwidth they need, while less critical traffic is given lower priority. It provides a more robust, stable connection than any single circuit ever could.</span></p></td></tr><tr><td style="width:13.516%;"><p><strong>Multiple Locations</strong></p></td><td style="width:25.137%;"><p><span>High cost of traditional WAN (MPLS), complex management, and traffic backhauling for security.</span></p></td><td style="width:59.5205%;"><p><strong>Virtual Network &amp; Cost Reduction:</strong><span> This is the original design intent. It creates a seamless, virtual network that spans multiple physical locations, making management centralized and simple. Critically, it allows companies to swap expensive MPLS with low-cost broadband, reducing ongoing network costs while improving agility and allowing for dynamic, automated routing around outages or congestion.</span></p></td></tr></tbody></table><p><span><br/></span></p><p><span>SDWAN’s value is in </span><strong>resilience</strong><span> and </span><strong>performance</strong><span>. It is the key to providing the high-quality, low-latency connectivity required for the sensitive, real-time applications we discussed in our last article on Call Survivability.</span></p><h3><span><br/></span></h3><h3><span>Part 2: Demystifying SASE (Secure Access Service Edge)</span></h3><p><span>If SDWAN is the intelligent highway, then </span><strong>SASE (Secure Access Service Edge)</strong><span> is the integrated, cloud-native security perimeter applied to that highway's entrance and exit ramps.</span></p><p><span><br/></span></p><p><span>SASE is an architectural framework, not a single product. It was introduced to address the reality that the traditional network perimeter—the firewall in your server room—is obsolete. Users now access corporate data from home, coffee shops, and client sites using personal devices, reaching applications hosted in multiple clouds.</span></p><p><span><br/></span></p><p><span>The goal of SASE is simple: </span><strong>Secure and reliable access to corporate resources from any location, without sacrificing user experience or performance.</strong></p><p><span><br/></span></p><p><span>A comprehensive, robust SASE solution is built upon the convergence of several key security and networking components, all delivered via a single, cloud-based platform. If a vendor is missing even one of these components, they are selling a partial, non-SASE solution.</span></p><h4><span><br/></span></h4><h4><span>The Five Essential Components of a True SASE Platform</span></h4><p><span>A good SASE solution brings together the following technologies into a unified stack:</span></p><ol><li><p><strong>Secure Web Gateway (SWG):</strong><span> Provides secure, cloud-based internet access. It acts as the first line of defense, blocking malicious websites, filtering URLs, and applying advanced malware detection before traffic even reaches the user’s device or the corporate network.</span></p></li><li><p><strong>Cloud Access Security Broker (CASB):</strong><span> The CASB provides critical visibility and control over cloud applications (SaaS). It monitors user activity within apps like Microsoft 365, Salesforce, and Dropbox, enforces security policies, and prevents data leakage by encrypting sensitive data both in transit and at rest.</span></p></li><li><p><strong>Firewall-as-a-Service (FWaaS):</strong><span> This replaces the traditional physical, on-premise firewall. FWaaS is a cloud-native security layer that controls access to corporate resources and blocks unauthorized traffic, applying consistent security policies to users regardless of their location.</span></p></li><li><p><strong>Zero Trust Network Access (ZTNA):</strong><span> This is the modern replacement for traditional VPNs. ZTNA is critical because it never grants blanket access to the entire network. Instead, it operates on a principle of &quot;never trust, always verify,&quot; granting users access only to the specific applications they need, only after identity verification, and only from a compliant device. This hides corporate resources from the public internet entirely.</span></p></li><li><p><strong>Identity and Access Management (IAM):</strong><span> An integral part of the Zero Trust model. IAM provides the centralized control over user identities, authentication (often multi-factor, or MFA), and authorization. It is the engine that validates who a user is and what they are allowed to access, enforcing policy consistently across the entire SASE stack.</span></p></li></ol><p><span><br/></span></p><p><span>And finally, the often-misunderstood component:</span></p><ul><li><p><strong>Software-Defined Wide Area Networking (SDWAN):</strong><span> A true SASE architecture </span><strong>includes</strong><span> SDWAN functionality. The networking side of SASE is responsible for optimizing the transport layer—selecting the best path for traffic based on business requirements and dynamically routing it across various links (broadband, 5G, private connections). It ensures the high-performance delivery of traffic to and from the secure SASE cloud edge.</span></p></li></ul><h3><span><br/></span></h3><h3><span>SDWAN + SASE: The Convergence Strategy</span></h3><p><span>The modern B2B enterprise is defined by dispersed data, dispersed users, and dispersed applications. The only way to manage this complexity effectively is through convergence.</span></p><p><span><br/></span></p><p><span>The strategic relationship can be summarized simply:</span></p><ul><li><p><strong>SDWAN is the foundation of high-performance connectivity.</strong><span> It delivers the path optimization, quality of service (QoS), and resilience (call survivability) that your business demands.</span></p></li><li><p><strong>SASE is the strategic security framework.</strong><span> It delivers the identity-centric access control (ZTNA), threat prevention (SWG, FWaaS), and data protection (CASB) that your business requires, regardless of where the user is located.</span></p></li></ul><p><span><br/></span></p><p><span>By consolidating these functions into a unified, cloud-based platform—the core tenet of SASE—businesses gain:</span></p><ol><li><p><strong>Simplified Management:</strong><span> Moving from managing six different boxes (router, firewall, VPN concentrator, web filter, etc.) to managing one policy stack in the cloud.</span></p></li><li><p><strong>Consistent Security:</strong><span> Every user, no matter where they are or how they connect, gets the exact same security inspection and policy enforcement.</span></p></li><li><p><strong>Cost Efficiency:</strong><span> Reducing hardware footprints and maintenance costs, leveraging lower-cost internet links, and consolidating vendor contracts.</span></p></li><li><p><strong>Agility:</strong><span> The network scales instantly to accommodate mergers, acquisitions, or sudden shifts to remote work, without needing to deploy physical hardware.</span></p></li></ol><h3><span><br/></span></h3><h3><span>Simplifying the Strategic Choice</span></h3><p><span>The choice between SDWAN and SASE is a false one; the correct answer is a converged solution.</span></p><p><span><br/></span></p><p><span>However, the vendor landscape is complex, with providers offering partial solutions that may excel at the &quot;SDWAN&quot; part but provide poor, bolt-on security, or vice versa. The strategic challenge is identifying the partner that can deliver a </span><strong>truly unified SASE platform</strong><span>—one where the networking and security components are built to work together seamlessly, eliminating gaps and preserving performance.</span></p><p><span><br/></span></p><p><span>Don’t get stuck in the alphabet soup of acronyms. Focus on the required outcomes: </span><strong>resilient performance and secure access from anywhere.</strong></p><p><span><br/></span></p><p><span>At Cloud 9 Advisers, we help technology leaders sift through the noise, evaluate the true integration level of SASE vendors, and select the platform that meets the specific demands of their single or multi-location business model.</span></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div><span style="font-size:12pt;"><br/></span></div>
</div></div><div data-element-id="elm_CV5VuMRYDmcEvhmfgMYM2w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_CV5VuMRYDmcEvhmfgMYM2w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sase" target="_blank"><span class="zpbutton-content">Learn more about SASE</span></a></div>
</div><div data-element-id="elm_FxB8pAckLtzq7zPAwodPLg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_FxB8pAckLtzq7zPAwodPLg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan" target="_blank"><span class="zpbutton-content">Learn more about SDWAN</span></a></div>
</div><div data-element-id="elm_-M6o_rd5AoLrhwfddyyoDQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-M6o_rd5AoLrhwfddyyoDQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel="">Redefining Connectivity in the Digital Age</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" title="The 'Real' SDWAN Test:" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div></div><div data-element-id="elm_bFHrnBjhtb96Vh5CJTGcZQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_bFHrnBjhtb96Vh5CJTGcZQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_oF0HDA0tROSZN17dhE2uvg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_oF0HDA0tROSZN17dhE2uvg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-left zpbutton-align-tablet-left"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 15 Jun 2023 09:40:58 -0500</pubDate></item><item><title><![CDATA[Bulletproof internet with SDWAN]]></title><link>https://www.cloud9advisers.com/News/post/bulletproof-internet-with-sdwan</link><description><![CDATA[Tired of network complexity, constant outages, and misconfigurations? We break down the four core operational benefits of SDWAN, showing how it transforms your WAN from a management burden into a bulletproof, expert-managed utility, freeing your IT team for strategic work.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_47Gd291vSuSNIu_dKruRog" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_gGxwSaLPTHKkul0WBiBcMg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_KWyTGzYYTzmstj6Ng8nehA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_KWyTGzYYTzmstj6Ng8nehA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_UjhYnljSTSCzNEG29CoeAA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">SDWAN Makes Life Easier for IT</h2></div>
<div data-element-id="elm_v6-7UqbugKbf3z3WiCTl6w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span style="font-weight:bold;">How Software-Defined Networking Eliminates Operational Headaches and Drives Strategic Value</span></p><p></p><div><p>Moving beyond cost savings, the greatest value of Software-Defined Wide Area Networking is the dramatic reduction in complexity, risk, and operational fatigue for network administrators.</p></div><br/><p></p><p style="text-align:center;"><span style="font-style:italic;">UPDATED!&nbsp;</span></p></div><p></p></div>
</div><div data-element-id="elm_pkM6h2uJQGvykMRNMVYiTA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_pkM6h2uJQGvykMRNMVYiTA"] .zpimage-container figure img { width: 1000px !important ; height: 1500px !important ; } } [data-element-id="elm_pkM6h2uJQGvykMRNMVYiTA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/pexels-photo-5231332.jpeg" size="original" alt="SDWAN makes life easy for IT. Cloud 9 make SDWAN easy" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm__AXYrW5udmXtyNZwszFT5g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>SDWAN transforms the complex, fragile traditional WAN and/or internet connection into a simple, self-managing utility.</p></div><p></p></div>
</div><div data-element-id="elm_zJ8p73pFltUtbMMB_OAwiw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_zJ8p73pFltUtbMMB_OAwiw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_zJ8p73pFltUtbMMB_OAwiw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_t_g0HEXw7O8ebslrPXFNFw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_t_g0HEXw7O8ebslrPXFNFw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_K0n48GzBfN225aGlrFJf0w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_K0n48GzBfN225aGlrFJf0w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_TxOpADniCA1q8fGbZvpXdQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_TxOpADniCA1q8fGbZvpXdQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div></div><div><h2>SDWAN Makes Life Easier for IT: Four Ways Intelligent Connectivity Simplifies Your Day</h2><p>In the world of B2B technology, network management has long been one of the most demanding, labor-intensive roles. The traditional Wide Area Network (WAN) is a brittle system: prone to errors, reliant on costly hardware upgrades, and subject to failure every time a single circuit experiences turbulence.</p><p><br/></p><p>While much of the industry talks about <strong>SDWAN</strong> benefits in terms of better performance and reduced cost compared to legacy MPLS, the most profound value often goes overlooked: <strong>SDWAN makes life easier for the IT administrator and the technology leader.</strong></p><p><br/></p><p>SDWAN is a realization of the decades-long promise of turning infrastructure into a simple utility. It takes the complexities of link aggregation, real-time traffic steering, security enforcement, and cloud access and packages them into an intelligent, managed service. This shift transforms your WAN from a management burden into a bulletproof, expert-managed asset, freeing up valuable IT hours.</p><p><br/></p><p>Here are the four core operational pillars that SDWAN delivers to IT teams:</p><h3><br/></h3><h3>Pillar 1: Eliminating the Biggest Headache (Guaranteed Resilience and Uptime)</h3><p>The number one stressor for any IT professional is downtime. A network failure is a direct line to lost revenue, angry calls, and all-hands-on-deck troubleshooting. SDWAN’s design focuses obsessively on preventing this stress point, realizing the goal of a <strong>bulletproof internet</strong> connection.</p><h4><strong><br/></strong></h4><h4><strong>Never Experience Downtime Again</strong></h4><p>This is not a marketing promise; it’s an architectural reality based on <strong>aggressive link monitoring</strong> and <strong>link aggregation</strong>.</p><ul><li><p><strong>Seamless Traffic Flow:</strong> SDWAN uses its unique software approach to combine two or more internet connections (broadband, fiber, 4G/5G) into a single logical pipe. It constantly monitors every link for critical performance metrics like throughput, <strong>packet loss, latency, and jitter</strong>. When a provider’s circuit performance dips below acceptable thresholds, your traffic will simply flow <em>around</em> the issue. There are no dramatic <strong>failover interrupts</strong>, just seamless, packet-by-packet traffic flow.</p></li><li><p><strong>No Wasted Standby Circuits:</strong> In the legacy approach, a backup circuit was often a <strong>wasted cost</strong>—sitting dormant until a disaster struck. SDWAN utilizes all available links simultaneously, intelligently load balancing traffic across them to maximize bandwidth and return on investment.</p></li><li><p><strong>Active &quot;VVV&quot; Survivability:</strong> This is the ultimate proof of resilience. If you are on an active, real-time voice or video call (or VPN connection) and all but one of your internet links fail, a true SDWAN solution will maintain that session. This eliminates one of the most frustrating and high-priority troubleshooting calls IT teams receive.</p></li></ul><p>SDWAN ensures that as long as two or more connections are present and at least one link remains operational, the business keeps running. The system does the complex, real-time monitoring and rerouting, allowing the IT team to focus on strategic work instead of constant <strong>firefighting</strong>.</p><h3><br/></h3><h3>Pillar 2: Complexity Reduction (From Expert to Utility)</h3><p>Traditional networking demands specialized, siloed expertise—one person for routing, another for firewalls, another for QoS. SDWAN drastically <strong>reduces network complexity</strong> by collapsing multiple functions into a single, centrally managed software stack.</p><h4><strong><br/></strong></h4><h4><strong>Network Management as a Utility</strong></h4><p>With SDWAN, the network simply becomes a managed utility that a qualified provider takes care of. This operational shift provides immense benefits:</p><ul><li><p><strong>Zero-Touch Configuration:</strong> Modern SDWAN platforms enable <strong>zero-touch provisioning</strong>. Appliances can be shipped to a site, plugged in by non-technical staff, and they automatically configure themselves via the central cloud controller. This eliminates the risk of human error from manual configurations, failed upgrades, and security vulnerabilities that often plague complex, dispersed hardware environments.</p></li><li><p><strong>Reduced Operational Costs and Headaches:</strong> By offloading the complex, low-level routing and monitoring tasks to the SDWAN platform, IT administrators no longer need to maintain a whole range of vendor-specific skills just to keep the lights on. This significantly reduces operational costs and the <em>headache factor</em> associated with managing a brittle, multi-vendor WAN.</p></li><li><p><strong>Consolidated Policy Enforcement:</strong> Instead of pushing individual policies to dozens of routers and firewalls, SDWAN allows administrators to define the entire network’s behavior—quality of service, security rules, and access permissions—from one central, cloud-based dashboard. This unified control minimizes the potential for misconfigurations across sites.</p></li></ul><h3><br/></h3><h3>Pillar 3: Agility and Cloud Enablement (Simplifying Hybrid Environments)</h3><p>Modern businesses rely on the cloud and a highly mobile, dispersed workforce. Legacy network infrastructure creates friction, complexity, and security gaps when attempting to extend the corporate perimeter to cloud providers or temporary sites. SDWAN is inherently built for agility.</p><h4><strong><br/></strong></h4><h4><strong>Easily Realize a Multi-Cloud Strategy</strong></h4><p>Extending traditional infrastructure to multiple cloud providers (like AWS, Azure, or GCP) or integrating with major SaaS platforms (like Salesforce or Microsoft 365) is notoriously difficult and resource-intensive. SDWAN makes it simple:</p><ul><li><p><strong>Secure Cloud Edge Deployment:</strong> With a managed SDWAN service, a secure network edge can be deployed into each cloud environment as a simple software node. This creates a secure, optimized tunnel between your physical locations, your remote users, and your cloud resources. The network is extended, not awkwardly bolted on, making a multi-cloud strategy both simple and secure.</p></li></ul><h4><strong><br/></strong></h4><h4><strong>Make Remote and Temporary Location Headaches a Thing of the Past</strong></h4><p>The flexibility of the software-defined architecture allows IT teams to rapidly deploy connectivity anywhere the business needs it:</p><ul><li><p><strong>Trivial Site Deployment:</strong> Need to spin up a temporary construction office, a pop-up retail shop, or a remote warehouse for three months? With the right SDWAN service, it's trivial. The provider can deploy the service with <strong>zero-touch</strong> configuration, treating the temporary site as just another secure edge node on the private network.</p></li><li><p><strong>Secure Remote Workers:</strong> SDWAN principles, now integrated into SASE (Secure Access Service Edge), allow for easy and secure deployment of remote access via software agents on user laptops. This eliminates the vulnerability of traditional VPNs, giving the remote worker the same level of performance, security, and policy control as if they were in the main office.</p></li></ul><h3><br/></h3><h3>Pillar 4: Accountability and Visibility (Empowering the IT Team)</h3><p>In the old way, when the network failed, the IT administrator was often caught between two conflicting parties: the end-user complaining about performance and the ISP denying any outage. SDWAN provides the objective, granular data necessary to end this cycle of blame and improve operations.</p><h4><strong><br/></strong></h4><h4><strong>Track and Improve Network Quality</strong></h4><p>SDWAN’s built-in advanced reports and analytics are a game-changer for IT teams, providing actionable insights far beyond the LAN (Local Area Network):</p><ul><li><p><strong>Objective Provider Accountability:</strong> You gain the tools to truly <strong>track your network quality</strong> and hold providers to task. Reports easily supply clear data on link <strong>uptime</strong>, <strong>packet loss</strong>, and even <strong>Mean Opinion Score (MOS)</strong>—a critical metric for judging voice quality. When a provider claims &quot;the circuit is up,&quot; you have definitive proof of where the actual issues lie (e.g., high jitter or high packet loss).</p></li><li><p><strong>Proactive Issue Resolution:</strong> The ability to see <strong>end-to-end visibility, reporting, and control</strong> allows administrators to move from reactive troubleshooting to <strong>proactive management</strong>. You can identify links that are consistently underperforming <em>before</em> they cause a hard outage, allowing you to engage a provider about a replacement or upgrade strategically.</p></li></ul><h3><br/></h3><h3>The Strategic Buying Decision</h3><p>The benefits of SDWAN are not a small list of features; they are a fundamental shift in how IT operates. They allow IT professionals to move away from constant fire-fighting and focus their expertise on high-value, strategic initiatives like cloud migration, security enhancement, and supporting AI adoption—which is where the business truly needs them.</p><p><br/></p><p>Every major ISP and managed service provider now offers some flavor of SDWAN. Yet, many of them are simply repackaging old firewalls or basic load balancers, calling it SDWAN just because the box has multiple WAN ports. This is where the confusion starts, and where a mistake can cost time, money, and stress.</p><p><br/></p><p>That is the million-dollar question: Which <strong>SDWAN platform and solutions provider</strong> is right for you?</p><p><br/></p><p>We don't sell solutions and we aren't a vendor. All we are here to do is to help clients buy the right solutions from the right vendors. Our Supplier Portfolio currently contains over 500 suppliers and&nbsp; dozens companies that offer SDWAN services - let's find out which is right for you. Each one is slightly different and fills different needs, and we know all about each one of them. Our team of experts and engineers will help you better understand the fine nuances and which ones are the best for you to choose from.</p><p><br/></p><p>Learn more and book an appointment with us today.</p><p><strong><br/></strong></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div></div>
</div></div></div><div data-element-id="elm_qjJj4G7hJkHdUPk9JEIHLA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_qjJj4G7hJkHdUPk9JEIHLA"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_OQAxAmdAAIE2vjE3RJzhfg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_OQAxAmdAAIE2vjE3RJzhfg"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_qbI_qX7lRyKy7azEzzAqgg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_qbI_qX7lRyKy7azEzzAqgg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan" title="contact us -&amp;gt; book appointment"><span class="zpbutton-content">Discover SDWAN</span></a></div>
</div><div data-element-id="elm_wRZV-JVbZ69rU8GyTaFrUQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-right zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-weight:bold;">Read more about SDWAN and SASE:&nbsp;</span></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-is-hot" title="SDWAN is hot!" rel="">SDWAN is hot!</a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/saas-fears-justified" title="SaaS fears justified?" rel="">SaaS fears justified?</a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/Is-SASE-the-next-gen-SDWAN" title="SASE, the next-gen SD-WAN?" rel="">SASE, the next-gen SD-WAN?</a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" title="The SDWAN Survivability Test" rel="">The SDWAN Survivability Test</a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/will-the-real-sdwan-please-stand-up" title="Will the real SDWAN please stand up" rel="">Will the real SDWAN please stand up</a><br/></p></div>
</div><div data-element-id="elm_PBeBKIXq86Y7vQi-zgpjPQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/disaster-recovery-as-a-service" target="_blank"><span class="zpbutton-content">What does this button do?</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 18 Mar 2021 19:09:20 -0500</pubDate></item><item><title><![CDATA[Still Managing Hardware?]]></title><link>https://www.cloud9advisers.com/News/post/Still-Managing-Hardware</link><description><![CDATA[If managing servers isn't your core business, it's time to stop. We break down three strategic option - Colocation, Private Cloud, and Hyperscale - to help B2B leaders pivot from capital-intensive hardware ownership to a predictable, agile, and scalable operational expenditure model.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_eyqAijJZS3-pYMowvuySFQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_DAyjHOcIRt6u1o_YxIxbzg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ouCr7tgkTCa768uQYCjGaA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_GmmcQuXnTKmvXcMmPdM4bQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_GmmcQuXnTKmvXcMmPdM4bQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;">Why keep managing hardware if you don't have to?</span></h2></div>
<div data-element-id="elm__Tiwhn5g1JIrxM1oqTuVug" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm__Tiwhn5g1JIrxM1oqTuVug"] .zpimage-container figure img { width: 1110px ; height: 739.71px ; } } [data-element-id="elm__Tiwhn5g1JIrxM1oqTuVug"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/g8f7ecb28ebffb2714d43f9c0f300a69b55ff9a3baae33db2970cba9b6a683f889929a1840bee3b86684f410910fa6675651ae077ead9d144a32226472878eabe_1280.jpg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_X-S-ncYY0naopFoHAAIPFg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>When managing servers isn't your core competency, it's a financial drain and a source of IT fatigue. Explore the core options—Colocation, Private Cloud, and Hyperscale—to strategically outsource infrastructure management.</span></p><p><span><br/></span></p></div>
</div><div data-element-id="elm_PEaDQR6rGP0MpQCN-upKJw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"> [data-element-id="elm_PEaDQR6rGP0MpQCN-upKJw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_sUq0LPTymrWWOIU8htXs9Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_sUq0LPTymrWWOIU8htXs9Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_vMhlU_iNEf449IODcrqX5g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vMhlU_iNEf449IODcrqX5g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;"></span></p><div><h3>Still Managing Hardware? The Strategic Shift from CapEx to Agile OpEx</h3><p>If your organization is not in the business of managing and maintaining server hardware as a service, then why is your valuable IT staff dedicating precious time and budget to it?</p><p><br/></p><p>The question is a critical one, particularly for mid-sized B2B companies. When you are still purchasing, racking, and maintaining physical infrastructure—whether in a dusty server closet, a professional <strong>on-premise</strong> facility, or a <strong>colocation/datacenter</strong>—you are locked into a high-risk, capital-intensive cycle.</p><p><br/></p><p>The strategic shift to offload this burden is not just about scalability; it’s about financial practicality, employee focus, and risk mitigation. It’s the essential pivot from unpredictable <strong>Capital Expenditure (CapEx)</strong> to agile <strong>Operational Expenditure (OpEx)</strong>.</p><p><br/></p><p>For those looking to exit the hardware business without jumping headfirst into a hyperscale environment, a pragmatic approach is necessary. We break down the three primary options available, moving from minimal outsourcing to full-service consumption.</p><h3><br/></h3><h3>Option 1: Colocation (Outsourcing the Building)</h3><p><strong>Colocation</strong> (or &quot;colo&quot;) is the practice of housing your organization's owned server hardware and networking equipment in a third-party datacenter facility. It is the first, most conservative step away from full on-premise management.</p><h4><br/></h4><h4>What You Outsource:</h4><p>Colocation outsources the <strong>physical environment</strong>—not the hardware ownership or maintenance. A quality colo provides:</p><ul><li><p><strong>Physical Security:</strong> Robust, 24/7 security, often including biometric access control and CCTV.</p></li><li><p><strong>Redundant Power &amp; Cooling:</strong> Clean, conditioned, redundant power (generators and UPS systems) and industrial-grade HVAC, eliminating the risk of physical failures common in office environments.</p></li><li><p><strong>Connectivity:</strong> Access to diverse, high-bandwidth network options.</p></li></ul><h4><br/></h4><h4>What You Retain:</h4><p>You still own the physical servers, storage arrays, and networking equipment. This means you retain the <strong>CapEx burden</strong> and are still responsible for managing:</p><ul><li><p><strong>Hardware Maintenance:</strong> Ongoing support (M&amp;S), warranty renewals, and physical replacement of failed components.</p></li><li><p><strong>Virtualization and Operating Systems:</strong> The hypervisor, containers, operating systems, and applications remain entirely under your management.</p></li></ul><p><br/></p><p>Colocation is best for organizations with specialized or highly proprietary <strong>legacy applications</strong> that cannot be easily migrated, or for hardware that still has significant life left and must be leveraged as part of a <strong>hybrid solution</strong>.</p><h3><br/></h3><h3>Option 2: Private Cloud (Outsourcing the Stack)</h3><p>A <strong>Private Cloud</strong> is a logical evolution of colocation. While the definition is flexible, for our purposes, we define it as a dedicated, single-tenant, virtualized environment delivered as a service by an external provider. It is a subset of <strong>Infrastructure as a Service (IaaS)</strong>.</p><h4><br/></h4><h4>What You Outsource:</h4><p>With Private Cloud, you effectively outsource the entire <strong>physical stack</strong>—the hardware, the physical network, and the datacenter itself.</p><ul><li><p><strong>No Hardware Ownership:</strong> You eliminate the CapEx cost, M&amp;S burden, and the need to refresh or manage underlying hardware.</p></li><li><p><strong>Dedicated Resources:</strong> You receive a pool of compute, storage, and networking resources that are <em>physically</em> separated from other customers, making it ideal for applications with strict regulatory, security, or ultra-low latency requirements.</p></li><li><p><strong>Management Relief:</strong> You no longer worry about physical emergencies, allowing your IT team to pivot from <strong>hardware maintenance</strong> to <strong>application optimization.</strong></p></li></ul><h4><br/></h4><h4>What You Retain:</h4><p>You still manage the logical layers critical to your business:</p><ul><li><p><strong>Hypervisor/Virtualization:</strong> Management of the hypervisor and/or containers, operating systems, and all running applications remains your responsibility.</p></li></ul><p><br/></p><p>Private Cloud provides a high degree of control and customization, making it suitable for complex, legacy, or highly sensitive custom applications that might struggle in a multi-tenant environment. While Private Cloud is easier to scale than physical hardware, it may still have longer provisioning lead times than public options.</p><h3><br/></h3><h3>Option 3: Public Cloud / Hyperscale (Outsourcing the Everything)</h3><p><strong>Public Cloud</strong> (or <strong>Hyperscale</strong>) environments, such as AWS, Microsoft Azure, and Google Cloud Platform (GCP), represent the deepest dive into OpEx and are an entirely different world of consumption.</p><h4><br/></h4><h4>What It Is:</h4><p>This is a highly elastic, multi-tenant environment where physical and virtual resources are shared across many customers. The key difference is the granularity of consumption and cost. Nearly every specification of the server—CPU cycles, memory, I/O requests—is a variable, consumable, and costed service.</p><h4><br/></h4><h4>The Strategic Advantage:</h4><ul><li><p><strong>Maximum Agility:</strong> Resources can be spun up or down in minutes, allowing for unprecedented agility and fast deployment of new applications.</p></li><li><p><strong>Innovation Access:</strong> Provides immediate access to cutting-edge services like serverless computing, Machine Learning (ML), and AI toolsets that would be prohibitively expensive to build on your own.</p></li><li><p><strong>Scalability:</strong> Offers virtually infinite scalability to handle massive shifts in demand.</p></li></ul><h4><br/></h4><h4>The Strategic Challenge:</h4><p>While the benefits are numerous, the complexity of cost and configuration is substantial. Without strict governance, cost management in a hyperscale environment can quickly spiral out of control. It requires a different, more specialized skillset than traditional IT management.</p><h3><br/></h3><h3>Making the Right Strategic Choice</h3><p>The ideal answer is rarely a single option. For most B2B organizations, a <strong>hybrid solution</strong>—combining existing Colocation/on-premise assets with a mix of Private and Hyperscale Cloud services—is the best approach to account for hardware that still has life left while leveraging the financial and operational agility of the cloud.</p><p><br/></p><p>However, moving from the clear-cut hardware world to the flexible, complex world of cloud requires more than a simple comparison chart. It requires an objective guide.</p><p><br/></p><p>The vendors and services that specialize in Colocation are different from those that specialize in Private Cloud, which are different still from those required to effectively manage Hyperscale environments. If your goal is to reduce risk, remove IT fatigue, and move from <strong>CapEx waste</strong> to a predictable <strong>OpEx model</strong>, you need impartial, vendor-neutral expertise to navigate the research, planning, evaluation, and comparison of all the options to fit your specific needs.</p><p><strong><br/></strong></p><p><strong>Technology. Driven. Outcomes.</strong></p><h3><br/></h3><h3>Next Step</h3><p>If you are currently facing a technology contract renewal or a hardware refresh and need clarity on which of these three strategic paths—Colocation, Private, or Public Cloud—is the right financial and operational decision for your team, <strong>get in touch</strong> to explore your options.</p></div><p style="margin-bottom:10pt;"><span style="font-size:12pt;"></span></p><p></p><p><span style="font-size:15px;"><span style="color:inherit;"></span></span></p></div>
</div></div><div data-element-id="elm_680uu-Ax-fDYHxuZ-gYqTA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_680uu-Ax-fDYHxuZ-gYqTA"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_Y2a7mOFE8ocfWpiqtn4WNA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_Y2a7mOFE8ocfWpiqtn4WNA"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_NKMMQuAiHip_MAJ8mLZo0w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-right zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-weight:bold;">More fun posts to read and learn more:</span></p><p></p><div><div><div><div><div><div><div><div><div><div><a href="https://www.cloud9advisers.com/News/post/get-into-the-cloud-now" rel="">Get into the Cloud, NOW</a></div><div><div><p style="margin-bottom:5px;"><a href="https://www.cloud9advisers.com/News/post/cloud-migration">Cloud Migration: The 6 Rs</a></p></div></div><div><a href="https://www.cloud9advisers.com/News/post/3-reasons-for-hybrid-cloud" rel="">3 Reasons for Hybrid Cloud</a></div></div></div></div></div></div></div></div></div></div><p></p></div>
</div><div data-element-id="elm_bi4XzCNtAiHiVfhVaL3VYQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_bi4XzCNtAiHiVfhVaL3VYQ"].zprow{ border-radius:1px; margin-block-start:42px; } </style><div data-element-id="elm_c7c3KpA4Iyqzi-0Q8BrCYA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_c7c3KpA4Iyqzi-0Q8BrCYA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_0F2pYZuapsnpa8UFNxma2A" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_0F2pYZuapsnpa8UFNxma2A"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/cloud"><span class="zpbutton-content">Learn more</span></a></div>
</div></div><div data-element-id="elm_1nDF5HJIxx1vhMTG8wV_2A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_1nDF5HJIxx1vhMTG8wV_2A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_CrUQaKOw12SoNYPGz8eo6g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_CrUQaKOw12SoNYPGz8eo6g"].zpelem-button{ border-radius:1px; margin-block-start:20px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Book an appointment. </span></a></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 22 Jan 2021 21:58:35 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: ECESSA]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-ecessa</link><description><![CDATA[You may be able to get all the bandwidth you need from one provider, on one circuit, but that introduces a huge risk of network outages. Fiber is great, but it’s not invincible! Being single-threaded puts you just one backhoe mishap or transformer explosion away from extended, expensive downtime.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_MVE6g-InT_-OnyS0SZ7lsw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2ScaT640RnGh7nO8Ke88Ow" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ivSAehZyS064VbPRYBZMHw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_4VdH17AoTzeS5SsWr_uG7g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4VdH17AoTzeS5SsWr_uG7g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">You Need More Than Just Fiber in Your Diet!</span></h2></div>
<div data-element-id="elm_yyqPPgGzK80j_uHPPml5dg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_yyqPPgGzK80j_uHPPml5dg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/54e0d2444355aa14f6da8c7dda79367f103cd9ed55536c4870277ad1944dcd58bf_1280.jpg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_JYuycZzUs_wErdSCYxNJ3g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JYuycZzUs_wErdSCYxNJ3g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:18px;">Cloud 9 Supplier Spotlight:&nbsp; <span style="font-weight:bold;"><a href="https://www.ecessa.com/" title="ECESSA" target="_blank">ECESSA</a></span></span></p></div>
</div><div data-element-id="elm_eKM7knIzWNLSvvmxvzprag" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_eKM7knIzWNLSvvmxvzprag"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.ecessa.com/" target="_blank" title="www.ecessa.com" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/SD%20ecessa.jpg" size="original"/></picture></a></figure></div>
</div><div data-element-id="elm_D4XlaUyoNI_j1rB1RZyRmQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_D4XlaUyoNI_j1rB1RZyRmQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_GdnIlqHVKi9y-MMfwRsjFA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_GdnIlqHVKi9y-MMfwRsjFA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Uslcba_zGK6GTjFcJ32h2g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Uslcba_zGK6GTjFcJ32h2g"].zpelem-heading { border-radius:1px; margin-block-start:95px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">You Need More Than Fiber in Your Diet!</span></h2></div>
<div data-element-id="elm_rEq0vzhQRLrr-PapCu4dfQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rEq0vzhQRLrr-PapCu4dfQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:18px;font-weight:bold;">The Case for SD-WAN and Internet Redundancy</span></div></div>
</div><div data-element-id="elm_FTOI-5pQ2nbawTtC_nlcbQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FTOI-5pQ2nbawTtC_nlcbQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:12px;">By:&nbsp;<span style="color:inherit;">Mike Siegler, CEO, ECESSA</span></span></p></div>
</div><div data-element-id="elm_KsvpyfdA_Lh07pASnQMkHw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KsvpyfdA_Lh07pASnQMkHw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>These days, most organizations rely heavily on cloud-based services for everything from phones and email to billing, inventory management, customer relationship management, training and more. We are leveraging Software as a Service (SaaS) more and loading less onto local servers. As a result, bandwidth requirements have skyrocketed.</div><p><br></p><div>Fortunately, fiber optic and other Gig speed services are available in many areas around the globe. In fact, you may be able to get all the bandwidth you need from one provider, on one circuit. But that introduces a huge risk of network outages. Fiber is great, but it’s not invincible! On the contrary, being single-threaded puts you just one backhoe mishap or transformer explosion away from extended, expensive downtime.</div><p><br></p><div><span style="font-weight:bold;">Redundant Connections Are Essential</span></div><p>Networking best practices include installing redundant Internet connections from different providers and a device to facilitate automatic failover. The secondary connection doesn’t have to be as robust as your fiber ring – but it does need to handle core business functions while repairs are being made on that primary circuit. Remember, those repairs could take hours – or days.</p></div>
</div><div data-element-id="elm_DxsivLT1DZ5ugquM26m-0Q" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_DxsivLT1DZ5ugquM26m-0Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/underground-Fiber-Optic-Cable-Repair.jpg" size="original" data-lightbox="true" style="height:409px;width:727.22px;"/></picture></span></figure></div>
</div><div data-element-id="elm_gRoX9QxuoFLfGVTLmZa6kQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gRoX9QxuoFLfGVTLmZa6kQ"].zpelem-text { border-radius:1px; margin-block-start:4px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">It can often take&nbsp;<span style="font-style:italic;">days</span>&nbsp;to repair damaged fiber optic cables.&nbsp;</span></p></div>
</div><div data-element-id="elm_FeIRSsy6BgvqZYzjCq30vA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FeIRSsy6BgvqZYzjCq30vA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>This is particularly true for businesses with remote locations that rely on the HQ data center or the cloud for mission-critical resources. If the Internet connection goes down, so does access to vital business services. When the “beyond fast” service stops working, productivity grinds to a halt and users get beyond frustrated.</div><p><br></p><div>What does this mean for network infrastructure? It’s not safe to have a single Internet connection feeding an office, no matter how much bandwidth it supplies. Especially in the case of organizations that rely on Citrix, SaaS, UCaaS and other cloud-based services, provisioning multiple communication links from multiple providers is now an essential part of the technological infrastructure. If one carrier is having intermittent issues or their service drops altogether, you must have a secondary line from a diverse carrier onto which outbound and inbound traffic can failover.</div><p><br></p><div><span style="font-weight:bold;">The Case For Multiple Carriers</span></div><p>Even the most reliable telecommunications providers acknowledge some probability of service disruption. Most public broadband Internet providers do not offer any service level guarantees. Unless your area is hit with a major disaster like a hurricane or forest fire, it’s unlikely two providers will experience service issues at the same time. By leveraging two or more providers, organizations mitigate the risk of an outage or intermittent service disruptions. Redundancy and automatic link failover, provided by an intelligent SD-WAN controller, should be a critical piece of every organization’s business continuity planning, as well as a key to optimizing daily performance.<br></p><p><br></p><div><span style="font-weight:bold;">Leverage All The Bandwidth of Standby Links</span></div><div>When you move applications and services to the cloud to increase IT efficiency, you’ll need additional network bandwidth to ensure proper application performance. It doesn’t do much good to launch a cool new initiative only to have it creep, crawl or crash. So use all the bandwidth you have, all the time. Make a standby line an active part of your network.</div><p><br></p><div>It’s easy to manage multiple connections with an intelligent SD-WAN controller. This allows an organization to spread Internet traffic and user applications across all the communication links and use all the available bandwidth – up to 20 Gbps in the case of Ecessa solutions – all the time. If one line fails or suffers degradation, traffic is automatically moved from that line to the better performing lines until service is restored.</div><p><br></p><div><span style="font-weight:bold;">The Bottom Line – Keep Business in Business With Redundancy</span></div><div>An increase in Internet bandwidth and automatic failover to a secondary link ensures that staff members can carry out all their online processes, without delays or interruptions. As one of our customers put it, “My primary vendor had a fiber cut, which of course dropped our services immediately. The Ecessa appliance was flawless with all traffic switched over to the secondary service within a second. Guess what, exactly ZERO people called in about the outage! A couple months earlier and I would’ve had over 100 calls and been unable to do anything. Now it was (almost) a normal day. That was cool!”</div><p><br></p><div>Another client, Sunstone Circuits, shared a similar experience. Their fiber line was cut during bridge construction, but they were able to continue operations thanks to automatic failover. You can read how redundancy saved the day in their case study.</div><p><br></p></div>
</div></div><div data-element-id="elm_q2sLO5ngxoaRl8qdbL0Y2A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_q2sLO5ngxoaRl8qdbL0Y2A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_vJWRcBHlGU-w3j6Y6Y6SXA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_vJWRcBHlGU-w3j6Y6Y6SXA"] div.zpspacer { height:152px; } @media (max-width: 768px) { div[data-element-id="elm_vJWRcBHlGU-w3j6Y6Y6SXA"] div.zpspacer { height:calc(152px / 3); } } </style><div class="zpspacer " data-height="152"></div>
</div><div data-element-id="elm_VNn16wqIzNSBPF9wthLUkA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VNn16wqIzNSBPF9wthLUkA"].zpelem-text { border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; margin-block-start:422px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Find out more about Ecessa's Secure SDWAN for internet optimization and redundancy solutions by reaching out to Cloud 9 Advisers. Ecessa is one of only a handful of &quot;SDWAN-only&quot; and &quot;SDWAN-focused&quot; providers in the market today, where the only thing they do is SDWAN, and all of those providers are available through the Cloud 9 Supplier Portfolio. Contact Cloud 9 today to find out if SDWAN and Ecessa are right for your business.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_JSAex58uXecv15LADcGcOA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_JSAex58uXecv15LADcGcOA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div></div><div data-element-id="elm_AFWJb5iZ4mbfX4ykfp-HQA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_AFWJb5iZ4mbfX4ykfp-HQA"].zpelem-divider{ border-radius:1px; margin-block-start:38px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_CilD3zPiSIqXNBes3XqqjQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CilD3zPiSIqXNBes3XqqjQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Find out more about Ecessa's Secure SDWAN for internet optimization and redundancy solutions by reaching out to Cloud 9 Advisers. Ecessa is one of only a handful of &quot;SDWAN-only&quot; and &quot;SDWAN-focused&quot; providers in the market today, where the only thing they do is SDWAN,&nbsp;<span style="color:inherit;">and all of those providers are available through the Cloud 9 Supplier Portfolio</span>. Contact Cloud 9 today to find out if SDWAN and Ecessa are right for your business.&nbsp;</div></div>
</div><div data-element-id="elm_HklqIdekj0wdh2vldtU8gg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_HklqIdekj0wdh2vldtU8gg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dXxZM5wyyb31Rx_-FoEXYg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dXxZM5wyyb31Rx_-FoEXYg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_qh4MmTidbj8Uep8YgFz8gw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_qh4MmTidbj8Uep8YgFz8gw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-full-width " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more and see if Cloud 9 can help" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn more about ECESSA</span></a></div>
</div></div><div data-element-id="elm_SjhWCJ-8qAlNjocVI5Nyig" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_SjhWCJ-8qAlNjocVI5Nyig"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_gDlQMEqA6U2ryPX4WV82bA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_gDlQMEqA6U2ryPX4WV82bA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline zpbutton-full-width " href="/sdwan" target="_blank"><span class="zpbutton-content">Learn More about SD-WAN</span></a></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 12 Feb 2020 13:42:06 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Aryaka]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-aryaka</link><description><![CDATA[Today, most organizations are concluding that SD-WAN is the best way to add the controls necessary for the digital age. But, do you build your own SD-WAN or buy it as a managed service?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OEUqXd3aStuX8UaceNbNMQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_9c1PY-ZJS0m-221Cj-s8NA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_de_9MvQ6RtGcUnRmphhDoA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_SkZqBucE_pxJ45bT9N3K1Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_SkZqBucE_pxJ45bT9N3K1Q"].zprow{ border-radius:1px; } </style><div data-element-id="elm_pHWLJSoDByNjZMYpIZRc4Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_pHWLJSoDByNjZMYpIZRc4Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_aTE4VqAEzdTNqSWttWf8Zg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_aTE4VqAEzdTNqSWttWf8Zg"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Consume or Construct Your SD-WAN?</span></h1></div>
<div data-element-id="elm_eoaUvM4T2V6_wK_GflMQDA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_eoaUvM4T2V6_wK_GflMQDA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/house-of-cards-3894985_640.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_EcINu7GpMgJNb687I2e8ig" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EcINu7GpMgJNb687I2e8ig"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:18px;">Cloud 9 Supplier Spotlight:&nbsp; <a href="https://www.aryaka.com/" title="Aryaka" target="_blank" style="font-weight:bold;">Aryaka</a></span></p></div>
</div><div data-element-id="elm_HK9aCSKbBhWmFwn5msjoqQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_HK9aCSKbBhWmFwn5msjoqQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/SD%20aryaka%20logo.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_APXKHMw4gYgHRh1SvNgISQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_APXKHMw4gYgHRh1SvNgISQ"].zpelem-text { border-radius:1px; margin-block-start:39px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"><span style="font-weight:700;">The Cloud-First managed WAN</span></span><br></p></div>
</div><div data-element-id="elm_uEoTnqX97zKTnUUHUV_9qA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_uEoTnqX97zKTnUUHUV_9qA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Consume or Construct Your SD-WAN?</span></h2></div>
<div data-element-id="elm_vAy1DHlUmWUk593lgtXP9w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vAy1DHlUmWUk593lgtXP9w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">Why a Cloud-First Managed SD-WAN is Better than a DIY Approach</span></div></div>
</div><div data-element-id="elm_y8aLpbpn1XXSN51cU04cIQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_y8aLpbpn1XXSN51cU04cIQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:12px;"><span>By:&nbsp;</span><span style="color:inherit;">Syed Ghayur, Aryaka<br></span></span></p><div><span style="font-size:12px;">Syed is Vice President of Global Systems Engineering at Aryaka, and has over 20 years of experience within networking and engineering industries.</span></div></div>
</div><div data-element-id="elm_9Tl2yPY288BDvcZWp1f7Rw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_9Tl2yPY288BDvcZWp1f7Rw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>If your company is beginning to embark on a digital transformation journey, ultimately, you’ll have to confront the question of how to modernize the Wide Area Network (WAN) and ensure it is up to the task of supporting the transformation effort.</div><p><br></p><div>Today, most organizations are concluding that Software Defined-WAN (SD-WAN) is the best way to add the controls necessary for the digital age.</div><p><span style="color:inherit;"><br></span></p><div>The next question becomes, do you build your own SD-WAN (the DIY approach) or buy it as a managed service? While doing it yourself has been the go-to method for decades now, the transformation efforts sweeping through enterprises worldwide, and the shift to cloud, is causing a fundamental rethink of this approach.</div><p><span style="color:inherit;"><br></span></p><div>It comes down to this: If the goal is to move the organization from Point A to Point B, do you want to take the time to build the road to the new destination or get on a private fast lane quickly so you can focus on how to capitalize on the new capabilities?</div><p><br></p><div>In world of computing, that question has largely been answered: Companies are migrating en-masse to the cloud consumption model and getting out of the business of focusing capital expenses on infrastructure. They are using those resources instead to better serve customers, differentiate the organization, and grow the business. And increasingly, that model is proving to be the answer for SD-WAN as well.</div></div>
</div><div data-element-id="elm_Y6VbQ8TP0SKiaS1s1iokkg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Y6VbQ8TP0SKiaS1s1iokkg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Great Power Comes with Great Responsibility</span></h3></div>
<div data-element-id="elm_3Da3q9f0I9yejKx9aCWo9A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3Da3q9f0I9yejKx9aCWo9A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Large organizations may have sufficient IT resources and network infrastructure in place to deploy SD-WAN in-house, but this self-management of the network holds with it some great consequences, especially if you’re embarking on a large digital transformation strategy.</div><p><br></p><div>The DIY SD-WAN approach still places more of the headache to manage, maintain, and support the network on IT by introducing additional complexity on an existing network.</div><p><br></p><div>One CIO I spoke with recently said his IT department was managing over 21 MPLS providers worldwide. He felt his networking organization was feeling like a telco because they not only have to manage and maintain these contracts, they must also deal with Internet providers, plus configure WAN optimization and SD-WAN devices at each location. Then they had to buy and implement monitoring software to check the health of their network. On top of all that, everything has to be re-configured each time a new application rolls out.</div></div>
</div><div data-element-id="elm_3yCxslQy1l46S1ScFjwNzA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3yCxslQy1l46S1ScFjwNzA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>Do-It-Yourself SDWAN</p></div>
</div><div data-element-id="elm_ZjMNH6fWlj6jnrjqRRE0pA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_ZjMNH6fWlj6jnrjqRRE0pA"].zpelem-image { border-radius:1px; margin-block-start:3px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Aryaka-DIY%20SWAN.png" size="original" alt="Do-It-Yourself SDWAN" data-lightbox="true" style="height:412px;width:689.35px;"/></picture></span></figure></div>
</div><div data-element-id="elm_2oxi5NVMKiteMJaHZWIcCA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_2oxi5NVMKiteMJaHZWIcCA"] div.zpspacer { height:85px; } @media (max-width: 768px) { div[data-element-id="elm_2oxi5NVMKiteMJaHZWIcCA"] div.zpspacer { height:calc(85px / 3); } } </style><div class="zpspacer " data-height="85"></div>
</div><div data-element-id="elm_fFUZaoby44xh2KSVr8f4DQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fFUZaoby44xh2KSVr8f4DQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>Aryaka, Cloud-First, Managed SDWAN</p></div>
</div><div data-element-id="elm_OyFmeo5rp5NXxL8x5CmpoA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_OyFmeo5rp5NXxL8x5CmpoA"].zpelem-image { border-radius:1px; margin-block-start:-3px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Aryaka%20Mgd%20SDWAN.png" size="original" alt="Aryaka, Cloud-First, Managed SDWAN" data-lightbox="true" style="height:450px;width:688.2px;"/></picture></span></figure></div>
</div><div data-element-id="elm_Ei2cEFl_e2rR4yYoQ2iEoA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ei2cEFl_e2rR4yYoQ2iEoA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>The task of maintaining the scenario above is a full-time task for any IT department. There’s hardly any room left for more strategic initiatives in a digital transformation strategy.</div><p><br></p><div>The task of maintaining the scenario above is a full-time task for any IT department. There’s hardly any room left for more strategic initiatives in a digital transformation strategy.</div><p><span style="color:inherit;"><br></span></p><div>If your enterprise is aiming to transform into a global digital powerhouse, here’s why SD-WAN delivered as a fully managed service would be right for you:</div><div><ul><li><span style="font-weight:bold;">Time to value</span>. The DIY approach to SD-WAN requires your IT department to learn about the technology, analyze the players, and procure and deploy the equipment in-house. Buying SD-WAN as a managed service gets you up and running in a fraction of the time, usually in days. Your staff doesn’t need to become network experts, learn how to operate the equipment, or troubleshoot the network. With a managed SD-WAN as a Service, all they need to do is learn how to use a single network portal to assess their needs.</li><li><span style="font-weight:bold;">Built-in capabilities</span>. Any DIY approach will typically require sets of ancillary tools to optimize and secure the network to meet the organizational needs. That adds additional cost and complexity, and makes the initial learning curve even steeper, slowing implementation.<br></li><li>A <span style="font-weight:bold;">cloud-first SD-WAN</span> delivered as a service, such as one deployed by Aryaka, uses patented optimization technology that is baked into the network, providing faster application performance from anywhere in the world. Since we’re also in partnership with leading security firms, a number of best-of-breed security options are available that can be easily implemented.<br></li><li><span style="font-weight:bold;">Cloud off ramps</span>. If you are building the SD-WAN yourself, it will be up to you to figure out how to link the network to the increasingly long list of cloud/SaaS service providers the company uses. That becomes difficult if you have layered in multiple optimization and security boxes because the cloud/SaaS suppliers won’t accommodate those appliances.<br>As a managed service, Aryaka has connectivity into nearly every major cloud/SaaS application and can deliver secure, end-to-end optimized SD-WAN services directly into these mission-critical resources.</li><li><span style="font-weight:bold;">Problem resolution</span>. In the DIY SD-WAN world, you’ll be using a range of hardware from a mix of suppliers, as well as a variety of service providers. When issues crop up the potential for finger pointing is high, taxing your staff and prolonging problem resolution.</li><li><span style="font-weight:bold;">A key benefit we provide</span> at Aryaka is that the network is proactively monitored by a 24x7x365 support staff. If something goes wrong, we will likely notice it before you do. What’s more, we have the staff expertise to address issues quickly. For example, if there is a transport service issue, we have the end-to-end network visibility to identify exactly where the problem lies and the customer clout to hold the service providers accountable.<br></li><li><span style="font-weight:bold;">Performance</span>. Most all DIY SD-WAN kits use the public, best-effort Internet for transport, which is susceptible to latency and packet loss, particularly over longer spans. The result is long application response times, unpredictable application performance, and in the case of real-time collaboration tools, degraded voice/video calls, and dropped sessions.<br>Aryaka’s cloud-first SD-WAN service, delivered over a global private network and optimized end-to-end, makes it possible to deliver consist application performance for employees anywhere in the world, regardless if the application resource they’re using is hosted on-premises or in the cloud.</li></ul></div><div><br></div><div>The old model of building the network yourself is simply outdated as companies shift to consumption models for IT and focus on transformation. The simple fact of the matter is, just like your data center can’t compete with the capabilities and the pace of innovation delivered by the likes of Amazon AWS, Google Cloud, and Microsoft Azure, if you opt to build your SD-WAN, it won’t be as complete, agile and support as many functions as an SD-WAN delivered as a managed service.</div><p><br></p><div>In order to fully enable your company’s digital transformation, focus on what you do best and let a company that specializes in Global WAN services provide the highway to get you there.</div></div>
</div><div data-element-id="elm_BcUN5cCcPnlGLRnNzwlu_A" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_BcUN5cCcPnlGLRnNzwlu_A"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div><div data-element-id="elm_OrU_Qnwx6NzJq0pZDdXEWQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_OrU_Qnwx6NzJq0pZDdXEWQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_fGzSQphT2eRWv87zUYEMjw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_fGzSQphT2eRWv87zUYEMjw"] div.zpspacer { height:1021px; } @media (max-width: 768px) { div[data-element-id="elm_fGzSQphT2eRWv87zUYEMjw"] div.zpspacer { height:calc(1021px / 3); } } </style><div class="zpspacer " data-height="1021"></div>
</div><div data-element-id="elm_4zJFXIx9HDe2dGgiqEAE7w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_4zJFXIx9HDe2dGgiqEAE7w"].zpelem-imagetext{ border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; margin:10px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" alt="Technology Experts" data-lightbox="false" style="width:1800px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">Aryaka is one of our leading global SDWAN and high-performance middle-mile providers in the Cloud 9&nbsp;<a href="https://sitebuilder-662896043.zohositescontent.com/solutions">Supplier Portfolio</a>. Our curated list of over 200 companies provides all the recommended daily vitamins a growing company needs for their technology: Cybersecurity, Communications, Connectivity, and Cloud. Our SDWAN, SASE, network and cybersecurity experts are vendor-agnostic and will help uncover the right solutions and the right companies to explore for you needs. We can even help reduce your monthly technology operating costs and create new efficiencies you may have never thought possible.&nbsp;</span><br></p></div>
</div></div></div></div><div data-element-id="elm_9XIfHsTfQ3S5tpISQz0f6g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_9XIfHsTfQ3S5tpISQz0f6g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Aryaka is one of our leading global SDWAN and high-performance middle-mile providers in the Cloud 9&nbsp;<a href="https://sitebuilder-662896043.zohositescontent.com/solutions">Supplier Portfolio</a>. Our curated list of over 200 companies provides all the recommended daily vitamins and nutrients a growing company needs for their technology: Cybersecurity, Communications, Connectivity, and Cloud. Our SDWAN, SASE, network and cybersecurity experts are vendor-agnostic and will help uncover the right solutions and the right companies to explore for you needs. We can even help reduce your monthly technology operating costs and create new efficiencies you may have never thought possible.&nbsp;</span><br></p></div>
</div><div data-element-id="elm__rSEVtvaOnH8tUVp_EiKlA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm__rSEVtvaOnH8tUVp_EiKlA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_7kqOKfVqN1DOgosKQKfsaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_7kqOKfVqN1DOgosKQKfsaw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_VmTA0vcZKJsgYP5gq69pOg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_VmTA0vcZKJsgYP5gq69pOg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline zpbutton-full-width " href="/sdwan"><span class="zpbutton-content">SDWAN Overview</span></a></div>
</div></div><div data-element-id="elm_0W8maJAAeL2o8urtBd6P9g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_0W8maJAAeL2o8urtBd6P9g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_HWtKqEkLEbbUdzQS-4q6iQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_HWtKqEkLEbbUdzQS-4q6iQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-full-width " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about Cloud 9 and Aryaka" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn more about Aryaka</span></a></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 12 Feb 2020 12:20:48 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: CloudGenix]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-cloudgenix</link><description><![CDATA[An ESG survey of 600 senior IT decision makers showing that 76% of respondents had already deployed multi-cloud environments, and as many as 67% were already using SaaS-delivered business applications. How do you keep it secure?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_gMTjFHMQQouCTEvm73pVXg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_a552PfiNQ2abz9vN3GgR5w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_laFE2tfZRsmIS8FcYW3UGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_gyqi8LfZTZKuQmzFl-cngQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gyqi8LfZTZKuQmzFl-cngQ"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Secure SD-WAN from CloudGenix and Palo Alto</h1></div>
<div data-element-id="elm_p17pdP2b981AR5BSqjP8uA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_p17pdP2b981AR5BSqjP8uA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1447752875215-b2761acb3c5d?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_AWuxccOpSCnL4M1Toqwfrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_AWuxccOpSCnL4M1Toqwfrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">By:</span></p></div>
</div><div data-element-id="elm_r5J9FG4pQbu39ghdN1XCCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_r5J9FG4pQbu39ghdN1XCCQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:18px;">Cloud 9 Supplier Spotlight:&nbsp; <span style="font-weight:bold;"><a href="https://www.cloudgenix.com/" title="CloudGenix" target="_blank">CloudGenix</a></span></span></p></div>
</div><div data-element-id="elm__kx0Mkn2HCQ-xDeyaLhGnA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm__kx0Mkn2HCQ-xDeyaLhGnA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.cloudgenix.com/" target="_blank" title="www.cloudgenix.com" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/SD%20CloudGenix2.png" size="medium" style="width:800px;"/></picture></a></figure></div>
</div><div data-element-id="elm_eM_fCvnwabg7idsbREHIJQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_eM_fCvnwabg7idsbREHIJQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_fy_61GMWyfO5YQIF8gBjTw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_fy_61GMWyfO5YQIF8gBjTw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_pWf02sJh-65p9yMYlI6l5w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pWf02sJh-65p9yMYlI6l5w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Secure SD-WAN from CloudGenix and Palo Alto</span></h2></div>
<div data-element-id="elm_PD5xx7UrDuj5zcKllqxSVg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PD5xx7UrDuj5zcKllqxSVg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>By now, most organizations have extended their IT infrastructure to the cloud. And many are using multiple clouds. ESG, in a recent webinar presented by CloudGenix and Palo Alto Networks, shared findings from a survey of 600 senior IT decision makers showing that 76% of respondents had already deployed multi-cloud environments, and nearly as many – 67% – were already using SaaS-delivered business applications.</div><p><br></p><div>ESG also talked about the challenges of not only ensuring network performance in these complex multi-cloud environments, but also making sure that SaaS-delivered apps are always on, are always secure, and always perform how employees need them to – especially employees in remote office locations.</div><p><br></p><div>In a traditional network architecture, applications are housed in an on-premise data center. Remote office workers access those apps via MPLS VPN connections. Routers enable the underlying network between geographically diverse locations, and firewalls deployed at both the central data center and at each remote office create a security perimeter.</div><p><br></p><div>But this approach simply doesn’t work in the world of cloud. Here’s why:</div><ul><li><span style="font-weight:bold;">Cost</span> – more routers are needed to deploy and manage as well as additional MPLS fees.<br></li><li><span style="font-weight:bold;">Complexity</span> – already overcommitted teams must manage multiple systems to fulfill network and security needs across multiple locations, and traditional MPLS-based networks are notoriously hard to provision or modify.<br></li><li><span style="font-weight:bold;">Performance</span> – with the rise of SaaS-based apps comes a need to not only ensure that networks are performing as needed, but that the apps critical for employees and customers are as well.<br></li><li>Security – data breaches and attacks are part of today’s reality, and in the world of cloud services where data is traveling over the public internet, there is no fixed perimeter to patrol.</li></ul><p><span style="color:inherit;"><br></span></p><div><span style="font-weight:bold;">Opportunities and Obstacles of SD-WAN</span></div><div>Many organizations have adopted SD-WAN solutions to solve for these issues, but they too present their own challenges. Most solutions require multiple hardware products for SD-WAN and security, which once again means more complexity and more cost. Others are mediocre “all-in-one” solutions that have separate roadmaps for features related to network and security, making it near impossible for an organization to simultaneously meet both networking and security needs.</div><p><br></p><p>So how can organizations cost-effectively and securely meet the needs of remote branch offices? In reality, overcoming the challenges presented by centralized network architecture or legacy SD-WANs means re-imagining remote office IT infrastructure. It needs to be cloud-delivered rather than based on complex hardware or software stacks, and:<br></p><ul><li>WANs have to be unconstrained and highly reliable<br></li><li>Security has to be pervasive across multi-cloud, SaaS, and data centers<br></li><li>Unified Communications as a Service (UCaaS), voice, and video have to be highly reliable<br></li><li>Multi-cloud access has to be high-speed<br></li><li>IT operations have to be proactive</li></ul><p><br></p><p><span style="font-weight:bold;">Next-gen WANs: The CloudGenix Autonomous WAN</span><br></p><p>The CloudGenix Autonomous SD-WAN uses global intelligence to deliver performance and security SLAs for all applications over any WAN-type. By providing app-policies aligned to business intent, direct access to multi-cloud and dev-ops frameworks, it delivers significant productivity gains and cost-savings compared to gen-1 SD-WAN alternatives.<br></p><p><br></p><div>Our new joint solution with Palo Alto Networks – and validated by ESG in the Secure SD-WAN: 7 Best Practices from Palo Alto Networks and CloudGenix webinar – combines CloudGenix Autonomous WAN with Palo Alto Networks Prisma Access, enabling organizations to deploy best-of-breed secure SD-WAN that is pre-integrated, requires no additional hardware or software to provision at the remote office, and lays the foundation for a zero-trust security architecture.</div><p><br></p><div>The joint secure SD-WAN solution enables organizations to:</div><ul><li><span style="font-weight:bold;">Apply traffic policy to application traffic</span>. No longer are they restricted to applying policy within the on-premise network. L3 is insufficient in a multi-cloud, hybrid model. L3 – L7 is ideal.<br></li><li><span style="font-weight:bold;">Ensure consistent performance</span> and high availability by automatically monitoring performance metrics against threshold, minimizing the need for manual intervention.<br></li><li><span style="font-weight:bold;">Create policies in the cloud</span> once and deploy them everywhere without the need for backhauling traffic to a controller<br></li><li><span style="font-weight:bold;">Via an easy-to-use platform</span>, integrate other services to be used in conjunction with SD-WAN and deploy them with a few clicks</li></ul><p><span style="color:inherit;"><br></span></p><div>To hear experts at Palo Alto and ESG talk more about this solution, as well as explain the 7 best practices for a secure SD-WAN, check out the on-demand webinar Secure SD-WAN: 7 Best Practices from Palo Alto Networks and CloudGenix.</div></div>
</div></div><div data-element-id="elm_A-lBT1Y6As9HumgAyzMyeQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_A-lBT1Y6As9HumgAyzMyeQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_KpJsJMIwQZe99o87fTfMSw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_KpJsJMIwQZe99o87fTfMSw"] div.zpspacer { height:279px; } @media (max-width: 768px) { div[data-element-id="elm_KpJsJMIwQZe99o87fTfMSw"] div.zpspacer { height:calc(279px / 3); } } </style><div class="zpspacer " data-height="279"></div>
</div><div data-element-id="elm_ABIoVtigkJ-BLbKZY8fjvg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_ABIoVtigkJ-BLbKZY8fjvg"].zpelem-imagetext{ border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:6px; padding:10px; margin:10px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">CloudGenix is a leading SDWAN company in the Cloud 9&nbsp;<a href="https://sitebuilder-662896043.zohositescontent.com/solutions">Supplier Portfolio</a>. Our curated list of over 200 companies provides all the nutrients and daily vitamins a growing company needs for their technology: Cybersecurity, Communications, Connectivity, and Cloud. Our SDWAN, SASE, network and cybersecurity experts are vendor-agnostic and will help uncover the right solutions and the right companies to look at for you needs. We can even help reduce your monthly technology operating costs and create new efficiencies you may have never thought possible.&nbsp;</span><br></p></div>
</div></div><div data-element-id="elm_TUAl_srLIP6w17iCVFvufw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_TUAl_srLIP6w17iCVFvufw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9 Advisers</span></a></div>
</div></div></div><div data-element-id="elm_RzwdkzSMYXKc2kbBGdg6lQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_RzwdkzSMYXKc2kbBGdg6lQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_yqFUQ700ZvaSEpXuju79zg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_yqFUQ700ZvaSEpXuju79zg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>CloudGenix is a leading SDWAN company in the Cloud 9 <a href="/solutions" title="Supplier Portfolio">Supplier Portfolio</a>. Our curated list of over 200 companies provides all the&nbsp;<span style="color:inherit;">daily&nbsp;</span>nutrients and&nbsp; vitamins a growing company needs for their technology: Cybersecurity, Communications, Connectivity, and Cloud. Our SDWAN, SASE, network and cybersecurity experts are vendor-agnostic and will help uncover the right solutions and the right companies to look at for you needs. We can even help reduce your monthly technology operating costs and create new efficiencies you may have never thought possible.&nbsp;</p></div>
</div><div data-element-id="elm_5l-viDwzFM5A_NZRRQ9lCA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_5l-viDwzFM5A_NZRRQ9lCA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_-n6E9JzfP30QReuiUcIYvQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-n6E9JzfP30QReuiUcIYvQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6tBU5e2aGC2aXOds3yok7A" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_6tBU5e2aGC2aXOds3yok7A"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn more about CloudGenix </span></a></div>
</div></div><div data-element-id="elm_qTeK158sEXmavPgOwvCj-g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_qTeK158sEXmavPgOwvCj-g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_mRNsOujEa2-aBsozBuQM7w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_mRNsOujEa2-aBsozBuQM7w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="/sdwan"><span class="zpbutton-content">Learn more about SDWAN</span></a></div>
</div></div></div><div data-element-id="elm_HcG71hnznhzCd528q6RWsQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_HcG71hnznhzCd528q6RWsQ"].zpelem-divider{ border-radius:1px; margin-block-start:37px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_-WGKbl7YqFDmgMj-KFhBIw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-WGKbl7YqFDmgMj-KFhBIw"].zpelem-heading { border-radius:1px; margin-block-start:78px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About CloudGenix</h2></div>
<div data-element-id="elm_mzTYL4JpaPBsyxnTPuyWbQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mzTYL4JpaPBsyxnTPuyWbQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>We have a deep understanding of complex networking issues and designs. We know the only way to truly solve networking issues that surface with next-generation application architectures, rich media, cloud, and SaaS, is to approach the problem top-down with a transformational networking architecture. An architecture that abstracts the complexity of low-level networking rules and configurations away in favor of top-down business policies for applications, sites, performance, security, and compliance. We built the CloudGenix AppFabric™ from the ground up for exactly this purpose.</div></div>
</div><div data-element-id="elm_WxKyFdhP0kno0x7dv_fBww" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WxKyFdhP0kno0x7dv_fBww"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">CloudGenix: Cloud Blades Platform</span></div><div>Build branch locations with best-of-breed infrastructure services that are pre-integrated and can be turned on with one click. <br>No additional hardware or software required.</div></div>
</div><div data-element-id="elm_PcLrJ3b2D-xaoGAyExJPew" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_PcLrJ3b2D-xaoGAyExJPew"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/cgx-cloudbld_1-intro-2x-1500x528.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 11 Feb 2020 09:45:59 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Open Systems]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-open-systems</link><description><![CDATA[Enterprise WAN and security doesn’t have to devolve into an impossible game of Whac-a-Mole. SASE services can help. Strategically framed and tactically applied, they can restore a sense of order. Contact Cloud 9 to learn more about Open Systems.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_cWIUPIOfQB2qOwLE1GVuFQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_egL1yYWOR_iNip2h46eUag" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_QXO7lh1STMKCiPqCLX3fBw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qp5hPukmQIaMfnKDc5W4kA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qp5hPukmQIaMfnKDc5W4kA"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><div>SD-WAN and Security Services Get Integrated</div></span></h1></div>
<div data-element-id="elm_dJjzgA894sJ2Z2myzWvODQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_dJjzgA894sJ2Z2myzWvODQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1492515114975-b062d1a270ae?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_k-ZUHAaqvsWCK4WHUvY4gA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_k-ZUHAaqvsWCK4WHUvY4gA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;"><span>By:&nbsp;<span style="color:inherit;">Dr. Serge Droz,&nbsp;</span></span>Cybersecurity Expert at Open Systems<span style="color:inherit;">&nbsp;(see the article </span><a href="https://open-systems.com/blog/sdwan-security-services-get-integrated" title="here" target="_blank">here</a><span style="color:inherit;">)</span></span></p></div>
</div><div data-element-id="elm_FLMS2ObaQwixOq4DBPHP1g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FLMS2ObaQwixOq4DBPHP1g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:18px;">Cloud 9 Supplier Spotlight:&nbsp; <a href="https://open-systems.com/" title="Open Systems" target="_blank">Open Systems</a></span></p></div>
</div><div data-element-id="elm_LUnlmvZHC5JJYEKM0ZB1Yg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_LUnlmvZHC5JJYEKM0ZB1Yg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/SD%20Open%20Systems%20Logo.jpg" size="medium" data-lightbox="true" style="width:1600px;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_NG6RbRtn2OcTPmwMzqgv_A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NG6RbRtn2OcTPmwMzqgv_A"].zpelem-text { border-radius:1px; margin-block-start:53px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><span style="font-size:18px;font-weight:bold;color:rgb(34, 135, 76);">Open Systems Secure SD-WAN and SOC-as-a-Service solutions are designed specifically to simplify your network and security operations and accelerate business growth.</span></div></div>
</div><div data-element-id="elm_nSHrgdbMyqIQ_tBkvGmgZw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_nSHrgdbMyqIQ_tBkvGmgZw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_nSHrgdbMyqIQ_tBkvGmgZw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_de0nroATf4zshviiyV2PCg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_de0nroATf4zshviiyV2PCg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">SD-WAN and Security Services Get Integrated</span></h2></div>
<div data-element-id="elm_N7HTKJxCCN6SdvGJfkbZXw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_N7HTKJxCCN6SdvGJfkbZXw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>It sometimes seems that enterprise security is a zero-sum game. Every time you add a tool or specialized application, new issues and problems emerge — sometimes faster than you can address them. But security doesn’t have to devolve into an impossible game of Whac-a-Mole. Managed cloud-delivered security services can help. Strategically framed and tactically applied, they can restore a sense of order.</div><p><br></p><div>Part of the problem with conventional security is that every point solution solves a specific problem, but a collection of point solutions creates a far bigger problem: gaps, new vulnerabilities, and overall complexity. A conventional approach might also lead to technical debt — an inability to stay current with rapidly evolving tools, applications, and solutions. The result is that many organizations fall further and further behind the security curve.</div><p><br></p><div>Fortunately, managed SD-WAN has matured and transformed into a holistic, security-integrated cloud-based framework that can address a network and all of its components. Gartner recently dubbed this type of integrated solution Secure Access Service Edge (SASE). This is important because today’s enterprise computing environments require a more sophisticated and streamlined approach to security.</div><p><br></p><div><span style="font-weight:bold;">The Clouds Roll In</span></div><p>A major advantage of SD-WANs is greater network flexibility. But clouds elevate the concept to a more complex level. Today, about half of all network traffic passes through clouds, and organizations that rank themselves as very successful users of WAN technology have upwards of 60 percent of traffic passing through a cloud versus about 39 percent for less successful networking organizations. Simply put, the ability to manage resources in a more flexible and comprehensive manner is nothing short of crucial. It’s a barometer for success.<br></p><p><br></p><div>The urgency of the situation shouldn’t escape business and IT leaders. When an enterprise can establish a central unified view — and protection framework — it fundamentally tips the equation toward better network performance and protection at a lower cost. This approach also boosts network availability and aids in integrating clouds.</div><p><br></p><div>A tightly integrated network security platform inspects traffic once and applies consistent policies across the board — and across clouds. This replaces the far more complicated task of applying enterprise policies as data crosses separate network borders, which often introduces security and compliance gaps. A more advanced approach to SD-WAN and network security ensures integrated security features at every layer — at the edge as well as in the cloud. All traffic must be inspected without latency, and security measures like next-generation firewalls, intrusion detection and anti-malware scanning should be supported and applied with consistent policies.</div><p><br></p><div>An integrated end-to-end network offers other advantages. It means that you don’t have to upgrade, patch, and rethink things constantly. On the other hand, a DIY approach often leads to inefficiencies, particularly in security. It means you have to maintain a center of expertise and have staff available at all times. At Open Systems, we have a Level 3 operations team that continually monitors and detects threats inside the SD-WAN. Not only does this approach aid in detecting threats, but it also allows specialists to remediate or contain them inside the network. This compliments AI-assisted automation that can detect more than 80 percent of networks problems without human involvement.</div><p><br></p><div><span style="font-weight:bold;">A Clear View</span></div><p>Costs are another consideration for organizations. The accumulation of security products doesn’t just ratchet up complexity; it hits the bottom line. We’ve found that, on average, organizations use 32 different security products. At large enterprises, we’ve seen as many as 400 different point solutions in place. Not surprisingly, this often results in higher than necessary licensing costs, repetitive and redundant tools, and added staff time and training expenses to manage things.<br></p><p><br></p><div>It’s not unusual for organizations to resist change — and modernization — because of the enormous time and energy required to adapt. But this too has consequences. OpEx costs often accelerate over time as technical debt and legacy technology accumulate. The challenge of interacting with numerous vendors, each with proprietary tools and methods, can prove daunting.</div><p><br></p><div>A secure platform that delivers SD-WAN, SOC, and cloud security as a service offers a simpler, more holistic, and more secure way to approach enterprise security. It ultimately makes it easier to scale resources, provide greater flexibility, broaden coverage, consolidate visibility, and deliver a framework that makes it simpler to enforce policies and identify non-compliant assets. It can cut costs and deliver the newest and best tools and technologies. No less important: Managed networking and security can aid organizations as they adopt emerging tech, such as AI, IoT, and SaaS solutions.</div><p><br></p><div>A more advanced networking infrastructure simplifies and improves IT and business operations. It promotes flexibility and agility, so that your enterprise can rapidly adapt the network to the speed of business. In the end, it allows organizations to focus on what matters most: business growth and digital transformation.</div></div>
</div><div data-element-id="elm_PRblLS7arQuudX_U7AkW0w" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_PRblLS7arQuudX_U7AkW0w"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_M7mUr-nyArR2-T3lHr55GQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_M7mUr-nyArR2-T3lHr55GQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div>Contact Cloud 9 Advisers for more information about the advantages of a cloud-based SD-WAN and the security protections it can deliver and to see if Open Systems is the right SD-WAN/SASE solution for your business. Our vendor-agnostic network and cybersecurity experts will uncover the right solutions and the right companies for your needs. (we may even save you a ton of money in the process!). Check out our <a href="/suppliers" title="Supplier Portfolio">Supplier Portfolio</a> with over 200 companies covering everything in cybersecurity, communications, connectivity, and cloud.&nbsp;<br></div></div></div>
</div><div data-element-id="elm_vhxBnljyTYaBXWpepkNdZg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_vhxBnljyTYaBXWpepkNdZg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more and see how Cloud 9 can help" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn more about Cloud 9 and Open Systems</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 10 Feb 2020 17:07:02 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Bigleaf Networks]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-bigleaf-networks</link><description><![CDATA[by Aaron Kaffen, see the original article here, Bigleaf Networks ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Cn74RkQ0SAyoh4TtdTG1qQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Z2cc267GT7uaJ7oH3w-M8Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_jWcqUcXoQJOtNrF7n878KQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_xfb6L7dwRDCOhizgZPgD8Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_xfb6L7dwRDCOhizgZPgD8Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Crappy Internet: It’s a Bigger Problem Than you Think</span></h2></div>
<div data-element-id="elm_cp1QtSRZxMx6hmX5BucvLg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_cp1QtSRZxMx6hmX5BucvLg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Cloud-9-Bigleaf-internet.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_wfLGVR5_ShSxvIqY4oEWwA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wfLGVR5_ShSxvIqY4oEWwA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;font-size:12px;">by Aaron Kaffen, see the original article here, <a href="https://www.bigleaf.net/2019/11/26/crappy-internet-the-most-important-business-problem-you-havent-solved-yet/" title="Bigleaf Networks" target="_blank">Bigleaf Networks</a></span><br></p></div>
</div><div data-element-id="elm_waR3FG6MNb67qN8_vEG12w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_waR3FG6MNb67qN8_vEG12w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Advisers, Supplier Spotlight:&nbsp;<span style="font-weight:bold;">Bigleaf Networks</span></p></div>
</div><div data-element-id="elm_F_6GUZgb2wiX1XdohFMKYQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_F_6GUZgb2wiX1XdohFMKYQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/SD%20Bigleaf-Logo-current-web-3.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_90BvQHuyyj-ofOvu79sK_A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_90BvQHuyyj-ofOvu79sK_A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>If you’re responsible for IT at an SMB or Mid-size Enterprise, you know this pain all too well. It starts with a support ticket that the phones aren’t working right. But when you go to check them, they’re working fine. You call the ISP and wait on hold for two hours only to have them say, “there aren’t any issues on our end”. You call the VoIP provider and they say it must be the ISP. You’re left waiting until the next complaint with no idea how to fix the issue. It’s a never-ending game of whack-a-mole that leaves end-users frustrated, new technologies looking like bad choices and IT pros with an embarrassing problem they can’t fix.&nbsp;</div><p><br></p><div>Cloud and SaaS technologies are enabling a wave of growth and innovation for SMB and Mid-size Enterprises. Whether it’s UCaaS, Office 365, a point of sale (PoS) service, or an industry-standard SaaS app, cloud technologies transform a business, making it more innovative and competitive. And one thing all these technologies have in common—they all need a reliable connection from an Internet Service Provider (ISP) to work properly.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>Unfortunately, as most have experienced, almost all ISPs have trouble providing a reliable and performant connection. The complex nature of the Internet causes every ISP to have occasional outages and performance issues. In turn, those issues wreak havoc on end-user experience in the form of dropped VoIP calls, choppy video conferencing and unresponsive apps. These issues erode user confidence, reduce productivity and prevents organizations from implementing and adopting the new cloud-based technologies they need to compete.&nbsp; &nbsp;<br></div><p><br></p><div>So how do you end the cycle? Well, let’s start by taking a look at some of the root causes at play, some of the traditional approaches that have failed and how a new technology like SD-WAN by Bigleaf could fix it all.&nbsp;</div></div>
</div><div data-element-id="elm_VaGLa7ygWBcJGxLhFSR64g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_VaGLa7ygWBcJGxLhFSR64g"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Outages are only the beginning&nbsp;</span></h3></div>
<div data-element-id="elm_zLCwIQdiZdRaX9ETZBXRvg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zLCwIQdiZdRaX9ETZBXRvg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">A quick visit to Downdetector demonstrates that there are always ISP outages somewhere. Sometimes outages last days, more often they’re over in seconds. Either way, outages are a major disruption. But as annoying and visible as they are, outages aren’t the real culprit of most ISP-related business disruptions.</span><br></p><p><span style="color:inherit;"><br></span></p><div>Most user complaints are caused by far-more-common ISP performance issues. Latency and packet loss shows up as choppy VoIP calls. Jitter can make calls sound robotic. These kinds of performance issues happen when the network is overloaded, or a partial outage causes packets to re-route over sub-optimal paths. Problems like these create costlier, more time-consuming disruptions in your business because the underlying issues are almost impossible to detect and resolve.&nbsp;</div><p><br></p><div>Let’s put these outages and performance issues into perspective. According to Bigleaf’s own monitoring data, the average ISP circuit suffers 3.5 hours of downtime in a month. That’s usually pretty shocking to folks. But what’s more surprising, and frankly more concerning, is the 23 hours of “unusable” performance in a month.&nbsp;</div><p><br></p><div>When we say “unusable performance,” we mean that packet loss, latency and jitter are so bad that you can’t make a VoIP call, run a video conference or use a real-time application. So that’s almost a full day each month of total business disruption.&nbsp; &nbsp;</div><p><br></p><div>So, with those two challenges in mind, we’re now talking about more than 24 hours each month where sales can’t make calls, customers can’t reach support and productivity grinds to a halt.&nbsp; &nbsp;</div><p><br></p><div>A lot of us tend to assume these ISP issues only happen in places like Drain, Iowa or the middle of the Mojave Desert because of lack of choice. The reality is that business and tech hubs like Denver, Portland, Seattle, Los Angeles, and much of the Bay Area are also danger zones for many prominent service providers because of oversubscription and aging infrastructure.&nbsp;</div><p><br></p><div>But it’s been this way for decades. What’s the big deal?</div></div>
</div><div data-element-id="elm_eR9c7IsSl3m9keJSF898zQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_eR9c7IsSl3m9keJSF898zQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Unreliable Internet isn’t just an IT annoyance, it’s a companywide problem</span></h3></div>
<div data-element-id="elm_22IVYpRWFU7N_gESqDyV-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_22IVYpRWFU7N_gESqDyV-Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Many SMB and Mid-size Enterprises tend to overlook these bandwidth and performance issues until it’s too late. You can overlook a faulty ISP if Dan from Accounting experiences buffering while watching a cat video at lunch. But there will be organization-wide heartburn if the CEO’s conference call fails while he’s presenting to the London branch about their new GDPR mandates.&nbsp; &nbsp;</div><p><br></p><div>Quite often, a high-profile failure like this leads to frustration across the organization, and the onus of that failure typically falls squarely on the IT department or MSP.&nbsp; As you might remember from the intro, that process rarely turns out the way we might hope. These technology failures continue, eroding trust in that tech personnel and casting doubt on the new technologies themselves.&nbsp; &nbsp;</div><p><br></p><div>We’ve found that application reliability drives end-user adoption of new technologies. When you roll out mission-critical software that doesn’t function right, that impacts every corner of your organization in the form of downtime, lost revenue, and erosion of trust from customers.&nbsp;</div><p><br></p><div>Why wait for an embarrassing disaster to learn that your ISP is hindering new technology adoption or frustrating your colleagues and customers?</div></div>
</div><div data-element-id="elm_3dATmXvPglU_GF3P2wGOQA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_3dATmXvPglU_GF3P2wGOQA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">It’s time for a Cloud-first approach to internet connectivity</span></h3></div>
<div data-element-id="elm_OTpgvPAA2oZKR62OsZDadw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OTpgvPAA2oZKR62OsZDadw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Whether your business is already knee-deep in Cloud applications or just starting out with VoIP phones, you need a reliable network for them to ride on, one that is 100% dependable for both today’s usage and tomorrow’s demands. The real goal here is to build an architecture that transforms commodity broadband into enterprise-grade service and does not send you diving for the antacid all the time. We call this a Cloud-first approach to internet connectivity&nbsp;</div><p><br></p><div>It starts with redundancy. Since every ISP has outages and performance issues, it’s essential to have multiple ISPs connecting you to your critical Cloud applications. Instead of betting on one big fiber circuit, diversify across a smaller fiber and cable provider. It’s great to have a 4G circuit for diversity in the worst-case scenario.&nbsp;</div><p><br></p><div>Redundancy can’t prevent disruption in real-time if it’s not managed in real-time. Your dual-WAN firewall can failover in the case of a hard outage, but any calls or session-based traffic will drop. Even then, you’re only using one connection at a time, and not to the best effect. Luckily there are new intelligent technologies like Bigleaf SD-WAN that auto-detects your application needs and adapt to changing ISP conditions in real-time. It monitors circuits constantly, prioritizes your most important apps and ensures that ISP performance never impacts the end-user experience.&nbsp;</div><p><br></p><div>No technology stack remains static for long. When more new apps are deployed and traffic patterns change, your network should adapt without having to change policies or configurations. With Bigleaf SD-WAN, performance-sensitive traffic is instantly classified and prioritized over functions such as bulk file download. This isn’t based on static app-specific rules, but instead intelligent auto-adaptive heuristics and algorithms. In other words, no matter what technologies you adopt your network will always keep up and…&nbsp;</div><p><br></p><div><span style="font-weight:bold;">The CFO’s important conference call will never fall prey to Dan’s cat video.&nbsp; &nbsp;</span></div><p><br></p><div>With the right solution, it’s possible for SMB and Mid-sized Enterprises to realize the same performance, redundancy, and reliability enjoyed by enterprise-level corporations. With a Cloud-first network purpose-built for your needs, you don’t suffer from daily internet woes.&nbsp;</div><p><br></p><div>With the right solution, everyone in your business receives the same cloud-ready Internet. VoIP and UCaaS perform flawlessly regardless of outages, packet-loss, jitter, or lag. Critical apps never fail because their traffic is always prioritized. Your users never feel the impact of ISP issues and your Cloud technologies always perform the way they should.&nbsp; &nbsp;</div><p><br></p><div>Because we do ask a lot from our ISPs, it is critical that we pair them with technologies capable of delivering enterprise-grade, worry-free service — improved performance for every app, anywhere in the world.&nbsp; &nbsp;</div><p><br></p><div>You can finally solve the “crappy internet” problem.</div><div><br></div><div>Cloud 9 Advisers can help you find out if Bigleaf's SD-WA solution is right for your business. For more information about Bigleaf Networks or any of other top-tier SDWAN service providers in our portfolio, contact us now.&nbsp;</div></div>
</div><div data-element-id="elm_zquJ4bJoQgCS5zWGg1J_zg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_zquJ4bJoQgCS5zWGg1J_zg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about Cloud 9" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn More</span></a></div>
</div><div data-element-id="elm_ROiJ-k9TLmbRtZKKDVwHdA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_ROiJ-k9TLmbRtZKKDVwHdA"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_37Ph7SMacpAjuetddhGwrA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_37Ph7SMacpAjuetddhGwrA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><span style="font-weight:bold;">Your Agent.&nbsp; Your Advocate. Your Adviser.</span></div><p><span style="color:inherit;"><br></span></p><div>Because it’s all about you.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>Cloud 9 Advisers will save you time during the often exhausting process of finding, evaluating, and selecting new technologies and competitive providers. We become an extension of your team and help manage the entire bidding and procurement process. We will save you money by using the buying power of thousands of other clients through our curated Supplier Portfolio, and finding the right companies from our portfolio to bid on your requirements. We provide you clarity by distilling all the information from each bidder, and clear the clutter so you can make the right decision on the best solution and provider. Cloud 9 gives you confidence throughout the decision-making process by continually evaluating the bidders and negotiating the best price and terms, so you can focus on what you do best.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;"><p style="text-align:center;"><span style="font-size:11pt;font-weight:700;">Technology Partners. Strategic Advisers.</span><span style="font-size:11pt;">&nbsp;</span></p><div><span style="font-size:11pt;"><br></span></div></span></div></div>
</div></div><div data-element-id="elm_6VDpfR00nZookw1S9nQJvA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_6VDpfR00nZookw1S9nQJvA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about Cloud 9" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Us</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 26 Jan 2020 14:45:25 -0500</pubDate></item><item><title><![CDATA[SaaS fears justified?]]></title><link>https://www.cloud9advisers.com/News/post/saas-fears-justified</link><description><![CDATA[Posted by&nbsp; Aaron Kaffen ,&nbsp; Bigleaf Networks. &nbsp;&nbsp; Software-as-a-service (SaaS) business applications have clear advantages. They have gre ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_4DISe8gXSeqc-uqdpR8l8A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_PTcccPCZSVu5dzCUIVvs3g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_K71Px3K8RTuqwT7SEDJHtA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_K71Px3K8RTuqwT7SEDJHtA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_b1T37MsOR9SaEQK_KPE9Fg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_b1T37MsOR9SaEQK_KPE9Fg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Software as a Service: Are Your Downtime Fears Justified?</span></h2></div>
<div data-element-id="elm__dxLEkoMSm6T-hrjEDUzbA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__dxLEkoMSm6T-hrjEDUzbA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"></span></p><div style="font-size:13px;"><div>Posted by&nbsp;<a href="/sdwan" title="&amp;nbsp;Aaron Kaffen, SDWAN expert at Bigleaf" target="_blank">Aaron Kaffen</a>,&nbsp;<time>Bigleaf Networks.</time>&nbsp;&nbsp;</div></div></div>
</div><div data-element-id="elm_4_En-jURyFp7jdwXr5VI2g" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_4_En-jURyFp7jdwXr5VI2g"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/noconnection.png" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Software-as-a-service (SaaS) business applications have clear advantages. They have great pricing. They are convenient and easy to manage. You get cutting edge technology. However, to get them implemented we have to overcome a very valid objection:&nbsp;</div><p><br></p><div><span style="font-weight:bold;font-style:italic;">Sometimes the internet breaks.&nbsp;</span></div><div><span style="font-weight:bold;font-style:italic;"><br></span></div><div><span style="color:inherit;"><div><span style="color:inherit;">Over the course of two hours on 24 June 2019, the internet broke down for most of the United States. Popular websites and apps were inaccessible on browsers and phones.&nbsp;</span><br></div></span><span style="color:inherit;"><div><br></div><div>The cause was achingly human while also being deeply technical. It is called a route leak: A Border Gateway Protocol (BGP) route list that was intended as a map to guide traffic between a few networks was published to networks that should not use those directions. It is like all the rush hour freeway traffic being routed to a suburban side street.&nbsp;</div><br><div>As a result, traffic for 2,400 networks was unfortunately sent through the network of Allegheny Technologies in Pennsylvania. Their infrastructure was not up to the task and most requests failed.&nbsp;</div><div><br></div><div><span style="color:inherit;"><div>BGP is one of the many arcane arts that usher traffic across the internet. The “inter-net” is a connection of many autonomous networks, and BGP provides rules for how to get from here to there by moving data from one network to another. A BGP route is somewhat like the turn-by-turn directions you get from Waze or Google Maps, only it tells data how to get from a server in Bellevue, Washington to your customer support desk in Trenton, New Jersey.</div><div><br></div><div>Propagation of a bad BGP table is preventable. This was clearly an error that everyone agrees never should have happened, but it did. And while the Allegheny incident was a high-profile breakage whose source we can identify, this sort of thing happens in harder-to-diagnose ways all the time.&nbsp;</div><div><br></div><div>Due to the nature of internet infrastructure and the laws of probability, they are inevitable. The internet will break, connections will drop, services will fail for no obvious reason.&nbsp;</div><div><br></div><div>The more you know about how the internet functions the more difficult it is to believe that it works at all. Along with leaky BGP routes, services depend on DNS, content delivery networks, cloud service providers, and a variety of technologies run by different companies falling well beyond the reach of the customer support or sales person whose web browser is displaying a cute “504, timed out” message instead of the new customer’s loan document.&nbsp;</div><div><br></div><div>Where does that leave your business operations, particularly now that cloud-based SaaS applications are taking over?&nbsp;</div><div><br></div><div>If your vendor is not taking your concerns about outages seriously, they clearly don’t know much about the “modern” internet.&nbsp;</div><div><br></div><div>The concern naturally increases when the risks are greater. The closer the cloud-based solution is to customer engagement where customers are won and lost, the more reasonably nervous you would be about uptime.&nbsp;</div><div><ul><li><span style="color:inherit;">If you are a car dealer and your parts lookup is cloud-based, short downtime is awkward and undesirable.&nbsp;</span><br></li><li>If your customer-facing staff rely on a scheduling system based in the cloud, downtime is an absolutely terrible prospect.</li><li>If your healthcare clinic’s electronic medical records are cloud-based, downtime is completely unacceptable.&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;</li></ul></div><div>For some locations, such as many rural and suburban areas of the US, the internet breaks worse and more often. When considering a cloud-based or SaaS solution for a business, concerns about downtime are legitimate and substantiated. Regardless of the technical advantages, inconveniencing customers isn’t worth it. Putting the weak links of the internet between the business and customer interaction at the service counter isn’t worth it.&nbsp;</div><div><br></div><div>As technologists, we can’t just complain and shirk connectivity. These applications are the key to being competitive in the modern marketplace. We have to make cloud solutions functional and reliable. They simplify business operations, keep technology up to date, and save money.&nbsp;</div><div><br></div><div>Despite everything fragile and subject to failure between that key service and our users, we have to create the right level of resilience.&nbsp;</div><div><br></div><div><span style="color:inherit;"><div><span style="font-weight:bold;">Key Network Issues for SaaS Deployments</span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><div><ul><li><span style="color:inherit;">Uptime and bandwidth&nbsp;me and bandwidth&nbsp;me and bandwidth&nbsp;me and bandwidth&nbsp;me and bandwidth&nbsp;</span><br></li><li>Management and support requirements&nbsp;</li><li>Security&nbsp;</li></ul></div><br><div><span style="font-weight:bold;">Uptime and bandwidth&nbsp;</span></div><div>Some things you don’t want to know, such as how many problems the internet has at any one time. Not every issue makes the news, but even very short incidents can cause problems for mission-critical real-time applications. A hiccup at the ISP can be enough to drop a call or tangle up a customer service response.&nbsp;</div><div><br></div><div>A study of router performance data shows that a typical single-ISP business experiences 3.5 hours of internet downtime a month. What’s more, they experience an additional 23 hours of severely degraded service from jitter, low throughput, and other internet problems that don’t register as downtime but the effect on applications – and thus customer experience – is the same. It is downtime by another name.&nbsp;</div><div><br></div><div><span style="font-weight:bold;">Calculating management and support&nbsp;</span></div><div>When networking gets critical, the solutions can be very involved. They can become a problem in themselves. When deciding on quality of service (QoS) settings to optimize a Voice over IP (VOIP) system, are you impacting another mission-critical system? Is YouTube video streaming important to a business operation or can you lower its priority? Do you have to manually tweak and then stress test these applications to see how they interact?</div><div><br></div><div>As new applications emerge and the business develops new expectations of network performance, maintaining the network, troubleshooting problems, and new installations can be significant time and budget burdens.&nbsp; &nbsp;</div><div><span style="color:inherit;"><br></span></div><div><span style="color:inherit;font-weight:bold;">Security in all things&nbsp;</span></div><div>Security has to be a part of every conversation now, and the resolution of our network challenges is no exception. The perimeter firewall is a centerpiece of current network security strategies. Particularly in regulated industries with compliance requirements, the business needs to have control over their firewall to keep rules and monitors up to snuff. Network solutions can interfere with existing firewalls and potentially provide a new attack vector.&nbsp;</div><div><br></div><div><span style="font-weight:bold;">The Uptime Reality&nbsp;</span></div><div>The SD-WAN industry was built with all of these concerns in mind. Ture SD-WAN platforms allow clients to seamlessly use multiple and various bandwidth connections for far greater resiliency, redundancy, and performance of their network making them more reliable than any one internet connection by itself.</div><div><br></div><div>SDWAN providers have a window into the reliability of the internet overall. In a recent month, individual circuits that clients used averaged 92.5 percent reliability. That is not measuring just major outages but also moments when throughput, errors, or jitter is preventing the internet from being usable.&nbsp;</div><div><br></div><div>Data also shows the solution: with the right SD-WAN solution in place, uptime was consistently and dramatically improve to 99.88 percent.&nbsp;</div><div><br></div><div>Bringing a business-critical SaaS application into the office is exciting, profitable, but can also be scary. There are no guarantees in this world, especially regarding the internet, but using the right SD-WAN solution means that, the next time someone transposes a couple numbers on a BGP table, your operation is more likely to stay up and running.&nbsp;</div><div><br></div><div><div><a href="mailto:consulting@Cloud9Advisers.com?subject=I need to learn more about SDWAN" title="Contact us">Contact us</a> at Cloud 9 to learn more about&nbsp;<span style="font-style:italic;">real</span>&nbsp;SDWAN and let us find the right SDWAN solution and provider for you.&nbsp;</div></div></span></div></span></div></span></div></div>
</div></div><div data-element-id="elm_3DMLTdhoTaKwUL5d9hmnAA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_3DMLTdhoTaKwUL5d9hmnAA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/sdwan"><span class="zpbutton-content">Learn more about SDWAN</span></a></div>
</div><div data-element-id="elm_Ri5eL8JsfeaFJbJX7_z1FA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Ri5eL8JsfeaFJbJX7_z1FA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_tKzeJSoyE3EUsUW5pZSe7A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_tKzeJSoyE3EUsUW5pZSe7A"].zpelem-col{ border-radius:1px; } </style></div>
<div data-element-id="elm_QVudrgfD1qpn3pmHROEJKg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_QVudrgfD1qpn3pmHROEJKg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_3hkdA-Doxmw_nMyPz-3vXQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3hkdA-Doxmw_nMyPz-3vXQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:11px;"><span style="color:inherit;"><span style="font-style:italic;">This article was brought to you by&nbsp;</span></span><a href="http://www.bigleaf.net/" target="_blank">Bigleaf Networks</a>,&nbsp;<span style="color:inherit;font-style:italic;">one of the leading SD-WAN providers in the Cloud 9 Supplier Portfolio</span><span style="color:inherit;font-style:italic;text-align:center;">.&nbsp;</span><a href="https://www.bigleaf.net/2019/08/14/saas-at-the-business-edge-are-your-downtime-fears-justified/?utm_source=hs_email&utm_medium=email&utm_content=75734220&_hsenc=p2ANqtz-8Yq69o1_zmPfUmzZQvcA5gEaFG6oKl04MXJb2e73HhjDGG-Rqbjnkmrn5d-IGxJy85_vBRjLGGDH9yiojeR-c2t93Fzir2wQZGOnXdQqFgPhwfbjk&_hsmi=75734220" target="_blank">See the full article here</a><span style="color:inherit;font-style:italic;text-align:center;">. Contact us to learn more about Bigleaf and over two-dozen other SDWAN provider companies. We'll uncover who's best for your needs.&nbsp;</span></span></p></div>
</div></div><div data-element-id="elm_lw1-0Wiz-zJ0RUErxw3tXw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_lw1-0Wiz-zJ0RUErxw3tXw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_K8IN9Zg50Aw18sNcl1E4dg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_K8IN9Zg50Aw18sNcl1E4dg"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_k_h14qxxYsY7SUKuQqRZDA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_k_h14qxxYsY7SUKuQqRZDA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="false" style="width:1800px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:11pt;">Every company wants to be your partner, but let’s face it, if they are selling you something, they’re not your partner, they’re just another vendor. Cloud 9 is different. We don’t actually sell anything and we don't charge our clients. We become an extension of your team and help manage the often overwhelming process of finding, evaluating, and selecting the right technologies and competitive providers for your needs. Cloud 9, together with our distributors, is made up of more than 250 staff, all devoted to helping you save time and money. Our curated Supplier Portfolio contains nearly 200 of the best service provider companies. We are one of the largest buyers of technology in the country. Through us, you’ll get the collective buying power of thousands of other clients. Consider us your informed buyers, full-service technology agents, and strategic advisers. We are impartial, unbiased, and supplier-neutral. We sit on your side of the table to help you find, evaluate, and negotiate with service provider companies. We’ll help you design the right solution and identify the best technologies. We’ll get pricing from multiple competing companies, then guide you through the evaluation and procurement process. Use our evaluation tools for documentation and due diligence. Plus, have our entire team at your disposal before, during, and after the acquisition of your new services.</span></p><p style="text-align:center;"><span style="font-size:11pt;font-weight:700;">Technology Partners. Strategic Advisers.</span></p><p><span style="color:inherit;"></span></p><div><span style="font-size:11pt;font-weight:700;"><br></span></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 15 Aug 2019 13:35:23 -0500</pubDate></item></channel></rss>