<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/sdwan/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #SDWAN</title><description>Cloud 9 Advisers - News #SDWAN</description><link>https://www.cloud9advisers.com/News/tag/sdwan</link><lastBuildDate>Tue, 24 Feb 2026 23:08:49 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[The Unseen Imperfection]]></title><link>https://www.cloud9advisers.com/News/post/the-unseen-imperfection</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cloud9advisers.com/Blog images/Clean and messy files.jpg"/>Explore why data quality is paramount for successful AI implementation. Learn about the core components of data quality and actionable strategies to overcome common challenges.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Bdwb9owbRxeppYqDn-MXww" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hNa0nshdT5OrNW0jJZowAA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_BwpIafOdRTWqLROYVnfmqg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_QKzyx0esQZSmImGc68gCyA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Why Data Quality Makes or Breaks Your AI</span></h1></div>
<div data-element-id="elm_7mNgjBZFQEOgXjdvutdmwQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span style="font-style:italic;">Explore why data quality is paramount for successful AI implementation in mid-sized businesses. Learn about the core components of data quality and actionable strategies to overcome common challenges.</span></p></div>
</div><div data-element-id="elm_H19rhnlQX1XgQikXQ2icTg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_H19rhnlQX1XgQikXQ2icTg"] .zpimage-container figure img { width: 1024px !important ; height: 559px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Clean%20and%20messy%20files.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_VYxVdbVVOBLPdYsZbTaLFg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Irt-kRaP4dwO8IeajbKhGw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_2uYieRN5OXRCW-VUyXgE1A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p style="margin-bottom:12pt;"><span>In a recent post, we unveiled the &quot;AI Magic Trick,&quot; highlighting how data serves as the true, often unseen, star behind every successful Artificial Intelligence initiative. We explored the concept of data readiness as the meticulous preparation and precise execution that allows AI to perform its dazzling feats. But just as a magician's tools must be flawless and the chef’s ingredients pure, the effectiveness of AI hinges on one critical, foundational element: </span><span style="font-style:italic;">data quality</span><span>. It's the unseen imperfection, the subtle flaw in the raw material, that can silently undermine even the most ambitious AI projects, turning potential breakthroughs into costly disappointments.</span></p><p style="margin-bottom:12pt;"><span>For many mid-sized organizations and their lean IT teams, the allure of AI is undeniable. The promise of enhanced productivity, smarter decision-making, and streamlined operations is a powerful motivator. Yet, the path from pilot to production is frequently fraught with unseen obstacles. Often, these obstacles aren't complex algorithms or sophisticated infrastructure challenges, but rather the insidious, pervasive issue of poor data quality.</span></p><p style="margin-bottom:12pt;"><span>Consider the analogy of a master chef. They might possess the most advanced kitchen, the latest culinary techniques, and a brilliant recipe. But if their ingredients are spoiled and stale,or incomplete – if the &quot;purity of ingredients&quot; is compromised – the resulting dish will inevitably fall short, regardless of the chef's skill or tools. In the realm of AI, your data is that ingredient. If it's flawed, your AI's output will be, too</span></p><p></p></div>
</div><div data-element-id="elm_N_LYKcar4IhwuQPmcX7q-g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The Silent Saboteur<br/></span></h2></div>
<div data-element-id="elm_tW-DPPp3Do-oygZuwjAKlA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-weight:bold;">How Poor Data Quality Undermines AI</span></p><p><br/></p><p><span><span><span></span></span></span></p><p style="margin-bottom:12pt;"><span>The consequences of subpar data quality are far-reaching and often more damaging than initially perceived. They don't just lead to minor glitches; they can fundamentally compromise the integrity, effectiveness, and trustworthiness of your entire AI ecosystem. This silent sabotage (queue the music: Beastie Boys, </span><span style="font-style:italic;">Ill Communication</span><span>) can creep into every aspect of your AI initiative, turning promising ventures into frustrating dead ends.</span></p><p style="margin-bottom:12pt;"><span>The principle that &quot;the output is only as good as the input data&quot; is, of course, not new. This concept, famously encapsulated by the adage &quot;Garbage In, Garbage Out&quot; (GIGO), has been a cornerstone of data management since the very first databases. However, AI dramatically escalates the stakes and challenges of achieving and maintaining that quality. The demand for trustworthy data is higher than ever because the potential for both immense benefit and significant harm from AI is so much greater.</span></p><ul><li><p><span style="font-weight:700;">Inaccurate Insights: The Blindfold on Decision-Making:</span><span> AI models learn from the data they're fed. If that data is inaccurate, incomplete, or inconsistent, the insights generated will be unreliable. Imagine an AI designed to predict market trends based on sales data riddled with duplicate entries and missing timestamps. Its forecasts would be skewed, leading to poor strategic decisions, misallocated resources, and missed opportunities. For CIOs and IT managers, this translates directly into a lack of trust from the business side, eroding confidence in AI's value proposition.</span></p></li><li><p><span style="font-weight:700;">Bias Issues: The Unintended Echo Chamber:</span><span> Data often reflects historical patterns and human biases. If your training data contains these inherent biases – whether algorithmic, historical, or due to prejudice – your AI models will not only learn them but can also amplify them. This can lead to unintended, negative outcomes in sensitive areas like hiring or customer service, creating significant ethical dilemmas, reputational damage, and even legal liabilities. Ensuring fairness in AI begins with scrutinizing the fairness of your data.</span></p></li><li><p><span style="font-weight:700;">Degraded Performance &amp; Bloated Costs: The Endless Treadmill:</span><span> Low-quality data is a resource drain. IT teams find themselves in a constant cycle of &quot;data wrangling&quot; – cleaning, correcting, and transforming data manually before it can even be used. This isn't just inefficient; it's expensive. AI models trained on poor data also tend to degrade in performance over time, requiring continuous re-training and maintenance, further inflating operational expenses and delaying any tangible return on AI investment.</span></p></li><li><p style="margin-bottom:12pt;"><span style="font-weight:700;">Compliance Risks: The Regulatory Minefield:</span><span> In an era of escalating data privacy regulations (like GDPR, CCPA, HIPAA, and emerging AI-specific acts), using non-compliant or unsecured data can lead to severe penalties. Feeding sensitive, unmasked, or improperly handled data into an AI system without proper governance can result in data breaches, privacy violations, and hefty fines that can cripple a mid-sized organization. The reputational damage alone can be irreparable.</span></p></li></ul><p style="margin-bottom:12pt;"><span>A recent Salesforce study highlighted that 92% of IT and analytics leaders believe the demand for trustworthy data has never been higher, with 86% agreeing that &quot;AI’s outputs are only as good as its data inputs.&quot; Yet, data quality issues persist, often due to a lack of resources or clear policies.</span></p><p></p></div>
</div><div data-element-id="elm_hlrE77xZi_kpU9ywz08VTQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The Core Components of Data Quality</span></h2></div>
<div data-element-id="elm_fdI9N5uVnWvyrD85KXBQfQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>A Practical Guide for Lean Teams</span></p><p><span><br/></span></p><p><span><span>Achieving high data quality isn't about perfection overnight; it's about establishing practical, sustainable processes. For mid-sized organizations with lean IT teams, the focus should be on incremental improvements and leveraging smart strategies. Here are the core components:</span><br/></span></p></div>
</div><div data-element-id="elm_NkVNI_xk_gu4iItyHImMIA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>1. Cleaning: Sweeping Away the Digital Dust<br/></span></h4></div>
<div data-element-id="elm_SmFJtZdvEH4dZfGxAwXQXQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p style="margin-bottom:12pt;"><span>Data cleaning involves identifying and correcting errors, inconsistencies, and inaccuracies in your datasets. This includes fixing typos, standardizing formats (e.g., ensuring all dates are in YYYY-MM-DD format), and correcting misspellings.</span></p><span style="font-weight:700;">Actionable Advice:</span><span> Start small. Identify the most critical datasets for your initial AI use cases. Utilize automated data profiling tools (many are available as open-source or affordable SaaS solutions) to quickly identify common errors. Prioritize fixing errors that have the highest impact on your AI's performance. For instance, if your AI is analyzing customer demographics, ensure age and location fields are consistently formatted.</span><p></p></div>
</div><div data-element-id="elm_wZGV-g2u1tEWzWILxXMSxg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>2. De-duplication: Eliminating the Echoes</span><br/></span></h4></div>
<div data-element-id="elm_PkyC_Znb3bFKMnW8WZY0gw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p style="margin-bottom:12pt;"><span>Duplicate records are a common scourge, leading to inflated numbers, skewed analyses, and wasted storage. De-duplication involves identifying and merging or removing redundant entries.</span></p><ul><li><p style="margin-bottom:12pt;"><span style="font-weight:700;">Actionable Advice:</span><span> Implement clear rules for identifying duplicates (e.g., matching on multiple fields like name, email, and address). Consider using master data management (MDM) principles, even at a simplified scale, to create a &quot;golden record&quot; for key entities. For mid-sized firms, this might involve a phased approach, starting with customer or product data.</span></p></li></ul><p></p></div>
</div><div data-element-id="elm_-7lnpB0_DZAKl32Au13-Og" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>3. Accuracy: The Truth in Every Byte</span><br/></span></h4></div>
<div data-element-id="elm_Pjcukk3MuP4W1N_g7ct3Ig" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p style="margin-bottom:12pt;"><span>Accuracy refers to the degree to which data correctly reflects the real-world entity or event it represents. Inaccurate data is fundamentally misleading.</span></p><ul><li><p style="margin-bottom:12pt;"><span style="font-weight:700;">Actionable Advice:</span><span> Establish data validation rules at the point of entry. Use dropdowns, constrained input fields, and automated checks to prevent incorrect data from entering your systems. Regularly audit key datasets against reliable sources to identify and correct inaccuracies. Encourage data owners (business users) to take responsibility for the accuracy of their data.</span></p></li></ul><p></p></div>
</div><div data-element-id="elm__snz7jIwXM7J558KoARXLQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>4. Completeness: Filling in the Blanks</span><br/></span></h4></div>
<div data-element-id="elm_sGsh7otAJM4_co_vgX7NyQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p style="margin-bottom:12pt;"><span>Incomplete data, characterized by missing values in critical fields, can cripple AI models that rely on comprehensive information.</span></p><span style="font-weight:700;">Actionable Advice:</span><span> Define which data fields are mandatory for specific business processes and AI applications. Implement processes to flag and address missing data, either through automated imputation (filling in missing values based on other data) or manual enrichment where necessary. For example, if a customer's industry is crucial for a predictive model, ensure that field is always populated.</span><p></p></div>
</div><div data-element-id="elm_Z5cfsfm-rmi8rQFNJl5Xlw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>5. Consistency: Speaking the Same Language</span><br/></span></h4></div>
<div data-element-id="elm_RuLHc06D9Bj3Kf5j9i3V_Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p style="margin-bottom:12pt;"><span>Consistency ensures that data is uniform across different systems and over time. Inconsistent data might use different units of measurement, varying codes for the same entity, or conflicting definitions.</span></p><span style="font-weight:700;">Actionable Advice:</span><span> Develop and enforce data dictionaries and glossaries across your organization. Standardize naming conventions, codes (e.g., for product categories or customer segments), and data types. This ensures that when different systems or departments refer to the &quot;same&quot; data point, they are truly referring to identical information.</span><p></p></div>
</div><div data-element-id="elm_lgVE9at_qFsiykHdq-6lXw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>6. Timeliness: The Freshness Factor</span><br/></span></h4></div>
<div data-element-id="elm_y2rNYBfNw7ZeJGyO1iCvAQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p style="margin-bottom:12pt;"><span>Timeliness means data is available when needed and is sufficiently current for its intended use. Stale data can lead to outdated insights and poor decisions, especially in dynamic environments.</span></p><ul><li><p style="margin-bottom:12pt;"><span style="font-weight:700;">Actionable Advice:</span><span> Establish clear data refresh rates based on the needs of your AI applications. Implement automated data pipelines to ensure data is ingested and processed in a timely manner. For real-time AI applications (eg, fraud detection), prioritize streaming data processing over batch processing</span></p></li></ul><p></p></div>
</div><div data-element-id="elm_bE1mCI4qWhsH5YRHfewpUg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>7. Validity: Conforming to the Rules</span><br/></span></h4></div>
<div data-element-id="elm_fH3udV2IHVQhX_o8K8kY4g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p style="margin-bottom:12pt;"><span>Validity ensures that data conforms to predefined rules or constraints. For example, a &quot;date of birth&quot; field should only contain valid dates, and a &quot;customer ID&quot; should adhere to a specific format.</span></p><span style="font-weight:700;">Actionable Advice:</span><span> Implement strong data validation checks at every stage of the data lifecycle, from input to integration. Use regular expressions, lookup tables, and logical checks to ensure data adheres to its defined structure and acceptable values.</span><p></p></div>
</div><div data-element-id="elm_Rtqe-90XkB3XsObzK_xD_Q" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Overcoming Barriers</span></h2></div>
<div data-element-id="elm_P205Dc7nwX-80-u6vCqurA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-weight:bold;"><span>Data Quality in a Mid-Sized World</span></span></p><p><span><br/></span></p><p><span><span><span></span></span></span></p><p style="margin-bottom:12pt;"><span>Mid-sized organizations often face unique challenges in their quest for data quality:</span></p><ul><li><p><span style="font-weight:700;">Lack of Dedicated Resources or Specialized Skills:</span><span> Lean IT teams are stretched thin, often juggling multiple priorities without dedicated data quality specialists.</span></p></li><li><p><span style="font-weight:700;">Fragmented Data Policies or Inconsistent Practices:</span><span> Without a centralized data governance strategy, different departments might collect and manage data in their own ways, leading to inconsistencies.</span></p></li><li><p style="margin-bottom:12pt;"><span style="font-weight:700;">Siloed Data Sources:</span><span> Data trapped in disparate systems makes it difficult to get a holistic, consistent view, complicating quality efforts.</span></p></li></ul><p style="margin-bottom:12pt;"><span>The key to overcoming these barriers lies in a pragmatic, phased approach. Start by identifying the highest-impact data for your most critical AI initiatives. Leverage readily available tools and automation where possible. Foster a data-aware culture across the organization, emphasizing that data quality is a shared responsibility, not just an IT problem.</span></p><div><span><br/></span></div><br/><p></p></div>
</div><div data-element-id="elm_6IElBGok74F2G6Ad0_AVBA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Data Quality: The Foundation of AI Success</span></h2></div>
<div data-element-id="elm_MnDtNSxQfr7B3k8PyPLWPA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>The journey to successful AI implementation is paved with high-quality data. It's the silent, unseen force that determines whether your AI performs dazzling feats or merely stumbles. For mid-sized organizations, recognizing and addressing the unseen imperfections in your data is not just a technical chore; it's a strategic investment that underpins every AI ambition. By focusing on data cleaning, de-duplication, accuracy, completeness, consistency, timeliness, and validity, you empower your AI to deliver truly transformative results, turning raw data into reliable, actionable intelligence.</div></div><p></p></div>
</div><div data-element-id="elm_rhpwjxkNY1h4Nx9cQf7kmQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_rhpwjxkNY1h4Nx9cQf7kmQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_rhpwjxkNY1h4Nx9cQf7kmQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div><div data-element-id="elm_9jcN6xhsgIJnq7DsqL8xKA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_jc--LN5ERPwGmVmf19wPZw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_jc--LN5ERPwGmVmf19wPZw"] div.zpspacer { height:159px; } @media (max-width: 768px) { div[data-element-id="elm_jc--LN5ERPwGmVmf19wPZw"] div.zpspacer { height:calc(159px / 3); } } </style><div class="zpspacer " data-height="159"></div>
</div><div data-element-id="elm_2WLaaFatGc91EvdstRbRIQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p>Read more about the importance of Data Readiness in AI:&nbsp;</p><p><br/></p><p></p><p><span style="font-weight:bold;">&nbsp; &nbsp;&nbsp;<a href="https://www.cloud9advisers.com/News/post/the-ai-magic-trick" title="The AI Magic Trick: Why Your Data is the Real Star of the Show" target="_blank" rel="">The AI Magic Trick: Why Your Data is the Real Star of the Show</a></span></p><p><br/></p></div>
</div><div data-element-id="elm_hoUKSnt5QaiHp-iy1K1ghA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Schedule a chat with us</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 05 Aug 2025 13:05:00 -0500</pubDate></item><item><title><![CDATA[Redefining Connectivity in the Digital Age]]></title><link>https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age</link><description><![CDATA[The B2B landscape is defined by the age of AI, cloud, and ubiquitous mobility. We explore how SDWAN and SASE are transforming the network from a cost center into the core strategic asset that drives advanced digital initiatives and fuels the AI gold rush.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_XA3OhJvvT1aZzVTrdhkPvQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_agzUTmSTQT-QxVGsMF3BAw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_5e4krQ7FR46xJ9t8_i2rmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_YBx_lEe_SEu1iNDKjj3CVA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;"><span>How SDWAN and SASE Fuel the Age of AI and Digital Strategy</span></span></h1></div>
<div data-element-id="elm_XYcZkgPcD2dDwzRMfWrKlQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-weight:bold;">Advanced Networking: The Foundational Requirement for the AI Era</span></p><p><span><span><span><span>The convergence of network optimization and cloud security transforms connectivity from a simple utility into the core strategic asset that enables mobility, IoT, and AI-driven growth.</span></span><br/></span></span></p><p><span><span><span><span><br/></span></span></span></span></p><p style="text-align:center;"><span><span><span><span><span><span style="font-style:italic;">Updated!&nbsp;</span></span><br/></span></span></span></span></p></div>
</div><div data-element-id="elm_vJ5mW9dYeQgXO9wbRdHiSw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_vJ5mW9dYeQgXO9wbRdHiSw"] .zpimage-container figure img { width: 1110px ; height: 369.42px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/artificial-intelligence-3706562_1280.jpg" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_osL2YtKZiEz20jz4t8Tfow" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>The modern network acts as an intelligent traffic control layer, prioritizing real-time AI data while securing every access point.</span></span></p></div>
</div><div data-element-id="elm_25RamFwwTPLd9yAdqGubMw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_25RamFwwTPLd9yAdqGubMw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_25RamFwwTPLd9yAdqGubMw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_aemv--3tH0aCZMkIizO-Bw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_9YoBLdTWISYfJc6Z5AkZDg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_sUYmup9gNv3NurUxkrujhg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-size:12pt;"></span></p><div><h1><span>Advanced Networking: The Foundational Requirement for the AI Era</span></h1><p><span>The modern B2B technology landscape is defined by two relentless forces: the shift of critical applications to the cloud, and the universal need for advanced, real-time data analysis. As customer needs evolve, driven by demands for instant communication, ubiquitous mobility, and sophisticated analytics, network architecture is no longer a back-office utility—it is the ultimate strategic enabler.</span></p><p><span><br/></span></p><p><span>Advanced solutions like cloud infrastructure, sophisticated cybersecurity defense, and transformative Customer Experience (CX) platforms are reshaping how network management operates. Without a high-performing, flexible, and secure network foundation, these initiatives cannot deliver their promised value. In fact, a brittle, legacy network architecture quickly becomes the single biggest bottleneck that cripples digital transformation.</span></p><p><span><br/></span></p><p><span>This realization is driving the rapid adoption and evolution of </span><strong>Software-Defined Wide Area Networking (SDWAN)</strong><span> and the mandatory shift to </span><strong>Secure Access Service Edge (SASE)</strong><span>. These are the twin pillars of advanced connectivity, transforming the network from a cost center into a true competitive asset.</span></p><h3><span><br/></span></h3><h3><span>The AI Gold Rush and the Network Bottleneck</span></h3><p><span>The excitement surrounding Artificial Intelligence (AI) and Machine Learning (ML) is palpable. From large language models (LLMs) used for generative tasks to predictive analytics driving operational efficiencies, every business is exploring how to harness this power. This technological pursuit can be described as the </span><strong>AI Gold Rush</strong><span>, and the fuel for this rush is </span><strong>data</strong><span>.</span></p><p><span><br/></span></p><p><span>However, the reality of deploying and scaling AI is harsh: AI models are voracious consumers and producers of data.</span></p><ul><li><p><strong>Training Data Load:</strong><span> Training new models requires moving massive, multi-petabyte datasets, often between enterprise locations, cloud storage, and specialized compute clusters. These sustained, heavy data streams place an immense strain on conventional wide area networks.</span></p></li><li><p><strong>Real-Time Inference:</strong><span> When models are deployed for real-time use (e.g., fraud detection, robotic process automation, or instant translation), the network must handle constant, bidirectional streams of </span><em>inference</em><span> data. This traffic demands extremely low latency, as milliseconds of delay can render the AI's result useless or too late for the human decision-maker.</span></p></li><li><p><strong>Edge AI and IoT:</strong><span> The proliferation of IoT devices and edge computing—essential for modern industrial operations or retail analytics—means AI is often deployed outside the data center. The network must aggregate data from thousands of endpoints, securely transport it for analysis, and then deliver inference back to the edge with near-zero delay.</span></p></li></ul><p><span>Legacy networks, designed primarily for static user-to-data-center traffic, are simply not equipped to handle the sheer volume, velocity, and priority requirements of these diverse AI data loads.</span></p><h3><span><br/></span></h3><h3><span>SDWAN’s AI Role: From Bandwidth to Intelligent Transport</span></h3><p><span>This is where the evolution of </span><strong>SDWAN</strong><span> becomes critical. SDWAN is moving beyond simply pooling bandwidth; it is now integrating </span><strong>AI and Machine Learning</strong><span> to enable a level of control that manual configuration could never achieve.</span></p><p><span><br/></span></p><p><span>The network must become self-aware and adaptive:</span></p><ol><li><p><strong>Adaptive Routing:</strong><span> Integrated ML capabilities allow the SDWAN solution to constantly monitor the quality of every available link (fiber, broadband, 5G, satellite) in real-time. If it detects a spike in jitter or packet loss on one link, it doesn't just failover; it instantly and preemptively steers critical traffic—like that associated with a remote AI inference operation or a vital cloud application—to a healthier path, often without any human intervention or network interruption.</span></p></li><li><p><strong>Application-Tailored Performance:</strong><span> Clients are prioritizing </span><strong>application-tailored performance</strong><span> over generalized capacity. A network built for the AI era must be intelligent enough to identify a large, non-urgent data backup (which can handle some latency) versus a sensitive UCaaS voice packet or a critical AI data stream. It uses its </span><strong>prioritization, optimization, and acceleration</strong><span> capabilities to allocate resources based on the business criticality of the application, ensuring that the most valuable traffic always wins.</span></p></li><li><p><strong>Convergence of Network, Mobility, and IoT:</strong><span> SDWAN facilitates the convergence of these three domains into a cohesive transport solution. By providing flexible, policy-driven connectivity, it ensures that real-time data transmission from mobile devices, manufacturing sensors, and cloud services flows efficiently. This integration is essential for providing the seamless, user-friendly experience modern businesses demand.</span></p></li></ol><p><span>SDWAN is no longer about getting more data through the pipe; it’s about making the pipe smarter, turning it into a dynamic data delivery system that is a prerequisite for successful AI adoption.</span></p><h3><span><br/></span></h3><h3><span>SASE and Security: Unifying the New Perimeter</span></h3><p><span>A conversation about advanced networking, especially one related to enabling AI and mobility, is fundamentally incomplete without addressing cybersecurity. As the network shifts to the cloud, the perimeter dissolves, and the risk surface expands exponentially. This is the driving force behind the mandatory shift to </span><strong>SASE (Secure Access Service Edge)</strong><span>.</span></p><p><span><br/></span></p><p><span>SASE and </span><strong>CASB (Cloud Access Security Broker)</strong><span> frameworks are transforming organizational security approaches by replacing fragmented, appliance-based security with a unified, cloud-native platform. This is the only way to manage the complexity and scale of modern threats.</span></p><p><span><br/></span></p><p><span>The integration of network optimization (SDWAN) and security convergence (SASE) delivers profound advantages:</span></p><ul><li><p><strong>Zero Trust Enforcement:</strong><span> A true SASE architecture embeds </span><strong>Zero Trust Network Access (ZTNA)</strong><span>. Instead of relying on the physical IP address of a location—which is obsolete in the mobile world—access policy is tied to the </span><strong>user's identity</strong><span> and the real-time posture of their device. This is crucial for protecting the sensitive data fueling AI, ensuring that only verified identities can access the massive data lakes required for model training and deployment.</span></p></li><li><p><strong>The Single Pane of Glass:</strong><span> SASE integrates multiple security functions (Firewall-as-a-Service, Secure Web Gateway, CASB) into a single software stack delivered from the cloud. This unified management platform greatly reduces the complexity, operational overhead, and security gaps inherent in multi-vendor, disparate solutions. Monitoring and managing security risks through a single interface provides unparalleled visibility and consistency across all endpoints and cloud resources.</span></p></li><li><p><strong>Pervasive, Low-Latency Security:</strong><span> Because SASE is delivered via a global network of PoPs (Points of Presence), security inspection happens close to the user, eliminating the need to &quot;backhaul&quot; traffic. This ensures that the security layer does not introduce performance-crippling latency, preserving the speed and efficiency required by AI and real-time cloud applications.</span></p></li></ul><p><span>In the advanced network, security is not an afterthought; it is an inseparable, integrated function of connectivity.</span></p><h3><span><br/></span></h3><h3><span>Understanding the Client Imperative</span></h3><p><span>The reality is that these advanced solutions are not a plug-and-play, one-size-fits-all commodity. They require a rigorous, third-party assessment to ensure they align with the unique needs and growth objectives of each business.</span></p><p><span><br/></span></p><p><span>Designing effective networking solutions in the age of AI and SASE requires:</span></p><ol><li><p><strong>Thorough Needs Assessment:</strong><span> Moving past simple link capacity metrics to understanding application requirements, data flow patterns (where the AI and IoT data is being generated and consumed), and specific security mandates (compliance, PII, etc.).</span></p></li><li><p><strong>Strategic Alignment:</strong><span> Ensuring that networking capabilities are not just meeting technical requirements but are directly enabling broader business objectives, such as a major cloud migration, the implementation of a new AI strategy, or the expansion of a mobile sales force.</span></p></li><li><p><strong>Vendor Neutrality:</strong><span> The market is saturated with vendors, each claiming a unique flavor of SDWAN or SASE. A trusted adviser is required to cut through the marketing noise, evaluate the true integration of the underlying technology, and shortlist providers that offer a genuinely unified, high-performing solution.</span></p></li></ol><p><span><br/></span></p><p><span>The digital age demands constant vigilance and architectural foresight. The successful organizations are those that view their network not as an expenditure, but as the core platform for innovation.</span></p><p><span><br/></span></p><p>At Cloud 9 Advisers<span>, we have a deep understanding of the challenges and opportunities at the intersection of AI, security, and connectivity. We are committed to providing our clients with the vendor-neutral insights and strategic solutions they need to navigate this complexity, achieve their business goals, and stay competitive in a rapidly evolving digital environment.</span></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div><span style="font-size:12pt;"><br/></span></div></div>
</div></div><div data-element-id="elm_Edv7AMMBMLmbT7rwjmCOWw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_Z_qMGMmzSOu_Ql2SHXbiBw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan"><span class="zpbutton-content">SD-WAN</span></a></div>
</div><div data-element-id="elm_yWHw1INNI6zc517E9iPpRg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""></a></p><p><a href="https://www.cloud9advisers.com/News/post/ai-engine" title="The Engine that Drives AI" rel="">The Engine that Drives AI</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 07 Feb 2025 13:17:45 -0500</pubDate></item><item><title><![CDATA[CrowdStrike and Microsoft]]></title><link>https://www.cloud9advisers.com/News/post/crowdstrike-and-microsoft</link><description><![CDATA[The time is nigh! Work with Cloud 9 to help you understand the implications of the Microsoft/CrowdStrike outage, and the importance of prioritizing your resiliency plans.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_BW-RdzRUStqn2tRLQvnrKw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MfwtWHzqS4i06DgSeIZlJg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_PiF5NKGWRGeW44UAlIQGTA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_cUtSUoCHTFOKeh66rQkEjw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">CrowdStrike and Microsoft Outage: Next Steps</span></h1></div>
<div data-element-id="elm_dbLpWrgG9btKNkhqk2nLKQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_dbLpWrgG9btKNkhqk2nLKQ"] .zpimage-container figure img { width: 1110px ; height: 719.65px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/premium_photo-1661891469578-7fd063fe8b65" size="fit" alt="Gone Phishing" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_IdzSgC0MTNC5XShoJCB8Jg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><span style="font-style:italic;">The CrowdStrike and Microsoft Outage Aftermath: Next Steps b<span style="color:inherit;">y Jeff Hathcote, Solution Architect – Security</span></span></div></div></div>
</div><div data-element-id="elm_MdL4iZ4qne1puUXWMdajig" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_eRIypUhC9s_awHRfxYQN8g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
<div data-element-id="elm_xKZasdZni9_lsW8XyXOObA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_9hQYD5CF1cF_TMQMWrpOqw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">CrowdStrike and Microsoft: Hard at work</span></h2></div>
<div data-element-id="elm_47d_fKZjIEvJJO2ScyCcEw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>While unintentional in nature, the recent CrowdStrike outage caused disruptions that reverberated throughout the globe. While CrowdStrike and Microsoft are hard at work to rectify an estimated 8.5 million computers affected worldwide, guess who’s hard at play taking advantage of the situation? The bad guys and their phishing schemes.&nbsp;</div><br><div>Now is the time to work with Cloud 9 to help you understand the implications of the outage, and the importance of prioritizing your resiliency plans.&nbsp;</div></div></div>
</div><div data-element-id="elm_zcOcY4hv52Ci7fnEu35jeg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>The vital role of Cloud 9 Advisers and Essential Discussion Points:&nbsp;</div></div></h3></div>
<div data-element-id="elm_IuIQOFNClESqgHUVAciBeg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">In the aftermath of the CrowdStrike outage, Cloud 9 has a critical role to play as your trusted adviser. We can help with guidance on navigating this crisis in two ways: 1) Helping you comprehend the situation, and 2) Advising you on how to strengthen your defenses to avoid a similar disaster from impacting your organization (any sized company is vulnerable to modern cyber threats.)</span><br></div></div></div>
</div><div data-element-id="elm_x9HNJnuJpRm6d1cv2hvRYQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">1. Understanding the Outage</h3></div>
<div data-element-id="elm_n7qc4uPbI4NAln0tIN4aVQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">It is important to note that the CrowdStrike/Microsoft outage was NOT a cyberattack. The incident began with a software update. As part of its ongoing threat protection, CrowdStrike regularly updates its sensor with the latest threat data. In this instance, the update violated a protected memory address within the Microsoft Windows environment, causing the operating system to encounter a critical error, resulting in the ubiquitous “blue screen of death” where an affected device is unable to recover on its own.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">The workaround to the issue involved a very manual process, requiring users/admins to log in to each machine under “safe mode” and remove the registry key that contains the faulty code. This event shows just how connected technology products are within our ecosystem, and one failure can cause a cascade of devastating impact on an entire infrastructure.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">While both CrowdStrike and Microsoft are working diligently to assist in recovery efforts, we all need to be aware of the potential for secondary attacks from cybercriminals based on information collected via a phishing attack.</span><br></p></div>
</div><div data-element-id="elm_NcoAZHm8B-oI2l1yW9c2DQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Learning from the Incident: How to Outsmart the Bad Guys&nbsp;</span></h3></div>
<div data-element-id="elm_C6GfVnZQRaUrMM9LWCcJ-A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Within hours of the incident on July 19, 2024 CrowdStrike warned of malicious activity trying to exploit the outage. One primary method that cybercriminals are using is to send phishing emails purportedly from CrowdStrike (or Microsoft) using “spoofed” addresses (i.e., somebody@crowdstrikeoutage.com) with malicious attachments or simply to gather information for a later compromise.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">CrowdStrike and Microsoft are working around the clock to provide guidance as well as potential tools to assist with recovery. Some good, free advice: DO NOT OPEN any emails from unofficial addresses posing as CrowdStrike or Microsoft support and thoroughly questioning any potential phone calls you may get from CrowdStrike staff; they are likely impersonators.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Additionally, this unfortunate incident opens up the conversation for developing (or revisiting) a robust cybersecurity prevention and recovery plan. With access to a breadth of cybersecurity providers, solution architects, and managed services, Cloud 9 has the opportunity to help you with your entire strategy – from organization-wide cyber training, to IT outage response plans, to infrastructure automation for disaster recovery, to third-party risk management and consulting programs.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Or, if you’re a maverick and really want to stir the pot, we can even help you switch it all over to Google and Chromebooks!</span><br></p></div>
</div><div data-element-id="elm_PvWE-YmOmiQ74IecKqfNJA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_EetI2UTqO1dxKV4cI0ZcHA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Final Thoughts&nbsp;</span></h2></div>
<div data-element-id="elm_v8SsmFVdGuladHKvWgLe9g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>“This high-impact event emphasizes the urgency to keep resiliency plans current, communicated, and understood within the organization to avoid the types of customer disruptions experienced since July 19. Like other industry disruptions this year, this event creates conversational opportunities about how to best prepare organizations for these inevitabilities.” – Koby Phillips, VP of Advanced Solutions</div><div><br></div><div>While the CrowdStrike outage presents significant challenges, Cloud 9 is ready, willing, and able to offer expert guidance. We can assist you in navigating this crisis and help you emerge stronger and more resilient. To that end I ask: Which components or upstream service providers in your environment are you dependent on? Are you considering additional resiliency around your mission critical vendors?&nbsp;</div></div></div>
</div></div><div data-element-id="elm_P9DpTgzYPFu6ERx7hBJIeg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_fzuNUrktQPefn_tpyo1leQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 09 Aug 2024 14:22:27 -0500</pubDate></item><item><title><![CDATA[Key security Concepts, 1]]></title><link>https://www.cloud9advisers.com/News/post/key-security-concepts-1</link><description><![CDATA[A cybersecurity framework is a set of practices, policies, and procedures that help an organization to create an effective security program.&nbsp; Key ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_jbJe4SA1Q_qeeBdh4gJftQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_kn84HiEaSvuEvI3Jf0Lq_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_LTQQzcB5R-izLAEoD7QYew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_xZ4RVIY-SiOuLhBNJi3zYg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_xZ4RVIY-SiOuLhBNJi3zYg"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Confidentiality. Integrity. Availability.</span><br></h1></div>
<div data-element-id="elm_SFTsRTD1gvcObz1xf2likA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width: 596.35px !important ; height: 519px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width:596.35px ; height:519px ; } } @media (max-width: 767px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width:596.35px ; height:519px ; } } [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/Security%20-%20Three%20of%20Three%20-1-.svg" width="596.35" height="519" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_vq6o0PLjT8iiytTJaLwNEA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vq6o0PLjT8iiytTJaLwNEA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">A cybersecurity framework is a set of practices, policies, and procedures that help an organization to create an effective security program.&nbsp; </span><span style="color:inherit;">Key&nbsp;</span><span style="color:inherit;">concepts for Cybersecurity is starting with a framework. There are plenty of pre-built frameworks available to guide you based on your industry, like NIST, PCI, HIPAA, ISO and more. But before you go there, and maybe before you even pick one, you should start with the Three Rules or Three. The first set starts with Confidentiality, Availability, and Integrity. This is the fine balancing act for Cybersecurity, also known as the “bedrock principle for Cybersecurity.” There’s no such thing as perfect security, you can’t spend all resources on all three areas - so focusing on your specific business needs, and identifying which of these are most important to your business and the separate business units helps properly align Cybersecurity solutions with business outcomes.</span></div></div></div>
</div><div data-element-id="elm_bJjyTVv7SSUchbztXC2Mdg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bJjyTVv7SSUchbztXC2Mdg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>If your an accounting firm integrity of data might be most important to you. If your an e-commerce company, then availability is critical. If you're in healthcare, confidentiality may be paramount. Start with the overall needs of the business as a whole, then drill down to the specific needs of each department or business unit. Striking the balance is also important from department to department.&nbsp;</p></div>
</div><div data-element-id="elm_8Hb7wbUbTVGvKPUdqBStGQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_8Hb7wbUbTVGvKPUdqBStGQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/cybersecurity"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 13 May 2024 05:42:00 -0500</pubDate></item><item><title><![CDATA[VMware impact on CSPs]]></title><link>https://www.cloud9advisers.com/News/post/vmware-impact-on-csps</link><description><![CDATA[The acquisition of VMware by Broadcom has left many scratching their heads and customers very concerned for many reasons. Not to worry Cloud 9 has you covered. Our experts and Supplier Portfolio are ready to help.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__MRtWHv1SBmltC3NHExSWw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ewoZ1VuXR1S_Iw56dVjpdw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_lf91I67uTuWLXuNokt_XFA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_JnSz6duZQCqvsWd0xEbqxw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_JnSz6duZQCqvsWd0xEbqxw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Impact on VMware Cloud Service Providers</span></h1></div>
<div data-element-id="elm_cUN_8yQxg8uUqqrYSm685w" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"] .zpimage-container figure img { width: 509px !important ; height: 319px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"] .zpimage-container figure img { width:509px ; height:319px ; } } @media (max-width: 767px) { [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"] .zpimage-container figure img { width:509px ; height:319px ; } } [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/VMware%20issue.png" width="509" height="319" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_yxdgSpcOCczdxf0W_eDuKg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_yxdgSpcOCczdxf0W_eDuKg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_I46ohUnYg2dKYogKcP5KxA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_I46ohUnYg2dKYogKcP5KxA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_JLrE7ut6KX_k2MussBwCuA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_JLrE7ut6KX_k2MussBwCuA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Broadcom + VMware BIG Partner changes</h2></div>
<div data-element-id="elm_cxQsTmnb-qhlsuz1XVM7JA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cxQsTmnb-qhlsuz1XVM7JA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-left:1pt;margin-right:9.1pt;"><span style="font-size:12pt;">The acquisition of VMware by Broadcom has left many scratching their heads and customers very concerned for many reasons. Not to worry Cloud 9 has you covered. Our experts and Supplier Portfolio are ready to help.&nbsp;</span></p><p style="margin-left:1pt;margin-right:9.1pt;"><span style="font-size:12pt;"><br></span></p><p style="margin-left:1pt;margin-right:9.1pt;"><span style="font-size:12pt;">One of the many changes have led to tension within the VMware partner community, with reports of numerous terminated reseller and cloud service provider agreements.</span></p><p style="margin-left:1pt;margin-right:9.1pt;"><span style="font-size:12pt;color:inherit;"><br></span></p><p style="margin-left:1pt;margin-right:9.1pt;"><span style="font-size:12pt;color:inherit;">VMware’s cloud service provider program is being reduced from approx. 4500 service providers globally to about 400 on May 1, 2024. There will be two Partner/CSP tiers going forward under the new program:</span></p><p style="font-size:13px;"><span style="color:inherit;"><span><br></span></span></p><ul><li style="font-size:12pt;margin-left:7pt;"><p><span style="font-size:12pt;font-weight:700;">Pinnacle </span><span style="font-size:12pt;">–&nbsp;100 globally partners and only 12 in the US</span></p></li><ul><li style="font-size:12pt;font-weight:700;margin-left:36pt;"><p><span style="font-size:12pt;">6 of the 12 providers are currently in our portfolio</span></p></li></ul></ul><p style="font-size:13px;"><span style="color:inherit;"><span><br></span></span></p><ul><li style="font-size:12pt;margin-left:7pt;"><p style="margin-right:33.25pt;"><span style="font-size:12pt;font-weight:700;">Premier </span><span style="font-size:12pt;">– 400 globally, approx. 135 in the U.S.</span></p></li><ul><li style="font-size:12pt;margin-left:36pt;"><p style="margin-right:33.25pt;"><span style="font-size:12pt;">Numerous suppliers already portfolio members</span></p></li></ul></ul><p style="font-size:13px;"><span style="color:inherit;"><br></span></p></div></div>
</div></div><div data-element-id="elm_rjaIA02rv5euDPkW5tZeng" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_rjaIA02rv5euDPkW5tZeng"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_NZbnm1gqi_xKgyODh688yQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_NZbnm1gqi_xKgyODh688yQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">VMware Resources</h2></div>
<div data-element-id="elm_iO50EIfdn3ybtFfCoH10hg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iO50EIfdn3ybtFfCoH10hg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:12pt;">Why Our Resources Are a Game-Changer for You</span></p><p><span style="color:inherit;"><span><br></span></span></p><ol><li style="font-size:12pt;"><p><span style="font-size:12pt;">Comprehensive Coverage: Our resources provide an all-encompassing look at VMware’s latest changes - from subscription models to the new VMware Cloud Foundation (VCF) and VMware vSphere Foundation (VVF).</span></p></li></ol><p><span style="color:inherit;"><span><br></span></span></p><ol start="2"><li style="font-size:12pt;"><p><span style="font-size:12pt;">Expert Insights: Get insights from industry experts and thought leaders on what these changes mean for your business and how to leverage them effectively.</span></p></li></ol><p><span style="color:inherit;"><span><br></span></span></p><ol start="3"><li style="font-size:12pt;"><p><span style="font-size:12pt;">Actionable Strategies: We don’t just inform; we equip you with actionable strategies to turn these changes into opportunities for growth and innovation.</span></p></li></ol><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-left:1pt;"><span style="font-size:12pt;">The changes at VMware have created significant confusion for existing VMware customers. Reach out to us for our guidebook to learn more. We'll help create a clear path forward and to increase your success and value to your own customers.</span><br></p><p><span style="color:inherit;"></span></p><div><span style="font-size:12pt;"><br></span></div></div>
</div><div data-element-id="elm_3xhas9MyT4ip2H8eE7iucQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_3xhas9MyT4ip2H8eE7iucQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Contact Us</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 30 Apr 2024 06:39:00 -0500</pubDate></item><item><title><![CDATA[VMware: New Core Offerings]]></title><link>https://www.cloud9advisers.com/News/post/vmware-new-core-offerings</link><description><![CDATA[VMware new core offerings represent a shift towards streamlined, subscription-only solutions, attempting to enhance customer value and innovation delivery]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_su3tYaT8R1qsHyb8h_D6Yw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Qa1NErh_TW-G1kWlxoefCA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_pP-fqXiVT-iu_m_vKD12dw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_zKl_0h54TCGiT3USEJtMHw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_zKl_0h54TCGiT3USEJtMHw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">New Core Offerings and Changes from VMware</span></h1></div>
<div data-element-id="elm_MqUD3cwPSY2TFSisE2OOnA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_MqUD3cwPSY2TFSisE2OOnA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">VMware's new core offerings, as part of their transition to a subscription-based model, are the VMware Cloud Foundation (VCF) and VMware vSphere Foundation (VVF). VCF is designed for customers seeking a full-stack infrastructure platform, integrating solutions like vSphere, vSAN, and NSX with the Aria management suite. On the other hand, VVF is tailored for data center optimization in traditional vSphere environments, including Tanzu Kubernetes Grid and Aria Operations as standard features. These offerings represent VMware's shift towards streamlined, subscription-only solutions, enhancing customer value and innovation delivery.</span><br></p></div>
</div><div data-element-id="elm_WhpIFEvgwOc7zTfIqCBKfw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_WhpIFEvgwOc7zTfIqCBKfw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">End of Availability (EOA) Products</span></h2></div>
<div data-element-id="elm_E3JVqpzH-n1qemtaF0UWzw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_E3JVqpzH-n1qemtaF0UWzw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-left:1pt;margin-right:0.4pt;"><span style="font-size:13pt;">VMware has announced EOA for several of its products, transitioning them to a more streamlined portfolio focused on VCF and VVF. This change means numerous standalone VMware products are now integrated into these core offerings or have been replaced by them. Notably, VMware vSphere Enterprise Plus, vSAN, and other key products are available within the VCF or VVF structure. This shift aims to simplify VMware's offerings and focus on subscription-based solutions, enhancing customer value and enabling a more straightforward approach to selecting VMware products.</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-left:1pt;"><span style="font-size:13pt;">End of Availability (EOA) items, effective May 6, 2024:</span></p><p><span style="color:inherit;"><br></span></p><ul><li style="font-size:13pt;"><p style="margin-right:9.4pt;"><span style="font-size:13pt;">350M/750M/5G bandwidth tiers (for services SD-WAN, Enhanced Firewall Service, and Regional add-ons)</span></p></li><li style="font-size:13pt;"><p><span style="font-size:13pt;">SD-WAN Software Orchestrator-Only deployment options</span></p></li><li style="font-size:13pt;"><p><span style="font-size:13pt;">SD-WAN Work From Home subscriptions</span></p></li><li style="font-size:13pt;"><p><span style="font-size:13pt;">VMware Edge Intelligence Hardware (Crawler and SFP)</span></p></li><li style="font-size:13pt;"><p><span style="font-size:13pt;">Hardware Rental Program</span></p></li><li style="font-size:13pt;"><p><span style="font-size:13pt;">Customer and Partner Success services (CPS)</span></p></li><li style="font-size:13pt;"><p><span style="font-size:13pt;">Support:</span></p></li><ul><li style="font-size:13pt;"><p><span style="font-size:13pt;">VMware SASE Basic/Production/Premier support tiers</span></p></li><li style="font-size:13pt;"><p><span style="font-size:13pt;">VMware SASE Carrier Grade Support</span></p></li><li style="font-size:13pt;"><p><span style="font-size:13pt;">VMware SD-WAN Hardware Replacement Services</span></p></li></ul></ul></div>
</div><div data-element-id="elm_3sglmzUJQlG3gj52bRxgxw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_3sglmzUJQlG3gj52bRxgxw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="javascript:;" target="_blank"><span class="zpbutton-content">Contact Us Now</span></a></div>
</div><div data-element-id="elm_4xpFds0XDK-mVJQVX9dXiA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4xpFds0XDK-mVJQVX9dXiA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cloud 9: your VMware Resource</h2></div>
<div data-element-id="elm_WDZ5Yooif8iMAA--jL110w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WDZ5Yooif8iMAA--jL110w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">The changes at VMware have created a lot of confusion for existing VMware customers. Reach out to us to get the guidebook and know that a relationship with us is in place will help create a clear path forward and to increase your success and value to your own customers.</span><br></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 29 Apr 2024 15:35:00 -0500</pubDate></item><item><title><![CDATA[VMware journey]]></title><link>https://www.cloud9advisers.com/News/post/vmware-journey</link><description><![CDATA[Get the guide. Get a plan. Changes to VMware will be impactful to many.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__MRtWHv1SBmltC3NHExSWw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ewoZ1VuXR1S_Iw56dVjpdw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_lf91I67uTuWLXuNokt_XFA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_JnSz6duZQCqvsWd0xEbqxw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_JnSz6duZQCqvsWd0xEbqxw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">VMware: Change is inevitable</h1></div>
<div data-element-id="elm_cUN_8yQxg8uUqqrYSm685w" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"] .zpimage-container figure img { width: 800px !important ; height: 800px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"] .zpimage-container figure img { width:800px ; height:800px ; } } @media (max-width: 767px) { [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"] .zpimage-container figure img { width:800px ; height:800px ; } } [data-element-id="elm_cUN_8yQxg8uUqqrYSm685w"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/BroadcomVMware.jpg" width="800" height="800" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_yxdgSpcOCczdxf0W_eDuKg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_yxdgSpcOCczdxf0W_eDuKg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_I46ohUnYg2dKYogKcP5KxA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_I46ohUnYg2dKYogKcP5KxA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_JLrE7ut6KX_k2MussBwCuA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_JLrE7ut6KX_k2MussBwCuA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Broadcom + VMware get the guide</h2></div>
<div data-element-id="elm_cxQsTmnb-qhlsuz1XVM7JA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cxQsTmnb-qhlsuz1XVM7JA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="font-size:13px;">Exciting news! Contact us to get the guidebook and everything you need to know to manage the quickly changing Broadcom VMware landscape. Building on the invaluable insights shared in our comprehensive VMware guidebook, we have now developed a customer-facing version that you can personalize. This tailored guidebook is crafted to spark impactful discussions with stakeholders and open new avenues for your IT operations.&nbsp;</p><p style="font-size:13px;">&nbsp;<span style="color:inherit;">&nbsp;</span></p><p style="font-size:13px;">We are your authority in the VMware ecosystem.&nbsp;</p><p style="font-size:13px;">Get equipped with essential knowledge on:</p><ul><li><strong>Latest VMware Innovations:</strong>&nbsp;An exploration of new core offerings and how they can revolutionize your IT environment</li><li><strong>Adjustments in Products, Support, and Services:</strong>&nbsp;Key updates that could influence your IT operations and strategies for adaptation.</li><li><strong>Insights for Cloud Service Providers:</strong>&nbsp;How the latest VMware developments impact cloud solutions and advice on leveraging these changes for growth.</li><li style="margin-bottom:13px;"><strong>Guidance on Migrating Off VMware:</strong>&nbsp;Expert tips for a seamless transition, ensuring a smooth experience</li></ul></div></div>
</div></div><div data-element-id="elm_rjaIA02rv5euDPkW5tZeng" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_rjaIA02rv5euDPkW5tZeng"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_NZbnm1gqi_xKgyODh688yQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_NZbnm1gqi_xKgyODh688yQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">VMware Resources</h2></div>
<div data-element-id="elm_iO50EIfdn3ybtFfCoH10hg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iO50EIfdn3ybtFfCoH10hg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:12pt;">Why Our Resources Are a Game-Changer for You</span></p><p><span style="color:inherit;"><span><br></span></span></p><ol><li style="font-size:12pt;"><p><span style="font-size:12pt;">Comprehensive Coverage: Our resources provide an all-encompassing look at VMware’s latest changes - from subscription models to the new VMware Cloud Foundation (VCF) and VMware vSphere Foundation (VVF).</span></p></li></ol><p><span style="color:inherit;"><span><br></span></span></p><ol start="2"><li style="font-size:12pt;"><p><span style="font-size:12pt;">Expert Insights: Get insights from industry experts and thought leaders on what these changes mean for your business and how to leverage them effectively.</span></p></li></ol><p><span style="color:inherit;"><span><br></span></span></p><ol start="3"><li style="font-size:12pt;"><p><span style="font-size:12pt;">Actionable Strategies: We don’t just inform; we equip you with actionable strategies to turn these changes into opportunities for growth and innovation.</span></p></li></ol><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-left:1pt;"><span style="font-size:12pt;">The changes at VMware have created significant confusion for existing VMware customers. Reach out to us for our guidebook to learn more. We'll help create a clear path forward and to increase your success and value to your own customers.</span><br></p><p><span style="color:inherit;"></span></p><div><span style="font-size:12pt;"><br></span></div></div>
</div><div data-element-id="elm_3xhas9MyT4ip2H8eE7iucQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_3xhas9MyT4ip2H8eE7iucQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Contact Us</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 26 Apr 2024 15:27:00 -0500</pubDate></item><item><title><![CDATA[SD-WAN and SASE]]></title><link>https://www.cloud9advisers.com/News/post/sd-wan-and-sase</link><description><![CDATA[SDWAN optimizes your network. SASE secures your edge. We demystify the two fastest-growing acronyms in networking, clarify their distinct benefits for single and multi-location companies, and explain the components that create a truly unified SASE platform.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_1jXyK-BxSzyrWaKP8RqrUA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iT5zEM8tTIydTEbJVk5i1A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_gS4hskNZS06uKMpuP2R1QQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_5E1mk1d-aq_UX3M_nNC1YA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>SDWAN &amp; SASE: The Essential Guide to Converging Connectivity and Cloud Security</span></h1></div>
<div data-element-id="elm_EaYOe5_uT1Wkw5nbmuKiqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EaYOe5_uT1Wkw5nbmuKiqQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div style="color:inherit;"><div><span><span>Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network</span></span></div><div><span><span><br/></span></span></div><div><span><span><span><span>Cloud-first operations demand a new network model. Understanding the roles of Software-Defined Wide Area Networking (SDWAN) and Secure Access Service Edge (SASE) is the first step toward building a truly resilient and secure edge.</span></span><br/></span></span></div><div><span><span><span><span><br/></span></span></span></span></div><div><span><span><span><span><span><span>SASE and SDWAN represent the necessary convergence of security (the perimeter) and networking (the pathway) in the age of cloud and hybrid work.</span></span><br/></span></span></span></span></div></div></div>
</div><div data-element-id="elm_jkUNxYuneitwIK_sewBFAg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_jkUNxYuneitwIK_sewBFAg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_jkUNxYuneitwIK_sewBFAg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_BbiI0m9bI29ZdapwOsEbpw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"> [data-element-id="elm_BbiI0m9bI29ZdapwOsEbpw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dcjweYy9nV-YMoK-K7qnZA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dcjweYy9nV-YMoK-K7qnZA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_WblXvipEFTmJ2j7HnywXfw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WblXvipEFTmJ2j7HnywXfw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;"></span></p><div><h2><span>Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network</span></h2><p><span>For many IT leaders, the networking and security landscape over the past few years has felt like an endless alphabet soup. Two acronyms, in particular, have dominated strategic conversations: </span><strong>SDWAN</strong><span> and </span><strong>SASE</strong><span>.</span></p><p><span><br/></span></p><p><span>Both are frequently discussed in the context of modernization, cloud migration, and supporting the hybrid workforce. This has led to widespread confusion, with many vendors incorrectly presenting them as competing solutions, or worse, claiming that one automatically includes the other without proper implementation.</span></p><p><span><br/></span></p><p><span>At Cloud 9 Advisers, we act as pragmatic, expert advisers to help you cut through this noise. Simply put: </span><strong>SDWAN optimizes the network; SASE secures the edge.</strong><span> They are not competing technologies, but essential components that, when unified correctly, form the foundation of a modern, secure, and resilient network.</span></p><p><span>Understanding their individual roles is the first step to making the right strategic investment.</span></p><h3><span><br/></span></h3><h3><span>Part 1: Demystifying SDWAN (Software-Defined Wide Area Network)</span></h3><p><span>SDWAN is fundamentally a revolutionary approach to Wide Area Networking (WAN). Traditionally, WANs relied on complex hardware—specific routers, expensive leased lines (like MPLS), and manual configurations—to connect separate locations.</span></p><p><span><br/></span></p><p><span>SDWAN separates the control plane (the intelligence of the network) from the data plane (the physical connections). By shifting control to software, it gains two critical advantages: </span><strong>intelligence</strong><span> and </span><strong>flexibility</strong><span>.</span></p><p><span><br/></span></p><p><span>The SDWAN appliance at each location becomes application-aware, meaning it knows the difference between a voice packet, an email, or a large file download. This intelligence is then used to optimize traffic flow in real time across any combination of underlying links (fiber, broadband, 4G/5G, etc.).</span></p><h4><span><br/></span></h4><h4><span>The Pragmatic Benefits of SDWAN</span></h4><p><span>While SDWAN was originally designed to connect </span><strong>multiple locations</strong><span> effectively, it offers distinct and significant benefits even for </span><strong>companies with a single location</strong><span>:<br/><br/></span></p><table><tbody><tr><th style="width:13.516%;"><p><span style="font-weight:bold;">Audience</span></p></th><th style="width:25.137%;"><p><span>Primary Problem Solved</span></p></th><th style="width:59.5205%;"><p><span>Core SDWAN Benefit</span></p></th></tr><tr><td style="width:13.516%;"><p><strong>Single Location</strong></p></td><td style="width:25.137%;" class="zp-selected-cell"><p><span>Internet instability, QoS issues for real-time apps, reliance on expensive single circuits.</span></p></td><td style="width:59.5205%;"><p><strong>Reliability &amp; Efficiency:</strong><span> It aggregates multiple, low-cost internet links into a unified connection. It uses that power to ensure mission-critical applications (like UCaaS or a cloud ERP system) always have the bandwidth they need, while less critical traffic is given lower priority. It provides a more robust, stable connection than any single circuit ever could.</span></p></td></tr><tr><td style="width:13.516%;"><p><strong>Multiple Locations</strong></p></td><td style="width:25.137%;"><p><span>High cost of traditional WAN (MPLS), complex management, and traffic backhauling for security.</span></p></td><td style="width:59.5205%;"><p><strong>Virtual Network &amp; Cost Reduction:</strong><span> This is the original design intent. It creates a seamless, virtual network that spans multiple physical locations, making management centralized and simple. Critically, it allows companies to swap expensive MPLS with low-cost broadband, reducing ongoing network costs while improving agility and allowing for dynamic, automated routing around outages or congestion.</span></p></td></tr></tbody></table><p><span><br/></span></p><p><span>SDWAN’s value is in </span><strong>resilience</strong><span> and </span><strong>performance</strong><span>. It is the key to providing the high-quality, low-latency connectivity required for the sensitive, real-time applications we discussed in our last article on Call Survivability.</span></p><h3><span><br/></span></h3><h3><span>Part 2: Demystifying SASE (Secure Access Service Edge)</span></h3><p><span>If SDWAN is the intelligent highway, then </span><strong>SASE (Secure Access Service Edge)</strong><span> is the integrated, cloud-native security perimeter applied to that highway's entrance and exit ramps.</span></p><p><span><br/></span></p><p><span>SASE is an architectural framework, not a single product. It was introduced to address the reality that the traditional network perimeter—the firewall in your server room—is obsolete. Users now access corporate data from home, coffee shops, and client sites using personal devices, reaching applications hosted in multiple clouds.</span></p><p><span><br/></span></p><p><span>The goal of SASE is simple: </span><strong>Secure and reliable access to corporate resources from any location, without sacrificing user experience or performance.</strong></p><p><span><br/></span></p><p><span>A comprehensive, robust SASE solution is built upon the convergence of several key security and networking components, all delivered via a single, cloud-based platform. If a vendor is missing even one of these components, they are selling a partial, non-SASE solution.</span></p><h4><span><br/></span></h4><h4><span>The Five Essential Components of a True SASE Platform</span></h4><p><span>A good SASE solution brings together the following technologies into a unified stack:</span></p><ol><li><p><strong>Secure Web Gateway (SWG):</strong><span> Provides secure, cloud-based internet access. It acts as the first line of defense, blocking malicious websites, filtering URLs, and applying advanced malware detection before traffic even reaches the user’s device or the corporate network.</span></p></li><li><p><strong>Cloud Access Security Broker (CASB):</strong><span> The CASB provides critical visibility and control over cloud applications (SaaS). It monitors user activity within apps like Microsoft 365, Salesforce, and Dropbox, enforces security policies, and prevents data leakage by encrypting sensitive data both in transit and at rest.</span></p></li><li><p><strong>Firewall-as-a-Service (FWaaS):</strong><span> This replaces the traditional physical, on-premise firewall. FWaaS is a cloud-native security layer that controls access to corporate resources and blocks unauthorized traffic, applying consistent security policies to users regardless of their location.</span></p></li><li><p><strong>Zero Trust Network Access (ZTNA):</strong><span> This is the modern replacement for traditional VPNs. ZTNA is critical because it never grants blanket access to the entire network. Instead, it operates on a principle of &quot;never trust, always verify,&quot; granting users access only to the specific applications they need, only after identity verification, and only from a compliant device. This hides corporate resources from the public internet entirely.</span></p></li><li><p><strong>Identity and Access Management (IAM):</strong><span> An integral part of the Zero Trust model. IAM provides the centralized control over user identities, authentication (often multi-factor, or MFA), and authorization. It is the engine that validates who a user is and what they are allowed to access, enforcing policy consistently across the entire SASE stack.</span></p></li></ol><p><span><br/></span></p><p><span>And finally, the often-misunderstood component:</span></p><ul><li><p><strong>Software-Defined Wide Area Networking (SDWAN):</strong><span> A true SASE architecture </span><strong>includes</strong><span> SDWAN functionality. The networking side of SASE is responsible for optimizing the transport layer—selecting the best path for traffic based on business requirements and dynamically routing it across various links (broadband, 5G, private connections). It ensures the high-performance delivery of traffic to and from the secure SASE cloud edge.</span></p></li></ul><h3><span><br/></span></h3><h3><span>SDWAN + SASE: The Convergence Strategy</span></h3><p><span>The modern B2B enterprise is defined by dispersed data, dispersed users, and dispersed applications. The only way to manage this complexity effectively is through convergence.</span></p><p><span><br/></span></p><p><span>The strategic relationship can be summarized simply:</span></p><ul><li><p><strong>SDWAN is the foundation of high-performance connectivity.</strong><span> It delivers the path optimization, quality of service (QoS), and resilience (call survivability) that your business demands.</span></p></li><li><p><strong>SASE is the strategic security framework.</strong><span> It delivers the identity-centric access control (ZTNA), threat prevention (SWG, FWaaS), and data protection (CASB) that your business requires, regardless of where the user is located.</span></p></li></ul><p><span><br/></span></p><p><span>By consolidating these functions into a unified, cloud-based platform—the core tenet of SASE—businesses gain:</span></p><ol><li><p><strong>Simplified Management:</strong><span> Moving from managing six different boxes (router, firewall, VPN concentrator, web filter, etc.) to managing one policy stack in the cloud.</span></p></li><li><p><strong>Consistent Security:</strong><span> Every user, no matter where they are or how they connect, gets the exact same security inspection and policy enforcement.</span></p></li><li><p><strong>Cost Efficiency:</strong><span> Reducing hardware footprints and maintenance costs, leveraging lower-cost internet links, and consolidating vendor contracts.</span></p></li><li><p><strong>Agility:</strong><span> The network scales instantly to accommodate mergers, acquisitions, or sudden shifts to remote work, without needing to deploy physical hardware.</span></p></li></ol><h3><span><br/></span></h3><h3><span>Simplifying the Strategic Choice</span></h3><p><span>The choice between SDWAN and SASE is a false one; the correct answer is a converged solution.</span></p><p><span><br/></span></p><p><span>However, the vendor landscape is complex, with providers offering partial solutions that may excel at the &quot;SDWAN&quot; part but provide poor, bolt-on security, or vice versa. The strategic challenge is identifying the partner that can deliver a </span><strong>truly unified SASE platform</strong><span>—one where the networking and security components are built to work together seamlessly, eliminating gaps and preserving performance.</span></p><p><span><br/></span></p><p><span>Don’t get stuck in the alphabet soup of acronyms. Focus on the required outcomes: </span><strong>resilient performance and secure access from anywhere.</strong></p><p><span><br/></span></p><p><span>At Cloud 9 Advisers, we help technology leaders sift through the noise, evaluate the true integration level of SASE vendors, and select the platform that meets the specific demands of their single or multi-location business model.</span></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div><span style="font-size:12pt;"><br/></span></div>
</div></div><div data-element-id="elm_CV5VuMRYDmcEvhmfgMYM2w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_CV5VuMRYDmcEvhmfgMYM2w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sase" target="_blank"><span class="zpbutton-content">Learn more about SASE</span></a></div>
</div><div data-element-id="elm_FxB8pAckLtzq7zPAwodPLg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_FxB8pAckLtzq7zPAwodPLg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan" target="_blank"><span class="zpbutton-content">Learn more about SDWAN</span></a></div>
</div><div data-element-id="elm_-M6o_rd5AoLrhwfddyyoDQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-M6o_rd5AoLrhwfddyyoDQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel="">Redefining Connectivity in the Digital Age</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" title="The 'Real' SDWAN Test:" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div></div><div data-element-id="elm_bFHrnBjhtb96Vh5CJTGcZQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_bFHrnBjhtb96Vh5CJTGcZQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_oF0HDA0tROSZN17dhE2uvg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_oF0HDA0tROSZN17dhE2uvg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-left zpbutton-align-tablet-left"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 15 Jun 2023 09:40:58 -0500</pubDate></item><item><title><![CDATA[Under Constant Attack]]></title><link>https://www.cloud9advisers.com/News/post/under-constant-attack</link><description><![CDATA[Most companies only have basic firewall protection, generally hardware-based and maybe a few others may conduct regular scans of their environment. Really no different than your home having a basic lock and maybe a deadbolt.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_PeBlM-B7QBSoRizcLxfeFg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_bVe8xmGiRf2NMBIZ-WIqQw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_RkvKXUFZSsSuqpus-rrQQw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_IJhu5s4OSu-WhUxJzptDAQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IJhu5s4OSu-WhUxJzptDAQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Constant attacks require constant Security<br></h2></div>
<div data-element-id="elm_iGCsf9_QQSqoCd-C8PQKtQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iGCsf9_QQSqoCd-C8PQKtQ"].zpelem-text { border-radius:1px; padding:100px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>We’re in an environment where our systems are constantly under attack. They're under attack from all sorts of diverse players who are trying to take advantage of the private proprietary information that is available.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>Companies are really focused on compliance ensuring that they are protecting their business value from these types of attacks. Every executive has an obligation to ensure that they are compliant with security.&nbsp;<br></div><p><br></p><div>What are most companies doing for security?&nbsp;</div><p><br></p><div>Most companies only have basic firewall protection, your basic intrusion prevention (not necessarily intrusion detection), generally just hardware-based. A few others may do just a little more; they may conduct regular scans of their environment. This is really no different than your home having a basic lock and maybe a deadbolt. There is no alarm system like you might have in a home to see and be alerted when intrusions are happening. Being alerted of intrusion is critical in business so that more immediate actions can be taken. Often enough, attacks can be sly and stealthy. Recent studies show that malicious code is embedded on business systems for more than 250 days before it is ever used to promote an actual attack. The reason being so that attackers know their code is also well planted in several layers of business backups as well as active systems.&nbsp;</div><p><br></p><div>How have today’s complex attacks changed systems and the approach to security?&nbsp;</div><p><br></p><div>The attacks are becoming more sophisticated, automated,&nbsp; and voluminous, so we no longer have the time nor capability to react in a manual way. We actually have to have machine learning and other artificial intelligence technologies to adapt and scan the environment much more rapidly looking for these constant intrusions malicious code, and breeches. These technologies work in tandem with professional cybersecurity teams and Security Operations Centers (SOCs) to constantly manage, monitor, and alert. The trick with alerts is dramatically reducing false positives. Too many alerts are just as futile as too few.&nbsp;</div><div><br></div><div>How much does a cyber attack cost?&nbsp;</div><p><br></p><p>Recent US cyber crime studies show an average measurement of damage from a breach: a 46 day long average resolution at an average of $21k per day, plus regulatory fines, and major customer fallout. These attacks can be highly damaging to any business. Cyber insurance can only go so far and cover so much. Claims can also be denied for a host of often confusing reasons, leaving the business to fit the bill. These newer types of cyber insurance policies have many requirements and stipulations, and with a sense of irony, those requirements are very much cybersecurity technology many of which are security technology related.<br></p><p><br></p><div>Contact us today and let’s evaluate your business security posture.</div></div>
</div><div data-element-id="elm_V_pS7vRFMwv4ksSL0MwbfQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_V_pS7vRFMwv4ksSL0MwbfQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_Gf5rwbhOiBsyYeCiU86xLg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Gf5rwbhOiBsyYeCiU86xLg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Advisers is a client-only, client-focused agency and consulting group offering vendor selection and management services to help you solve IT and general technology problems fast. We'll walk you through the identification, research, evaluation, and comparison process, provide board-ready documentation and due diligence, and provide oversight of solution implementation on any of our 250+ vendors, carriers, and service providers.&nbsp;</p><p><br></p><p>Our teams of vendor-neutral security focused engineers will help you slice through the marketing fluff and&nbsp; industry jargon so you know what you're buying. We'll help you make smart IT investments quickly and confidently. Reach out to us today!</p></div>
</div><div data-element-id="elm_-ynmqeVSS66pw0SgNPNkFg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_-ynmqeVSS66pw0SgNPNkFg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" title="contact us page"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 21 Jul 2021 14:59:22 -0500</pubDate></item><item><title><![CDATA[Mobile Data for Backup?]]></title><link>https://www.cloud9advisers.com/News/post/mobile-data-for-backup</link><description><![CDATA[4G/5G networks might be the answer to your problems. These networks offer connectivity virtually anywhere with no physical cabling. They can provide primary or backup connectivity for your critical bandwidth needs]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_IL_1GYTkRd2ll6FbaAvhrg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_913y3B5FTtipM67KoOflUA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_GDeMbP-WSJWdOuE6R9dHsQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Odl6SO0TTmKns1q1anCFAw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Odl6SO0TTmKns1q1anCFAw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Mobile Data for Backup?</h2></div>
<div data-element-id="elm_sBkM-64UQgioNssuP3rVkw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sBkM-64UQgioNssuP3rVkw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Backup/Secondary Connectivity</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Many customers that are looking to institute SDWAN are looking for options for secondary and Tertiary Circuits to have a bulletproof environment.&nbsp; One of the reasons behind looking at multiple circuits is that SDWAN can provide completely seamless redundancy for single-site and multi-site enterprises SDWAN provides seamless failover at a fraction of the cost of traditional technologies, and with far better results.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Many enterprises look at a combination of Broadband and DIA circuits to accomplish this.&nbsp; However, one of the main problems they experience is the connections for these services typically come in from the same entry point into the building or even over the same wire.&nbsp; If there is a problem with the connections, then potentially all the connections could experience issues, rendering the SDWAN and dual circuits completely useless.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">This is where 4G/5G networks come in.&nbsp; These networks offer connectivity virtually anywhere with no physical cabling.&nbsp; They can provide backup connectivity for the following use cases.&nbsp;</span></p><p><span style="color:inherit;"></span></p><ul><li style="font-size:12pt;"><p><span style="font-size:12pt;">Diverse entry into a site&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Low bandwidth applications like IoT&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Short-term needs (Construction Sites)&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Hard to reach places&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Services that are needed quickly&nbsp;</span></p></li><li style="font-size:12pt;"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Mobile applications like Food Trucks or mobile services.&nbsp;</span></p></li><li style="font-size:12pt;"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">High cost for bringing in a fiber or broadband connection</span></p></li></ul></div>
</div><div data-element-id="elm_6gir4RuHNnce0JCABplpPw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6gir4RuHNnce0JCABplpPw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>Contact the experts at Cloud 9 to learn more about traditional and alternative options for backup, secondary, and tertiary bandwidth for your mission critical business connectivity. We are the only 100% vendor-neutral IT-related services and solutions experts with the resources and portfolio of vendors, carriers, and service providers to get your problems solved fast.&nbsp;</p></div>
</div><div data-element-id="elm_ZVBzYjPoRTSnQ9kwvuIRPw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 12 Jul 2021 11:39:21 -0500</pubDate></item></channel></rss>