Intentionally Making the Most of SD-WAN

M. Fratto
M. Fratto

Summary Bullets:

  • Successfully deploying SD-WAN means moving from rigid, static policies to dynamic enforcement of your intentions.
  • Static rules should be a thing of the past and alternative equivalent controls should be evaluated for any lingering static requirements.

Few technologies make me sit up and say, “I want that!” when I see them, and SD-WAN is a game changing technology for organizations that have more than a handful of remote offices and want a better, more efficient way of interconnecting branches and a better, more efficient way to manage them. Regardless of the product you choose, and I discuss them in “SD-WAN H1 2016 Market Update: Vendor Snapshots Show a Crowded, Competitive Field Attempting to Diversify,” the benefits of SD-WAN will seem remarkable, fantastical even, until you see it in action. Implementing the routing, firewall, VPN, link load balancing, application performance, failover, failback, and cost management with traditional branch office equipment is very complex and even more complex to change, including adding new sites. Continue reading “Intentionally Making the Most of SD-WAN”

Unleashing the Data Scientist Within, Cautiously

Brad Shimmin
Brad Shimmin

Summary Bullets:

  • We’re all becoming data scientists, steeped in the meaning and value of data along with data visualization and discovery.
  • Applying self-service expectations to big data could readily lead to erroneous conclusions and a resulting lessening of trust in big data and in IT itself.

I don’t play tennis, but if I did so with any passion for the game, it’s likely that I’d also be a data scientist.  Well, at least I’d be thinking more like one thanks to the current market rush toward device instrumentation and personal analytics. Continue reading “Unleashing the Data Scientist Within, Cautiously”

Compliance and (In)Security

A. DeCarlo
A. DeCarlo

Summary Bullets:

  • For all the emphasis on industry security standards and regulatory compliance, businesses too often miss the mark
  • For those that do not achieve compliance, security breaches are all too common

Nothing drives enterprise security spending quite like compliance. Angst over meeting or missing a mandate strikes fear in the hearts of CIOs and IT security directors everywhere. As a result, it is not at all unusual for a company to map its security priorities to government standards such as those laid out in the Federal Information Security Management Act (FISMA) or industry specifications such as the healthcare-focused Health Insurance Portability and Accountability Act (HIPAA) specification and the Health Information Trust Alliance (HITRUST) framework.
Continue reading “Compliance and (In)Security”