Fundamental Networking Industry Trends to Expect in 2014
|
|
- Loraine Perkins
- 8 years ago
- Views:
Transcription
1 Fundamental Networking Industry Trends to Expect in 2014
2 What does 2014 have in store for the networking industry? We asked three top industry analysts to predict the key networking industry trends for this year. Read on to discover what we might see happen in the and the data center, cloud encryption and virtualization security arenas. money and silicon Chuck Moozakis What will the new year bring for data center networks? Fabrics, merchant silicon and a resurgence in investments in fundamental networking components will dominate data center network engineering in 2014, even as enterprises mull the best way to adapt to emerging technologies, such as software-defined networks and. Eric Hanselman, chief analyst at New York-based 451 Research, shared his data center forecast for the next 12 months. Fabrics redux as enterprises are reluctant to abandon spanning tree It's fabrics all over again. Interconnection platforms like Brocade VCS, Cisco FabricPath and Juniper QFabric are nothing new, of course, but as reluctance among enterprises to move away from traditional architectures begins to melt, fabrics are once again becoming front and center, Hanselman said. "We are living in a world today where many enterprise data centers are getting themselves off legacy architecture and are beginning to look at transitions to some level of fabric and interconnect capability," he said. The advent of next-stage hardware, meantime, is offering data centers options that go even beyond fabric. "But because there has been so much hesitation [to abandon legacy systems], it seems like an anachronism, but these are Page 1 of 10
3 steps most enterprise data centers have taken very cautiously. Getting them off spanning tree has been the largest challenge." Contents Hanselman said the shift to the more efficient fabric interconnection may also be fueled by an increase in capital spending for core network components. While a 451 Research study revealed that wireless spending tops the list of IT investments enterprises will make in 2014, Hanselman said wired networking-related spending occupies the next four slots. Enterprises need to make these investments because a significant chunk of legacy equipment is reaching end of life, further accelerating a move to newer network designs. "There has been a hold-off in networking infrastructure spend[ing] and we are seeing that lift. We are now starting to hit the end of depreciation. People have stretched equipment lifecycles. We have gotten to [the] point where there is a lot of gear that is getting a little long in the tooth, so we are now seeing a lot of unlocking for some of these transitions," Hanselman said. At the same time, enterprises want to maintain sufficient Layer 2 density as they move from what has been a fairly integrated environment to one encompassing next-stage architectures like leaf-and-spine. "That [migration] gives enterprises the ability to interconnect better and start making transitions that give them options for better interconnect density and better resilience -- primarily headed toward Layer 2," Hanselman said. These shifts will occur as port costs continue to drop -- another critical consideration, Hanselman said. "That will permit more interconnected architectures --such as [leaf-and-spine fabric] -- to be more attractive." Network virtualization moving ahead, but on a scattered basis Fueled by advances in software-defined networking (SDN), virtual networking will gain traction in 2014, but absent a unified foundation or industry-wide strategy. "There are a lot of pieces beginning to move ahead without any direct interplay with the networking infrastructure on where they are running," Hanselman said. "We are starting to see folks on Page 2 of 10
4 virtualized platforms using tunneling protocols to extend networking, but that is happening on a very disconnected rollout." Contents That said, virtualized network functionality is moving ahead, Hanselman said. In his view, network functions virtualization (NFV) encompasses any functionality that can be recreated in a virtualized instance -- from virtualizing domain name system environments to spinning out virtual firewalls or load balancers. Enterprises will "invest cautiously in NFV," he said. "If you want to move any of this stuff into your operation, it has to be integrated into how they run their business and integrated into the process of all the government, risk management and compliance issues, and that is a fairly complex set of steps to get to a final production implementation." Data center forecast: Leapfrogging over initial SDN? Because many enterprises have choked off their capex in recent years, some organizations may decide 2014 is the year to dive into SDN -- or at least dip a toe into the waters. "There is the potential to step toward functionality like OpenFlow, or [to] move toward some of the more sophisticated overlay capabilities [in order] to take some of the steps to claw back a bit of that network control and create programmable capabilities," Hanselman said. To that end, Hanselman said organizations will take a long look at Cisco and its Application Centric Infrastructure initiative, if for no other reason than they are already Cisco customers. Although the components of ACI won't ship until mid-2014, "because you have a single vendor that so dominates the market, there are decisions to be made about the gear that's deployed, but there is an opportunity on both sides to move forward with new technologies." White-box networking will appeal to small group of potential customers Bare-metal switching will gain more of a toehold, but so-called white-box networking will still only appeal to a select group of customers in "All of Page 3 of 10
5 these potentially attractive avenues will really depend on a networking buyer that is working in an infrastructure that can support it" -- primarily very large enterprises that own the entire hardware lifecycle process, Hanselman said. "The number of midmarket companies, though -- the ones who want to go out and buy directly from the white-box guys -- will remain very small." Then there is the Trident II chip, which Broadcom made widely available to switch vendors late in The silicon, Hanselman said, is ushering in a new crop of more affordable networking gear from established vendors like Dell and Hewlett-Packard Co. The devices, such as Dell's S6000 switch, might compel some midmarket enterprises to forgo the white-box route in favor of switches from legacy vendors. Gina Narcisi With the ac standard -- or "gigabit Wi-Fi" -- approaching ratification, network administrators will need simplified performance management tools that combine both wired and wireless network management in order to help the wireless LAN live up to its potential, an increasingly critical role within businesses. Jim Berenbaum, research director of mobility, wireless and network technologies for Stamford, Conn.-based Gartner Research Inc., shared his insight on wireless LAN market milestones in 2013, as well as his vision on what network administrators can expect in ac: Breathing new life into the The soon-to-be-ratified ac standard was on almost every WLAN vendors' mind in 2013, with a slew of new Wave 1 gigabit Wi-Fi access points -- both modular and purpose-built -- introduced to the market from the likes of Aruba, Motorola, Cisco and Xirrus. Page 4 of 10
6 A Wi-Fi network powered by ac gives WLAN technology comparable bandwidth to wired access switches, making Wi-Fi plausible as the default choice for network infrastructure. "The fact that there is a new technology available with increased performance capabilities is allowing WLANs to better position [themselves] as replacements for wired networks moving forward," Berenbaum said. The education segment has led the way for ac deployments so far, but while adoption wasn't widespread in 2013, the standard's ratification -- slated for the beginning of should help increase interest and growth among other industries, Berenbaum said. "One of the nice things about [802].11ac is it's a bit ahead of the demand curve, as [802.11n] is still meeting the needs of many organizations," he said. "But organizations are becoming aware that the rest of their network infrastructure -- like the wired LAN and enterprise WANs -- need to also expand to take advantage of the capabilities that.11ac has to offer." While Wave 1-enabled ac products are already on the market, Wave 2 -- a system of additional capabilities, like multi-user MIMO for ac -- won't be a big factor in 2014 for enterprises. "Wave 2 will require new chips, not just a software upgrade," he said. "These products probably won't be available until the end of the year, so they won't have a market impact in 2014." HotSpot 2.0, small cell networks could influence the 2014 HotSpot 2.0, a standard for public Wi-Fi access developed by the Wi-Fi Alliance and the Wireless Broadband Association, could be a game-changer for the by allowing users to roam between Wi-Fi networks, as well as between Wi-Fi and cellular networks, without the need to reauthenticate. Some businesses have begun investing in Hotspot 2.0 to address mobile user needs, but it's still yet to been seen how the standard will play out within enterprise environments, Berenbaum said. "The value of Hotspot 2.0 is much clearer for a carrier-based Wi-Fi environment than it is Page 5 of 10
7 for enterprise environments right now, but there is potential for the standard to be realistically deployed within enterprises." Contents Enterprise small cell technology for cellular services has also been slow to gain traction within the enterprise, but has potential to blossom in the coming year. Small cells can serve as another mechanism for enabling cellular connectivity into enterprise facilities, but there are still some technology hurdles related to multi-carrier support that need to be worked out, Berenbaum said. Will wireless trump wired networks in 2014? With WLANs graduating from a "nice feature to have," to a critical business network, enterprises will be asking for tools that increase ease of management for combined wired/wireless networks, and overall performance across their entire environment, Berenbaum said. As users bring in more new devices without Ethernet ports -- like some laptops and all tablets -- the pressure is on for IT to ensure their Wi-Fi network is up for the challenge. "Interest and expansion for the all-wireless enterprise is on the rise, but it's not going to increase tremendously fast this year; it's still going to be more common to mix wired and wireless because the wires are already there in most cases," he said. in focus for the New Shamus McGillicuddy he breach of 40 million credit card records disclosed by retail giant Target has reminded us that the battle to secure data will never be over. It is a war without end. Page 6 of 10
8 And it's not just the "bad guys" who challenge network security professionals. Edward Snowden's revelations about widespread surveillance by the National Security Agency (NSA) has taught companies that criminal hackers and hacktivists aren't the only threats to their data. With the New upon us, SearchNetworking asked John Kindervag, principal analyst at Cambridge, Mass.-based Forrester Research, to predict what network security professionals will be facing in Universal cloud encryption is essential The surveillance controversy surrounding the NSA has many enterprises worried about their data, especially data they send to the cloud, Kindervag said. Cloud encryption will be a priority. "People want to encrypt a lot more stuff than they ever did before, and a lot of that [desire to encrypt] is for data going to the cloud," he said. To that end, the network security industry will need to deliver technology that helps enterprises encrypt that data. "[Cloud encryption gateways] are essentially a new product category," he said. "They are just a gateway that allows you to encrypt data before it goes to the cloud." Kindervag said his clients at Forrester are typically conservative. They mostly invest in mature technologies. But in the case of cloud encryption gateways, a market that is mostly dominated by startups, conservative enterprises are buying in early. Kindervag said larger network security vendors will probably try to acquire companies in this market in "Microsoft announced they were going to adopt more encryption. Every vendor is adopting more encryption," he said. Enterprises are also worried that their WAN links are vulnerable to government snooping, Kindervag said. As a result, some enterprises will start encrypting data crossing their MPLS networks. "More people will build their Page 7 of 10
9 own WANs by using IPsec site-to-site tunneling on the public Internet. Oftentimes, they won't have an SLA [service-level agreement] from these services, but they are much more simple to build than they ever were." Legacy firewalls and intrusion prevention become dinosaurs Stateful firewalls and intrusion prevention appliances will become less and less relevant in 2014, Kindervag said. In fact, their markets will "dry up." Next- generation firewalls, which have been booming for a few years, will be the undisputed mainstream network security platform next year, especially since wider adoption will lead to lower prices. "Standalone [stateful] firewalls and intrusion prevention will be limited to specialized use cases," he said. "There won't be any reason to not use a next- generation firewall for most companies because it won't be any more expensive to have a next-generation firewall. [Improved] performance and manageability of next-generation firewalls will continue driving that." Network virtualization a boon and an obligation for network security Virtual network infrastructure security will be a major focus for enterprises in 2014 as IT organizations install such products as VMware NSX and Juniper Contrail in their data centers. Kindervag said has the potential to positively affect network security because automated and orchestrated software configuration will replace manual hardware configuration, thus removing human error and bottlenecks from security updates. "It will be incumbent upon security vendors to establish partnerships with virtual network players, as well as software-defined networking players," he said. "I see a huge demand from my customer base for virtual networking." Some network security vendors are already aligning themselves with network virtualization platforms. Palo Alto Networks, for example, has integrated its next-generation firewall into VMware NSX. McAfee, Symantec, Trend Micro and Rapid7 have also partnered with VMware NSX. Page 8 of 10
10 Free resources for technology professionals TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. What makes TechTarget unique? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. Related TechTarget Websites Page 9 of 10
Software Defined Networking Goes Well Beyond the Data Center
Software Defined Goes Well Software Defined Goes Well Software-defined networking (SDN) is already changing the data center network, but now the technology could redefine other parts of the network, as
More informationThe State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools
The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools Why have virtual desktops been positioned as a cure-all for many of today s endpoint
More informationE-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED
E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED M obility spurs video conferencing software need; users want software-and cloud-based offerings to interoperate with their legacy
More informationBenefits of virtualizing your network
While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.
More information3 common cloud challenges eradicated with hybrid cloud
3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,
More informationEvaluating SaaS vs. on premise for ERP systems
Evaluating SaaS vs. on premise Increasingly organizations are given more options and evaluating SaaS vs. on premise options can be challenging for organizations. In this expert E-Guide, readers will learn
More informationE-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE
E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE T he VMware software-defined data center turns virtualization into Infrastructure as a Service with automation and self-service.
More informationData warehouse software bundles: tips and tricks
Data software bundles: tips and tricks Data software bundles: Data The emergence of data appliances has broadened the potential uses of business intelligence (BI) and analytics within many organizations
More informationSecuring the SIEM system: Control access, prioritize availability
The prospect of a SIEM system crash or compromise should scare any enterprise given the role it plays in an organization s security infrastructure. This expert E-Guide discusses the implications of a compromised
More informationHow to Define SIEM Strategy, Management and Success in the Enterprise
How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have
More informationHow to Develop Cloud Applications Based on Web App Security Lessons
Applications Based on Before moving applications to the public cloud, it is important to implement security practices and techniques. This expert E-Guide provides guidance on how to develop secure applications
More informationDesktop virtualization: Best practices for a seamless deployment
Desktop virtualization: Best practices for a For years, virtualization efforts have centered on servers and storage, as opposed to desktops and rightfully so. The technology has evolved faster with fewer
More informationE-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE
E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE W hy the need for a baseline? A baseline is a set of metrics used in network performance monitoring to define the normal
More informationE-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY
E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY and mean for F or IT managers, has always been high priority, however the new IT landscape and increased deployment of cloud has complicated the
More informationSOFTWARE-DEFINED NETWORKS
THE PROMISE OF SOFTWARE-DEFINED NETWORKS SDNs offer organizations a flexible solution capable of reimagining the enterprise network. The IT community is abuzz with discussions about software-defined networks
More informationAligning Public Cloud Strategies to Improve Server Efficiency
How to Successfully Implement Cloud Strategies Aligning Rather than simply being swept up in the cloud computing trend, IT admins must be careful to implement cloud strategies that match their organization's
More informationWHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS
E-Guide WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS SearchDataCenter D ata center managers have a handful of new converged and hyper-converged infrastructure to choose from, and though there are components
More informationE-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS
E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS T his e-guide teaches you the importance of collaboration on a micro level for defending against cyber threats. Learn how to embed security practices
More informationIs Your Data Safe in the Cloud?
Is Your Data Safe in the? Is Your Data Safe in the? : Tactics and Any organization likely to be using public cloud computing are also likely to be storing data in the cloud. Yet storing data in the cloud
More informationSDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility
WHITEPAPER SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility Copyright 2014 Meru Networks, Inc. All rights reserved. Table of Contents Executive summary... 3 Introduction...
More informationManaging Virtual Desktop Environments
Managing Virtual Desktop Environments Desktop virtualization can be extremely beneficial to a company's operating system environment. Yet while working through the virtualization planning process, IT professionals
More informationEthernet Wide Area Networking, Routers or Switches and Making the Right Choice
Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards
More informationWhite Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.
White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
More informationLTO tape technology continues to evolve with LTO 5
with LTO 5 Despite the predictions from industry experts, tape isn t dead yet and it continues to serve as a low-cost option for long-term storage for many organizations. Like all data center technologies
More informationSDN Services at the Customer Edge
WHITEPAPER SDN Services at the Customer Edge White Box SDN Foundation for Strategic Advantage SDN Services at the Customer Edge White Box SDN Foundation for Strategic Advantage Businesses and consumers
More informationHOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT
E-Guide HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT SearchSolidState Storage P erformance is the driving factor for the vast majority of companies considering a solid-state storage
More informationHybrid cloud computing explained
computing explained A few years ago, the IT industry was focused on public cloud computing. Then after facing public cloud security issues, the focus shifted to private clouds. And now the focus has shifted
More informationStreamlining the move to the cloud. Key tips for selecting the right cloud tools and preparing your infrastructure for migration
Streamlining the move to the cloud Key tips for selecting the right cloud tools and preparing your infrastructure for migration When planning for a, you must (1) carefully evaluate various cloud tools
More informationREMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION
REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network
More informationBusiness Case for Open Data Center Architecture in Enterprise Private Cloud
Business Case for Open Data Center Architecture in Enterprise Private Cloud Executive Summary Enterprise IT organizations that align themselves with their enterprise s overall goals help the organization
More informationSolution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED
Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED T here s two ways you can build your mobile applications: native applications, or mobile cloud applications. Which option is
More informationHP floats cloud-managed Wi-Fi offering for campus unified wired/wireless network access
HP floats cloud-managed Wi-Fi offering for campus unified wired/wireless network access Analyst: Christian Renaud 17 Apr, 2014 At Interop Las Vegas, Hewlett-Packard announced products for both on-premises
More informationTransform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure
White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure
More informationE-Guide to Mobile Application Development
Mobilizing enterprise applications for the consumerization of for The rise of the mobile device in the enterprise is changing the way users access and share information at work, as well as how developers
More informationA Unified Strategy for Securing Data Centers and Clouds
A Unified Strategy for Securing Data Centers and Clouds www.fortinet.com A Unified Strategy for Securing Data Centers and Clouds In an era of cloud computing, big data, mobility and IoT (Internet of Things),
More informationE-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD
E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD T o d ay, n e a r ly e v e r y IT function is available as a cloud-based service: email, payroll, HR, analytics, and on and on. While higher-level
More information2013 Cloud Storage Expectations
2013 Cloud Storage Expectations cloud A recent TechTarget Survey suggests that while many IT budgets are decreasing or remaining flat, cloud projects are still on the rise and will continue to be throughout
More informationIncrease Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
More informationEVOLVED DATA CENTER ARCHITECTURE
EVOLVED DATA CENTER ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER DAVID NOGUER BAU HEAD OF SP SOLUTIONS MARKETING JUNIPER NETWORKS @dnoguer @JuniperNetworks 1 Copyright 2014 Juniper
More informationGUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE
Solution Spotlight GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE SearchFinancial Applications selection C hoosing the right can be challenging, especially as purchasing has evolved to encompass the basics
More informationWhat is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates
What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates 1 Goals of the Presentation 1. Define/describe SDN 2. Identify the drivers and inhibitors of SDN 3. Identify what
More informationKey Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM
1 of 5 10/11/2010 9:44 AM 27 April 2010 Mark Fabbi Gartner RAS Core Research Note G00200313 With the completion of the 3Com acquisition, HP will become a formidable competitor across the entire enterprise
More informationData Center Network Evolution: Increase the Value of IT in Your Organization
White Paper Data Center Network Evolution: Increase the Value of IT in Your Organization What You Will Learn New operating demands and technology trends are changing the role of IT and introducing new
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More informationSimplifying IT with SDN & Virtual Application Networks
Simplifying IT with SDN & Virtual Application Networks Justin Chiah Product Category Head HP Networking APJ Solutions for the New Style of IT Networking innovations lay the foundation for transformation
More informationE-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES
E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES M id-sized companies plan to use more managed services and many see it as improving security. Read on to find
More informationThe changing face of scale-out networkattached
scale-out network-attached scale-out network-attached By: Carol Sliwa The face of network-attached (NAS) is changing. Enterprise IT shops are increasingly seeking out the latest wave of scale-out network-attached
More informationManaging Data Center Growth Explore Your Options
Managing Growth Explore Your Options Managing Growth: Managing The increasing demand on data centers has forced many IT managers to look for new ways to manage data center growth, either by consolidating,
More informationvsrx Services Gateway: Protecting the Hybrid Data Center
Services Gateway: Protecting the Hybrid Data Center Extending Juniper Networks award-winning security products to virtualized, cloud-based, and hybrid IT environments Challenge Virtualization and cloud
More informationA Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC. September 18, 2014.
A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC September 18, 2014 Charles Sun www.linkedin.com/in/charlessun @CharlesSun_ 1 What is SDN? Benefits
More informationJuniper Solutions for Turnkey, Managed Cloud Services
Juniper Solutions for Turnkey, Managed Cloud Services Three use cases for hosting and colocation service providers looking to deliver massively scalable, highly differentiated cloud services. Challenge
More informationHow To Be A Successful Company
Welcome Lynn Anderson Senior Vice President, Communications Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Extends Converged
More informationONOS [Open Source SDN Network Operating System for Service Provider networks]
ONOS [Open Source SDN Network Operating System for Service Provider networks] http://onosproject.org/ Released on December 5 th, 2014 Guru Parulkar parulkar@stanford.edu ONOS Partnership A partnership
More informationHuawei Agile Network FAQ... 2. 1 What is an agile network? What is the relationship between an agile network and SDN?... 2
Contents Huawei Agile Network FAQ... 2 1 What is an agile network? What is the relationship between an agile network and SDN?... 2 2 What is an agile campus?... 3 3 What are the benefits of an agile network?...
More informationExpert Reference Series of White Papers. Is Network Functions Virtualization (NFV) Moving Closer to Reality?
Expert Reference Series of White Papers Is Network Functions Virtualization (NFV) Moving Closer to Reality? 1-800-COURSES www.globalknowledge.com Is Network Functions Virtualization (NFV) Moving Closer
More informationVMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
More informationPreparing for the Software-Defined Data Center A TECH TARGET WHITE PAPER FOR AVNET TECHNOLOGY SOLUTIONS
Preparing for the Software-Defined Data Center A TECH TARGET WHITE PAPER FOR AVNET TECHNOLOGY SOLUTIONS Opportunity and Market Size In IT today, anything even loosely characterized as softwaredefined is
More informationA Guide to MAM and Planning for BYOD Security in the Enterprise
A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.
More informationBig Data and the Data Warehouse
Big Data and the Data Warehouse When the phrase big data management hit the data management and business intelligence (BI) industry, it had many IT professionals wondering if it would be the real deal
More informationE-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS
E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS B lock-based SANs and file-based networkattached storage are traditional technologies, and new trends and innovations continue to emerge with these age
More informationPreparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration
Eight essential tips for a successful How a The move to the cloud is happening and it s happening now. But before you jump start your cloud migration project, be sure you understand how to adequately prepare
More informationAdvanced analytics key component for decision management systems
decision management In the last 20 to 30 years, companies have faced significant changes in how they perform their day-to-day operations, and so have the analytics used to make decisions. In this Q&A Tip
More informationCoIP (Cloud over IP): The Future of Hybrid Networking
CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical
More informationSimple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group
Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
More informationCALCULATING ROI FOR STORAGE VIRTUALIZATION IS TRICKY
e-guide E-Guide CALCULATING ROI FOR STORAGE VIRTUALIZATION IS TRICKY B efore deploying, IT professionals must be sure that the benefits of this technology justify the acquisition expenses. This lesson
More informationSoftware Defined Networking Moving Towards Mainstream
Electronics Banking Research August 2012 Software Defined Networking Moving Towards Mainstream Key Takeaways: Edited by Kirk Bloede Software Defined Networking (SDN) has emerged as a promising new approach
More informationMeru MobileFLEX Architecture
Meru MobileFLEX Architecture Bringing new levels of choice and control to enterprise wireless LANs Today, network management is a tug-of-war between user demands and IT requirements. Users are pulling
More informationWhen SDN meets Mobility
When SDN meets Mobility The result is an automated, simpler network that supports the way you work With wireless increasingly becoming the primary means of access for end users, it is essential that any
More informationAccelerating Packet-Optical Convergence: A Blueprint for P-OTS 3.0
White Paper Accelerating Packet-Optical Convergence: A Blueprint for P-OTS 3.0 Prepared by Sterling Perrin Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.mrv.com July 2014 Introduction
More informationE-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT
E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT F or many reasons, has become a critical issue for many IT organizations and enterprise s alike. With many licensing options, hurdles and
More informationCloud Security Certification Guide What certification is right for you?
What certification is right for you? This exclusive guide examines the available cloud security certifications that can translate to better career opportunities -- and a higher salary -- for you as cloud
More informationWhy Software Defined Networking (SDN)? Boyan Sotirov
Why Software Defined Networking (SDN)? Boyan Sotirov Agenda Current State of Networking Why What How When 2 Conventional Networking Many complex functions embedded into the infrastructure OSPF, BGP, Multicast,
More informationAT&T activearc unified IP data solution
Solution Brief AT&T activearc unified IP data solution Flexible IP networking options to fit your needs What is the AT&T activearc solution? The AT&T activearc solution is a wired and wireless Ethernet
More informationEssentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS
Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS M ost storage vendors now offer all-flash storage arrays, and many modern organizations recognize the need for these highperformance
More informationSocial media driving CRM strategies
Rapid changes in social computing, mobile and customer analytics are driving shifts in. In a recent survey, IT identified establishing a CRM strategy as the second greatest challenge, behind instituting
More informationCloud Storage: Top Concerns, Provider Considerations, and Application Candidates
Cloud Storage: Top Concerns, Provider Considerations, and Application Candidates As cloud technology and deployment models become increasingly sophisticated, once-wary storage professionals are plunging
More informationWhite. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments.
White Paper The Rise of Network Functions Virtualization Implications for I/O Strategies in Service Provider Environments By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned
More informationThe Promise and the Reality of a Software Defined Data Center
The Promise and the Reality of a Software Defined Data Center Authored by Sponsored by Introduction The traditional IT operational model is highly manual and very hardware centric. As a result, IT infrastructure
More informationSINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER
SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER JOINT SDN SOLUTION BY ALCATEL-LUCENT ENTERPRISE AND NEC APPLICATION NOTE EXECUTIVE SUMMARY Server
More informationSOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology
More informationMeru MobileFLEX Architecture
Meru MobileFLEX Architecture Bringing new levels of choice and control to enterprise wireless LANs Mobility has transformed work from a location to an activity. Smartphones, tablets, and laptops enable
More informationUnlocking data with document capture and imaging
Unlocking data with capture and imaging Unlocking data with Before organizations can banish paper from the office, proper and capture processes must be adopted. This E-Guide reveals the keys to effective
More informationRethink defense-in-depth security model
e-guide E-Guide Rethink defense-in-depth By Mike Rothman Rethink defense-in-depth T oday s endpoint security modevl is failing. What s next? Learn why endpoint defense-in-depth controls must assume the
More informationJUNIPER. One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER. 1 Copyright 2010 Juniper Networks, Inc. www.juniper.net
JUNIPER One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER 1 Copyright 2010 Juniper Networks, Inc. www.juniper.net 2-3-7: JUNIPER S BUSINESS STRATEGY 2 Customer Segments 3 Businesses Service
More informationNEC s Juniper Technology Brief Issue 2
NEC s Juniper Technology Brief Issue 2 Inside This Issue: Juniper s New SPACE Solutions, Datacentre, Services and Switches Product Releases For further information email info@nec.co.nz or visit www.nec.co.nz
More informationThe skinny on storage clusters
The skinny on storage clusters Storage clustering can mean different things based on the vendor and the architecture which the technology is built on, but the features or benefits are usually similar across
More informationPluribus Netvisor Solution Brief
Pluribus Netvisor Solution Brief Freedom Architecture Overview The Pluribus Freedom architecture presents a unique combination of switch, compute, storage and bare- metal hypervisor OS technologies, and
More informationSDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
More informationSecured Voice over VPN Tunnel and QoS. Feature Paper
Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3
More informationHP FlexNetwork Architecture
HP Networking HP Networking 1 HP FlexNetwork Architecture FlexFabric Flex Campus FlexBranch FlexManagement Converges Network Management and Orchestration Open Scalable Secure Agile Consistent 2 Innovative
More informationAn SDN Reality Check. Authored by. Sponsored by
An SDN Reality Check Authored by Sponsored by 1 Introduction The traditional IT operational model is highly manual and very hardware centric. As a result, IT infrastructure services have historically been
More informationSubtitle. VoIP Trends. What to Expect in 2016. VoIP 2016 Compare Business Products 2015 1
Subtitle VoIP Trends What to Expect in 2016 VoIP 2016 Compare Business Products 2015 1 Contents The VoIP Market Is Set to Grow... 3 Nomadic VoIP Stakes a Claim... 4 Some Key Technologies for 2016... 5
More informationWireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com
Wireless Services The Top Questions to Help You Choose the Right Wireless Solution for Your Business Get Started Now: 877.611.6342 to learn more. www.megapath.com Why Go Wireless? Today, it seems that
More informationPervasive Security Enabled by Next Generation Monitoring Fabric
Pervasive Security Enabled by Next Generation Monitoring Fabric By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Big Switch Networks Executive Summary Enterprise networks have become ever
More informationE-Guide SHAREPOINT UPGRADE BEST PRACTICES
E-Guide SHAREPOINT UPGRADE BEST PRACTICES I n keeping with its practice of updating the collaboration platform SharePoint roughly every three years, Microsoft delivered another version,. Not that it is
More informationCENTER I S Y O U R D ATA
I S Y O U R D ATA CENTER R E A DY F O R S D N? C R I T I C A L D ATA C E N T E R C O N S I D E R AT I O N S FOR SOFT WARE-DEFINED NET WORKING Data center operators are being challenged to be more agile
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
W H I T E P A P E R A p p l i c a t i o n D e l i v e r y f o r C l o u d S e r v i c e s : C u s t o m i z i n g S e r v i c e C r e a t i o n i n V i r t u a l E n v i r o n m e n t s Sponsored by: Brocade
More informationManaging the supply chain for SAP
Managing the supply chain for SAP Supply chain projects around collaboration with suppliers, contract lifecycle management and transportation management can provide a quick return on investment (ROI) for
More informationThe Many Faces of SDN: An Industry Perspective
The Many Faces of SDN: An Industry Perspective Kenneth Duda CTO / SVP Software Arista Networks, Inc. Face 1: SDN is for Experimentation Today, there is almost no practical way to experiment with new network
More informationSoftware Defined Networking (SDN)
Software Defined Networking (SDN) Unified Wired/Wireless Networks Ajay Malik, SVP Worldwide Engineering & Products Meru Networks, Inc. MERU PROPRIETARY INFORMATION. Copyright 2014. Meru Networks, Inc.
More information