Fundamental Networking Industry Trends to Expect in 2014

Size: px
Start display at page:

Download "Fundamental Networking Industry Trends to Expect in 2014"

Transcription

1 Fundamental Networking Industry Trends to Expect in 2014

2 What does 2014 have in store for the networking industry? We asked three top industry analysts to predict the key networking industry trends for this year. Read on to discover what we might see happen in the and the data center, cloud encryption and virtualization security arenas. money and silicon Chuck Moozakis What will the new year bring for data center networks? Fabrics, merchant silicon and a resurgence in investments in fundamental networking components will dominate data center network engineering in 2014, even as enterprises mull the best way to adapt to emerging technologies, such as software-defined networks and. Eric Hanselman, chief analyst at New York-based 451 Research, shared his data center forecast for the next 12 months. Fabrics redux as enterprises are reluctant to abandon spanning tree It's fabrics all over again. Interconnection platforms like Brocade VCS, Cisco FabricPath and Juniper QFabric are nothing new, of course, but as reluctance among enterprises to move away from traditional architectures begins to melt, fabrics are once again becoming front and center, Hanselman said. "We are living in a world today where many enterprise data centers are getting themselves off legacy architecture and are beginning to look at transitions to some level of fabric and interconnect capability," he said. The advent of next-stage hardware, meantime, is offering data centers options that go even beyond fabric. "But because there has been so much hesitation [to abandon legacy systems], it seems like an anachronism, but these are Page 1 of 10

3 steps most enterprise data centers have taken very cautiously. Getting them off spanning tree has been the largest challenge." Contents Hanselman said the shift to the more efficient fabric interconnection may also be fueled by an increase in capital spending for core network components. While a 451 Research study revealed that wireless spending tops the list of IT investments enterprises will make in 2014, Hanselman said wired networking-related spending occupies the next four slots. Enterprises need to make these investments because a significant chunk of legacy equipment is reaching end of life, further accelerating a move to newer network designs. "There has been a hold-off in networking infrastructure spend[ing] and we are seeing that lift. We are now starting to hit the end of depreciation. People have stretched equipment lifecycles. We have gotten to [the] point where there is a lot of gear that is getting a little long in the tooth, so we are now seeing a lot of unlocking for some of these transitions," Hanselman said. At the same time, enterprises want to maintain sufficient Layer 2 density as they move from what has been a fairly integrated environment to one encompassing next-stage architectures like leaf-and-spine. "That [migration] gives enterprises the ability to interconnect better and start making transitions that give them options for better interconnect density and better resilience -- primarily headed toward Layer 2," Hanselman said. These shifts will occur as port costs continue to drop -- another critical consideration, Hanselman said. "That will permit more interconnected architectures --such as [leaf-and-spine fabric] -- to be more attractive." Network virtualization moving ahead, but on a scattered basis Fueled by advances in software-defined networking (SDN), virtual networking will gain traction in 2014, but absent a unified foundation or industry-wide strategy. "There are a lot of pieces beginning to move ahead without any direct interplay with the networking infrastructure on where they are running," Hanselman said. "We are starting to see folks on Page 2 of 10

4 virtualized platforms using tunneling protocols to extend networking, but that is happening on a very disconnected rollout." Contents That said, virtualized network functionality is moving ahead, Hanselman said. In his view, network functions virtualization (NFV) encompasses any functionality that can be recreated in a virtualized instance -- from virtualizing domain name system environments to spinning out virtual firewalls or load balancers. Enterprises will "invest cautiously in NFV," he said. "If you want to move any of this stuff into your operation, it has to be integrated into how they run their business and integrated into the process of all the government, risk management and compliance issues, and that is a fairly complex set of steps to get to a final production implementation." Data center forecast: Leapfrogging over initial SDN? Because many enterprises have choked off their capex in recent years, some organizations may decide 2014 is the year to dive into SDN -- or at least dip a toe into the waters. "There is the potential to step toward functionality like OpenFlow, or [to] move toward some of the more sophisticated overlay capabilities [in order] to take some of the steps to claw back a bit of that network control and create programmable capabilities," Hanselman said. To that end, Hanselman said organizations will take a long look at Cisco and its Application Centric Infrastructure initiative, if for no other reason than they are already Cisco customers. Although the components of ACI won't ship until mid-2014, "because you have a single vendor that so dominates the market, there are decisions to be made about the gear that's deployed, but there is an opportunity on both sides to move forward with new technologies." White-box networking will appeal to small group of potential customers Bare-metal switching will gain more of a toehold, but so-called white-box networking will still only appeal to a select group of customers in "All of Page 3 of 10

5 these potentially attractive avenues will really depend on a networking buyer that is working in an infrastructure that can support it" -- primarily very large enterprises that own the entire hardware lifecycle process, Hanselman said. "The number of midmarket companies, though -- the ones who want to go out and buy directly from the white-box guys -- will remain very small." Then there is the Trident II chip, which Broadcom made widely available to switch vendors late in The silicon, Hanselman said, is ushering in a new crop of more affordable networking gear from established vendors like Dell and Hewlett-Packard Co. The devices, such as Dell's S6000 switch, might compel some midmarket enterprises to forgo the white-box route in favor of switches from legacy vendors. Gina Narcisi With the ac standard -- or "gigabit Wi-Fi" -- approaching ratification, network administrators will need simplified performance management tools that combine both wired and wireless network management in order to help the wireless LAN live up to its potential, an increasingly critical role within businesses. Jim Berenbaum, research director of mobility, wireless and network technologies for Stamford, Conn.-based Gartner Research Inc., shared his insight on wireless LAN market milestones in 2013, as well as his vision on what network administrators can expect in ac: Breathing new life into the The soon-to-be-ratified ac standard was on almost every WLAN vendors' mind in 2013, with a slew of new Wave 1 gigabit Wi-Fi access points -- both modular and purpose-built -- introduced to the market from the likes of Aruba, Motorola, Cisco and Xirrus. Page 4 of 10

6 A Wi-Fi network powered by ac gives WLAN technology comparable bandwidth to wired access switches, making Wi-Fi plausible as the default choice for network infrastructure. "The fact that there is a new technology available with increased performance capabilities is allowing WLANs to better position [themselves] as replacements for wired networks moving forward," Berenbaum said. The education segment has led the way for ac deployments so far, but while adoption wasn't widespread in 2013, the standard's ratification -- slated for the beginning of should help increase interest and growth among other industries, Berenbaum said. "One of the nice things about [802].11ac is it's a bit ahead of the demand curve, as [802.11n] is still meeting the needs of many organizations," he said. "But organizations are becoming aware that the rest of their network infrastructure -- like the wired LAN and enterprise WANs -- need to also expand to take advantage of the capabilities that.11ac has to offer." While Wave 1-enabled ac products are already on the market, Wave 2 -- a system of additional capabilities, like multi-user MIMO for ac -- won't be a big factor in 2014 for enterprises. "Wave 2 will require new chips, not just a software upgrade," he said. "These products probably won't be available until the end of the year, so they won't have a market impact in 2014." HotSpot 2.0, small cell networks could influence the 2014 HotSpot 2.0, a standard for public Wi-Fi access developed by the Wi-Fi Alliance and the Wireless Broadband Association, could be a game-changer for the by allowing users to roam between Wi-Fi networks, as well as between Wi-Fi and cellular networks, without the need to reauthenticate. Some businesses have begun investing in Hotspot 2.0 to address mobile user needs, but it's still yet to been seen how the standard will play out within enterprise environments, Berenbaum said. "The value of Hotspot 2.0 is much clearer for a carrier-based Wi-Fi environment than it is Page 5 of 10

7 for enterprise environments right now, but there is potential for the standard to be realistically deployed within enterprises." Contents Enterprise small cell technology for cellular services has also been slow to gain traction within the enterprise, but has potential to blossom in the coming year. Small cells can serve as another mechanism for enabling cellular connectivity into enterprise facilities, but there are still some technology hurdles related to multi-carrier support that need to be worked out, Berenbaum said. Will wireless trump wired networks in 2014? With WLANs graduating from a "nice feature to have," to a critical business network, enterprises will be asking for tools that increase ease of management for combined wired/wireless networks, and overall performance across their entire environment, Berenbaum said. As users bring in more new devices without Ethernet ports -- like some laptops and all tablets -- the pressure is on for IT to ensure their Wi-Fi network is up for the challenge. "Interest and expansion for the all-wireless enterprise is on the rise, but it's not going to increase tremendously fast this year; it's still going to be more common to mix wired and wireless because the wires are already there in most cases," he said. in focus for the New Shamus McGillicuddy he breach of 40 million credit card records disclosed by retail giant Target has reminded us that the battle to secure data will never be over. It is a war without end. Page 6 of 10

8 And it's not just the "bad guys" who challenge network security professionals. Edward Snowden's revelations about widespread surveillance by the National Security Agency (NSA) has taught companies that criminal hackers and hacktivists aren't the only threats to their data. With the New upon us, SearchNetworking asked John Kindervag, principal analyst at Cambridge, Mass.-based Forrester Research, to predict what network security professionals will be facing in Universal cloud encryption is essential The surveillance controversy surrounding the NSA has many enterprises worried about their data, especially data they send to the cloud, Kindervag said. Cloud encryption will be a priority. "People want to encrypt a lot more stuff than they ever did before, and a lot of that [desire to encrypt] is for data going to the cloud," he said. To that end, the network security industry will need to deliver technology that helps enterprises encrypt that data. "[Cloud encryption gateways] are essentially a new product category," he said. "They are just a gateway that allows you to encrypt data before it goes to the cloud." Kindervag said his clients at Forrester are typically conservative. They mostly invest in mature technologies. But in the case of cloud encryption gateways, a market that is mostly dominated by startups, conservative enterprises are buying in early. Kindervag said larger network security vendors will probably try to acquire companies in this market in "Microsoft announced they were going to adopt more encryption. Every vendor is adopting more encryption," he said. Enterprises are also worried that their WAN links are vulnerable to government snooping, Kindervag said. As a result, some enterprises will start encrypting data crossing their MPLS networks. "More people will build their Page 7 of 10

9 own WANs by using IPsec site-to-site tunneling on the public Internet. Oftentimes, they won't have an SLA [service-level agreement] from these services, but they are much more simple to build than they ever were." Legacy firewalls and intrusion prevention become dinosaurs Stateful firewalls and intrusion prevention appliances will become less and less relevant in 2014, Kindervag said. In fact, their markets will "dry up." Next- generation firewalls, which have been booming for a few years, will be the undisputed mainstream network security platform next year, especially since wider adoption will lead to lower prices. "Standalone [stateful] firewalls and intrusion prevention will be limited to specialized use cases," he said. "There won't be any reason to not use a next- generation firewall for most companies because it won't be any more expensive to have a next-generation firewall. [Improved] performance and manageability of next-generation firewalls will continue driving that." Network virtualization a boon and an obligation for network security Virtual network infrastructure security will be a major focus for enterprises in 2014 as IT organizations install such products as VMware NSX and Juniper Contrail in their data centers. Kindervag said has the potential to positively affect network security because automated and orchestrated software configuration will replace manual hardware configuration, thus removing human error and bottlenecks from security updates. "It will be incumbent upon security vendors to establish partnerships with virtual network players, as well as software-defined networking players," he said. "I see a huge demand from my customer base for virtual networking." Some network security vendors are already aligning themselves with network virtualization platforms. Palo Alto Networks, for example, has integrated its next-generation firewall into VMware NSX. McAfee, Symantec, Trend Micro and Rapid7 have also partnered with VMware NSX. Page 8 of 10

10 Free resources for technology professionals TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. What makes TechTarget unique? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. Related TechTarget Websites Page 9 of 10

Software Defined Networking Goes Well Beyond the Data Center

Software Defined Networking Goes Well Beyond the Data Center Software Defined Goes Well Software Defined Goes Well Software-defined networking (SDN) is already changing the data center network, but now the technology could redefine other parts of the network, as

More information

The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools

The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools The State of Desktop Virtualization in 2013: Brian Madden analyzes uses cases, preferred vendors and effective tools Why have virtual desktops been positioned as a cure-all for many of today s endpoint

More information

E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED

E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED E-Guide VIDEO CONFERENCING SOFTWARE AND HARDWARE: HYBRID APPROACH NEEDED M obility spurs video conferencing software need; users want software-and cloud-based offerings to interoperate with their legacy

More information

Benefits of virtualizing your network

Benefits of virtualizing your network While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.

More information

3 common cloud challenges eradicated with hybrid cloud

3 common cloud challenges eradicated with hybrid cloud 3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,

More information

Evaluating SaaS vs. on premise for ERP systems

Evaluating SaaS vs. on premise for ERP systems Evaluating SaaS vs. on premise Increasingly organizations are given more options and evaluating SaaS vs. on premise options can be challenging for organizations. In this expert E-Guide, readers will learn

More information

E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE

E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE T he VMware software-defined data center turns virtualization into Infrastructure as a Service with automation and self-service.

More information

Data warehouse software bundles: tips and tricks

Data warehouse software bundles: tips and tricks Data software bundles: tips and tricks Data software bundles: Data The emergence of data appliances has broadened the potential uses of business intelligence (BI) and analytics within many organizations

More information

Securing the SIEM system: Control access, prioritize availability

Securing the SIEM system: Control access, prioritize availability The prospect of a SIEM system crash or compromise should scare any enterprise given the role it plays in an organization s security infrastructure. This expert E-Guide discusses the implications of a compromised

More information

How to Define SIEM Strategy, Management and Success in the Enterprise

How to Define SIEM Strategy, Management and Success in the Enterprise How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have

More information

How to Develop Cloud Applications Based on Web App Security Lessons

How to Develop Cloud Applications Based on Web App Security Lessons Applications Based on Before moving applications to the public cloud, it is important to implement security practices and techniques. This expert E-Guide provides guidance on how to develop secure applications

More information

Desktop virtualization: Best practices for a seamless deployment

Desktop virtualization: Best practices for a seamless deployment Desktop virtualization: Best practices for a For years, virtualization efforts have centered on servers and storage, as opposed to desktops and rightfully so. The technology has evolved faster with fewer

More information

E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE

E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE W hy the need for a baseline? A baseline is a set of metrics used in network performance monitoring to define the normal

More information

E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY

E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY E-Guide BEST PRACTICES FOR CLOUD BASED DISASTER RECOVERY and mean for F or IT managers, has always been high priority, however the new IT landscape and increased deployment of cloud has complicated the

More information

SOFTWARE-DEFINED NETWORKS

SOFTWARE-DEFINED NETWORKS THE PROMISE OF SOFTWARE-DEFINED NETWORKS SDNs offer organizations a flexible solution capable of reimagining the enterprise network. The IT community is abuzz with discussions about software-defined networks

More information

Aligning Public Cloud Strategies to Improve Server Efficiency

Aligning Public Cloud Strategies to Improve Server Efficiency How to Successfully Implement Cloud Strategies Aligning Rather than simply being swept up in the cloud computing trend, IT admins must be careful to implement cloud strategies that match their organization's

More information

WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS

WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS E-Guide WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS SearchDataCenter D ata center managers have a handful of new converged and hyper-converged infrastructure to choose from, and though there are components

More information

E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS

E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS E-Guide CONSIDER SECURITY IN YOUR DAILY BUSINESS OPERATIONS T his e-guide teaches you the importance of collaboration on a micro level for defending against cyber threats. Learn how to embed security practices

More information

Is Your Data Safe in the Cloud?

Is Your Data Safe in the Cloud? Is Your Data Safe in the? Is Your Data Safe in the? : Tactics and Any organization likely to be using public cloud computing are also likely to be storing data in the cloud. Yet storing data in the cloud

More information

SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility

SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility WHITEPAPER SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility Copyright 2014 Meru Networks, Inc. All rights reserved. Table of Contents Executive summary... 3 Introduction...

More information

Managing Virtual Desktop Environments

Managing Virtual Desktop Environments Managing Virtual Desktop Environments Desktop virtualization can be extremely beneficial to a company's operating system environment. Yet while working through the virtualization planning process, IT professionals

More information

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards

More information

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc. White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3

More information

LTO tape technology continues to evolve with LTO 5

LTO tape technology continues to evolve with LTO 5 with LTO 5 Despite the predictions from industry experts, tape isn t dead yet and it continues to serve as a low-cost option for long-term storage for many organizations. Like all data center technologies

More information

SDN Services at the Customer Edge

SDN Services at the Customer Edge WHITEPAPER SDN Services at the Customer Edge White Box SDN Foundation for Strategic Advantage SDN Services at the Customer Edge White Box SDN Foundation for Strategic Advantage Businesses and consumers

More information

HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT

HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT E-Guide HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT SearchSolidState Storage P erformance is the driving factor for the vast majority of companies considering a solid-state storage

More information

Hybrid cloud computing explained

Hybrid cloud computing explained computing explained A few years ago, the IT industry was focused on public cloud computing. Then after facing public cloud security issues, the focus shifted to private clouds. And now the focus has shifted

More information

Streamlining the move to the cloud. Key tips for selecting the right cloud tools and preparing your infrastructure for migration

Streamlining the move to the cloud. Key tips for selecting the right cloud tools and preparing your infrastructure for migration Streamlining the move to the cloud Key tips for selecting the right cloud tools and preparing your infrastructure for migration When planning for a, you must (1) carefully evaluate various cloud tools

More information

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network

More information

Business Case for Open Data Center Architecture in Enterprise Private Cloud

Business Case for Open Data Center Architecture in Enterprise Private Cloud Business Case for Open Data Center Architecture in Enterprise Private Cloud Executive Summary Enterprise IT organizations that align themselves with their enterprise s overall goals help the organization

More information

Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED

Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED T here s two ways you can build your mobile applications: native applications, or mobile cloud applications. Which option is

More information

HP floats cloud-managed Wi-Fi offering for campus unified wired/wireless network access

HP floats cloud-managed Wi-Fi offering for campus unified wired/wireless network access HP floats cloud-managed Wi-Fi offering for campus unified wired/wireless network access Analyst: Christian Renaud 17 Apr, 2014 At Interop Las Vegas, Hewlett-Packard announced products for both on-premises

More information

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure

More information

E-Guide to Mobile Application Development

E-Guide to Mobile Application Development Mobilizing enterprise applications for the consumerization of for The rise of the mobile device in the enterprise is changing the way users access and share information at work, as well as how developers

More information

A Unified Strategy for Securing Data Centers and Clouds

A Unified Strategy for Securing Data Centers and Clouds A Unified Strategy for Securing Data Centers and Clouds www.fortinet.com A Unified Strategy for Securing Data Centers and Clouds In an era of cloud computing, big data, mobility and IoT (Internet of Things),

More information

E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD

E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD T o d ay, n e a r ly e v e r y IT function is available as a cloud-based service: email, payroll, HR, analytics, and on and on. While higher-level

More information

2013 Cloud Storage Expectations

2013 Cloud Storage Expectations 2013 Cloud Storage Expectations cloud A recent TechTarget Survey suggests that while many IT budgets are decreasing or remaining flat, cloud projects are still on the rise and will continue to be throughout

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

EVOLVED DATA CENTER ARCHITECTURE

EVOLVED DATA CENTER ARCHITECTURE EVOLVED DATA CENTER ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER DAVID NOGUER BAU HEAD OF SP SOLUTIONS MARKETING JUNIPER NETWORKS @dnoguer @JuniperNetworks 1 Copyright 2014 Juniper

More information

GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE

GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE Solution Spotlight GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE SearchFinancial Applications selection C hoosing the right can be challenging, especially as purchasing has evolved to encompass the basics

More information

What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates

What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates 1 Goals of the Presentation 1. Define/describe SDN 2. Identify the drivers and inhibitors of SDN 3. Identify what

More information

Key Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM

Key Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM 1 of 5 10/11/2010 9:44 AM 27 April 2010 Mark Fabbi Gartner RAS Core Research Note G00200313 With the completion of the 3Com acquisition, HP will become a formidable competitor across the entire enterprise

More information

Data Center Network Evolution: Increase the Value of IT in Your Organization

Data Center Network Evolution: Increase the Value of IT in Your Organization White Paper Data Center Network Evolution: Increase the Value of IT in Your Organization What You Will Learn New operating demands and technology trends are changing the role of IT and introducing new

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

Simplifying IT with SDN & Virtual Application Networks

Simplifying IT with SDN & Virtual Application Networks Simplifying IT with SDN & Virtual Application Networks Justin Chiah Product Category Head HP Networking APJ Solutions for the New Style of IT Networking innovations lay the foundation for transformation

More information

E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES

E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES M id-sized companies plan to use more managed services and many see it as improving security. Read on to find

More information

The changing face of scale-out networkattached

The changing face of scale-out networkattached scale-out network-attached scale-out network-attached By: Carol Sliwa The face of network-attached (NAS) is changing. Enterprise IT shops are increasingly seeking out the latest wave of scale-out network-attached

More information

Managing Data Center Growth Explore Your Options

Managing Data Center Growth Explore Your Options Managing Growth Explore Your Options Managing Growth: Managing The increasing demand on data centers has forced many IT managers to look for new ways to manage data center growth, either by consolidating,

More information

vsrx Services Gateway: Protecting the Hybrid Data Center

vsrx Services Gateway: Protecting the Hybrid Data Center Services Gateway: Protecting the Hybrid Data Center Extending Juniper Networks award-winning security products to virtualized, cloud-based, and hybrid IT environments Challenge Virtualization and cloud

More information

A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC. September 18, 2014.

A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC. September 18, 2014. A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC September 18, 2014 Charles Sun www.linkedin.com/in/charlessun @CharlesSun_ 1 What is SDN? Benefits

More information

Juniper Solutions for Turnkey, Managed Cloud Services

Juniper Solutions for Turnkey, Managed Cloud Services Juniper Solutions for Turnkey, Managed Cloud Services Three use cases for hosting and colocation service providers looking to deliver massively scalable, highly differentiated cloud services. Challenge

More information

How To Be A Successful Company

How To Be A Successful Company Welcome Lynn Anderson Senior Vice President, Communications Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Extends Converged

More information

ONOS [Open Source SDN Network Operating System for Service Provider networks]

ONOS [Open Source SDN Network Operating System for Service Provider networks] ONOS [Open Source SDN Network Operating System for Service Provider networks] http://onosproject.org/ Released on December 5 th, 2014 Guru Parulkar parulkar@stanford.edu ONOS Partnership A partnership

More information

Huawei Agile Network FAQ... 2. 1 What is an agile network? What is the relationship between an agile network and SDN?... 2

Huawei Agile Network FAQ... 2. 1 What is an agile network? What is the relationship between an agile network and SDN?... 2 Contents Huawei Agile Network FAQ... 2 1 What is an agile network? What is the relationship between an agile network and SDN?... 2 2 What is an agile campus?... 3 3 What are the benefits of an agile network?...

More information

Expert Reference Series of White Papers. Is Network Functions Virtualization (NFV) Moving Closer to Reality?

Expert Reference Series of White Papers. Is Network Functions Virtualization (NFV) Moving Closer to Reality? Expert Reference Series of White Papers Is Network Functions Virtualization (NFV) Moving Closer to Reality? 1-800-COURSES www.globalknowledge.com Is Network Functions Virtualization (NFV) Moving Closer

More information

VMware vcloud Networking and Security Overview

VMware vcloud Networking and Security Overview VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility

More information

Preparing for the Software-Defined Data Center A TECH TARGET WHITE PAPER FOR AVNET TECHNOLOGY SOLUTIONS

Preparing for the Software-Defined Data Center A TECH TARGET WHITE PAPER FOR AVNET TECHNOLOGY SOLUTIONS Preparing for the Software-Defined Data Center A TECH TARGET WHITE PAPER FOR AVNET TECHNOLOGY SOLUTIONS Opportunity and Market Size In IT today, anything even loosely characterized as softwaredefined is

More information

A Guide to MAM and Planning for BYOD Security in the Enterprise

A Guide to MAM and Planning for BYOD Security in the Enterprise A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.

More information

Big Data and the Data Warehouse

Big Data and the Data Warehouse Big Data and the Data Warehouse When the phrase big data management hit the data management and business intelligence (BI) industry, it had many IT professionals wondering if it would be the real deal

More information

E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS

E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS B lock-based SANs and file-based networkattached storage are traditional technologies, and new trends and innovations continue to emerge with these age

More information

Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration

Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration Eight essential tips for a successful How a The move to the cloud is happening and it s happening now. But before you jump start your cloud migration project, be sure you understand how to adequately prepare

More information

Advanced analytics key component for decision management systems

Advanced analytics key component for decision management systems decision management In the last 20 to 30 years, companies have faced significant changes in how they perform their day-to-day operations, and so have the analytics used to make decisions. In this Q&A Tip

More information

CoIP (Cloud over IP): The Future of Hybrid Networking

CoIP (Cloud over IP): The Future of Hybrid Networking CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical

More information

Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group

Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

CALCULATING ROI FOR STORAGE VIRTUALIZATION IS TRICKY

CALCULATING ROI FOR STORAGE VIRTUALIZATION IS TRICKY e-guide E-Guide CALCULATING ROI FOR STORAGE VIRTUALIZATION IS TRICKY B efore deploying, IT professionals must be sure that the benefits of this technology justify the acquisition expenses. This lesson

More information

Software Defined Networking Moving Towards Mainstream

Software Defined Networking Moving Towards Mainstream Electronics Banking Research August 2012 Software Defined Networking Moving Towards Mainstream Key Takeaways: Edited by Kirk Bloede Software Defined Networking (SDN) has emerged as a promising new approach

More information

Meru MobileFLEX Architecture

Meru MobileFLEX Architecture Meru MobileFLEX Architecture Bringing new levels of choice and control to enterprise wireless LANs Today, network management is a tug-of-war between user demands and IT requirements. Users are pulling

More information

When SDN meets Mobility

When SDN meets Mobility When SDN meets Mobility The result is an automated, simpler network that supports the way you work With wireless increasingly becoming the primary means of access for end users, it is essential that any

More information

Accelerating Packet-Optical Convergence: A Blueprint for P-OTS 3.0

Accelerating Packet-Optical Convergence: A Blueprint for P-OTS 3.0 White Paper Accelerating Packet-Optical Convergence: A Blueprint for P-OTS 3.0 Prepared by Sterling Perrin Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.mrv.com July 2014 Introduction

More information

E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT

E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT F or many reasons, has become a critical issue for many IT organizations and enterprise s alike. With many licensing options, hurdles and

More information

Cloud Security Certification Guide What certification is right for you?

Cloud Security Certification Guide What certification is right for you? What certification is right for you? This exclusive guide examines the available cloud security certifications that can translate to better career opportunities -- and a higher salary -- for you as cloud

More information

Why Software Defined Networking (SDN)? Boyan Sotirov

Why Software Defined Networking (SDN)? Boyan Sotirov Why Software Defined Networking (SDN)? Boyan Sotirov Agenda Current State of Networking Why What How When 2 Conventional Networking Many complex functions embedded into the infrastructure OSPF, BGP, Multicast,

More information

AT&T activearc unified IP data solution

AT&T activearc unified IP data solution Solution Brief AT&T activearc unified IP data solution Flexible IP networking options to fit your needs What is the AT&T activearc solution? The AT&T activearc solution is a wired and wireless Ethernet

More information

Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS

Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS M ost storage vendors now offer all-flash storage arrays, and many modern organizations recognize the need for these highperformance

More information

Social media driving CRM strategies

Social media driving CRM strategies Rapid changes in social computing, mobile and customer analytics are driving shifts in. In a recent survey, IT identified establishing a CRM strategy as the second greatest challenge, behind instituting

More information

Cloud Storage: Top Concerns, Provider Considerations, and Application Candidates

Cloud Storage: Top Concerns, Provider Considerations, and Application Candidates Cloud Storage: Top Concerns, Provider Considerations, and Application Candidates As cloud technology and deployment models become increasingly sophisticated, once-wary storage professionals are plunging

More information

White. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments.

White. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments. White Paper The Rise of Network Functions Virtualization Implications for I/O Strategies in Service Provider Environments By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned

More information

The Promise and the Reality of a Software Defined Data Center

The Promise and the Reality of a Software Defined Data Center The Promise and the Reality of a Software Defined Data Center Authored by Sponsored by Introduction The traditional IT operational model is highly manual and very hardware centric. As a result, IT infrastructure

More information

SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER

SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER JOINT SDN SOLUTION BY ALCATEL-LUCENT ENTERPRISE AND NEC APPLICATION NOTE EXECUTIVE SUMMARY Server

More information

SOFTWARE DEFINED NETWORKING

SOFTWARE DEFINED NETWORKING SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology

More information

Meru MobileFLEX Architecture

Meru MobileFLEX Architecture Meru MobileFLEX Architecture Bringing new levels of choice and control to enterprise wireless LANs Mobility has transformed work from a location to an activity. Smartphones, tablets, and laptops enable

More information

Unlocking data with document capture and imaging

Unlocking data with document capture and imaging Unlocking data with capture and imaging Unlocking data with Before organizations can banish paper from the office, proper and capture processes must be adopted. This E-Guide reveals the keys to effective

More information

Rethink defense-in-depth security model

Rethink defense-in-depth security model e-guide E-Guide Rethink defense-in-depth By Mike Rothman Rethink defense-in-depth T oday s endpoint security modevl is failing. What s next? Learn why endpoint defense-in-depth controls must assume the

More information

JUNIPER. One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER. 1 Copyright 2010 Juniper Networks, Inc. www.juniper.net

JUNIPER. One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER. 1 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNIPER One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER 1 Copyright 2010 Juniper Networks, Inc. www.juniper.net 2-3-7: JUNIPER S BUSINESS STRATEGY 2 Customer Segments 3 Businesses Service

More information

NEC s Juniper Technology Brief Issue 2

NEC s Juniper Technology Brief Issue 2 NEC s Juniper Technology Brief Issue 2 Inside This Issue: Juniper s New SPACE Solutions, Datacentre, Services and Switches Product Releases For further information email info@nec.co.nz or visit www.nec.co.nz

More information

The skinny on storage clusters

The skinny on storage clusters The skinny on storage clusters Storage clustering can mean different things based on the vendor and the architecture which the technology is built on, but the features or benefits are usually similar across

More information

Pluribus Netvisor Solution Brief

Pluribus Netvisor Solution Brief Pluribus Netvisor Solution Brief Freedom Architecture Overview The Pluribus Freedom architecture presents a unique combination of switch, compute, storage and bare- metal hypervisor OS technologies, and

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

Secured Voice over VPN Tunnel and QoS. Feature Paper

Secured Voice over VPN Tunnel and QoS. Feature Paper Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3

More information

HP FlexNetwork Architecture

HP FlexNetwork Architecture HP Networking HP Networking 1 HP FlexNetwork Architecture FlexFabric Flex Campus FlexBranch FlexManagement Converges Network Management and Orchestration Open Scalable Secure Agile Consistent 2 Innovative

More information

An SDN Reality Check. Authored by. Sponsored by

An SDN Reality Check. Authored by. Sponsored by An SDN Reality Check Authored by Sponsored by 1 Introduction The traditional IT operational model is highly manual and very hardware centric. As a result, IT infrastructure services have historically been

More information

Subtitle. VoIP Trends. What to Expect in 2016. VoIP 2016 Compare Business Products 2015 1

Subtitle. VoIP Trends. What to Expect in 2016. VoIP 2016 Compare Business Products 2015 1 Subtitle VoIP Trends What to Expect in 2016 VoIP 2016 Compare Business Products 2015 1 Contents The VoIP Market Is Set to Grow... 3 Nomadic VoIP Stakes a Claim... 4 Some Key Technologies for 2016... 5

More information

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com Wireless Services The Top Questions to Help You Choose the Right Wireless Solution for Your Business Get Started Now: 877.611.6342 to learn more. www.megapath.com Why Go Wireless? Today, it seems that

More information

Pervasive Security Enabled by Next Generation Monitoring Fabric

Pervasive Security Enabled by Next Generation Monitoring Fabric Pervasive Security Enabled by Next Generation Monitoring Fabric By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Big Switch Networks Executive Summary Enterprise networks have become ever

More information

E-Guide SHAREPOINT UPGRADE BEST PRACTICES

E-Guide SHAREPOINT UPGRADE BEST PRACTICES E-Guide SHAREPOINT UPGRADE BEST PRACTICES I n keeping with its practice of updating the collaboration platform SharePoint roughly every three years, Microsoft delivered another version,. Not that it is

More information

CENTER I S Y O U R D ATA

CENTER I S Y O U R D ATA I S Y O U R D ATA CENTER R E A DY F O R S D N? C R I T I C A L D ATA C E N T E R C O N S I D E R AT I O N S FOR SOFT WARE-DEFINED NET WORKING Data center operators are being challenged to be more agile

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R A p p l i c a t i o n D e l i v e r y f o r C l o u d S e r v i c e s : C u s t o m i z i n g S e r v i c e C r e a t i o n i n V i r t u a l E n v i r o n m e n t s Sponsored by: Brocade

More information

Managing the supply chain for SAP

Managing the supply chain for SAP Managing the supply chain for SAP Supply chain projects around collaboration with suppliers, contract lifecycle management and transportation management can provide a quick return on investment (ROI) for

More information

The Many Faces of SDN: An Industry Perspective

The Many Faces of SDN: An Industry Perspective The Many Faces of SDN: An Industry Perspective Kenneth Duda CTO / SVP Software Arista Networks, Inc. Face 1: SDN is for Experimentation Today, there is almost no practical way to experiment with new network

More information

Software Defined Networking (SDN)

Software Defined Networking (SDN) Software Defined Networking (SDN) Unified Wired/Wireless Networks Ajay Malik, SVP Worldwide Engineering & Products Meru Networks, Inc. MERU PROPRIETARY INFORMATION. Copyright 2014. Meru Networks, Inc.

More information