Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

How to drive intelligence into your next-generation networks

Mark Micallef, Area Vice President, ASEAN | July 9, 2014
Here are a few key steps organizations need to break barriers of network fragility to securely maximize enterprise cloud efficiency

Furthermore the open and programmable nature of the network facilitates service integration. This provides organizations with an extensible, elastic and scalable virtualization framework that supports seamless and secure onboarding of additional services, while retaining full isolation and independence between these services.

Altogether, this increases the value of existing network computation resources, giving organizations the ability to promptly adapt and scale network behavior and characteristics to suit ever-evolving needs of customers which are constantly susceptible to volatile changes.

Step 3: Tighten security with granular security and control policies

With change comes uncertainty, and the transition to unfamiliar grounds might seem like opening a can of worms in terms of security management. However, when approached the right way, SDN helps boost network security. The high level of automation in SDN improves security postures through virtualization, by mitigating or even eliminating human errors. This gives IT better visibility, as well as a more streamlined, orderly and optimized policy deployment process.

Deploying a network-wide policy architecture can create, distribute and monitor security rules based on a contextual language, such as who, what, where, when and how. The security enforcement includes blocking access to data or devices, and initiating data encryption. For instance, when an employee connects to the corporate network from a smartphone, the network identifies the device and user, as well as the privileges granted them. The policy engine not only establishes policies for the device and user, but also shares these policies with all points on the network, and instantly updates information when a new device appears on the network. With just one flick of a switch, businesses can intelligently redirect network traffic to enforce granular security and control policies. By better defining app requirements, SDN becomes a security solution instead of a security problem.

A smarter network for the virtualized world 

As apps take center stage in the business world today, the new enterprise IT landscape, which includes cloud services, mobility and BYOD, calls for a change in network architecture as network traffic and bandwidth requirements have progressed to support richer workloads with lower latency. In order to fully embrace cloud-based apps and services, organizations need smarter network solutions to deliver quality services for their business.

The future of next-generation networks lies in app-aware SDN. With the right governance and usage policies in place, enterprises could find themselves with a fully automated, broadly dynamic network infrastructure, capable of accommodating virtually any requirement users throw at it. 

 

 

Previous Page  1  2 

Sign up for Computerworld eNewsletters.