Digital Transformation
Digital Transformation using a cloud architecture involves numerous components:
​
-
Secure Access Service Edge (SASE) network architecture,
-
Choosing a suite of Software as a Service (SaaS) applications that best fit operations,
-
Configurating and using SaaS vendor integrations for chosen applications,
-
Use Infrastructure as a Service (IaaS) and applications for non-SaaS applications,
-
Deploy and configure appropriate security throughout,
-
Review operations, agility, and productivity enhancements with and adjust for work anywhere mobility,
-
Update organizational goals, culture, and policy with new and changing operational models.
​
Cloud services architecture allows an 80/20 split in Information Technology (IT) responsibilities.
-
Large infrastructure providers like Google, Microsoft, and Amazon can take on responsibilities for data center operations and infrastructure.
-
Software vendors can make their full suite of applications available with integrations available with other cloud vendors.
-
All the base maintenance, patching, health monitoring, repairs and fixing, upgrades over time, and most operational components are cared for by the vendor.
-
The service consumer is responsible for configuring applications and services to fit their operations (the 20%).
This allows for a much more agile and sophisticated deployment with 80% of the cost shared across a much larger user base.
​
By moving to a cloud architecture, 80% of the work in traditional models can be moved to application and infrastructure service vendors that provide a much richer environment deployed on a very large scale. A rich full suite of integrated services are available for organizations to custom configure for their operations.
Secure Access Service Edge
(SASE) Architecture
SASE Network Components
​
-
Universal Wide Area Network (WAN) and Internet access security independent of worker location or mobility, identity based with the same options available for workers no matter the location: office, branch, corporate data center, cloud data center, remote locations or home (security is integrated across all components, not just networking)
-
Cloud based global software defined firewalls for WAN and Internet
-
Identity based security based on the user, independent of location, enables network segmentation based on user anywhere on the WAN
-
Application aware network security applied using policies based on user identity and application identity – enables global application prioritization and improved user experience
-
Managed middle mile internet networks integrated with last mile SD-WAN site connectivity for better application quality of service and availability
-
Improved cost efficiency as scaling connectivity becomes incremental with multiple broadband connections aggregated using SD-WAN
-
Integrated with campus network Shortest Path Bridging (SPB) software defined networks for fast operational scaling and performance
-
Simplicity provided through advanced software defined networks allows improved business agility,
-
Enhanced traffic visibility and management allows improved efficiencies and performance.
-
Enables hybrid application deployment and migration. Applications become services that can be moved easily from corporate data centre, to cloud IAAS, and cloud SaaS solutions – with minimal impact on the end user
Core Business Applications - Cloud
Application agility, integrations with other cloud apps, flexibility, fast onboarding and scaling
​
-
Easily scale up or down with application agility - fast onboarding and scaling,
-
Upgrades and core application components seamlessly vendor managed by their experts,
-
Configuration managed and defined by user organization,
-
Cloud vendors offer standard integration with other cloud vendors allowing enhanced customized work flow and operations,
-
Integrated authentication (SAML) improves ease of use and user experience.
-
Availability allows work anywhere mobility,
-
Significant number of options for security allows for wide range of security features to fit many organizations
Security Management & Incident Response
​
Directory Services, Multifactor Authentication & Security. Security management, patching, upgrades, IT configuration & management.
​
-
Integrated directory services and authentication simplifies management and agility, while improving user experience
-
Integrated multifactor authentication options improve security,
-
Security monitoring with advanced analytics enhances security detection capabilities to reduce business risk
-
Device management cloud systems enhance deployment agility and emergency security response capabilities improving operational availability,
-
Integrated network and device management systems and data analytics improve security and availability,
-
Personnel security awareness monitoring and training systems improve the most important part of active security – people
Data Analytics
​
Measure value proposition and understand customers better than your competitors.
​
-
Make decisions faster by making information available to staff in near real time
-
Used to develop strategies based on real data from a variety of sources,
-
Insights used to improve products and services,
-
Measure value proposition and understand customers better than your competitors,
-
Artificial Intelligence (AI) helps customers with real time application decisions, responses, and animation.