Digital Transformation
Digital Transformation using a cloud architecture involves numerous components:
​
-
Secure Access Service Edge (SASE) network architecture,
-
Choosing a suite of Software as a Service (SaaS) applications that best fit operations,
-
Configurating and using SaaS vendor integrations for chosen applications,
-
Use Infrastructure as a Service (IaaS) and applications for non-SaaS applications,
-
Deploy and configure appropriate security throughout,
-
Review operations, agility, and productivity enhancements with and adjust for work anywhere mobility,
-
Update organizational goals, culture, and policy with new and changing operational models.
​
Cloud services architecture allows an 80/20 split in Information Technology (IT) responsibilities.
-
Large infrastructure providers like Google, Microsoft, and Amazon can take on responsibilities for data center operations and infrastructure.
-
Software vendors can make their full suite of applications available with integrations available with other cloud vendors.
-
All the base maintenance, patching, health monitoring, repairs and fixing, upgrades over time, and most operational components are cared for by the vendor.
-
The service consumer is responsible for configuring applications and services to fit their operations (the 20%).
This allows for a much more agile and sophisticated deployment with 80% of the cost shared across a much larger user base.
​
By moving to a cloud architecture, 80% of the work in traditional models can be moved to application and infrastructure service vendors that provide a much richer environment deployed on a very large scale. A rich full suite of integrated services are available for organizations to custom configure for their operations.
Secure Access Service Edge
(SASE) Architecture
ERP
SASE
Simplify setup, management and improve performance
Industry Specific Applications
Cloud
Internet Firewall
Cloud
WAN Firewall
SASE Global
Backbone
(Middle Mile)
QoS
Mobile Workers connect to the closest POP globally
SD-WAN
Mobile Workers
Remote Sites
Worker Identity based access from anywhere to WAN & Internet
Multiple internet links, Link optimized, Application acceleration
SD-WAN
VPN / SD-WAN
SD-WAN
Branch Offices
VPN
Corporate Data Centers
Headquarters
& Campus
LAN Sites
Cloud Data Centers
Microsoft
Amazon
Monitoring & Security
Data Analytics
Cloud Data Centers
(IaaS / PaaS)
SASE Global Backbone
(Middle Mile)
Business Intelligence
Big Data
Data Analytics
Measure value proposition and understand customers better than your competitors.
Core Business Applications
Application agility, integrations with other cloud apps, flexibility, fast onboarding and scaling.
Cloud Internet Firewall
Middle Mile managed backbone, QoS
Video Conferencing Meetings
CRM
Collaboration & Document
Management
Project Management
Cloud Storage
SASE Network Components
Enhanced connectivity and traffic management and visibility.
Identity Management
Password Management
Device Management (MDM)
Endpoint Security Management
Security Management & Incident Response
Directory Services, Multifactor Authentication & Security
​
Security management, patching, upgrades, IT configuration & management
Security Awareness
Security Monitoring (SIEM)
VPN
LAN
SD-WAN
Internet
Remote Desktop / VDI for Legacy Apps
Shortest Path Bridging
(IEEE 802.1AQ)
Cloud WAN Firewall
SASE Network Components
​
-
Universal Wide Area Network (WAN) and Internet access security independent of worker location or mobility, identity based with the same options available for workers no matter the location: office, branch, corporate data center, cloud data center, remote locations or home (security is integrated across all components, not just networking)
-
Cloud based global software defined firewalls for WAN and Internet
-
Identity based security based on the user, independent of location, enables network segmentation based on user anywhere on the WAN
-
Application aware network security applied using policies based on user identity and application identity – enables global application prioritization and improved user experience
-
Managed middle mile internet networks integrated with last mile SD-WAN site connectivity for better application quality of service and availability
-
Improved cost efficiency as scaling connectivity becomes incremental with multiple broadband connections aggregated using SD-WAN
-
Integrated with campus network Shortest Path Bridging (SPB) software defined networks for fast operational scaling and performance
-
Simplicity provided through advanced software defined networks allows improved business agility,
-
Enhanced traffic visibility and management allows improved efficiencies and performance.
-
Enables hybrid application deployment and migration. Applications become services that can be moved easily from corporate data centre, to cloud IAAS, and cloud SaaS solutions – with minimal impact on the end user
Core Business Applications - Cloud
​
-
Easily scale up or down with application agility - fast onboarding and scaling,
-
Upgrades and core application components seamlessly vendor managed by their experts,
-
Configuration managed and defined by user organization,
-
Cloud vendors offer standard integration with other cloud vendors allowing enhanced customized work flow and operations,
-
Integrated authentication (SAML) improves ease of use and user experience.
-
Availability allows work anywhere mobility,
-
Significant number of options for security allows for wide range of security features to fit many organizations
Security Management & Incident Response
​
-
Integrated directory services and authentication simplifies management and agility, while improving user experience
-
Integrated multifactor authentication options improve security,
-
Security monitoring with advanced analytics enhances security detection capabilities to reduce business risk
-
Device management cloud systems enhance deployment agility and emergency security response capabilities improving operational availability,
-
Integrated network and device management systems and data analytics improve security and availability,
-
Personnel security awareness monitoring and training systems improve the most important part of active security – people
Data Analytics
​
-
Make decisions faster by making information available to staff in near real time
-
Used to develop strategies based on real data from a variety of sources,
-
Insights used to improve products and services,
-
Measure value proposition and understand customers better than your competitors,
-
Artificial Intelligence (AI) helps customers with real time application decisions, responses, and animation.