Remove Architecture Remove Firewall Remove Groups Remove Network
article thumbnail

How Orange’s CTO is driving network transformation

TM Forum

As Orange Group’s CTO and Senior Vice President Orange Innovation Networks he is responsible for steering the evolution of the operator’s networks, including their software transformation. “On the network side we are at the beginning of a significant transformation of our industrial model.

CTO 130
article thumbnail

How customers can save money during periods of economic uncertainty

CIO Business Intelligence

Today, security, networking, and IT teams are faced with reduced headcount, shrinking budgets, and the very real need to do more with less. Yesterday’s hub-and-spoke networks and castle-and-moat security models were adequate when users, applications, and data all resided onsite in the corporate office or data center.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Microsegmentation – Secure Your Internal Network

CTOvision

The problem is that threat actors are able to get through the castle gates (firewalls) and once in, are able to evade the castle guards (IPS). The argument is that today with the expansion of n-tier distributed systems and massively parallel architectures, east-west traffic has increased exponentially. Microsegmentation will fix this.

Network 150
article thumbnail

Maturing Security Posture and Mitigating Concerns with FireMon

CTOvision

According to Greg Young of the Gartner Group, many organizations are taking the “adopt first, secure later” approach to the cloud. A good deal of effort goes into migration of existing network security infrastructure, and more importantly network security policies, to support cloud services. Find out more about FireMon here.

Security 150
article thumbnail

Radically simplify and expand Zero Trust to cloud workload

CIO Business Intelligence

Many organizations rely on legacy security architectures to secure their cloud workloads. They often use a combination of: Cloud native security solutions offered by cloud service providers Multiple security tools (firewall, VPN, TLS/SSL inspection, DLP, etc.)

Cloud 96
article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO Business Intelligence

Even as its cloud journey reaches cruising altitude, Cathay Pacific Group IT is not slowing down. Securing the network One major aspect of Cathay’s cloud optimization plan is embracing Aryaka’s unified secure access service edge (SASE) converged networking, security, and observability platform across its global network, Nair says.

Cloud 100
article thumbnail

Liveblog: Hybrid Architectures, Bridging the Gap to the Cloud

Scott Lowe

This is a liveblog of the AWS re:Invent session titled “Hybrid Architectures: Bridging the Gap to the Cloud” (ARC208). The speaker for the session is Jamie Butler, Manager of Solutions Architecture at AWS (focused on state/local government). Once you have data and identity addressed, it’s time to handle networking.