We were happy and proud to learn that Frost & Sullivan had bestowed its 2015 Business Metro Carrier Ethernet Services Market Leadership Award to AT&T.In fact, AT&T has ranked number 1 in Frost & Sullivan’s market share analysis of the retail Ethernet market over the past 5 years. “AT&T continues to lead through a combination of deep metro network footprint, market leading Ethernet solutions and high-performance service level agreements (SLAs),” says Frost & SullivanAT&T and customers, old and new, are migrating from time-division multiplexing (TDM) private line technology to Ethernet service to take advantage of scalability, reliability, and cost efficient bandwidth.To read this article in full or to leave a comment, please click here
Frost & Sullivan recently declared that the “enterprise wide area networking (WAN) space is going through a major transformation”.
As any enterprise IT and networking executive well knows, voice video and data are continuing to drive WAN demand, but there are even more challenging applications coming to the fore. As Frost & Sullivan notes, “the growing penetration of cloud computing, big data applications, and mobility applications are dictating new requirements on the enterprise.”
So what’s needed to relieve pressure on the corporate network? According to the report, a hybrid VPN approach that leverages the best of Multiprotocol Label Switching (MPLS) VPNs and public internet-based IPSec VPNs is the direction enterprises are moving in or at least evaluating.To read this article in full or to leave a comment, please click here
Networking is difficult to manage, cost consuming and subject to huge security concerns. More and more administrators would just as soon pass off some of the core responsibilities for keep their networks operating properly and safely.The typical enterprise today is either managing or outsourcing a bewildering array of WAN hardware that includes switches, routers, load balancers, VPNs, accelerators and firewalls – essentially a separate device for each core network function.Recently, an IDG Research Services survey revealed that 75 percent of respondents would value the ability to offload installing, configuring, and running network hardware. That aligns with an overall trend to rely more on managed service providers for key business processes, which, according to research published by consulting and research firm Everest Group, now represents a global market of $1.5 billion .To read this article in full or to leave a comment, please click here
Virtualization has dramatically transformed data center infrastructure and now it’s time for wide area networking (WAN) to undergo a similar transformation.Network Functions Virtualization (NFV) heralds a new era of networking in which WANs are software-centric, rather than tied to proprietary, inflexible hardware devices.“NFV eliminates the need for proprietary hardware; and enables routers, switches, firewalls, load balancers, content delivery systems, end-user devices, IP Multimedia Subsystem (IMS) nodes, and almost any other network function to run as software on virtual machines,” according to Roopashree Honnachari, industry director of business communications services with Frost & Sullivan.To read this article in full or to leave a comment, please click here
Businesses large and small are under the gun to satisfy network access for varied constituencies: not only centralized and remote workers, but outsiders ranging from consumers to partners. Typically, that means supporting multiple access technologies such as a secure virtual private network (VPN) and any number of Wi-Fi guest access devices.Businesses typically have spent years trying to catch up with the access needs of their workers. Larger firms may use a variety of networking technologies from high-performing carrier-based Multiprotocol Label Switching (MPLS) virtual private networks (VPNs), campus or metro Ethernet local area networks (LANs), and public internet VPNs. Smaller organizations are more likely inclined to the public internet options.To read this article in full or to leave a comment, please click here
There’s broad recognition among enterprises of the need for network modernization, but many decision-makers are constrained by the prospect of capital equipment outlays, proving a solid return on investment, or fear of being locked into a proprietary solution. Those are key findings in a soon to be published survey conducted by IDG Research Services.
One third of IT decision-makers think it’s highly likely their organizations will modernize their network connectivity strategies over the next year and another 46 percent indicate there’s some likelihood. Today, virtually every enterprise places a premium on flexibility and agility, and few are willing to commit to long-term, costly outlays for network technology that can’t adapt to their future needs.To read this article in full or to leave a comment, please click here
By Joe Faranetta
MPLS (multi-protocol label switching) VPNs have long been recognized as a preferred option for dedicated, high performance connectivity over a wide area network (WAN), such as linking data centers or branch offices that require high volume and reliability. But smaller groups and individual workers typically were offloaded to the public internet, primarily utilizing the IPsec suite of protocols to create a VPN link.
The MPLS VPN is a high-speed, single-carrier-operated network. An enterprise can directly link any of its MPLS VPN sites directly and at high speeds, without going through the public internet routing process where data packets can travel circuitous routes and often require retransmission of lost packets.To read this article in full or to leave a comment, please click here
MPLS (multi-protocol label switching) VPNs (Virtual Private Network) have long been recognized as a preferred option for dedicated, high performance connectivity over a wide area network (WAN), such as linking data centers or branch offices that require high volume and reliability. Often these MPLS VPNs would use a broadband internet connection, either DSL, Cable or LTE, as a backup option. It has become more common recently to leverage that broadband for internet offload. In fact, the broadband internet is also being used as the primary VPN link for many locations and is even being combined with single user remote access options. Regardless of the use case for the broadband VPN, it uses the IPSec protocol to encrypt the VPN traffic to keep it secure. To read this article in full or to leave a comment, please click here
The Bring Your Own Device (BYOD) revolution is in full swing. According to a global survey of CIOs by Gartner, 38 percent of companies expect to stop providing devices to workers by 2016. As BYOD adoption accelerates and consumer smartphones and other devices evolve, the technology we use at work must find a way to keep up.Consumer devices are tightening the bond between ‘Man and Machine’, and one thing is certain: our smartphones and smart watches are getting smarter. In fact, it’s eerie how smart they have become. There are the widely used personal devices: the explosion of smart watches like the highly-anticipated Apple Watch™, the enormously popular fitness bands like FITBIT®, and smartphones like Samsung’s Galaxy S6 Edge™ that are making strides in streamlined app management.To read this article in full or to leave a comment, please click here