The Friday Five: Network Monitoring, Artificial Intelligence and DevSecOps
Twice a month, we highlight five popular news stories from the world of networking, security and automation. Here are the top five stories from the last two weeks. How to...
April 5, 2019
Twice a month, we highlight five popular news stories from the world of networking, security and automation. Here are the top five stories from the last two weeks.
Intent-Based Networking and Monitoring: The Basics – Solutions Review
There’s a lot of hype around intent-based networking (IBN), but this article takes it back to the basics, explaining what IBN is, how it compares to software-defined networking, and how it impacts network monitoring. Essentially, IBN automates network management with the use of AI and machine learning by delivering tasks and requirements to network nodes based on the business’s intent – removing the need for network teams to manually configure devices and orchestrate tasks. In the future, it is likely we will see more and more network management tools incorporate IBN features.
Four Hidden Benefits of SD-WAN Adoption – ITProPortal
Many of the benefits of SD-WAN are obvious – simplifying, streamlining and optimizing network capabilities – but as this ITProPortal article points out, to think about SD-WAN only in terms of reducing man-hours or implementation lead time would be missing out on some of the other benefits the technology can deliver. Over the next year or two, additional advantages will surely become more mainstream. Those include consumer-grade interfaces for enterprise-grade technology, super-powered access options and bandwidth capacities through 5G, thinking in terms of applications and security instead of network provisioning, and more.
Hacker AI vs. Enterprise AI: A New Threat – Dark Reading
Artificial intelligence (AI) and machine learning (ML) are finally starting to make their way towards mainstream adoption, rather than simply being a vision of future technology. Many organizations are implementing AI for security defense, but now hackers also have access to some of the same AI-enabled technology that’s supposed to keep enterprises secure. It won’t be long until hackers start taking advantage of the flexibility of AI to find weaknesses in current defense strategies. This article discusses the dangers of AI when it gets into the wrong hands.
The way employees work is changing. Many work remotely and access company resources on smartphones, tablets and personal computers. That means the way our corporate networks are managed and secured needs to adapt to these changes. Organizations must be able to keep their workers productive and secure corporate assets. But how? Perhaps instead of trying to prevent local internet breakouts, you secure them. It may sound too good to be true, but it’s possible with a security protocol called software-defined access (SDA).
Implementing security throughout the entire app lifecycle is a must if organizations want to take full advantage of DevOps. But in order to take action with the compliance process to free up developer resources, automation is also essential. The trouble is, many organizations lack the necessary systems and tools to do so. Here, DevOps.com discusses the need for automation in DevSecOps and how to establish automation in the process.
Want more of the Friday Five? Check out our last blog: The Friday Five: DevOps, Network Management, and Continuous Compliance