NC Feb-Mar 2024
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
NETWORKcomputing<br />
I N F O R M A T I O N A N D C O M M U N I C A T I O N S – N E T W O R K E D www.networkcomputing.co.uk<br />
<strong>2024</strong> VISION<br />
Predicting the network space for the year ahead<br />
AGILE OPERATORS<br />
Network Computing catches<br />
up with Polywell Computers<br />
NETWORK<br />
INTEGRATION<br />
Navigating the complexity<br />
of modern networks<br />
IDENTITY CRISIS?<br />
The modern evolution of<br />
IGA solutions<br />
FEBRUARY/MARCH <strong>2024</strong> VOL 33 NO 01
REGISTER<br />
FOR YOUR<br />
FREE TICKET<br />
WWW.CLOUDEXPOEUROPE.COM/BTC
COMMENT<br />
COMMENT<br />
FORECASTING THE FUTURE OF NETWORKS<br />
Welcome to our first issue of <strong>2024</strong>, where we're taking a closer look at what<br />
this year will entail for the networking space with a range of predictions from<br />
industry experts. First, Kevin Drinkall, Director - <strong>Mar</strong>keting and GTM Strategy,<br />
EMEA at Zyxel, explains why <strong>2024</strong> is set to be a year of progressive network evolution<br />
and innovation, defined by "a continued move towards remote monitoring and management<br />
of networks."<br />
Kevin identifies three key elements underpinning this innovation, namely "a large-scale<br />
upgrade of wireless technology to the latest WiFi 6/6E and WiFi 7 standards; a continued<br />
move to multi-gigabit switches and infrastructure; and increased adoption of network<br />
security that is simple to install and manage. Another developing trend is the<br />
increased uptake of 5G routers for connectivity that is mobile and can be used in<br />
remote areas." Read Kevin's article for more insights on how we can bring the network<br />
up to speed in the coming months.<br />
We also have an opinion piece from HPE Aruba Networking Chief Product Officer<br />
David Hughes, in which David shares his top 5 networking and security predictions for<br />
<strong>2024</strong>. With HPE poised to purchase Juniper Networks for $14 billion - a move that's<br />
set to shake-up the industry in its own right - it seems a fitting time to learn more about<br />
the company's vision for the networking year ahead, and David's predictions range from<br />
the death of the standalone firewall to the potential for AI to liberate, rather than supplant,<br />
IT admins.<br />
REVIEWS:<br />
Dave Mitchell<br />
DEPUTY EDITOR: <strong>Mar</strong>k Lyward<br />
(netcomputing@btc.co.uk)<br />
PRODUCTION: Abby Penn<br />
(abby.penn@btc.co.uk)<br />
DESIGN: Ian Collis<br />
(ian.collis@btc.co.uk<br />
SALES:<br />
David Bonner<br />
(david.bonner@btc.co.uk)<br />
Julie Cornish<br />
(julie.cornish@btc.co.uk)<br />
SUBSCRIPTIONS: Christina Willis<br />
(christina.willis@btc.co.uk)<br />
PUBLISHER: John Jageurs<br />
(john.jageurs@btc.co.uk)<br />
Published by Barrow & Thompkins<br />
Connexion Ltd (BTC)<br />
35 Station Square,<br />
Petts Wood, Kent, BR5 1LZ<br />
Tel: +44 (0)1689 616 000<br />
Fax: +44 (0)1689 82 66 22<br />
SUBSCRIPTIONS:<br />
UK £35/year, £60/two years,<br />
£80/three years;<br />
Europe:<br />
£48/year, £85/two years £127/three years;<br />
ROW:<br />
£62/year, £115/two years, £168/three years;<br />
Subscribers get SPECIAL OFFERS — see subscriptions<br />
advertisement; Single copies of<br />
Network Computing can be bought for £8;<br />
(including postage & packing).<br />
© 2023 Barrow & Thompkins<br />
Connexion Ltd.<br />
All rights reserved.<br />
No part of the magazine may be<br />
reproduced without prior consent, in<br />
writing, from the publisher.<br />
Finally, while we're focusing on the year ahead, we're excited to announce that nominations<br />
for the <strong>2024</strong> Network Computing Awards have just opened! Now's the time to<br />
nominate the networking solutions, companies and people that have impressed you the<br />
most in the past twelve months, so please put forward you choices on the awards website.<br />
We'll have more news about this year's event in our next issue. <strong>NC</strong><br />
GET FUTURE COPIES FREE<br />
BY REGISTERING ONLINE AT<br />
WWW.NETWORKCOMPUTING.CO.UK/REGISTER<br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 03
FEBRUARY/MARCH <strong>2024</strong> VOL 33 NO 01<br />
CONTENTS<br />
CONTENTS<br />
F E B R U A R Y / M A R C H 2 0 2 4<br />
NETWORKcomputing<br />
I N F O R M A T I O N A N D C O M M U N I C A T I O N S – N E T W O R K E D www.networkcomputing.co.uk<br />
<strong>2024</strong> VISION<br />
Predicting the network space for the year ahead<br />
AGILE OPERATORS<br />
Network Computing catches<br />
up with Polywell Computers<br />
NETWORK<br />
INTEGRATION<br />
Navigating the complexity<br />
of modern networks<br />
IDENTITY CRISIS?<br />
The modern evolution of<br />
IGA solutions<br />
INTERVIEW: POLYWELL............8<br />
Network Computing catches up with Sam<br />
Chu, CEO and founder of Polywell<br />
Computers, a PC manufacturer with a<br />
unique focus on the small-to-mid-size<br />
marketplace<br />
COMMENT.....................................3<br />
Forecasting the future of networks<br />
INDUSTRY NEWS.............................6<br />
The latest networking news<br />
TIME TO BRING THE NETWORK<br />
UP TO SPEED........................12<br />
Kevin Drinkall at Zyxel tells us what he<br />
believes will be the major trends in<br />
networking technology over the coming year<br />
NETWORK INTEGRATION......20<br />
The world of networking has changed<br />
rapidly, and in this issue Chris McKie at<br />
Kaseya provides a guide to navigating the<br />
complexity of modern networks<br />
FOCUSING ON THE NETWORK<br />
SPACE IN <strong>2024</strong>..........................16<br />
David Hughes at HPE Aruba Networking<br />
gives us his top 5 networking and security<br />
predictions for <strong>2024</strong><br />
AVOIDING AN IDENTITY<br />
CRISIS.................................28<br />
Thomas Muller-<strong>Mar</strong>tin at Omada explains<br />
why the evolution of modern identity<br />
governance and administration (IGA)<br />
solutions Is worth your attention<br />
ARTICLES<br />
THE FUTURE OF USB DEVICES IN AN<br />
IOT WORLD...................................10<br />
By Alan Hayward at SEH Technology<br />
THE RISE OF QUANTUM<br />
ECOSYSTEMS IN <strong>2024</strong> AND<br />
BEYOND.........................................22<br />
By Dr. Philip Krantz at Keysight<br />
RETAIL INFRASTRUCTURE FIT FOR<br />
TODAY AND TOMORROW.............24<br />
By Henk Ijspeerd at Vertiv<br />
BECOMING SECURE BY DESIGN....26<br />
By Chip Daniels at SolarWinds<br />
BUNGLED BACKUPS........................30<br />
By John Fielding at Apricorn<br />
THE NEXT GENERATION OF<br />
CONNECTIVITY...............................32<br />
By Todd Mussman at GTT<br />
REVIEWS<br />
POLYWELL NANO-U10L4-SFP+.......11<br />
PERLE SYSTEMS IDS-710HP-XT.........15<br />
HORNETSECURITY 365 PERMISSION<br />
MANAGER.......................................18<br />
04 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
INDUSTRY NEWS<br />
NEWSNEWS<br />
NEWS NEWS<br />
NEWS NEWS NEWS NEWS<br />
NEWS NEWS<br />
New cloud-managed solutions from Extreme Networks<br />
Extreme Networks has introduced two new solutions<br />
designed to help highly distributed enterprise<br />
organisations create improved network connectivity, security<br />
and application performance. The AP5020 is a new Wi-Fi 7<br />
Universal access point (AP) that operates on the 6 GHz<br />
spectrum and is designed to support high-bandwidth,<br />
latency-sensitive applications and IoT devices. The 4000<br />
Series cloud-managed switches, the latest addition to<br />
Extreme's Universal portfolio, offer faster setup time by<br />
eliminating nearly all manual configurations. Paired with<br />
ExtremeCloud Universal ZTNA, these offer automated<br />
onboarding, configuration and policy enforcement to<br />
strengthen security as organisations move to a Zero Trust<br />
architecture across their network.<br />
Both the AP5020 and 4000 Series switches leverage AIOps<br />
(Artificial Intelligence for IT Operations) and machine learning<br />
features of the ExtremeCloud IQ cloud management platform<br />
to help proactively identify network issues and make<br />
recommendations that help reduce IT time to resolution.<br />
Cohesity and Veritas to combine data protection business<br />
Cohesity and Veritas have announced a definitive agreement<br />
under which Cohesity intends to combine with Veritas' data<br />
protection business, which will be carved out of Veritas, to<br />
create a new leader in data security and management.<br />
Customers will benefit from the accelerated innovations<br />
unlocked by the joint company's scaled R&D investment and<br />
one of the industry's most extensive partner ecosystems. Sanjay<br />
Poonen will lead the combined organisation as CEO and<br />
President. Greg Hughes, CEO of Veritas, will serve as a Board<br />
member and strategic advisor to Sanjay Poonen after the close<br />
of the transaction.<br />
The combined company will bring together 100s of exabytes<br />
of data protected and will continue to invest in and advance the<br />
roadmap and strategy of all Cohesity products and services, as<br />
well as Veritas NetBackup, NetBackup appliances, and Alta<br />
data protection offerings, while working towards the delivery of<br />
an integrated solution combining the best technology across the<br />
two companies.<br />
Nokia trials 5G edge cloud network slicing solution<br />
Nokia and A1 Austria (A1) have successfully completed the<br />
industry's first 5G edge cloud network slicing trial with<br />
Microsoft. The deployment utilised Nokia's 5G edge slicing solution<br />
integrated with Microsoft Azure managed edge compute on A1's<br />
live commercial network in Vienna, Austria. With edge cloud<br />
network slicing, A1 can bring enterprise cloud applications to<br />
mobile users over a high capacity, secure and low latency network.<br />
During the trial, A1 demonstrated real-time HD video streaming by<br />
transmitting live camera feeds from several mobile devices using<br />
Multicasting.io's streaming mobile platform running on the Azure<br />
edge infrastructure.<br />
Nokia's 5G Edge Slicing solution enables operators to take<br />
advantage of both slicing and edge cloud capabilities and provide<br />
value to their customers. Network slices can be tailored to support<br />
specific customers' use cases and different applications based on<br />
network performance, quality, traffic routing, latency, and security.<br />
Nokia's new solution enabled A1 to isolate its public Internet and<br />
enterprise traffic while keeping critical business traffic local using<br />
4G/5G core breakout for enterprise edge cloud applications. The<br />
network slices were implemented across Devices-RAN-Transport-Core-<br />
Edge Cloud Applications. 5G Edge Slicing enhances the enterprise<br />
user experience for low latency and high bandwidth use cases with<br />
high network performance, quality security and manageability.<br />
Highlighting Network Assessment for Cisco partners<br />
Highlight has introduced a new compact Network Assessment<br />
feature on its Service Assurance Platform to enable Cisco<br />
partners to assess a customer's network and identify performance<br />
issues within a couple of weeks. The service is designed as a<br />
stepping stone to delivering trusted, differentiated and profitable<br />
managed services. Using quick and seamless API integration with<br />
Cisco Meraki, Catalyst and ThousandEyes technologies, Highlight<br />
enables partners to quickly onboard a new customer, assess the<br />
network, make recommendations and transition the customer<br />
from a one-time assessment to an ongoing managed, recurring<br />
revenue relationship.<br />
06 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
INDUSTRY NEWS<br />
The service enables providers to demonstrate to their customers<br />
that they understand their network, including any current issues and<br />
frustrations. A comprehensive report with detailed evidence<br />
facilitates fact-based discussions on where and how to make<br />
improvements. This strengthens the relationship between service<br />
provider and customer whilst giving the provider an opportunity to<br />
deliver accurate advice and upsell services.<br />
<strong>Mar</strong>tin Saunders, Chief Operating Officer at Highlight said,<br />
"Modern IT departments are struggling with ever growing demands<br />
and expectations on their time and resources. Despite huge<br />
advances in simplifying the management of networks through cloud<br />
platforms like Cisco Meraki, many IT leaders are looking to their<br />
partner to manage the infrastructure that underpins IT. Customers are<br />
also looking for partners they can trust to become virtual members of<br />
their IT department. However, the managed services model can be a<br />
complex shift for some partners to make. With the Network<br />
Assessment feature, Cisco Partners have a tangible and easy way to<br />
prove their ability to remove the network management burden from<br />
IT, whilst setting the foundation for building longer term recurring<br />
revenue relationships with their customers via a managed service."<br />
x530-28GSX full fibre switch from Allied Telesis<br />
Allied Telesis has introduced its x530-28GSX full fibre switch,<br />
bringing flexibility and network optimisation to the company's<br />
x530 Series of multi-Gigabit switches. Months in development, the<br />
x530-28GSX switch is a 24-port 100/1000X SFP stackable switch<br />
with 4 SFP+ ports and 2 fixed power supplies. It can aggregate a<br />
24x1 Gigabit fibre link to a 4x10 Gigabit fibre link and up to 8<br />
units can be stacked using Virtual Chassis Stacking (VCStack) to<br />
build a 192 Gigabit fibre aggregator. The switch also supports<br />
copper connectivity via SFP/SFP+ ports allowing the maximum<br />
flexibility of both copper and fibre as required.<br />
"Businesses and organisations need to meet the rapidly changing<br />
demand put on networks by applications such as artificial intelligence,<br />
5G backhaul and edge computing. The x530-28GSX enables the<br />
addition of bandwidth using either copper or fibre at either 1 or<br />
10Gb/s, and because of its high resiliency, this capacity increase<br />
works very well for numerous large site markets such as education<br />
campuses, FTTx deployments, utilities, and city-wide metro networks,"<br />
said Chris Dyke, Sales Director UK & Ireland at Allied Telesis.<br />
Elevated 2.5G performance for SBs and prosumers<br />
Zyxel Networks has launched the XMG1915 series, a family of<br />
smart managed switches designed for small businesses (SBs)<br />
and professional home users (prosumers). Available in 8 and 16-<br />
port models, the XMG1915 series provide 2.5 Multi-Gigabit<br />
Ethernet capability across all ports. There are also 10G uplinks<br />
for connections to the network core, and PoE++ options that will<br />
provide as much as 60W to a connected device. Flexible cloud<br />
management makes the switches easy to deploy and manage.<br />
Kell Lin, Senior Associate Vice President of Zyxel Networking<br />
Strategic Business Unit, said: "Changing work patterns, the<br />
increased bandwidth demands of modern applications and<br />
services, and the growing number of devices being used on the<br />
network edge are a significant challenge. The XMG1915 series<br />
provides a fast, versatile, and cost-effective solution, with the<br />
added benefit of simple deployment and management options<br />
through our Nebula cloud management platform."<br />
McCambridge Duffy saves and modernises with Apogee<br />
McCambridge Duffy, a leading UK insolvency firm, has<br />
partnered with managed workplace services (MWS) provider<br />
Apogee Corporation to boost workplace efficiencies and modernise<br />
its IT infrastructure. Since the collaboration began, the firm has<br />
already reduced a large proportion of its yearly operating costs by<br />
almost half a million pounds. Apogee digitised the operations at<br />
McCambridge Duffy with the implementation of its Managed IT<br />
Services and Digital Document Service. Prior to engaging the MWS<br />
provider, the firm was suffering from up to two IT outages a month,<br />
costing approximately £31,000, which have been reduced to zero.<br />
As a business heavily reliant on paper-based documents, the yearly<br />
costs associated with postage accumulating to £60,000 have been<br />
cut down to £8,400. McCambridge Duffy has also benefitted from<br />
improved efficiency across its workforce. Client caseloads have<br />
almost doubled from 5,000 to 9,500, without needing to increase<br />
headcount, and a meeting of creditors appointment now takes just<br />
7 days to process, down from 45, an 80% reduction.<br />
NEWS NEWSNEWS<br />
NEWS<br />
NEWS NEWS NEWS NEWS NEWS<br />
NEWS<br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 07
INTERVIEW: POLYWELL<br />
A COMMITMENT TO AGILITY<br />
NETWORK COMPUTING CATCHES UP WITH SAM CHU, CEO AND FOUNDER OF POLYWELL<br />
COMPUTERS, A PC MANUFACTURER WITH A UNIQUE FOCUS ON THE SMALL-TO-MID-SIZE<br />
MARKETPLACE<br />
Network Computing: For readers<br />
who may not be that familiar<br />
with the company, let's start with<br />
some background on Polywell and its<br />
product range - what should we know<br />
about what you do, and what makes<br />
your offerings unique?<br />
Sam Chu: Polywell is a Silicon Valleybased<br />
PC manufacturer founded in 1987:<br />
initially focused on serving the US market,<br />
the company has since expanded<br />
globally. Polywell uses technologies from<br />
Intel, AMD, and Nvidia to produce PCs,<br />
workstations, servers, and storage<br />
devices. A core focus is embedded PCs<br />
for applications like network security,<br />
digital signage, kiosks, POS systems, and<br />
AI/IoT devices.<br />
In the network security industry, we<br />
don't sell directly to end customers:<br />
instead, we mainly work with<br />
software vendors and developers<br />
who use our hardware products to<br />
create turnkey solutions for SMB<br />
network security. Most network<br />
security software is based on<br />
Linux, often optimised for older<br />
versions of the Linux kernel. This<br />
makes it difficult for developers to<br />
find a partner like Polywell that can<br />
provide long-term support for<br />
legacy operating systems.<br />
Polywell offers<br />
products with a<br />
10-year<br />
lifespan,<br />
helping our<br />
software<br />
partners<br />
avoid additional development and<br />
certification costs. We have a strong<br />
reputation for supporting this business<br />
segment over many years.<br />
In other market niches we focus on the<br />
most advanced innovations in computer<br />
hardware. It's common knowledge that<br />
industrial grade computing has a<br />
noticeable 'inertia' of 6 to 12 months as<br />
compared to the moment that advanced<br />
technologies appear in mainstream<br />
segments. Polywell tries to minimise this<br />
time lapse and make the newest<br />
solutions available in the embedded<br />
market as well.<br />
Of course, we are working in a tightly<br />
competitive market in terms of not only<br />
the largest industry giants, but also of<br />
mid-size manufacturers like us who are<br />
the main driving force of the industrial<br />
computer market. We decided long ago<br />
that we could in no way sacrifice quality<br />
because it lasts and reminds about itself<br />
during the whole lifecycle of the product<br />
- unlike price! We are trying to make our<br />
products 'self-convincing', saying<br />
everything about themselves. You may be<br />
surprised, but in many cases a customer<br />
just needs to take our PC in hand to<br />
make a choice in our favour. That's why<br />
we encourage the 'test-before-you-buy'<br />
approach.<br />
<strong>NC</strong>: Can you talk about particular<br />
product developments in the pipeline -<br />
what are you planning, when will it be<br />
available, and why will it be of interest to<br />
our readers?<br />
08 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
INTERVIEW: POLYWELL<br />
SC: While maintaining a longevity<br />
product supply for our embedded<br />
products, Polywell is also working<br />
closely with Intel to develop new<br />
products, such as utilising the 13th<br />
gen CPU to provide early samples to<br />
developers to develop their software,<br />
or port their old or existing apps by<br />
utilising the new technologies<br />
launching with the new platform to<br />
improve performance and features.<br />
Besides the CPU itself, security<br />
products are also heavily dependent on<br />
network I/O and speeds. We are<br />
currently developing the 400Gbit<br />
Network Platform for the SDN<br />
(Software Defined Network) products<br />
for the high-end segment, by utilising<br />
the PCIe 5.0 high performance buses<br />
lanes and high-speed network chip<br />
from Mellanox (Nvidia) and Intel.<br />
Expect the product to be launched at<br />
the end of <strong>2024</strong>.<br />
<strong>NC</strong>: The simultaneous growth in dge<br />
computing and in AI seems to be<br />
unstoppable - how do these emerging<br />
technologies influence both your<br />
customers' requirements and your own<br />
development strategies?<br />
SC: AI is hot and is driving high<br />
demand for supercomputing across<br />
various areas such as CPU, GPU, Bus<br />
Lane, Network I/O, memory I/O, and<br />
storage capacity/speed in both Edge<br />
and backend computing. Polywell is<br />
actively developing products for both<br />
Edge and Cloud to address market<br />
demands. We have always prioritised<br />
client needs and worked closely to<br />
deliver tailored solution products - our<br />
approach is customer-centric, ensuring<br />
we meet and exceed client demands<br />
with effective solutions.<br />
AI is in its early stages of<br />
development, of course. Many practical<br />
applications are using early bird AI<br />
development platforms to build on later.<br />
Our long-standing - thirty year -<br />
presence in the industry allows us to<br />
engage with early adopters and<br />
development circles, thanks to strong<br />
relationships, experience, and trust<br />
across the industry.<br />
<strong>NC</strong>: How would you summarise what<br />
makes Polywell stand out in an<br />
increasingly competitive market and<br />
attract customers to the way you work?<br />
SC: Polywell is dedicated to catering to<br />
the unique needs of small to mid-size<br />
businesses that may not find an ideal fit<br />
with Tier-1 vendors like Dell or HP. We<br />
understand the challenges faced by<br />
businesses of this scale and are<br />
passionate about providing tailored<br />
solutions. Our commitment to agility is<br />
not just a strategy; it's a mindset that<br />
allows us to swiftly embrace new<br />
technologies and navigate dynamic<br />
market changes.<br />
In our pursuit of excellence, we<br />
recognise that the landscape for small<br />
to mid-size businesses is constantly<br />
evolving. We take pride in being nimble<br />
and responsive, ensuring that our<br />
partners are not only well-supported but<br />
also at the forefront of innovation.<br />
At Polywell, we believe in fostering<br />
meaningful relationships with our business<br />
partners, understanding their aspirations,<br />
and aligning our strategies to help them<br />
thrive. Our approach is not just<br />
transactional; it's about building a<br />
collaborative ecosystem where success is<br />
shared. In a world where adaptability is<br />
key, Polywell stands as a beacon for<br />
businesses seeking a reliable and<br />
dynamic partner. Embracing change is<br />
not just a necessity for us; it's a core value<br />
that fuels our passion for delivering<br />
impactful solutions to the heart of the<br />
business community.<br />
<strong>NC</strong>: What is the next step then for<br />
Polywell in terms of business growth,<br />
perhaps specifically for the UK market?<br />
SC: The internet has significantly reduced<br />
global barriers for international business.<br />
Our overseas partners leverage our US<br />
resources and cutting-edge technologies,<br />
empowering them to excel in their local<br />
markets. Instead of competing, we prefer<br />
to collaborate and serve within our<br />
industry segment.<br />
We prioritise partners who recognise our<br />
value and are astute enough to harness<br />
our resources and support, fostering their<br />
business development and growth. This<br />
collaborative approach strengthens our<br />
bonds and creates a shared journey<br />
towards success, emphasising the<br />
importance of mutual understanding and<br />
smart utilisation of available resources. <strong>NC</strong><br />
www.polywell.com<br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 09
OPINION: USB DEVICES<br />
THE FUTURE OF USB DEVICES IN AN IOT WORLD<br />
IN THE ERA OF THE INTERNET OF THINGS (IOT), WHERE CONNECTIVITY AND DATA<br />
ARE THE CORNERSTONES OF MODERN TECHNOLOGIES, THE FUTURE OF USB<br />
DEVICES APPEARS POISED FOR A SIGNIFICANT TRANSFORMATION, ACCORDING<br />
TO ALAN HAYWARD, SALES AND MARKETING MANAGER AT SEH TECHNOLOGY<br />
From its beginnings as a standard for<br />
connecting peripherals to computers, the<br />
USB interface has evolved into an<br />
indispensable tool for data transfer and power<br />
delivery. As the demand for faster data transfer<br />
speeds increases with larger file sizes and<br />
higher-resolution media, USB technology is<br />
likely to evolve to support evolving demands.<br />
A recent study conducted by Arthur Little<br />
recorded how the average data consumption<br />
per month per user had increased from<br />
approximately 5 GB/month in 2018 to 15<br />
GB/month in 2022 across Europe, with<br />
forecasts estimating it to grow to 75 GB/month<br />
by 2030, highlighting the mass increase in<br />
network usage and pressure.<br />
Newer standards, such as USB 3.2 and<br />
USB4, already offer faster data rates, and<br />
future iterations will in all likelihood continue<br />
this trend.<br />
I<strong>NC</strong>REASING FLEXIBILITY<br />
In order to adapt to a rapidly changing world,<br />
USB devices may have to become more<br />
versatile, providing multiple functions beyond<br />
simple data transfer and power delivery. This<br />
could include features like integrated storage,<br />
advanced sensors, or even processing<br />
capabilities, making USB devices more<br />
intelligent and capable.<br />
Moreover, USB power delivery has become<br />
a significant feature of the technology,<br />
allowing devices to not only transfer data<br />
but also deliver power. This is important in<br />
an interconnected world where various<br />
devices need to charge quickly and<br />
efficiently. Future USB standards may<br />
enhance power delivery capabilities,<br />
supporting more power-hungry devices.<br />
USB Type-C, with its reversible design and<br />
support for high data transfer speeds and<br />
power delivery, has become increasingly<br />
popular. USB-C will likely continue to be a<br />
universal standard for various devices, reducing<br />
the need for multiple types of cables and<br />
adapters, and simplifying the interconnected<br />
future direction of technology. By the end of<br />
<strong>2024</strong>, all mobile devices sold on the EU<br />
market will have to include USB-C, with laptops<br />
also having to include them by Spring 2026.<br />
SIMPLIFYING CONNECTIVITY<br />
In an increasingly IoT-focused world, USB<br />
devices can provide a standardised and<br />
simplified way for IoT devices to connect and<br />
communicate with each other. Their interfaces<br />
can be customised to better support and<br />
manage IoT networks, regardless of the<br />
competency of users. Looking ahead to the<br />
future of the industry, USB devices may evolve<br />
to support enhanced edge computing<br />
capabilities, allowing IoT devices to offload<br />
processing tasks to connected USB devices.<br />
This enhances overall system performance<br />
and reduces vast workload pressures on IoT<br />
networks. They can also be developed to<br />
incorporate advanced power harvesting<br />
technologies, allowing them to generate power<br />
from the environment (such as solar or kinetic<br />
energy) to sustain IoT devices with minimal<br />
reliance on external power sources.<br />
ELEVATING SECURITY<br />
USB devices in IoT applications often handle<br />
sensitive data, which makes maintaining data<br />
privacy and confidentiality paramount.<br />
Encryption mechanisms help protect<br />
information from unauthorised access,<br />
eliminating the possibility of technologyenhanced<br />
eavesdropping and strengthening<br />
the security of data that is transferred across<br />
the network.<br />
Adopting a zero-trust architecture is<br />
becoming increasingly important in securing<br />
IoT environments. This approach assumes that<br />
no device, even if connected via USB, can be<br />
trusted by default and requires continuous<br />
verification of the device's security posture. This<br />
prevents rogue or malicious devices from<br />
infiltrating IoT networks, reducing the possibility<br />
of attacks and disruption.<br />
Furthermore, regular security audits should be<br />
conducted to identify and address<br />
vulnerabilities in USB-connected devices. This<br />
includes scanning for malware and ensuring<br />
devices comply with developing security best<br />
practices. As the IoT landscape continues to<br />
evolve, cybersecurity processes and protocols<br />
must also evolve, maximising the security and<br />
protection of information.<br />
CLOSING THOUGHTS<br />
In summary, the role of USB devices in an<br />
interconnected and technologically<br />
integrated world is likely to involve faster<br />
data transfer, enhanced power delivery, the<br />
reinforced security of data, and a continued<br />
evolution towards universal and versatile<br />
connectivity. In the era of IoT, the future of<br />
USB devices appears poised for significant<br />
flexibility, scalability and adaptability, so it's<br />
important today to consider their role in an<br />
IoT world. <strong>NC</strong><br />
10 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
PRODUCT REVIEW<br />
Polywell<br />
Nano-U10L4-SFP+<br />
PRODUCT REVIEW<br />
PRODUCT<br />
REVIEWPRODUCT RE<br />
If extreme longevity is a mark of success then<br />
Polywell Computers is a clear winner, as this<br />
US-based company has been designing and<br />
building computing products since 1987. Its<br />
impressive portfolio includes enterprise-class<br />
rack servers, storage systems, workstations and<br />
PCs while a rapidly expanding range of mini-<br />
PCs allows it to offer an unprecedented choice<br />
of form factors and features.<br />
Polywell has a sharp focus on network<br />
security gateway solutions and the Nano-<br />
U10L4-SFP+ on review is an ideal candidate<br />
for providing network threat protection,<br />
firewall and intrusion prevention duties. To<br />
show off its capabilities, Polywell supplied our<br />
review unit with the VyOS network operating<br />
system software preinstalled.<br />
It delivers an impressive set of security<br />
features including edge routing, NAT, BGP, SPI<br />
firewalling, VPN gateway and broadband<br />
remote access services. VyOS operates two<br />
'branches' where free rolling releases combine<br />
the latest code from contributors, while longterm<br />
support for stable releases is offered with<br />
yearly subscriptions that include options for<br />
unlimited on-premises deployments.<br />
The VyOS for Good scheme will appeal to<br />
establishments such as schools, colleges and<br />
universities, emergency services and start-ups.<br />
VyOS also recognises the valuable work done<br />
by non-profit organisations by offering them a<br />
premium support subscription free of charge.<br />
The Nano-U10L4-SFP+ clearly has the<br />
credentials to handle a high demand as inside<br />
its ruggedised aluminium chassis beats an Intel<br />
quad-core 1.6GHz Core i5-10210u CPU. This<br />
was teamed up with 16GB of DDR4 memory<br />
upgradeable to 64GB while the VyOS software<br />
was loaded on a 256GB M.2 NVMe SSD.<br />
Network connection options abound with<br />
base configurations providing four 2.5GbE<br />
multi-Gigabit ports. Our unit sported an<br />
additional pair of 10GbE SFP+ fibre ports for<br />
high-speed links and Polywell offers another<br />
model with eight 2.5GbE ports.<br />
Other hardware features of note include an<br />
RJ-45 serial console port and a quartet of USB<br />
3 ports, while power is handled by a small<br />
external PSU. The CPU's embedded Intel 4K<br />
UHD graphics chip has its output piped<br />
through to HDMI 2.0 and DisplayPort<br />
connections for dual monitor support.<br />
The sturdy aluminium chassis does a fine job<br />
as a heatsink as, although the motherboard<br />
has a cooling fan assembly above it, we didn't<br />
hear it ever being activated during testing. This<br />
makes the Nano-U10L4-SFP+ ideal for small<br />
office environments that value their tranquillity -<br />
it also supports a VESA wall mount bracket so it<br />
can be safely tucked out of the way.<br />
For initial deployment, we attached an HD<br />
monitor plus keyboard and followed the VyOS<br />
online quick start guide to create a gateway<br />
configuration using two 2.5GbE ports. VyOS<br />
doesn't offer a web GUI but using its CLI, we<br />
had no problems configuring our WAN and<br />
LAN interfaces, applying DHCP, DNS and NAT<br />
services, applying a base set of firewall policies<br />
and committing and saving our changes.<br />
After enabling SSH access, we dispensed<br />
with the monitor and keyboard and conducted<br />
further monitoring and configuration using the<br />
PuTTY app. Where you go from here is up to<br />
your imagination - suffice to say that VyOS is<br />
an incredibly versatile open platform.<br />
Our base firewall configuration worked fine<br />
and Polywell also provided us with a clear<br />
guide for deploying core routing and BGP<br />
services between a head office and remote<br />
site. New users may find the learning curve a<br />
little steep but VyOS provides a massive<br />
knowledge base, along with great community<br />
support and tutorials to help you get started<br />
and quickly resolve any issues.<br />
Polywell's Nano-U10L4-SFP+ delivers<br />
plenty of power in a compact and well-built<br />
package. It's ideal for hosting a wide range<br />
of business applications and teaming it up<br />
with VyOS delivers the perfect network<br />
security partnership. <strong>NC</strong><br />
Product: Nano-U10L4-SFP+<br />
Supplier: Polywell Computers<br />
Web site: www.polywell.com<br />
Sales: info.eu@polywell.com<br />
WWW.NETWORKCOMPUTING.CO.UK FEBRUARY/MARCH <strong>2024</strong> 11<br />
NETWORKcomputing<br />
@<strong>NC</strong>MagAndAwards
FEATURE: PREDICTIONS<br />
TIME TO BRING THE NETWORK UP TO SPEED<br />
KEVIN DRINKALL, DIRECTOR - MARKETING AND GTM STRATEGY, EMEA AT ZYXEL, TELLS US WHAT HE<br />
BELIEVES WILL BE THE MAJOR TRENDS IN NETWORKING TECHNOLOGY OVER THE COMING YEAR<br />
Zyxel Networks expects <strong>2024</strong> to be a<br />
year of further progressive<br />
innovation in networking. We also<br />
expect it to be a year in which customers<br />
will make serious (and in many cases,<br />
much-needed) investments to upgrade<br />
wireless technologies and further<br />
embrace multi-gigabit performance<br />
across the infrastructure.<br />
With more devices now being connected at<br />
the edge of the network, the number of entry<br />
points and vulnerabilities are growing and<br />
security will continue to be vitally important.<br />
There is also a desire for security to be as<br />
simple as possible to implement and<br />
manage. Smaller businesses in particular do<br />
not need to know about the complexities of<br />
how they are protected - they just need to<br />
know that they are protected. Improved<br />
support for Power over Ethernet (PoE)<br />
connections is needed to support the<br />
increased number of edge devices.<br />
Another trend we see is further<br />
growth in the use of 5G technology,<br />
both as a backup for fixed-line<br />
connections, and as a way of<br />
providing quick, easy-to-deploy<br />
connectivity just about anywhere.<br />
This is an increasingly popular<br />
choice where the connectivity<br />
needs to be easy to move<br />
around, or there are<br />
inadequate or no fixed-line<br />
connections.<br />
On a broader front, we expect<br />
to see increased use of remote<br />
monitoring capabilities and<br />
services, as businesses look to<br />
simplify and streamline the management of<br />
the IT systems and networks on which they<br />
are increasingly dependent.<br />
A BIG YEAR FOR WIFI UPGRADES<br />
In wireless, <strong>2024</strong> will be the year of WiFi 7 -<br />
and we also expect to see a lot more uptake<br />
of WiFi 6 and 6E. While the former is still<br />
quite new - and the IEEE 802.11be (WiFi 7)<br />
standard will not be formally ratified until<br />
quite late in <strong>2024</strong> - the technology available<br />
from Qualcomm (the chip producer with<br />
whom Zyxel Networks has a strong<br />
partnership), conforms to the proposed<br />
standard that will most certainly be rubberstamped<br />
later in the year. There are already<br />
a number of WiFi 7 access points on the<br />
market (Zyxel Networks was one of the first<br />
to announce and make a product<br />
available *1 ), and many more will be<br />
launched over the course of the year.<br />
WiFi 7 offers distinct advantages. It is<br />
significantly faster than WiFi 6/6E (around<br />
2X to 3X faster in real-world scenarios) and<br />
is much better at delivering consistent and<br />
reliable connectivity in dense environments,<br />
i.e. where there are a lot of devices<br />
connected to the WiFi in one area. In<br />
exhibition centres, sports and entertainment<br />
arenas, in schools, train stations and<br />
airports, for example, it will deliver distinct<br />
and immediate benefits.<br />
Why then, would you want to install WiFi 6<br />
or 6E? Well, for smaller businesses and<br />
homes where there won't be that many<br />
devices being connected, there won't be a<br />
lot of difference in terms of the user<br />
experience with WiFi. What the 802.11ax<br />
standard - or WiFi 6 or 6E (the 'E' stands for<br />
12 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
FEATURE: PREDICTIONS<br />
'extended range') - as it is more widely<br />
known, will give you is a noticeable<br />
performance uplift on previous standards<br />
and the ability to support more users that are<br />
using multimedia content, such as video.<br />
Upgrading to WiFi 6 or 6E will also - for<br />
now at least - be more affordable than<br />
WiFi 7. As the 802.11ax standard is fully<br />
ratified and established, there are many<br />
more devices on the market. For the<br />
businesses and homes for which WiFi 6/6E<br />
will deliver improved performance, it will<br />
be a good investment. It's also worth<br />
noting that the majority of WiFi 6/6E and<br />
all WiFi 7 devices come with WPA3<br />
protection, which provides enhanced<br />
security for both infrastructure and devices<br />
connecting wirelessly.<br />
In the end, whether you choose WiFi 7<br />
and WiFi 6 or 6E, upgrading wireless is<br />
going to be important. This year we are<br />
likely to see many more users finally taking<br />
the plunge and upgrading their ageing<br />
laptops, tablets and smartphones. Many of<br />
these would have been bought during the<br />
early days of the pandemic - three years<br />
ago or more. These new devices will<br />
support WiFi 6/6E as a minimum - and<br />
some may even have WiFi 7.<br />
The wireless networks they connect to will<br />
need to be capable of making use of their<br />
increased speed. For hotels, restaurants,<br />
cafes, bars and any other hospitality<br />
business, enabling customers to get the best<br />
and fastest access will be important. That<br />
will also be the case in schools and<br />
colleges, in hospitals and in businesses<br />
where there are guests and visitors coming<br />
and going all the time.<br />
GOING MULTI-GIG ACROSS THE<br />
WHOLE NETWORK<br />
This last point is one that applies to the<br />
whole network infrastructure. Applications<br />
and services have become much more<br />
bandwidth<br />
hungry. Video<br />
conferencing and<br />
collaboration tools, increased use<br />
of cloud applications and services, and<br />
richer content, have all pushed network<br />
traffic relentlessly upwards. There is now<br />
a need to support high throughput right<br />
across the network.<br />
This is driving the uptake of multi-gigabit<br />
switches that have the capability to deliver<br />
speeds of 2.5Gbps, 5Gbps and 10Gbps<br />
to connected devices. Zyxel Networks<br />
already offers a range of smart managed<br />
and unmanaged switches that support<br />
multiple speeds in each direction. This<br />
gives organisations the flexibility to<br />
construct a network fabric that will meet<br />
their increased need for bandwidth. This<br />
does not mean you have to upgrade every<br />
single element of the network though. In<br />
most scenarios - certainly this is the case<br />
with Zyxel Networks switches, existing Cat<br />
5E cabling will carry 2.5Gbps and in some<br />
cases 5Gbps to edge connections.<br />
We'll be adding to our multi-gig range in<br />
<strong>2024</strong> and also enhancing their PoE<br />
capabilities. We're doing this because the<br />
devices now being deployed at the network's<br />
edge, such as WiFi 6/6E and WiFi 7 access<br />
points, along with high-quality IP surveillance<br />
cameras with pan-zoom-tilt (PZT) capability,<br />
need additional power to run. These devices<br />
are usually of critical importance as they<br />
may be providing connectivity for scores of<br />
users and clearly, if you have a security<br />
camera in place, it's there for a reason. You<br />
won't want it to be out of action for any<br />
length of time. This means an increase from<br />
15.4W or 30W per port to 60W per port on<br />
a network switch (POE+ to POE++).<br />
SIMPLE, COMPREHENSIVE SECURITY<br />
Digital security also needs to be<br />
completely reliable. No organisation can<br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 13
FEATURE: PREDICTIONS<br />
afford to let<br />
its defences down,<br />
even for a few moments. It<br />
also needs to be comprehensive<br />
and cover the network from end to end.<br />
Increasing regulation is driving<br />
organisations to adopt more secure<br />
practices. The EU's NIS2 directive is due<br />
to come into force in <strong>2024</strong>, requiring<br />
organisations operating in Europe to<br />
have a specific level of cybersecurity<br />
protection in place.<br />
Every year the threats to networks<br />
multiply, and the increased dependency<br />
we have on our IT systems and<br />
connections means that any loss of<br />
access or data will be extremely<br />
damaging. This has led to digital security<br />
solutions becoming more and more<br />
complex, and while it is absolutely<br />
essential it can also be off-putting,<br />
especially for smaller businesses that<br />
have no technical or cybersecurity<br />
expertise of their own.<br />
We see two parallel trends here: a<br />
growing desire to make protecting the<br />
network simpler, and a greater willingness<br />
to place the administration and<br />
management of security in the hands of<br />
professional experts.<br />
Zyxel Networks has already responded to<br />
both of these developments. With our<br />
Connect and Protect initiative, we provide<br />
a predefined cybersecurity set-up for our<br />
devices that makes deployment much<br />
more accessible. This is provided not only<br />
on our unified security gateway, but also<br />
on our wireless access points and smart<br />
managed switches.<br />
Through the ongoing development of<br />
our Nebula cloud management and our<br />
cybersecurity cloud platforms, we're<br />
providing additional and proactive<br />
protection against all kinds of threats. For<br />
example, we've already introduced<br />
collaborative detection and response<br />
(CDR) - a feature that checks for unsafe<br />
devices connected via WiFi and works with<br />
one of Zyxel Networks' firewalls to contain<br />
them according to preset conditions.<br />
Nebula enables businesses to put<br />
security into the hands of an expert;<br />
network administrators and MSPs can<br />
keep a look-out for any potential<br />
problems or breaches remotely and take<br />
appropriate action when required. We'll<br />
be bringing forward many more security<br />
enhancements to Nebula in <strong>2024</strong>.<br />
Through these twin initiatives, we are<br />
making network security simpler and even<br />
more comprehensive for our customers.<br />
THREE BIG TRENDS<br />
In summary, there will be three key major<br />
trends in networking in <strong>2024</strong>: a largescale<br />
upgrade of wireless technology to<br />
the latest WiFi 6/6E and WiFi 7 standards;<br />
a continued move to multi-gigabit<br />
switches and infrastructure; and increased<br />
adoption of network security that is simple<br />
to install and manage. Another<br />
developing trend is the increased uptake<br />
of 5G routers for connectivity that is<br />
mobile and can be used in remote areas.<br />
Overarching all of this will be a general<br />
move to higher bandwidth and<br />
performance right across the network<br />
fabric; the sophistication of applications,<br />
content and cloud-based services - and<br />
the need to ensure security throughout the<br />
network - requires that now. In <strong>2024</strong>, it will<br />
be time to bring the network up to speed.<br />
We will also see a continued move<br />
towards remote monitoring and<br />
management of networks - and this will<br />
extend to configuration and installation.<br />
Far from being a new development, this is<br />
a growing trend that has been driven for<br />
some time by the increasing acceptance<br />
of managed services, a scarcity of<br />
advanced technical skills, and the<br />
increasing dependency that all<br />
organisations have on their IT systems,<br />
connectivity and networks.<br />
At Zyxel Networks, we have advanced<br />
the capability of our own cloud<br />
management platform, Nebula,<br />
considerably over the last couple of years.<br />
Further enhancements are being added all<br />
the time and in particular, to its security<br />
functionality, which is now becoming<br />
deeply embedded within the platform. We<br />
are using AI and machine learning in<br />
Nebula to enhance protection even more,<br />
to aid fault finding and resolution, and<br />
monitor and retune access points so that<br />
their performance is enhanced.<br />
We're also providing reporting tools that<br />
enable admins and MSPs to delve deeper<br />
into the network activity and traffic to gain a<br />
better insight into how resources are being<br />
used and make adjustments that will<br />
enhance performance and security. Nebula<br />
is continually developing and becoming an<br />
all-encompassing, end-to-end solution<br />
through which, the entire network (or<br />
multiple networks) can be monitored.<br />
This is the longer-term direction for<br />
networking. Devices will be installed,<br />
configured and managed remotely and<br />
there will be much greater collaboration<br />
and sharing of functionality between<br />
switches, wireless access points and<br />
security appliances. In <strong>2024</strong>, we will see<br />
networks progressing to the point where<br />
performance tuning and digital<br />
cybersecurity are fully integrated across all<br />
devices and everything is monitored and<br />
managed through the cloud. <strong>NC</strong><br />
1<br />
- Zyxel Networks' WBE660S WiFi 7<br />
BE22K Triple-Radio NebulaFlex Pro Access<br />
Point was launched in October 2023.<br />
14 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
PRODUCT REVIEW<br />
Perle Systems<br />
IDS-710HP-XT<br />
PRODUCT REVIEW<br />
PRODUCT<br />
REVIEWPRODUCT RE<br />
The growing demand for industrial Power<br />
over Ethernet (PoE) switches is being<br />
driven by many factors including the<br />
adoption of IoT devices, outdoor IP surveillance<br />
systems and the new high-performance Wi-Fi<br />
6/7 access points. Perle Systems is a specialist<br />
in this area and its latest IDS-710HP family can<br />
go where other PoE switches fear to tread.<br />
Available in three models, the top-end IDS-<br />
710HP-XT on review is designed to work in an<br />
extended operating temperature range of -40C<br />
to 70C for assured reliability across extreme<br />
fluctuations. Sheathed in a metal fan-less chassis<br />
with an IP20 ingress protection rating, the switch<br />
includes 35mm DIN rail attachments and Perle<br />
also offers optional panel/wall mount kits.<br />
A generous 450W power budget makes the<br />
switch supremely versatile as it can support any<br />
type and class of powered device (PD) along<br />
with single and dual-signature connections. It<br />
can supply up to 100W for 802.3bt PoE++<br />
Type 4 devices or 90W simultaneously on five<br />
ports, making it ideal for external IP cameras<br />
with remote PTZ functions and heaters.<br />
The IDS-710HP-XT offers eight PoE-enabled<br />
copper Gigabit ports and dual SFP slots<br />
supporting copper Gigabit or fibre<br />
Gigabit/2.5GbE transceivers. Fibre<br />
connections are a valuable feature as they<br />
are immune to the high levels of<br />
electromagnetic interference (EMI) frequently<br />
found in industrial environments.<br />
Power redundancy is available as the switch's<br />
terminal block supports dual inputs from<br />
separate supplies. We found it simple to deploy<br />
as we cabled it to a Phoenix Trio DINcompliant<br />
PSU and pressed the switch's reset<br />
button to initiate its Fast Setup mode. Just<br />
connect a PC to the port with the rapidly<br />
flashing LEDs, load a web browser and follow<br />
the wizard to set up your default VLAN and<br />
DHCP services along with secure CLI and web<br />
admin access.<br />
Don't be fooled by its minuscule dimensions<br />
as the IDS-710HP-XT offers a wealth of features<br />
that are all easily accessible from its web<br />
console. Standard Layer 2 features are<br />
abundant and include static and LACP link<br />
aggregation groups along with support for up<br />
to 256 VLANs plus GVRP support for dynamic<br />
VLAN creation. For VoIP networks, you can<br />
create voice VLANs to separate, prioritise and<br />
authenticate this traffic for assured call quality.<br />
Security is a high priority as 802.1x port<br />
authentication is provided and admin access<br />
can be controlled using RADIUS and<br />
TACACS+. The switch supports HTTPS web<br />
access, secure CLI sessions using SSL/TLS, the<br />
stronger SNMPv3 and the PROFINET and<br />
Modbus TCP Industrial Ethernet protocols.<br />
That big power budget means you can deploy<br />
plenty of PDs but if you're worried about<br />
exceeding it, priorities can be applied to each<br />
port. Assign low, high or critical priorities to<br />
each one and if the total draw reaches the<br />
power threshold, those with the lowest priorities<br />
will be turned off first.<br />
Support staff will approve of the PD power<br />
reset feature as they can remotely restart<br />
attached devices. Select a port from the<br />
configuration menu, disable PoE services and<br />
enable them again to force the device to reboot.<br />
Management options are outstanding as,<br />
along with the local web console, you can<br />
manage multiple switches using Perle's free<br />
Network Assist web application, which provides<br />
auto-discovery services. Organisations with<br />
geographically distributed switches can<br />
manage them all using the PerleView cloud<br />
portal, which facilitates remote access to<br />
devices along with scheduled firmware updates<br />
and alerting services.<br />
The IDS-710HP-XT is superbly built, rich in<br />
features and excellent value too, as Perle<br />
includes all features, functionality and ongoing<br />
software maintenance in the base price<br />
of the product. Businesses that need to<br />
deploy secure and reliable PoE services in<br />
extreme or hazardous environments need<br />
look no further. <strong>NC</strong><br />
Product: IDS-710HP-XT<br />
Supplier: Perle Systems<br />
Web site: www.perle.com<br />
Sales: +44 1280 825 540<br />
Price: £1,908 exc VAT<br />
WWW.NETWORKCOMPUTING.CO.UK FEBRUARY/MARCH <strong>2024</strong> 15<br />
NETWORKcomputing<br />
@<strong>NC</strong>MagAndAwards
FEATURE: PREDICTIONS<br />
FOCUSING ON THE NETWORK SPACE IN <strong>2024</strong><br />
FOLLOWING THE RECENT ANNOU<strong>NC</strong>MENT THAT HPE ARE SET<br />
TO ACQUIRE JUNIPER NETWORKS FOR $14 BILLION, HPE<br />
ARUBA NETWORKING CHIEF PRODUCT OFFICER DAVID<br />
HUGHES GIVES US HIS TOP 5 NETWORKING AND SECURITY<br />
PREDICTIONS FOR <strong>2024</strong><br />
1: The death of the standalone firewall<br />
The rise of the hybrid workforce and the<br />
extensive deployment of IoT devices have<br />
irreversibly eroded the network perimeter, and<br />
the standalone firewall is dying with it. No<br />
longer can a good "inside" be protected from<br />
a bad "outside" by a ring of firewalls. Trying to<br />
plug the gaps by deploying even more<br />
firewalls inside an organisation only adds<br />
complexity, creates room for errors, and slows<br />
down businesses that want to move rapidly.<br />
Consequently, the next-gen firewall<br />
appliance is rapidly becoming the last-gen<br />
firewall appliance. On one side, the secure<br />
service edge (SSE) is replacing firewalls and<br />
proxies with cloud delivered secure web<br />
gateway, cloud access security broker and<br />
zero trust network access. SSE provides a<br />
compelling way of managing security for users<br />
accessing applications from anywhere. On the<br />
other side, for IoT security, segmentation is<br />
needed on-prem, right at the edge of the<br />
network, and to achieve this firewall services<br />
are being built directly into access points,<br />
switches and SD-WAN gateways.<br />
Even in the data centre the introduction of<br />
top-of-rack switches with L4-7 security<br />
functionality can deliver east-west<br />
segmentation far more cost-effectively than<br />
traditional next-gen firewalls at end-of-aisle.<br />
Over the coming couple of years the next-gen<br />
firewall market will continue to decline as<br />
these new cloud based and built-in<br />
capabilities usher in a simpler way of<br />
managing secure connectivity.<br />
Industry Supporting Stat: As more<br />
organisations choose programmatic, hybrid<br />
work strategies, buyers are more likely to<br />
select firewall vendors that offer cloud-based<br />
security services with credible cloud security<br />
strategies. Gartner Critical Capabilities for<br />
Network Firewalls? (Adam Hils, Rajpreet Kaur,<br />
Thomas Lintemuth) May 16, 2023.<br />
2: Zero trust principles accelerate alignment<br />
of security and networking objectives<br />
Most organisations have separate teams<br />
managing networking and security, and in<br />
many ways their goals can be at odds with<br />
one another. In <strong>2024</strong> leading enterprises will<br />
demonstrate how zero trust principles can be<br />
employed to align the two team's interests to<br />
deliver better end user experience and<br />
business outcomes.<br />
In a typical organisation the networking<br />
team's objectives are to keep people and<br />
services connected reliably and up and<br />
running with predictably good performance.<br />
They are incented to make it easy for people<br />
to connect to anything and avoid complexity<br />
that will result in outages, latency or<br />
slowdowns. On the one hand, the security<br />
organisation is tasked with minimising risk and<br />
maintaining compliance. Too often the user<br />
and their experience are caught in the middle.<br />
An overzealous security implementation might<br />
make it slow or impossible for users to access<br />
the apps and data they need, slowing down<br />
the business. On the other hand, lax security<br />
or a networking team that aims to please by<br />
bypassing security measures can result in<br />
infiltration and ransomware.<br />
Leading enterprises will adopt zero trust<br />
architectures where the network's job is<br />
defined not in terms of connecting anything to<br />
anything, but rather as being an enforcement<br />
layer for security policy. For users accessing<br />
applications security policy may be enforced<br />
in the cloud, but for many traffic flows,<br />
particularly for IoT devices and their<br />
associated services, it will be more efficient to<br />
automatically implement this policy in access<br />
devices like access points, switches and<br />
routers. With the right level of shared visibility,<br />
automation, and clear delineation of policy<br />
and enforcement, networking and security<br />
teams will have aligned goals and deliver a<br />
better experience.<br />
Industry Supporting Stat: According to<br />
Forrester, 96% of customers stated that<br />
security and networking worked together to<br />
implement SASE.<br />
3: Measuring end user experience becomes<br />
a must<br />
In order to deliver what employees and<br />
customers expect, IT organisations will need to<br />
shift to SLOs and SLAs based on measured<br />
user experience. Users don't care what is at<br />
fault, they are focused on one simple thing: is<br />
the application they are using working well or<br />
not. User satisfaction plummets when they are<br />
16 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
FEATURE: PREDICTIONS<br />
first to find problems, and are then rebuffed<br />
by IT with reports that all devices are up<br />
and operating correctly.<br />
To address this, organisations will widely<br />
deploy digital experience management<br />
(DEM) tools, that both measure actual<br />
experience of end users and make<br />
synthetic probes to ensure infrastructure<br />
readiness even when users are not<br />
present. Organisations will likely want a<br />
mix of measurements collected from<br />
endpoint agents (like an SSE agent) and<br />
measurements collected by dedicated<br />
hardware sensors, particularly when<br />
monitoring Wi-Fi performance. Ideally<br />
these same measurements feed<br />
automated AIOps that are able to learn<br />
and then implement best practices, rapidly<br />
triage problems and automatically<br />
remediate issues.<br />
Industry Supporting Stat: By 2026, at least<br />
60% of I&O leaders will use DEM to<br />
measure application, services and endpoint<br />
performance from the user's viewpoint, up<br />
from less than 20% in 2021. (Gartner,<br />
<strong>Mar</strong>ket Guide for Digital Experience<br />
Monitoring, <strong>Mar</strong>ch 2022).<br />
4: 6GHz Wi-Fi adoption skyrockets<br />
The barriers slowing Wi-Fi deployment in<br />
the 6GHz spectrum will be removed in most<br />
geographies, and adoption will start to<br />
skyrocket. A couple of years ago, the Wi-Fi<br />
6E standard introduced support for the<br />
6GHz band, more than doubling Wi-Fi<br />
capacity, enabling more users and faster<br />
speeds. It's been rapidly adopted in some<br />
segments, but others have been more<br />
cautious. In <strong>2024</strong> the last remaining<br />
barriers to broad adoption will be resolved.<br />
First, use of the 6GHz band, particularly<br />
outdoors is subject to approval by<br />
government authorities. Although some,<br />
like the US, have been quick to open the<br />
spectrum for Wi-Fi, other countries have<br />
been slower. Fortunately, there has been<br />
much forward progress in this area, and<br />
in <strong>2024</strong> most enterprises will have<br />
6GHz spectrum accessible in most parts<br />
of the world.<br />
Second, some enterprises have been leery<br />
about adopting Wi-Fi 6E when Wi-Fi 7 is<br />
around the corner. Now with Wi-Fi 7<br />
ratified, there is no doubt that Wi-Fi 6E and<br />
Wi-Fi 7 will be interoperable, so with 6E<br />
devices and access points shipping in<br />
volume, 6GHz Wi-Fi deployments can<br />
move ahead full steam.<br />
Finally, adoption is gated by support on<br />
both access points and client devices. We<br />
are witnessing a slew of new devices that<br />
support Wi-Fi 6E, and the mainstreaming of<br />
6E access points. On top of this there are<br />
more Wi-Fi 7 devices on the horizon, and<br />
these can utilise the 6GHz band to deliver<br />
better user experience with either Wi-Fi 6E<br />
or Wi-Fi 7 access points.<br />
The combination of these developments<br />
will see a big uptake of 6GHz spectrum in<br />
<strong>2024</strong>, and with it, faster transfers and better<br />
user experience!<br />
Industry Supporting Stat: "HPE Aruba<br />
Networking hasshipped over 1.5 times the<br />
number of Wi-Fi 6E APs than any other<br />
vendor in the industry" - Sian Morgan is the<br />
lead networking analyst for Dell'Oro Group.<br />
5: AI will liberate IT admins<br />
It is sometimes quoted you that won't lose<br />
your job to AI, you'll lose your job to<br />
someone who is using AI effectively. This is<br />
absolutely becoming true for the IT admin.<br />
The increasing burden of implementing<br />
new technology and maintaining cybersecurity<br />
with a fixed or even shrinking<br />
headcount means that each admin must<br />
handle more. Fortunately, AI and<br />
automation are advancing rapidly, shifting<br />
the job from managing and configuring<br />
individual devices, to instead defining<br />
policy across a whole estate and having<br />
that policy implemented automatically and<br />
consistently. AI is also able to comb<br />
through huge volumes of data to identify<br />
anomalies and recommend (and even<br />
implement) remedies.<br />
It's now well established that AI is only as<br />
good as its dataset, and bigger, high<br />
quality datasets are key. Leading vendors<br />
will be drawing AI insights from data lakes<br />
representing millions of managed devices<br />
and hundreds of millions of endpoints.<br />
Finally large language models (LLMs) are<br />
turbo charging existing natural language<br />
interfaces and providing a more<br />
convenient way for admins to get the<br />
information they need.<br />
The bottom line is that organisations need<br />
to ensure that they are providing their IT<br />
teams the AI force-multiplier admins need<br />
to remain competitive.<br />
Industry Supporting Stat: By 2026,<br />
generative artificial intelligence (GenAI)<br />
technology will account for 20% of initial<br />
network configuration, which is an increase<br />
from near zero in 2023. (Gartner, Strategic<br />
Roadmap for Enterprise Networking,<br />
October 2023). <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 17
PRODUCT REVIEW<br />
Hornetsecurity 365<br />
Permission Manager<br />
PRODUCT REVIEW<br />
PRODUCT<br />
REVIEWPRODUCT RE<br />
Microsoft 365 (MS365) is the<br />
productivity and communications<br />
platform of choice for organisations of<br />
all sizes, with it already having reached a<br />
staggering 382 million paid seats this year. A<br />
huge number of companies, including those<br />
with hybrid working practices, clearly see the<br />
benefits of MS365 cloud collaboration services;<br />
but ensuring adequate protection of information<br />
assets, and preventing unauthorised and anonymous<br />
access, can be a major challenge.<br />
Hornetsecurity's 365 Permission Manager is the<br />
perfect solution, as it provides administrators<br />
with all the tools needed to control access<br />
permissions, monitor violations and enforce<br />
compliance policies. Easily managed from a<br />
single cloud portal, it readily allows<br />
organisations to ensure compliance with internal<br />
and external regulations, and maintain access<br />
policies across sharing sites, folders and files.<br />
Onboarding is very swift, as you simply select<br />
365 Permission Manager from Hornetsecurity's<br />
Control Panel, provide all required tenant<br />
details and authenticate with your MS365<br />
account. It avoids management issues with<br />
MS365 global administrators and potential<br />
permission creep, as it uses API connections<br />
and doesn't store any credentials.<br />
The Control Panel presents a highly<br />
informative dashboard, with pie charts showing<br />
overall compliance health, plus separate ones<br />
for SharePoint, OneDrive and Teams. A timefiltered<br />
graph reveals fixed and approved<br />
violations, while others are provided for itemlevel<br />
and policy compliance, upcoming and<br />
overdue audits, and violation trends over time.<br />
You can also view your compliance policies and<br />
365 Permission Manager does all the hard work<br />
for you, as it includes a set of predefined ones.<br />
These are all based on the ISO 27001<br />
information security management systems<br />
standard, so applying them to your organisation<br />
will help you meet certification requirements.<br />
You can easily create custom policies and set<br />
internal and external sharing criteria, while, at<br />
the site level, you set external sharing levels for<br />
all people in your organisation, existing and new<br />
guests or anyone; apply default sharing links<br />
and permissions; and set guest access expiration<br />
times in days. Policies are a very powerful<br />
feature as, if any action violates them,<br />
administrators will receive an alert and an<br />
option to approve or fix them.<br />
SharePoint site and OneDrive account<br />
exploration reveals all entities and their applied<br />
policy, while colour-coded icons show if they are<br />
compliant. Further icons highlight if they have<br />
items with anonymous access granted, those<br />
that have organisation-wide access and those<br />
with external user access permitted.<br />
Click the quick actions button and you will then<br />
be presented with five of the most powerful<br />
features of this service. With no more than three<br />
clicks, you can set an external sharing level for a<br />
Share-Point site or OneDrive account, clean up<br />
orphaned users, remove 'Everyone' permissions,<br />
revoke user or group access or set site<br />
permissions. There's much more, as 365<br />
Permission Manager presents a 'To Do' list, with<br />
all policy violations that require your attention.<br />
The list can be filtered and, with one click, you<br />
can either approve the violation or fix it: you can<br />
fix site settings or 365 Permission Manager can<br />
automatically remove user access.<br />
As you'd expect, there are plenty of reporting<br />
tools provided, with options to generate ones for<br />
full site permissions, user and group access, and<br />
also external access. An activity log provides<br />
essential auditing for all administrative activities<br />
and the portal generates daily alert summaries,<br />
which can be sent to multiple recipients.<br />
MS365 rights management presents many<br />
pain points, as it is far too easy for users to<br />
share files across this platform and so difficult<br />
for administrators to stay in control.<br />
Hornetsecurity's 365 Permission Manager<br />
brings order to this rights chaos and gives<br />
administrators the power to effortlessly enforce<br />
policy compliance and ensure access to critical<br />
data is tightly locked down. <strong>NC</strong><br />
Product: 365 Permission Manager<br />
Supplier: Hornetsecurity<br />
Web site: www.hornetsecurity.com<br />
Tel: +44 (0) 203 0869 833<br />
Sales: sales@hornetsecurity.com<br />
Contact Hornetsecurity for pricing<br />
18 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
PLEASE MAKE YOUR NOMINATIONS<br />
Nominations are now open for the Network Computing Awards of <strong>2024</strong>. We<br />
invite you - the readers of Network Computing - to tell us which companies,<br />
products and individuals have most impressed you. After nominations have<br />
closed and been counted the finalists will be revealed.<br />
NOMINATE NOW AT:<br />
WWW.NETWORKCOMPUTINGAWARDS.CO.UK<br />
ATTENTION VENDORS:<br />
In addition to the nominating/voting categories, the Awards provide opportunities<br />
for impressive work and impressive solutions to be recognised by a Judge. You can<br />
enter your customer success stories for the NETWORK PROJECT OF THE YEAR<br />
by sending in case studies. Also, you can ensure that your chosen solutions<br />
become finalists for the BE<strong>NC</strong>H TESTED PRODUCT OF THE YEAR by booking<br />
them to be independently reviewed for Network Computing.<br />
There are also opportunities to get involved with the Awards as a sponsor.<br />
For help with any of the above contact dave.bonner@btc.co.uk<br />
Sponsored by:
OPINION: NETWORK INTEGRATION<br />
THE IMPORTA<strong>NC</strong>E OF INTEGRATION FOR YOUR NETWORK<br />
CHRIS MCKIE, VP PRODUCT MARKETING SECURITY AND NETWORKING SOLUTIONS AT KASEYA,<br />
OFFERS A GUIDE TO NAVIGATING THE COMPLEXITY OF MODERN NETWORKS<br />
The world of networking has changed<br />
rapidly, along with the dynamic evolution<br />
of IT as a whole. Hybrid environments,<br />
spanning on-premises and the cloud, have<br />
become the new norm, posing significant<br />
challenges for network managers. Company<br />
networks are becoming increasingly difficult to<br />
manage, monitor and secure. And, because<br />
hardware refresh cycles in networking are<br />
traditionally slow, organisations can end up<br />
with numerous disparate components,<br />
environments and management tools, all<br />
adding to the infrastructure complexity.<br />
KEY CHALLENGES FACED BY<br />
NETWORK MANAGERS<br />
The traditional contrast of cloud versus onpremises<br />
no longer holds in today's diverse<br />
network environments. Most organisations'<br />
networks no longer fall into the binary<br />
categories of cloud or on-premise; instead, they<br />
combine a bit of everything. The widespread<br />
adoption of hybrid infrastructures, driven by<br />
business performance and security<br />
considerations, means that organisations must<br />
now navigate a hugely complex mix of cloud<br />
and on-premise network components.<br />
Moreover, post-pandemic, the global work<br />
landscape has largely shifted to a hybrid<br />
model, where employees expect to seamlessly<br />
transition between remote and office-based<br />
work. Organisations must therefore have the<br />
ability to connect everyone, everywhere, at any<br />
time to their essential workflows.<br />
This trend of employees connecting from<br />
outside the traditional network boundaries<br />
brings with it some obvious security issues.<br />
The rise of zero trust architectures and<br />
Secure Access Service Edge (SASE) solutions<br />
has addressed some of these concerns,<br />
redefining how organisations securely<br />
connect remote workers.<br />
Even more is changing on the network edge.<br />
Growing numbers of smart, IoT and<br />
operational technology (OT) devices process<br />
data locally at the periphery of the network - for<br />
example, to prevent connectivity or latency<br />
issues. Edge-as-a-Service (EaaS) is starting to<br />
attract interest and will only accelerate the<br />
adoption of edge computing and related<br />
services, presenting additional headaches in<br />
terms of security and access management.<br />
Finally, hardware upgrades have always been<br />
slow in networking. Network components are<br />
usually added as one-off purchases as<br />
required, with components typically only<br />
upgraded every 3-5 years. This means many<br />
organisations rely on very heterogenous<br />
environments that incorporate solutions from<br />
several different vendors.<br />
With so many different networking and<br />
management tools as well as different support<br />
levels for each of these components, it is no<br />
wonder that there is little integration across the<br />
typical company network.<br />
However, today's complex network<br />
requirements demand a comprehensive<br />
approach to visibility, security, network<br />
architecture, manageability and technology<br />
adoption. Ultimately, for network managers to<br />
remain efficient, they will have no choice but to<br />
consolidate, to integrate and to look at the<br />
network from a holistic perspective.<br />
THE ROLE OF INTEGRATION<br />
Integration emerges as the single solution to the<br />
challenges posed by complex networks.<br />
Bringing together the various network and IT<br />
management applications in one single<br />
management console can streamline<br />
workflows, enhance efficiency and provide<br />
valuable insights for network managers.<br />
For instance, integrating the network with a<br />
Professional Services Automation (PSA) tool can<br />
significantly speed up troubleshooting by<br />
directly tying network events to ticketing<br />
processes. Troubleshooting when something<br />
goes wrong in the company network is<br />
traditionally disjointed, with managers having to<br />
move from the network console to the ticketing<br />
system and back. Integration removes these<br />
unnecessary additional steps and streamlines<br />
problem solving and recovery.<br />
Similarly, integrating live network information<br />
with Remote Monitoring and Management<br />
(RMM) tools enables remote device<br />
management across the network, reducing the<br />
need for back-and-forth interactions. With<br />
shadow IT still a challenge for many<br />
organisations, there is another advantage to<br />
this integration: tools in RMM can be used for<br />
20 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: NETWORK INTEGRATION<br />
automatic network discovery, while live<br />
network performance data monitoring<br />
ensures networks are running smoothly.<br />
Additionally, integrating network<br />
information with documentation systems<br />
aids in compliance and auditing processes,<br />
while promoting automation and saving<br />
valuable time.<br />
Application Programming Interfaces (APIs)<br />
can be used to enable such bridging, but<br />
keeping all the involved applications<br />
synchronised and updated is crucial for<br />
seamless functionality. If done well,<br />
integration of these network-related tools<br />
allows businesses to streamline multiple<br />
workflows according to their needs.<br />
THE IMPORTA<strong>NC</strong>E OF SASE<br />
In the era of evolving network challenges,<br />
SASE solutions play a key part in building an<br />
integrated, secure and easily manageable<br />
network. Ensuring the security of a company<br />
network has always been a challenge; even<br />
moreso now the network edge as we know it<br />
no longer exists. With cyber-attacks growing<br />
in number and sophistication, businesses<br />
must implement robust network security to<br />
defend their sensitive data against<br />
ransomware, unauthorised access, data<br />
breaches and other risks. Remote users need<br />
as much, if not more, protection as those<br />
working in the office.<br />
SASE solutions have been a game-changer<br />
as they integrate security right into the<br />
network itself. They essentially provide nextgen<br />
firewall functionality in the cloud,<br />
offering granular controls for web traffic in<br />
distributed work environments. This<br />
technology is fast replacing VPNs, ensuring<br />
secure connectivity regardless of user<br />
location and extending networking and<br />
security capabilities beyond the traditional<br />
network boundaries.<br />
This gives organisations a lot more<br />
flexibility in how they implement security<br />
policies such as zero trust, content filtering<br />
and threat prevention across locations and<br />
remote users.<br />
The many benefits of SASE integration<br />
include efficient policy enforcement,<br />
simplified network management and<br />
scalability. What's more, SASE not only<br />
addresses current network complexities but<br />
also offers the flexibility to adapt to changing<br />
and future business needs - paving the way<br />
to a future-proof infrastructure.<br />
BENEFITS OF NETWORK<br />
INTEGRATION<br />
The integration of network components and<br />
solutions brings numerous benefits. One key<br />
advantage is that network issues, such as<br />
latency or blackouts, can be resolved much<br />
faster. With the necessary information at their<br />
fingertips thanks to seamless links with their<br />
ticketing system and RMM platform, network<br />
managers can pinpoint the source of any<br />
issue more quickly and significantly speed up<br />
mean time to resolution.<br />
In addition, issues can be automatically<br />
routed to the right person for prompt<br />
resolution, while easier and more transparent<br />
performance monitoring helps prevent<br />
problems from arising in the first place.<br />
Policy enforcement is more effective too,<br />
with integrated devices facilitating the<br />
consistent application of rules and access<br />
restrictions across the entire infrastructure,<br />
including edge devices. Updates, patches<br />
and upgrades can also be streamlined<br />
through tight integration, allowing for better<br />
control over their timing and therefore<br />
minimising impact on users and the network.<br />
Plus, the ability to monitor and analyse<br />
network traffic continually enables network<br />
managers to optimise data flows and<br />
balance loads more effectively.<br />
Another benefit of network integration is the<br />
ability to consolidate. SASE, for example,<br />
eliminates the need for multiple VPNs,<br />
potentially allowing downsizing of firewalls<br />
and the removal of redundant, standalone<br />
network security devices. The fact that SASE<br />
platforms are cloud managed simplifies<br />
network administration even further.<br />
Finally, as network needs change, a<br />
streamlined setup with SASE allows<br />
businesses to scale fast and adjust their<br />
infrastructure as needed.<br />
LOOKING AHEAD<br />
Business networks will continue to evolve in<br />
response to changing business needs and<br />
technological advancements. For network<br />
architects, this means they will have to<br />
continually reassess and update their<br />
strategies. Increased integration and a<br />
holistic approach are the keys to staying<br />
ahead of networking requirements.<br />
Integration is not only the answer to<br />
addressing the new complexities of the<br />
hybrid world - it will also be the linchpin for<br />
the future of network management. By<br />
embracing it and leveraging technologies<br />
like SASE, organisations can not only<br />
navigate current challenges but also position<br />
themselves for future success in an everevolving<br />
digital era. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 21
OPINION: QUANTUM TECHNOLOGY<br />
THE RISE OF QUANTUM ECOSYSTEMS<br />
IN <strong>2024</strong> AND BEYOND<br />
DR. PHILIP KRANTZ, QUANTUM ENGINEERING SOLUTIONS<br />
EXPERT AT KEYSIGHT, EXPLORES THE POTENTIAL OF QUANTUM<br />
TECHNOLOGY FOR THE YEAR AHEAD<br />
Quantum technology allows us to<br />
harness the fundamental laws of<br />
quantum mechanics to solve<br />
problems that are either intractable or even<br />
impossible using today's technology. Areas<br />
where quantum technology can offer<br />
profound impact include complex<br />
simulations and computations, secure<br />
communication, and more powerful<br />
imaging and sensor techniques.<br />
Governments and industries have<br />
recognised the necessity to invest in<br />
quantum research and early adoption of<br />
quantum-technological applications to<br />
ensure competitiveness and to be prepared<br />
for any disruptive advancements within the<br />
scope of their interests.<br />
As a response to the steady scientific<br />
progress within the quantum community<br />
during the past decades, many branches of<br />
quantum technologies have moved out of<br />
university labs into start-up ventures, hightech<br />
companies, as well as military.<br />
Consequently, the community has<br />
broadened from mainly being explored by<br />
quantum physicists to requiring a wide<br />
blend of expertise and backgrounds,<br />
ranging from various engineering<br />
disciplines to including business<br />
professionals, investors, and entrepreneurs.<br />
As part of this transition, academic and<br />
industrial quantum hubs, quantum<br />
incubators, as well as local and national<br />
quantum ecosystems have risen during the<br />
past years - most aiming to build up and<br />
foster a workforce composition required for<br />
long-term success. To this end, there has<br />
been an increased need to attract talent,<br />
both from outside these ecosystems as well<br />
as training local students and engineers, to<br />
enable sustainable technological growth.<br />
22 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: QUANTUM TECHNOLOGY<br />
In this article, we will discuss a few<br />
ongoing trends we are seeing when it<br />
comes to building up quantum<br />
ecosystems.<br />
NATIONAL QUANTUM<br />
TECHNOLOGY INITIATIVES<br />
Building up world-leading expertise in<br />
quantum technologies takes a long time,<br />
requires substantial investment, and is<br />
often facilitated through an already<br />
existing academic quantum research<br />
community. Quantum ecosystems, i.e.<br />
collaborative environments of academic<br />
and industrial quantum research teams,<br />
are often created to support mutual<br />
interests in terms of both attracting the<br />
workforce, as well as synergistically<br />
benefiting from other members' strengths<br />
and competencies.<br />
These local quantum ecosystems expand<br />
both organically via education and<br />
inorganically through attracting workforce<br />
and industries from other places to get<br />
established within the ecosystem.<br />
Therefore, access to state-of-the-art<br />
technology, beneficial start-up culture,<br />
and world-leading research teams are all<br />
examples of important factors needed for<br />
ecosystems to become successful and<br />
self-sustaining.<br />
Oftentimes, however, ecosystems<br />
experience "knowledge gaps" prohibiting<br />
them from making fast progress on certain<br />
technologies. One example is when the<br />
capability to produce high-quality quantum<br />
processor units (QPUs) is missing. For<br />
instance, due to the lack of an advanced<br />
and dedicated cleanroom facility. One<br />
common trend that we often see is that<br />
such ecosystems procure a commercial<br />
quantum processor (sometimes also<br />
including all required cryogenics and<br />
quantum control systems) containing the<br />
qubit modality (or modalities) that the<br />
country seeks to pursue.<br />
This way, local experience in quantum<br />
control and algorithms can be gained in<br />
parallel with the development of local<br />
cleanroom fabrication processes and the<br />
exploration of optimal qubit designs.<br />
During the past years, several<br />
commercial alternatives for QPUs as well<br />
as parametric amplifiers have entered<br />
the market.<br />
QUANTUM-AS-A-SERVICE (QAAS)<br />
As mentioned, getting started in quantum<br />
technology requires time, money, and<br />
manpower. This has yielded an increased<br />
market need for quantum service<br />
providers to offer quantum-as-a-service<br />
(QaaS), including, for instance, remote<br />
cloud access to quantum processors, test<br />
beds for device characterisation, as well<br />
as foundries that offer fabrication services<br />
to clients.<br />
This way, quantum research teams have<br />
the option to strategically outsource<br />
parts of their operation to a third-party<br />
QaaS provider, which can have an<br />
important impact for startups entering<br />
the quantum ecosystem with limited time<br />
and resources.<br />
While this is currently happening on a<br />
very limited scale, interest in QaaS will<br />
increase in <strong>2024</strong> and beyond. In<br />
addition, we foresee that QaaS providers<br />
may in the long run enter a role to<br />
standardise device operation,<br />
characterisation, and fabrication which<br />
allows for future benchmarking of both<br />
quantum processors as well as qubitadjacent<br />
technologies.<br />
QUANTUM IN THE CLASSROOM<br />
Another ongoing trend we are seeing is<br />
an increased need for a qualified and<br />
diverse workforce as countries ramp up<br />
their national quantum initiatives. To<br />
address this bottleneck, we foresee that<br />
the number of dedicated higher<br />
education programs focusing on quantum<br />
technologies will continue to increase in<br />
<strong>2024</strong> and beyond.<br />
Oftentimes, these programs are<br />
constructed in close collaboration with<br />
industrial partners, with access to stateof-the-art<br />
quantum control and readout<br />
technologies, so that students acquire<br />
relevant and up-to-date skills,<br />
preparing them for future quantum<br />
careers. There are also numerous<br />
industrial internships and mentorship<br />
programs that can help guide students<br />
in their future career choices.<br />
In addition to pure technical programs,<br />
there will also be an increased focus on<br />
quantum technology among business<br />
schools and entrepreneurship programs.<br />
This comes from an increased drive for<br />
business professionals to obtain basic<br />
training in quantum technology, helping<br />
them to be competitive in the highly<br />
dynamic quantum community.<br />
GENDER EQUALITY IN QUANTUM<br />
Another very positive and uprising trend is<br />
the many ongoing efforts on gender<br />
equality, aiming at increasing the ratio of<br />
women working in quantum technologies.<br />
Having access to a diversified and<br />
gender-balanced workforce is important<br />
for any industry and quantum<br />
technologies are certainly no exception.<br />
With the worldwide advancement in<br />
quantum technology research and<br />
development, the community is expanding<br />
beyond the academic realm and into<br />
startups, high-tech companies, and the<br />
military. This will give rise to quantum<br />
hubs, incubators, and local and national<br />
ecosystems all trying to build a workforce<br />
able to seize the quantum opportunity.<br />
Solving the talent gap is critical to<br />
realising the potential of quantum in the<br />
coming years and decades. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 23
OPINION: RETAIL INFRASTRUCTURE<br />
RETAIL INFRASTRUCTURE FIT FOR TODAY AND TOMORROW<br />
THE CHALLENGE OF DIGITAL TRANSFORMATION IN THE RETAIL SECTOR REQUIRES A RESILIENT<br />
AND ADAPTABLE IT INFRASTRUCTURE, ACCORDING TO HENK IJSPEERD, SALES DIRECTOR EMEA<br />
STRATEGIC SEGMENT RETAIL, AT VERTIV<br />
In the ever-evolving landscape of retail, the<br />
call for transformation is not just a<br />
buzzword but a strategic necessity, one that<br />
can make or break any business across the<br />
sector. The intricate interplay of consumer<br />
behaviours, driven by the unstoppable surge<br />
of the digital revolution and accentuated by<br />
global events such as the never-to-be<br />
forgotten COVID-19 pandemic, highlights<br />
the need for a profound and comprehensive<br />
re-evaluation of IT infrastructure.<br />
However, the task is far from simple - it's a<br />
complex landscape characterised by<br />
intricacies and challenges. Retail<br />
infrastructure should be more than a swift<br />
adaptation to immediate needs; retailers<br />
should also look ahead, consider formidable<br />
trends that loom large and navigate change<br />
armed with foresight and strategic acumen.<br />
NAVIGATING THE DIGITAL<br />
REVOLUTION<br />
The foundation of the retail sector is shifting<br />
as consumer preferences continue to pivot<br />
towards digital platforms. The impact of the<br />
pandemic accelerated this shift, pushing<br />
retailers to adapt to online models to meet<br />
consumer demands far more quickly than<br />
planned. However, this move is not just a<br />
reaction to events like COVID; it reflects a<br />
broader trend in consumer behaviour which<br />
will stand the test of time as people enjoy the<br />
speed and convenience of online shopping.<br />
The relentless pace of technological<br />
advancements - such as Artificial Intelligence<br />
(AI), Virtual Reality (VR) and Augmented<br />
Reality (AR) - add another layer of<br />
complexity, requiring retailers to be agile and<br />
innovative in adopting technologies that<br />
enhance the customer experience. Success in<br />
this dynamic environment hinges on retailers'<br />
ability to blend short-term responsiveness<br />
with a visionary outlook, ensuring they not<br />
only meet today's needs but also remain<br />
adaptive to the digital trends shaping the<br />
future of retail.<br />
Central to the success of businesses in the<br />
sector is the achievement of consistency<br />
across diverse channels. The line between<br />
online and offline experiences continues to<br />
blur, necessitating a seamless transition<br />
between virtual and physical interactions with<br />
brands. The optimisation of systems,<br />
streamlined logistics and maintaining<br />
consistent stock levels all emerge as integral<br />
components of ensuring a positive and<br />
consistent customer experience. Consumers<br />
are no longer satisfied with good customer<br />
service, they expect to be delighted.<br />
REGULATORY CHALLENGES AND<br />
ENVIRONMENTAL CONSIDERATIONS<br />
For retailers, the journey of keeping the retail<br />
infrastructure fit for purpose is marked with<br />
regulatory challenges, especially in regions<br />
facing power scarcity such as Ireland and the<br />
Netherlands. Compliance with local and<br />
international environmental regulations<br />
further amplifies the intricacies of this process.<br />
Retailers must navigate a complex landscape<br />
of rules and standards while striving to build<br />
an efficient and resilient infrastructure.<br />
Ongoing success for retailers demands not<br />
only an acute understanding of the current<br />
regulatory landscape but also an ability to<br />
strategically position infrastructure in<br />
alignment with emerging environmental<br />
standards and the latest technology<br />
24 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: RETAIL INFRASTRUCTURE<br />
innovations. This dual focus ensures not just<br />
compliance but a resilient and forwardlooking<br />
foundation capable of withstanding<br />
the regulatory changes that lie ahead.<br />
INFRASTRUCTURE PRESSURES IN<br />
THE DIGITAL ERA<br />
The surge in digital transactions and the<br />
growing reliance on technology bring a<br />
host of considerations for retail<br />
infrastructure. Storage demands,<br />
especially for vast amounts of data like<br />
CCTV images, coupled with the<br />
intricacies of delivering personalised<br />
customer experiences, present a delicate<br />
balancing act. Achieving standardisation<br />
across diverse regions is crucial, yet<br />
predicting infrastructure requirements in<br />
an era of constant technological evolution<br />
poses a formidable challenge.<br />
Beyond the digital sphere, the physical<br />
spaces of warehouses and stores pose<br />
unique challenges too. Physical security of<br />
warehouses, temperature variations in<br />
different store locations and diverse<br />
environmental conditions necessitate<br />
infrastructure solutions that are adaptable<br />
and resilient. Understanding and<br />
anticipating customer expectations in the<br />
coming years are paramount in crafting<br />
infrastructure that stands resilient against<br />
the test of time.<br />
CONTRIBUTING TO GRID STABILITY<br />
In the face of escalating pressure on<br />
energy grids, retailers also assume a<br />
crucial role beyond consumption - they<br />
become potential contributors to grid<br />
stability. The implementation of scalable<br />
Uninterruptible Power Supply (UPS)<br />
solutions with dynamic grid support<br />
features, the integration of renewable<br />
energy sources like solar panels and wind<br />
turbines, and the strategic storage of<br />
energy in batteries (Battery Energy Storage<br />
Solutions; BESS) extend beyond business<br />
continuity measures.<br />
These initiatives play a pivotal role in<br />
mitigating the strain on the grid,<br />
transforming retailers into active<br />
participants in the broader energy<br />
ecosystem. By embracing more sustainable<br />
energy practices and acting as responsible<br />
contributors to grid stability, retailers not<br />
only fortify their own infrastructure against<br />
disruptions but also contribute to the<br />
overall resilience, and help to reduce the<br />
carbon footprint of the energy infrastructure<br />
that underpins modern commerce. This<br />
dual impact underscores the integral role<br />
retailers play in shaping a more robust and<br />
sustainable future.<br />
STRATEGIC PLANNING FOR LONG-<br />
TERM RESILIE<strong>NC</strong>E<br />
At the core of future-proofing retail<br />
infrastructure lies strategic, long-term<br />
planning. The evolving retail landscape<br />
demands not just adaptability to current<br />
challenges but a proactive stance towards<br />
emerging trends. Scalable solutions that<br />
flexibly accommodate future requirements,<br />
coupled with a comprehensive<br />
understanding of regional and global<br />
dynamics, are essential for resilience in the<br />
face of uncertainty and change.<br />
Providers of critical infrastructure solutions<br />
play a pivotal role in empowering retailers<br />
for the digital age. Going beyond being<br />
solution providers, they must also be<br />
strategic partners committed to delivering<br />
the continuous availability, reliability and<br />
efficiency of essential elements in evolving<br />
retail settings. Partners with a<br />
comprehensive approach - from innovation<br />
and design to manufacturing and ongoing<br />
support - will provide a seamless and<br />
efficient experience throughout the<br />
infrastructure life cycle.<br />
Close collaboration with retailers to craft<br />
bespoke strategies that align with their<br />
unique requirements, such as the meticulous<br />
creation of comprehensive data profiles for<br />
each customer, will make the critical<br />
difference. This empowers retailers to gain<br />
invaluable insights and make informed,<br />
data-driven decisions to propel their<br />
businesses forward.<br />
One element that will help is if your<br />
partner has proven expertise in the realm of<br />
Artificial Intelligence (AI). This invaluable<br />
knowledge will strategically place<br />
organisations at the forefront of the<br />
imminent retail revolution, whereAI is<br />
poised to thrive and realise its full potential.<br />
FIT FOR THE FUTURE<br />
Considering the dynamic interplay of<br />
consumer expectations, technological<br />
evolution and regulatory landscapes, retail<br />
infrastructure transcends the realm of choice<br />
- it stands as a strategic imperative. The<br />
retail landscape, characterised by perpetual<br />
change, demands a proactive approach<br />
from retailers. It's not enough to react to<br />
current challenges; retailers must envision<br />
and enact an infrastructure capable of<br />
navigating the uncertainties that lie ahead.<br />
The journey towards implementing the<br />
right infrastructure is not a one-time event;<br />
it's an enduring commitment. It involves<br />
creating a resilient and adaptable IT<br />
infrastructure that can not only withstand<br />
disruptions but also leverage emerging<br />
opportunities, harnessing the power of<br />
digital infrastructure partners. Through this<br />
ongoing commitment, retailers can<br />
position themselves not just as entities in<br />
the present retail ecosystem but as<br />
architects shaping a brighter, more<br />
sustainable future for the entire industry.<br />
In embracing this continuous journey of<br />
evolution, retailers strengthen their<br />
relevance, ensuring that their<br />
infrastructure is not only responsive to<br />
current needs but also anticipatory of the<br />
transformative trends shaping the retail<br />
industry of tomorrow. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 25
SECURITY UPDATE<br />
BECOMING SECURE BY DESIGN<br />
CHIP DANIELS, VP, GOVERNMENT AFFAIRS AT SOLARWINDS, OUTLINES THE ROLE OF PUBLIC-<br />
PRIVATE PARTNERSHIPS IN PROTECTING OUR CYBERINFRASTRUCTURE<br />
Modern software development has<br />
made our digital world more<br />
interconnected than ever, driven<br />
by the shift to the cloud and the increased<br />
use of microservices and open-source<br />
code. The interdependent nature of our<br />
modern digital infrastructure means cyber<br />
threats targeting any one software<br />
company or product can, unfortunately,<br />
have a broad impact across the industry.<br />
Therefore, the sector must change its<br />
approach to cybersecurity and come<br />
together to better defend against mounting<br />
cyber threats.<br />
The industry must work collaboratively<br />
and in partnership with governments to<br />
share information about threats,<br />
mitigation methods, and prevention steps.<br />
While some government agencies have<br />
taken a leading role in championing this<br />
type of collaboration, there is still work to<br />
be done.<br />
To support collaboration among the<br />
public and private sectors, SolarWinds<br />
recently hosted a panel discussion in<br />
Washington D.C. featuring SolarWinds<br />
President and CEO Sudhakar<br />
Ramakrishna in conjunction with<br />
Congressman Darrell Issa (R-CA),<br />
Congressman Raja Krishnamoorthi (D-IL),<br />
and CISA Executive Assistant Director for<br />
Cybersecurity Eric Goldstein.<br />
The discussion highlighted several key<br />
ways to help the industry become Secure by<br />
Design, including the role of collaboration<br />
in creating a strong defence, supporting<br />
responsible disclosure to increase<br />
information sharing, and ensuring the<br />
industry invests in the people skills needed<br />
to defend against the newest threats.<br />
COLLABORATION FOR A STRONG<br />
DEFE<strong>NC</strong>E<br />
The role of collaboration is critical in<br />
protecting the customers of private<br />
companies, as well as defending nations<br />
against foreign adversaries. According to<br />
Goldstein, CISA is leading the<br />
collaborative effort in public-private<br />
partnerships to "ensure that we are seeing<br />
threats before they manifest on our nation's<br />
networks and taking action in response."<br />
And to support CISA's initiative in<br />
promoting widespread collaboration, "we<br />
need a model where government, industry,<br />
and our international partners are<br />
seamlessly and frictionlessly working<br />
together day in and day out to combat the<br />
threats that we're seeing today and getting<br />
ahead of the ones that we're seeing<br />
tomorrow." Companies can contribute to<br />
the industry's collective defence posture by<br />
actively participating in transparent<br />
information sharing.<br />
SUPPORTING VICTIMS IN<br />
RESPONSIBLE DISCLOSURE<br />
The practice of reporting security<br />
vulnerabilities and threats in a responsible<br />
way is critical to ensure that the sector has<br />
information about new attacks. The<br />
cornerstone of responsible disclosure is<br />
ensuring that fixes or patches are available<br />
when the issue is announced in order to<br />
limit the risk of malicious actors exploiting<br />
issues before they are fixed.<br />
Governments should further incentivise<br />
companies for responsible disclosure and<br />
information sharing. Unfortunately, this is<br />
not always the case. Given the risk that<br />
companies can be victim-shamed in the<br />
news media and even face punitive<br />
measures after<br />
disclosure, there is<br />
often a greater<br />
incentive for companies<br />
not to disclose. Ideally,<br />
the industry would foster<br />
an environment where<br />
victims can share their<br />
experiences and learnings<br />
without fear of retribution.<br />
SECURE BY DESIGN: A<br />
PROACTIVE APPROACH<br />
To successfully navigate the<br />
modern threat landscape,<br />
companies must become Secure by<br />
Design in the software development<br />
process. This means integrating security<br />
measures throughout an entire product<br />
lifecycle from inception to deployment.<br />
Ramakrishna shares an analogy: "You don't<br />
think about the airbag in a car after the car<br />
is manufactured and on the road. You think<br />
about the safety of that as you're<br />
designing it."<br />
Similarly, Secure by Design incorporates<br />
security as a foundational and inherent<br />
component of systems and applications. As<br />
a result, developers can minimise the<br />
attack surface and proactively identify and<br />
address vulnerabilities.<br />
Many governments are already refining<br />
security guidelines. In the US, for<br />
example, this includes the generation of a<br />
Software Bill of Materials (SBOM), which<br />
26 NETWORKcomputing FEBUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
SECURITY UPDATE<br />
is like a<br />
receipt of each component,<br />
library, tool, and process developers use<br />
in the build process.<br />
SBOMs are a critical step for improving<br />
the security of software products by<br />
providing visibility into their composition.<br />
According to Krishnamoorthi, "We need<br />
radical disclosure and radical sharing to<br />
make sure that everybody can learn from<br />
the attacks that are going on." As part of a<br />
more significant, nationwide Secure by<br />
Design initiative, SBOMs introduce a new<br />
standard for transparency and openness in<br />
the industry.<br />
BUILDING THE SKILLS NEEDED<br />
With more than 3.4 million open positions<br />
in the field, the demand for cybersecurity<br />
experts is higher than ever. This results<br />
from a<br />
lack of<br />
qualified<br />
individuals available<br />
to fill the roles. During the panel,<br />
Krishnamoorthi recommended allocating<br />
additional skills and vocational training<br />
resources to solve this issue. This would<br />
require increased incentives and the<br />
implementation of training in high schools<br />
and community colleges.<br />
To accomplish collaboration and<br />
transparency, the government needs more<br />
support from the private sector.<br />
Ramakrishna suggested that software<br />
companies allocate the equivalent of one<br />
trained, full-time employee to support<br />
information sharing across individuals,<br />
companies, and government agencies.<br />
This designated liaison would be a<br />
champion<br />
for working collaboratively<br />
and help ensure robust public-private<br />
partnerships amid the evolving threat<br />
landscape.<br />
WHY IT MATTERS<br />
Highly sophisticated nation-state hackers<br />
pose significant threats to the security of<br />
global digital infrastructure. By working<br />
together across the industry, we can build a<br />
resilient defence against cyberattacks and<br />
protect our digital ecosystem. Cyber<br />
resilience is not just about preventing<br />
cyberattacks but recovering quickly - and<br />
having a plan to identify and contain the<br />
attack. It is a shared responsibility<br />
requiring the cooperation of governments,<br />
businesses, and individuals. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 27
OPINION: IDENTITY MANAGEMENT<br />
AVOIDING AN IDENTITY CRISIS<br />
THOMAS MULLER-MARTIN, GLOBAL PARTNER LEAD, OMADA EXPLAINS WHY THE EVOLUTION OF MODERN<br />
IDENTITY GOVERNA<strong>NC</strong>E AND ADMINISTRATION (IGA) SOLUTIONS IS WORTH YOUR ATTENTION<br />
The field of identity governance and<br />
administration has dramatically changed<br />
in the past several years, driven in large<br />
part by trends like cloud adoption and AI.<br />
These aren't the only significant factors that<br />
have changed the landscape, of course, but<br />
they are the ones we hear of most.<br />
It's also worthwhile to look at subtle shifts that<br />
have occurred in recent years, as they allow<br />
organisations to calculate their ROI faster,<br />
illustrate consistent business value to their<br />
stakeholders, and keep the solution simple to<br />
operate, agile to extend, and conveniently<br />
scalable. Implementing IGA fast and<br />
successfully requires a modern<br />
implementation strategy.<br />
BUILT-IN PROCESSES HAVE IMPROVED<br />
In the past, customers often created highly<br />
customised onboarding, transfer and<br />
offboarding routines. Request access and<br />
approvals were different at every organisation.<br />
You saw similar trends with periodic reviews of<br />
access (recertifications), management of<br />
contractors, and other IGA-related workflows.<br />
But today, more organisations are looking for<br />
more universal approaches that don't add<br />
extra work for employees but still help<br />
maintain compliance.<br />
There are more solutions today with more<br />
mature built-in processes than they had in the<br />
past. They're far more robust, more adaptable<br />
and easier to operate. Typical use cases like<br />
generating account names according to the<br />
company standard, sending individual emails<br />
or defining individual approval patterns are<br />
now highly configurable. Some of these<br />
processes may have required code-based<br />
customisation before; now those coding tasks<br />
have shifted to business-focused advisory. In<br />
28 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: IDENTITY MANAGEMENT<br />
other words, whereas in the past IAM projects<br />
were seen as pure technical plays to shift data<br />
from A to B, now they can be positioned as a<br />
solution to a business need, not just a tool.<br />
As more organisations use the configured<br />
out-of-the-box standard, innovation can today<br />
focus on the flexibility of the core product<br />
instead of the error-prine and high-cost codebased<br />
customisation.<br />
SELF-SERVICE OPTIONS HAVE<br />
EXPANDED AS USER BASE GROWS<br />
It used to be that IGA was a domain that<br />
required specialists - a core team of two to five<br />
specialists who were tasked with keeping your<br />
organisation compliant. That approach has<br />
changed, largely out of necessity, given the<br />
number of people and roles within a typical<br />
organisation today. More people are using<br />
IGA solutions in most companies, from<br />
requesting access to recertifying and from<br />
creating role definitions to onboarding<br />
employees. To meet these needs, we've seen<br />
many IGA offerings evolve to be able to<br />
distribute tasks in an easier way, throughout<br />
the entire organisation.<br />
Operations are changing faster than in the<br />
past, and the exposure of individuals in the<br />
business has continuously risen. As the<br />
operation of the solution gets less complex and<br />
fewer tickets go to the service desk and<br />
operations team, they can focus on<br />
broadening the scope of the IGA solution<br />
(connecting to more systems), to go deeper<br />
than before (segregation of duties, risk<br />
concepts, roles) or to think outside of the box<br />
of IGA to integrations with privileged access<br />
management (PAM), customer identity and<br />
access management (CIAM), security<br />
information and event management (SIEM)<br />
and other identity-related solutions.<br />
MORE SYSTEMS, MORE IDENTITIES<br />
An average enterprise might be using as many<br />
as 130 different SaaS apps and all of these<br />
apps are also creating new digital identities.<br />
It's no wonder, then, that the number of<br />
identities that need to be managed has<br />
continuously risen in the last 10 years. With<br />
more cross-organisational collaboration, the<br />
adoption of cloud services and remote work,<br />
this trend is on an upward trajectory.<br />
The number of relations between identities<br />
and systems is exponentially increasing. Larger<br />
enterprises have many more connections than<br />
smaller ones. Additionally, not all identities and<br />
systems are under direct control anymore. For<br />
example, suppliers and contractors are<br />
typically not managed by the HR system, and<br />
your employees have work-related access to<br />
systems that you don't own.<br />
THE RISE OF INTEGRATIONS<br />
It was common in the past to see the individual<br />
identity management solution as an isolated<br />
element of your cybersecurity strategy. But<br />
things have changed, such as the rise of<br />
visionary Identity Fabric strategies. They<br />
represent a forward-looking approach to IGA,<br />
aiming to create a unified, flexible and secure<br />
identity management framework that aligns<br />
with an organisation's current and future<br />
needs. These strategies often leverage modern<br />
technologies like AI, automation and analytics<br />
to enhance identity governance and security.<br />
An emphasis on zero trust (assuming every<br />
person or device is not trustworthy until<br />
verified) is another change. It's become<br />
increasingly apparent that the many pieces of<br />
your identity infrastructure - including multifactor<br />
authentication (MFA), PAM, CIAM and<br />
IGA - need to collaborate in a seamless way.<br />
A typical enterprise has solutions by various<br />
vendors, ongoing transformation projects and<br />
extensions to the existing set of functionalities.<br />
IGA plays an essential role in this scenario, as<br />
it is the integration layer in many regards,<br />
allowing the other solutions to be<br />
more effective.<br />
IGA IN ACTION<br />
As one example, the PAM solution allows<br />
you to protect your securable assets. IGA<br />
allows you to classify those assets, create a<br />
comprehensive risk analysis and define the<br />
list of assets that need to be secured.<br />
Another use case is the deactivation of<br />
accounts triggered by third-party solutions.<br />
For instance, IGA can get the signals about<br />
unexpected user behavior from Microsoft<br />
Threat Protection and disable all personal<br />
and administrative accounts of the<br />
individual within seconds, in a compliant<br />
and auditable manner.<br />
The integration of the company's user<br />
interface for standard IGA tasks, such as<br />
requesting and approving access, is a<br />
third example that's becoming increasingly<br />
relevant. If you are using common user<br />
interfaces for your end users, such as<br />
ServiceNow, you can allow them to<br />
perform their tasks inside the platform<br />
they're familiar with. Creating open APIs<br />
and the availability of interwoven use<br />
cases is key for leveraging your IAM<br />
solutions far better.<br />
IGA AT THE CORE<br />
IGA is the core of modern identity<br />
management ecosystems. You can't fix<br />
today's problems with solution patterns<br />
from a decade ago. You need more of an<br />
advisory mindset with a business focus<br />
instead of a purely technical approach. If<br />
you're aware of the leaps of functionality<br />
that modern IAM solutions have gone<br />
through, you can reduce the effort required<br />
for integration, increase the measurable<br />
business value, achieve a more secure<br />
solution and reduce the long-tail operation<br />
and migration costs that legacy solutions<br />
have. Getting this right will enable you to<br />
leverage mega-trends like AI more<br />
effectively and maximise the value of<br />
identity governance. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 29
OPINION: BACKUPS<br />
BUNGLED BACKUPS<br />
WHY ARE BUSINESSES STILL FAILING TO BACKUP THEIR DATA? JON FIELDING, MANAGING<br />
DIRECTOR, EMEA AT APRICORN, OFFERS SOME INSIGHTS<br />
Abackup strategy is a safety net for<br />
the business and, in the event of a<br />
disaster or a data breach, it can<br />
often determine if a business sinks or<br />
swims. Being able to recover data is vital<br />
to resume normal operations, yet a<br />
growing number of businesses are finding<br />
that they are unable to recover all of their<br />
data when putting that strategy to the test.<br />
A recent poll of 201 security decision<br />
makers found that, of the 90 percent of<br />
businesses that needed to recover<br />
their data at some point over the<br />
past year, only 27 percent were<br />
able to do so, down from 45<br />
percent in 2022, according to the<br />
Apricorn Annual Survey 2023. That<br />
equates to two out of three<br />
businesses losing some of their<br />
data. The main cause of these<br />
failed backups was a lack of robust<br />
backup processes, as identified by<br />
32% of those questioned. The<br />
findings further revealed that<br />
ransomware is on the up, with a<br />
quarter naming this as the main<br />
cause of data breaches, up from 15%<br />
the previous year.<br />
WHY ARE BACKUPS FAILING?<br />
So, given the rise in<br />
ransomware attacks - which<br />
should have prompted users<br />
to double down security and<br />
focused attention on the<br />
importance of data backups -<br />
why are organisations getting<br />
worse at the practice? Part of<br />
the problem comes down to<br />
an increase in manual<br />
processing. Working habits,<br />
namely an increase in remote or mobile<br />
working, have seen more of us resorting<br />
to manually backing up data locally<br />
before then also doing so to a central<br />
location. But while this may be more<br />
convenient it's also more prone to error.<br />
Users need to remember to execute the<br />
backup and to carry out the procedure<br />
correctly, for example.<br />
The same survey uncovered a marked<br />
shift from automated to manual backups,<br />
with only half of those questioned using<br />
an automated approach, whereas that<br />
figure stood at 93 percent in 2022.<br />
Nearly half of businesses (49%) are<br />
backing up manually compared to just 6<br />
percent the year before, so there has been<br />
an extreme swing from one to the other.<br />
Moreover, while only one percent were<br />
backing up to personal storage devices<br />
before, now 16 percent are using these to<br />
provide a local backup facility.<br />
It's important to note that there are<br />
advantages and disadvantages to both<br />
localised and centralised backups, so<br />
doing so manually to a local device isn't<br />
necessarily a bad thing. What's worrying is<br />
that there is a marked decline in those<br />
adopting the 3-2-1 strategy of having at<br />
least three copies of the data, stored on<br />
at least two media, at least one of which<br />
is off-site. In fact, the ideal is to have that<br />
offsite copy air gapped so a personal<br />
storage device such as an encrypted<br />
removable hard drive or USB stick. But the<br />
survey revealed that those companies<br />
backing up to both a central and personal<br />
repository was low, with only 38 percent<br />
doing so regardless of whether they were<br />
using an automated or manual approach.<br />
30 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: BACKUPS<br />
PUT<br />
YOUR BACKUP<br />
PROCESS TO THE TEST<br />
In effect this means that the backup<br />
strategy has been reduced to a single<br />
point of failure - and this doesn't<br />
become apparent until it is put to the<br />
test. What the survey reveals is that not<br />
enough businesses are testing their<br />
backup processes to ensure they are<br />
up to date, robust and able to function<br />
correctly and efficiently. The general<br />
consensus is this should be done at<br />
least once a year but, given that it<br />
should also be tested in the event of<br />
any changes to the digital<br />
environment, i.e. when new users,<br />
applications, or systems are added, or<br />
when there's a procedural change<br />
caused by changes in workflow or<br />
compliance<br />
regulations, the reality is<br />
testing should be more frequent.<br />
Going forward there are some clear<br />
lessons to be learnt here. It's not<br />
enough to be backing up regularly -<br />
that data needs to be held in multiple<br />
locations to provide a belt and braces<br />
approach using the 3-2-1 rule so that,<br />
in the event one backup fails, the<br />
business has other options. It's for this<br />
reason also that you should ensure that<br />
your backup doesn't connect directly to<br />
the live data source, as this can make<br />
it vulnerable to malicious activity.<br />
Ideally, it should be an<br />
automated process, although manual<br />
backups do offer a convenience that is<br />
hard to argue with given the way we<br />
now flexibly work. To safeguard data,<br />
therefore, it should be held on an<br />
encrypted format and, if using<br />
hardware, look for FIPs-level security.<br />
Finally, regularly test that the backup<br />
procedure is fit for purpose and that<br />
data is fully recoverable, otherwise all of<br />
those efforts will be in vain. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 31
OPINION: 5G<br />
THE NEXT GENERATION OF CONNECTIVITY<br />
TODD MUSSMAN, WIRELESS CONNECTIVITY EXPERT AT GTT,<br />
EXPLAINS HOW WE CAN UNOCK THE POTENTIAL OF 5G FIXED<br />
WIRELESS ACCESS (FWA)<br />
In our increasingly crowded market,<br />
businesses across all sectors have to<br />
find ways to gain the competitive<br />
advantage and deliver for their<br />
customers. After all, today's consumer has<br />
higher expectations for the brands that<br />
they interact with than ever before. And, if<br />
these expectations aren't met, they will<br />
search elsewhere.<br />
In fact, according to recent research,<br />
almost one third (32%) of customers<br />
would stop doing business with a<br />
brand they loved after just one<br />
negative experience. For businesses<br />
looking to attract and retain their<br />
customers, there is simply no room<br />
for mistakes.<br />
To keep up with customer demand -<br />
and deliver the best experiences<br />
possible - connectivity is vital. It is the<br />
key to both remaining agile and<br />
ensuring business continuity, regardless<br />
of economic, societal and geopolitical<br />
conditions. It also enables businesses to<br />
scale and protect their operations from<br />
unexpected downtime and keep their<br />
costs in check.<br />
For businesses looking to<br />
boost connectivity,<br />
there are<br />
several<br />
routes<br />
they<br />
could<br />
take.<br />
One<br />
which is currently garnering much<br />
industry attention is 5G Fixed Wireless<br />
Access (FWA). This technology - which<br />
provides stable, high-speed internet -<br />
offers a high-performance, reliable<br />
answer for businesses looking to meet<br />
customer expectations and remain agile,<br />
no matter what.<br />
GAME-CHANGING TECHNOLOGY<br />
FWA is a type of 5G technology that<br />
relies on radio waves to broadcast highspeed<br />
signals across vast distances<br />
instead of fiber optic cabling, reducing<br />
the number of infrastructural challenges<br />
related to traditional broadband access.<br />
For businesses and their customers, it<br />
offers greater reliability and resiliency<br />
with guaranteed performance.<br />
By delivering ultra-fast speeds, 5G<br />
FWA enables businesses to keep up with<br />
their customer's ever-changing<br />
expectations. It does so by providing<br />
optimal connectivity for all employees,<br />
regardless of where they are logging on<br />
from. This is a game-changer, especially<br />
in challenging-to-reach locations when<br />
wireline solutions for primary connectivity<br />
are difficult to establish. Employees are<br />
not only connected to each other but<br />
their customers.<br />
Another benefit associated with 5G<br />
FWA is easy installation. Unlike<br />
traditional connections, it can be<br />
installed without any cable drilling or<br />
wiring. All a business needs to activate it<br />
is the right expertise and a 5G-enabled<br />
32 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
EVENT ORGANISERS:<br />
Do you have something coming up that may<br />
interest readers of Network Computing?<br />
Contact dave.bonner@btc.co.uk<br />
6-7<br />
MAR<br />
TECH SHOW LONDON<br />
ExCel, London<br />
https://www.techshowlondon.co.uk/BTC<br />
FORTHCOMING EVENTS<br />
<strong>2024</strong><br />
FORTHCOMING EVENTS<br />
FORTHCOMING EVENTS<br />
28<br />
MAR<br />
25<br />
APR<br />
25<br />
APR<br />
9<br />
MAY<br />
22-23<br />
MAY<br />
4-6<br />
JUN<br />
13<br />
JUN<br />
19<br />
SEP<br />
2-3<br />
OCT<br />
20-21<br />
NOV<br />
CIO/CISO NORDICS SUMMIT<br />
Copenhagen, Denmark<br />
www.cdmmedia.com/events<br />
CIO/CISO UK SUMMIT<br />
London<br />
www.cdmmedia.com/events<br />
CDO UK SUMMIT<br />
London<br />
www.cdmmedia.com/events<br />
CIO/CISO BENELUX SUMMIT<br />
Amsterdam, Netherlands<br />
www.cdmmedia.com/events<br />
DTX MA<strong>NC</strong>HESTER<br />
Manchester Central<br />
https://dtxevents.io/manchester/en/page/dtx-manchester<br />
INFOSECURITY EUROPE<br />
ExCel London<br />
https://www.infosecurityeurope.com/<br />
CIO/CISO DACH SUMMIT<br />
Frankfurt, Germany<br />
www.cdmmedia.com/events<br />
CIO/CISO IRELAND SUMMIT<br />
Dublin, Ireland<br />
www.cdmmedia.com/events<br />
UC EXPO EUROPE<br />
ExCel, London<br />
https://ucxevents.io/ucexpo/en/page/ucexpo-home<br />
DATA CENTRES IRELAND<br />
RDS, Dublin<br />
www.datacentres-ireland.com
OPINION: 5G<br />
SIM card. This also makes it far more<br />
cost effective than many of the other<br />
solutions on the market.<br />
5G FWA networks are also built with<br />
redundancy measures and backup<br />
internet connections in place, making<br />
them one of the most reliable solutions<br />
for businesses looking to stay connected<br />
at all times. By using a premise-based<br />
modem equipped with dual SIM cards,<br />
the FWA service is available across two<br />
operators' footprints. This means that<br />
businesses can switch to the network<br />
providing the best performance at a<br />
given time, increasing agility and<br />
performance.<br />
This technology has the power to<br />
transform many industries - including<br />
manufacturing, agriculture, healthcare,<br />
and banking - due to its ability to<br />
provide high-speed connectivity, rapid<br />
deployment, fewer business interruptions<br />
and improved scalability. Currently, many<br />
of these benefits are already being<br />
witnessed in retail environments, where<br />
the blending of 5G and Wi-Fi has<br />
extended connectivity, leading to<br />
improved customer experiences, reliable<br />
point of sales (POS) processing, and<br />
faster decision making.<br />
UNLOCKING THE POTENTIAL OF<br />
5G FWA WITH HELP FROM AN MSP<br />
Before businesses can unlock the 5G<br />
FWA connectivity rewards, there are<br />
some things to consider, especially when<br />
it comes to implementation. One key<br />
area that needs to be addressed is<br />
whether they have the required skillset<br />
and expertise to ensure that deployment<br />
and everything it entails - from<br />
integrating existing infrastructure to<br />
combating potential network congestion<br />
and cost, plus everything that follows the<br />
deployment - is a success.<br />
To truly unlock the potential of a 5G<br />
FWA network, organisations need to<br />
work with an experienced managed<br />
service provider (MSP) who can offer<br />
tailored solutions. They should bring to<br />
the table a global reach complemented<br />
by local knowledge and be able to<br />
address each organisations unique<br />
requirements.<br />
The right partners can also help<br />
business to keep track of connectivity<br />
performance and make the most of their<br />
investment. Using real-time reports from<br />
the moment of 5G FWA activation, they<br />
can advise on any improvement areas<br />
and keep tabs on connectivity levels. This<br />
enables businesses to react quickly and<br />
efficiently to any changes, boosting their<br />
flexibility, whilst enabling them to meet<br />
customer expectations across the board.<br />
A MORE CONNECTED FUTURE<br />
As we start a new year, meeting customer<br />
demand and providing the best<br />
experience possible will continue to be<br />
the top priority for organisations. The<br />
role that 5G FWA could play in this is<br />
clear to see. It is hardly surprising that<br />
the number of 5G FWA connections is<br />
predicted to reach 236 million worldwide<br />
by 2028, up from 19.23 million in 2022.<br />
When deployed and managed<br />
effectively, this technology can enable<br />
organisations to scale, remain agile,<br />
provide business continuity, and gain<br />
competitive advantage allowing them to<br />
meet their customers' needs quickly and<br />
efficiently. The next generation of<br />
connectivity solutions is here; and it<br />
starts with 5G FWA. <strong>NC</strong><br />
34 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
Accelerating AI<br />
Data Pipelines<br />
Proven High-Performance Storage Architectures<br />
to Support AI and ML Workloads<br />
Learn More at<br />
www.supermicro.com/AIStorage<br />
© Supermicro and Supermicro logo are trademarks of Super Micro Computer, Inc. in the US. and/or other countries.