22.02.2024 Views

NC Feb-Mar 2024

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NETWORKcomputing<br />

I N F O R M A T I O N A N D C O M M U N I C A T I O N S – N E T W O R K E D www.networkcomputing.co.uk<br />

<strong>2024</strong> VISION<br />

Predicting the network space for the year ahead<br />

AGILE OPERATORS<br />

Network Computing catches<br />

up with Polywell Computers<br />

NETWORK<br />

INTEGRATION<br />

Navigating the complexity<br />

of modern networks<br />

IDENTITY CRISIS?<br />

The modern evolution of<br />

IGA solutions<br />

FEBRUARY/MARCH <strong>2024</strong> VOL 33 NO 01


REGISTER<br />

FOR YOUR<br />

FREE TICKET<br />

WWW.CLOUDEXPOEUROPE.COM/BTC


COMMENT<br />

COMMENT<br />

FORECASTING THE FUTURE OF NETWORKS<br />

Welcome to our first issue of <strong>2024</strong>, where we're taking a closer look at what<br />

this year will entail for the networking space with a range of predictions from<br />

industry experts. First, Kevin Drinkall, Director - <strong>Mar</strong>keting and GTM Strategy,<br />

EMEA at Zyxel, explains why <strong>2024</strong> is set to be a year of progressive network evolution<br />

and innovation, defined by "a continued move towards remote monitoring and management<br />

of networks."<br />

Kevin identifies three key elements underpinning this innovation, namely "a large-scale<br />

upgrade of wireless technology to the latest WiFi 6/6E and WiFi 7 standards; a continued<br />

move to multi-gigabit switches and infrastructure; and increased adoption of network<br />

security that is simple to install and manage. Another developing trend is the<br />

increased uptake of 5G routers for connectivity that is mobile and can be used in<br />

remote areas." Read Kevin's article for more insights on how we can bring the network<br />

up to speed in the coming months.<br />

We also have an opinion piece from HPE Aruba Networking Chief Product Officer<br />

David Hughes, in which David shares his top 5 networking and security predictions for<br />

<strong>2024</strong>. With HPE poised to purchase Juniper Networks for $14 billion - a move that's<br />

set to shake-up the industry in its own right - it seems a fitting time to learn more about<br />

the company's vision for the networking year ahead, and David's predictions range from<br />

the death of the standalone firewall to the potential for AI to liberate, rather than supplant,<br />

IT admins.<br />

REVIEWS:<br />

Dave Mitchell<br />

DEPUTY EDITOR: <strong>Mar</strong>k Lyward<br />

(netcomputing@btc.co.uk)<br />

PRODUCTION: Abby Penn<br />

(abby.penn@btc.co.uk)<br />

DESIGN: Ian Collis<br />

(ian.collis@btc.co.uk<br />

SALES:<br />

David Bonner<br />

(david.bonner@btc.co.uk)<br />

Julie Cornish<br />

(julie.cornish@btc.co.uk)<br />

SUBSCRIPTIONS: Christina Willis<br />

(christina.willis@btc.co.uk)<br />

PUBLISHER: John Jageurs<br />

(john.jageurs@btc.co.uk)<br />

Published by Barrow & Thompkins<br />

Connexion Ltd (BTC)<br />

35 Station Square,<br />

Petts Wood, Kent, BR5 1LZ<br />

Tel: +44 (0)1689 616 000<br />

Fax: +44 (0)1689 82 66 22<br />

SUBSCRIPTIONS:<br />

UK £35/year, £60/two years,<br />

£80/three years;<br />

Europe:<br />

£48/year, £85/two years £127/three years;<br />

ROW:<br />

£62/year, £115/two years, £168/three years;<br />

Subscribers get SPECIAL OFFERS — see subscriptions<br />

advertisement; Single copies of<br />

Network Computing can be bought for £8;<br />

(including postage & packing).<br />

© 2023 Barrow & Thompkins<br />

Connexion Ltd.<br />

All rights reserved.<br />

No part of the magazine may be<br />

reproduced without prior consent, in<br />

writing, from the publisher.<br />

Finally, while we're focusing on the year ahead, we're excited to announce that nominations<br />

for the <strong>2024</strong> Network Computing Awards have just opened! Now's the time to<br />

nominate the networking solutions, companies and people that have impressed you the<br />

most in the past twelve months, so please put forward you choices on the awards website.<br />

We'll have more news about this year's event in our next issue. <strong>NC</strong><br />

GET FUTURE COPIES FREE<br />

BY REGISTERING ONLINE AT<br />

WWW.NETWORKCOMPUTING.CO.UK/REGISTER<br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 03


FEBRUARY/MARCH <strong>2024</strong> VOL 33 NO 01<br />

CONTENTS<br />

CONTENTS<br />

F E B R U A R Y / M A R C H 2 0 2 4<br />

NETWORKcomputing<br />

I N F O R M A T I O N A N D C O M M U N I C A T I O N S – N E T W O R K E D www.networkcomputing.co.uk<br />

<strong>2024</strong> VISION<br />

Predicting the network space for the year ahead<br />

AGILE OPERATORS<br />

Network Computing catches<br />

up with Polywell Computers<br />

NETWORK<br />

INTEGRATION<br />

Navigating the complexity<br />

of modern networks<br />

IDENTITY CRISIS?<br />

The modern evolution of<br />

IGA solutions<br />

INTERVIEW: POLYWELL............8<br />

Network Computing catches up with Sam<br />

Chu, CEO and founder of Polywell<br />

Computers, a PC manufacturer with a<br />

unique focus on the small-to-mid-size<br />

marketplace<br />

COMMENT.....................................3<br />

Forecasting the future of networks<br />

INDUSTRY NEWS.............................6<br />

The latest networking news<br />

TIME TO BRING THE NETWORK<br />

UP TO SPEED........................12<br />

Kevin Drinkall at Zyxel tells us what he<br />

believes will be the major trends in<br />

networking technology over the coming year<br />

NETWORK INTEGRATION......20<br />

The world of networking has changed<br />

rapidly, and in this issue Chris McKie at<br />

Kaseya provides a guide to navigating the<br />

complexity of modern networks<br />

FOCUSING ON THE NETWORK<br />

SPACE IN <strong>2024</strong>..........................16<br />

David Hughes at HPE Aruba Networking<br />

gives us his top 5 networking and security<br />

predictions for <strong>2024</strong><br />

AVOIDING AN IDENTITY<br />

CRISIS.................................28<br />

Thomas Muller-<strong>Mar</strong>tin at Omada explains<br />

why the evolution of modern identity<br />

governance and administration (IGA)<br />

solutions Is worth your attention<br />

ARTICLES<br />

THE FUTURE OF USB DEVICES IN AN<br />

IOT WORLD...................................10<br />

By Alan Hayward at SEH Technology<br />

THE RISE OF QUANTUM<br />

ECOSYSTEMS IN <strong>2024</strong> AND<br />

BEYOND.........................................22<br />

By Dr. Philip Krantz at Keysight<br />

RETAIL INFRASTRUCTURE FIT FOR<br />

TODAY AND TOMORROW.............24<br />

By Henk Ijspeerd at Vertiv<br />

BECOMING SECURE BY DESIGN....26<br />

By Chip Daniels at SolarWinds<br />

BUNGLED BACKUPS........................30<br />

By John Fielding at Apricorn<br />

THE NEXT GENERATION OF<br />

CONNECTIVITY...............................32<br />

By Todd Mussman at GTT<br />

REVIEWS<br />

POLYWELL NANO-U10L4-SFP+.......11<br />

PERLE SYSTEMS IDS-710HP-XT.........15<br />

HORNETSECURITY 365 PERMISSION<br />

MANAGER.......................................18<br />

04 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


INDUSTRY NEWS<br />

NEWSNEWS<br />

NEWS NEWS<br />

NEWS NEWS NEWS NEWS<br />

NEWS NEWS<br />

New cloud-managed solutions from Extreme Networks<br />

Extreme Networks has introduced two new solutions<br />

designed to help highly distributed enterprise<br />

organisations create improved network connectivity, security<br />

and application performance. The AP5020 is a new Wi-Fi 7<br />

Universal access point (AP) that operates on the 6 GHz<br />

spectrum and is designed to support high-bandwidth,<br />

latency-sensitive applications and IoT devices. The 4000<br />

Series cloud-managed switches, the latest addition to<br />

Extreme's Universal portfolio, offer faster setup time by<br />

eliminating nearly all manual configurations. Paired with<br />

ExtremeCloud Universal ZTNA, these offer automated<br />

onboarding, configuration and policy enforcement to<br />

strengthen security as organisations move to a Zero Trust<br />

architecture across their network.<br />

Both the AP5020 and 4000 Series switches leverage AIOps<br />

(Artificial Intelligence for IT Operations) and machine learning<br />

features of the ExtremeCloud IQ cloud management platform<br />

to help proactively identify network issues and make<br />

recommendations that help reduce IT time to resolution.<br />

Cohesity and Veritas to combine data protection business<br />

Cohesity and Veritas have announced a definitive agreement<br />

under which Cohesity intends to combine with Veritas' data<br />

protection business, which will be carved out of Veritas, to<br />

create a new leader in data security and management.<br />

Customers will benefit from the accelerated innovations<br />

unlocked by the joint company's scaled R&D investment and<br />

one of the industry's most extensive partner ecosystems. Sanjay<br />

Poonen will lead the combined organisation as CEO and<br />

President. Greg Hughes, CEO of Veritas, will serve as a Board<br />

member and strategic advisor to Sanjay Poonen after the close<br />

of the transaction.<br />

The combined company will bring together 100s of exabytes<br />

of data protected and will continue to invest in and advance the<br />

roadmap and strategy of all Cohesity products and services, as<br />

well as Veritas NetBackup, NetBackup appliances, and Alta<br />

data protection offerings, while working towards the delivery of<br />

an integrated solution combining the best technology across the<br />

two companies.<br />

Nokia trials 5G edge cloud network slicing solution<br />

Nokia and A1 Austria (A1) have successfully completed the<br />

industry's first 5G edge cloud network slicing trial with<br />

Microsoft. The deployment utilised Nokia's 5G edge slicing solution<br />

integrated with Microsoft Azure managed edge compute on A1's<br />

live commercial network in Vienna, Austria. With edge cloud<br />

network slicing, A1 can bring enterprise cloud applications to<br />

mobile users over a high capacity, secure and low latency network.<br />

During the trial, A1 demonstrated real-time HD video streaming by<br />

transmitting live camera feeds from several mobile devices using<br />

Multicasting.io's streaming mobile platform running on the Azure<br />

edge infrastructure.<br />

Nokia's 5G Edge Slicing solution enables operators to take<br />

advantage of both slicing and edge cloud capabilities and provide<br />

value to their customers. Network slices can be tailored to support<br />

specific customers' use cases and different applications based on<br />

network performance, quality, traffic routing, latency, and security.<br />

Nokia's new solution enabled A1 to isolate its public Internet and<br />

enterprise traffic while keeping critical business traffic local using<br />

4G/5G core breakout for enterprise edge cloud applications. The<br />

network slices were implemented across Devices-RAN-Transport-Core-<br />

Edge Cloud Applications. 5G Edge Slicing enhances the enterprise<br />

user experience for low latency and high bandwidth use cases with<br />

high network performance, quality security and manageability.<br />

Highlighting Network Assessment for Cisco partners<br />

Highlight has introduced a new compact Network Assessment<br />

feature on its Service Assurance Platform to enable Cisco<br />

partners to assess a customer's network and identify performance<br />

issues within a couple of weeks. The service is designed as a<br />

stepping stone to delivering trusted, differentiated and profitable<br />

managed services. Using quick and seamless API integration with<br />

Cisco Meraki, Catalyst and ThousandEyes technologies, Highlight<br />

enables partners to quickly onboard a new customer, assess the<br />

network, make recommendations and transition the customer<br />

from a one-time assessment to an ongoing managed, recurring<br />

revenue relationship.<br />

06 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


INDUSTRY NEWS<br />

The service enables providers to demonstrate to their customers<br />

that they understand their network, including any current issues and<br />

frustrations. A comprehensive report with detailed evidence<br />

facilitates fact-based discussions on where and how to make<br />

improvements. This strengthens the relationship between service<br />

provider and customer whilst giving the provider an opportunity to<br />

deliver accurate advice and upsell services.<br />

<strong>Mar</strong>tin Saunders, Chief Operating Officer at Highlight said,<br />

"Modern IT departments are struggling with ever growing demands<br />

and expectations on their time and resources. Despite huge<br />

advances in simplifying the management of networks through cloud<br />

platforms like Cisco Meraki, many IT leaders are looking to their<br />

partner to manage the infrastructure that underpins IT. Customers are<br />

also looking for partners they can trust to become virtual members of<br />

their IT department. However, the managed services model can be a<br />

complex shift for some partners to make. With the Network<br />

Assessment feature, Cisco Partners have a tangible and easy way to<br />

prove their ability to remove the network management burden from<br />

IT, whilst setting the foundation for building longer term recurring<br />

revenue relationships with their customers via a managed service."<br />

x530-28GSX full fibre switch from Allied Telesis<br />

Allied Telesis has introduced its x530-28GSX full fibre switch,<br />

bringing flexibility and network optimisation to the company's<br />

x530 Series of multi-Gigabit switches. Months in development, the<br />

x530-28GSX switch is a 24-port 100/1000X SFP stackable switch<br />

with 4 SFP+ ports and 2 fixed power supplies. It can aggregate a<br />

24x1 Gigabit fibre link to a 4x10 Gigabit fibre link and up to 8<br />

units can be stacked using Virtual Chassis Stacking (VCStack) to<br />

build a 192 Gigabit fibre aggregator. The switch also supports<br />

copper connectivity via SFP/SFP+ ports allowing the maximum<br />

flexibility of both copper and fibre as required.<br />

"Businesses and organisations need to meet the rapidly changing<br />

demand put on networks by applications such as artificial intelligence,<br />

5G backhaul and edge computing. The x530-28GSX enables the<br />

addition of bandwidth using either copper or fibre at either 1 or<br />

10Gb/s, and because of its high resiliency, this capacity increase<br />

works very well for numerous large site markets such as education<br />

campuses, FTTx deployments, utilities, and city-wide metro networks,"<br />

said Chris Dyke, Sales Director UK & Ireland at Allied Telesis.<br />

Elevated 2.5G performance for SBs and prosumers<br />

Zyxel Networks has launched the XMG1915 series, a family of<br />

smart managed switches designed for small businesses (SBs)<br />

and professional home users (prosumers). Available in 8 and 16-<br />

port models, the XMG1915 series provide 2.5 Multi-Gigabit<br />

Ethernet capability across all ports. There are also 10G uplinks<br />

for connections to the network core, and PoE++ options that will<br />

provide as much as 60W to a connected device. Flexible cloud<br />

management makes the switches easy to deploy and manage.<br />

Kell Lin, Senior Associate Vice President of Zyxel Networking<br />

Strategic Business Unit, said: "Changing work patterns, the<br />

increased bandwidth demands of modern applications and<br />

services, and the growing number of devices being used on the<br />

network edge are a significant challenge. The XMG1915 series<br />

provides a fast, versatile, and cost-effective solution, with the<br />

added benefit of simple deployment and management options<br />

through our Nebula cloud management platform."<br />

McCambridge Duffy saves and modernises with Apogee<br />

McCambridge Duffy, a leading UK insolvency firm, has<br />

partnered with managed workplace services (MWS) provider<br />

Apogee Corporation to boost workplace efficiencies and modernise<br />

its IT infrastructure. Since the collaboration began, the firm has<br />

already reduced a large proportion of its yearly operating costs by<br />

almost half a million pounds. Apogee digitised the operations at<br />

McCambridge Duffy with the implementation of its Managed IT<br />

Services and Digital Document Service. Prior to engaging the MWS<br />

provider, the firm was suffering from up to two IT outages a month,<br />

costing approximately £31,000, which have been reduced to zero.<br />

As a business heavily reliant on paper-based documents, the yearly<br />

costs associated with postage accumulating to £60,000 have been<br />

cut down to £8,400. McCambridge Duffy has also benefitted from<br />

improved efficiency across its workforce. Client caseloads have<br />

almost doubled from 5,000 to 9,500, without needing to increase<br />

headcount, and a meeting of creditors appointment now takes just<br />

7 days to process, down from 45, an 80% reduction.<br />

NEWS NEWSNEWS<br />

NEWS<br />

NEWS NEWS NEWS NEWS NEWS<br />

NEWS<br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 07


INTERVIEW: POLYWELL<br />

A COMMITMENT TO AGILITY<br />

NETWORK COMPUTING CATCHES UP WITH SAM CHU, CEO AND FOUNDER OF POLYWELL<br />

COMPUTERS, A PC MANUFACTURER WITH A UNIQUE FOCUS ON THE SMALL-TO-MID-SIZE<br />

MARKETPLACE<br />

Network Computing: For readers<br />

who may not be that familiar<br />

with the company, let's start with<br />

some background on Polywell and its<br />

product range - what should we know<br />

about what you do, and what makes<br />

your offerings unique?<br />

Sam Chu: Polywell is a Silicon Valleybased<br />

PC manufacturer founded in 1987:<br />

initially focused on serving the US market,<br />

the company has since expanded<br />

globally. Polywell uses technologies from<br />

Intel, AMD, and Nvidia to produce PCs,<br />

workstations, servers, and storage<br />

devices. A core focus is embedded PCs<br />

for applications like network security,<br />

digital signage, kiosks, POS systems, and<br />

AI/IoT devices.<br />

In the network security industry, we<br />

don't sell directly to end customers:<br />

instead, we mainly work with<br />

software vendors and developers<br />

who use our hardware products to<br />

create turnkey solutions for SMB<br />

network security. Most network<br />

security software is based on<br />

Linux, often optimised for older<br />

versions of the Linux kernel. This<br />

makes it difficult for developers to<br />

find a partner like Polywell that can<br />

provide long-term support for<br />

legacy operating systems.<br />

Polywell offers<br />

products with a<br />

10-year<br />

lifespan,<br />

helping our<br />

software<br />

partners<br />

avoid additional development and<br />

certification costs. We have a strong<br />

reputation for supporting this business<br />

segment over many years.<br />

In other market niches we focus on the<br />

most advanced innovations in computer<br />

hardware. It's common knowledge that<br />

industrial grade computing has a<br />

noticeable 'inertia' of 6 to 12 months as<br />

compared to the moment that advanced<br />

technologies appear in mainstream<br />

segments. Polywell tries to minimise this<br />

time lapse and make the newest<br />

solutions available in the embedded<br />

market as well.<br />

Of course, we are working in a tightly<br />

competitive market in terms of not only<br />

the largest industry giants, but also of<br />

mid-size manufacturers like us who are<br />

the main driving force of the industrial<br />

computer market. We decided long ago<br />

that we could in no way sacrifice quality<br />

because it lasts and reminds about itself<br />

during the whole lifecycle of the product<br />

- unlike price! We are trying to make our<br />

products 'self-convincing', saying<br />

everything about themselves. You may be<br />

surprised, but in many cases a customer<br />

just needs to take our PC in hand to<br />

make a choice in our favour. That's why<br />

we encourage the 'test-before-you-buy'<br />

approach.<br />

<strong>NC</strong>: Can you talk about particular<br />

product developments in the pipeline -<br />

what are you planning, when will it be<br />

available, and why will it be of interest to<br />

our readers?<br />

08 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


INTERVIEW: POLYWELL<br />

SC: While maintaining a longevity<br />

product supply for our embedded<br />

products, Polywell is also working<br />

closely with Intel to develop new<br />

products, such as utilising the 13th<br />

gen CPU to provide early samples to<br />

developers to develop their software,<br />

or port their old or existing apps by<br />

utilising the new technologies<br />

launching with the new platform to<br />

improve performance and features.<br />

Besides the CPU itself, security<br />

products are also heavily dependent on<br />

network I/O and speeds. We are<br />

currently developing the 400Gbit<br />

Network Platform for the SDN<br />

(Software Defined Network) products<br />

for the high-end segment, by utilising<br />

the PCIe 5.0 high performance buses<br />

lanes and high-speed network chip<br />

from Mellanox (Nvidia) and Intel.<br />

Expect the product to be launched at<br />

the end of <strong>2024</strong>.<br />

<strong>NC</strong>: The simultaneous growth in dge<br />

computing and in AI seems to be<br />

unstoppable - how do these emerging<br />

technologies influence both your<br />

customers' requirements and your own<br />

development strategies?<br />

SC: AI is hot and is driving high<br />

demand for supercomputing across<br />

various areas such as CPU, GPU, Bus<br />

Lane, Network I/O, memory I/O, and<br />

storage capacity/speed in both Edge<br />

and backend computing. Polywell is<br />

actively developing products for both<br />

Edge and Cloud to address market<br />

demands. We have always prioritised<br />

client needs and worked closely to<br />

deliver tailored solution products - our<br />

approach is customer-centric, ensuring<br />

we meet and exceed client demands<br />

with effective solutions.<br />

AI is in its early stages of<br />

development, of course. Many practical<br />

applications are using early bird AI<br />

development platforms to build on later.<br />

Our long-standing - thirty year -<br />

presence in the industry allows us to<br />

engage with early adopters and<br />

development circles, thanks to strong<br />

relationships, experience, and trust<br />

across the industry.<br />

<strong>NC</strong>: How would you summarise what<br />

makes Polywell stand out in an<br />

increasingly competitive market and<br />

attract customers to the way you work?<br />

SC: Polywell is dedicated to catering to<br />

the unique needs of small to mid-size<br />

businesses that may not find an ideal fit<br />

with Tier-1 vendors like Dell or HP. We<br />

understand the challenges faced by<br />

businesses of this scale and are<br />

passionate about providing tailored<br />

solutions. Our commitment to agility is<br />

not just a strategy; it's a mindset that<br />

allows us to swiftly embrace new<br />

technologies and navigate dynamic<br />

market changes.<br />

In our pursuit of excellence, we<br />

recognise that the landscape for small<br />

to mid-size businesses is constantly<br />

evolving. We take pride in being nimble<br />

and responsive, ensuring that our<br />

partners are not only well-supported but<br />

also at the forefront of innovation.<br />

At Polywell, we believe in fostering<br />

meaningful relationships with our business<br />

partners, understanding their aspirations,<br />

and aligning our strategies to help them<br />

thrive. Our approach is not just<br />

transactional; it's about building a<br />

collaborative ecosystem where success is<br />

shared. In a world where adaptability is<br />

key, Polywell stands as a beacon for<br />

businesses seeking a reliable and<br />

dynamic partner. Embracing change is<br />

not just a necessity for us; it's a core value<br />

that fuels our passion for delivering<br />

impactful solutions to the heart of the<br />

business community.<br />

<strong>NC</strong>: What is the next step then for<br />

Polywell in terms of business growth,<br />

perhaps specifically for the UK market?<br />

SC: The internet has significantly reduced<br />

global barriers for international business.<br />

Our overseas partners leverage our US<br />

resources and cutting-edge technologies,<br />

empowering them to excel in their local<br />

markets. Instead of competing, we prefer<br />

to collaborate and serve within our<br />

industry segment.<br />

We prioritise partners who recognise our<br />

value and are astute enough to harness<br />

our resources and support, fostering their<br />

business development and growth. This<br />

collaborative approach strengthens our<br />

bonds and creates a shared journey<br />

towards success, emphasising the<br />

importance of mutual understanding and<br />

smart utilisation of available resources. <strong>NC</strong><br />

www.polywell.com<br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 09


OPINION: USB DEVICES<br />

THE FUTURE OF USB DEVICES IN AN IOT WORLD<br />

IN THE ERA OF THE INTERNET OF THINGS (IOT), WHERE CONNECTIVITY AND DATA<br />

ARE THE CORNERSTONES OF MODERN TECHNOLOGIES, THE FUTURE OF USB<br />

DEVICES APPEARS POISED FOR A SIGNIFICANT TRANSFORMATION, ACCORDING<br />

TO ALAN HAYWARD, SALES AND MARKETING MANAGER AT SEH TECHNOLOGY<br />

From its beginnings as a standard for<br />

connecting peripherals to computers, the<br />

USB interface has evolved into an<br />

indispensable tool for data transfer and power<br />

delivery. As the demand for faster data transfer<br />

speeds increases with larger file sizes and<br />

higher-resolution media, USB technology is<br />

likely to evolve to support evolving demands.<br />

A recent study conducted by Arthur Little<br />

recorded how the average data consumption<br />

per month per user had increased from<br />

approximately 5 GB/month in 2018 to 15<br />

GB/month in 2022 across Europe, with<br />

forecasts estimating it to grow to 75 GB/month<br />

by 2030, highlighting the mass increase in<br />

network usage and pressure.<br />

Newer standards, such as USB 3.2 and<br />

USB4, already offer faster data rates, and<br />

future iterations will in all likelihood continue<br />

this trend.<br />

I<strong>NC</strong>REASING FLEXIBILITY<br />

In order to adapt to a rapidly changing world,<br />

USB devices may have to become more<br />

versatile, providing multiple functions beyond<br />

simple data transfer and power delivery. This<br />

could include features like integrated storage,<br />

advanced sensors, or even processing<br />

capabilities, making USB devices more<br />

intelligent and capable.<br />

Moreover, USB power delivery has become<br />

a significant feature of the technology,<br />

allowing devices to not only transfer data<br />

but also deliver power. This is important in<br />

an interconnected world where various<br />

devices need to charge quickly and<br />

efficiently. Future USB standards may<br />

enhance power delivery capabilities,<br />

supporting more power-hungry devices.<br />

USB Type-C, with its reversible design and<br />

support for high data transfer speeds and<br />

power delivery, has become increasingly<br />

popular. USB-C will likely continue to be a<br />

universal standard for various devices, reducing<br />

the need for multiple types of cables and<br />

adapters, and simplifying the interconnected<br />

future direction of technology. By the end of<br />

<strong>2024</strong>, all mobile devices sold on the EU<br />

market will have to include USB-C, with laptops<br />

also having to include them by Spring 2026.<br />

SIMPLIFYING CONNECTIVITY<br />

In an increasingly IoT-focused world, USB<br />

devices can provide a standardised and<br />

simplified way for IoT devices to connect and<br />

communicate with each other. Their interfaces<br />

can be customised to better support and<br />

manage IoT networks, regardless of the<br />

competency of users. Looking ahead to the<br />

future of the industry, USB devices may evolve<br />

to support enhanced edge computing<br />

capabilities, allowing IoT devices to offload<br />

processing tasks to connected USB devices.<br />

This enhances overall system performance<br />

and reduces vast workload pressures on IoT<br />

networks. They can also be developed to<br />

incorporate advanced power harvesting<br />

technologies, allowing them to generate power<br />

from the environment (such as solar or kinetic<br />

energy) to sustain IoT devices with minimal<br />

reliance on external power sources.<br />

ELEVATING SECURITY<br />

USB devices in IoT applications often handle<br />

sensitive data, which makes maintaining data<br />

privacy and confidentiality paramount.<br />

Encryption mechanisms help protect<br />

information from unauthorised access,<br />

eliminating the possibility of technologyenhanced<br />

eavesdropping and strengthening<br />

the security of data that is transferred across<br />

the network.<br />

Adopting a zero-trust architecture is<br />

becoming increasingly important in securing<br />

IoT environments. This approach assumes that<br />

no device, even if connected via USB, can be<br />

trusted by default and requires continuous<br />

verification of the device's security posture. This<br />

prevents rogue or malicious devices from<br />

infiltrating IoT networks, reducing the possibility<br />

of attacks and disruption.<br />

Furthermore, regular security audits should be<br />

conducted to identify and address<br />

vulnerabilities in USB-connected devices. This<br />

includes scanning for malware and ensuring<br />

devices comply with developing security best<br />

practices. As the IoT landscape continues to<br />

evolve, cybersecurity processes and protocols<br />

must also evolve, maximising the security and<br />

protection of information.<br />

CLOSING THOUGHTS<br />

In summary, the role of USB devices in an<br />

interconnected and technologically<br />

integrated world is likely to involve faster<br />

data transfer, enhanced power delivery, the<br />

reinforced security of data, and a continued<br />

evolution towards universal and versatile<br />

connectivity. In the era of IoT, the future of<br />

USB devices appears poised for significant<br />

flexibility, scalability and adaptability, so it's<br />

important today to consider their role in an<br />

IoT world. <strong>NC</strong><br />

10 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


PRODUCT REVIEW<br />

Polywell<br />

Nano-U10L4-SFP+<br />

PRODUCT REVIEW<br />

PRODUCT<br />

REVIEWPRODUCT RE<br />

If extreme longevity is a mark of success then<br />

Polywell Computers is a clear winner, as this<br />

US-based company has been designing and<br />

building computing products since 1987. Its<br />

impressive portfolio includes enterprise-class<br />

rack servers, storage systems, workstations and<br />

PCs while a rapidly expanding range of mini-<br />

PCs allows it to offer an unprecedented choice<br />

of form factors and features.<br />

Polywell has a sharp focus on network<br />

security gateway solutions and the Nano-<br />

U10L4-SFP+ on review is an ideal candidate<br />

for providing network threat protection,<br />

firewall and intrusion prevention duties. To<br />

show off its capabilities, Polywell supplied our<br />

review unit with the VyOS network operating<br />

system software preinstalled.<br />

It delivers an impressive set of security<br />

features including edge routing, NAT, BGP, SPI<br />

firewalling, VPN gateway and broadband<br />

remote access services. VyOS operates two<br />

'branches' where free rolling releases combine<br />

the latest code from contributors, while longterm<br />

support for stable releases is offered with<br />

yearly subscriptions that include options for<br />

unlimited on-premises deployments.<br />

The VyOS for Good scheme will appeal to<br />

establishments such as schools, colleges and<br />

universities, emergency services and start-ups.<br />

VyOS also recognises the valuable work done<br />

by non-profit organisations by offering them a<br />

premium support subscription free of charge.<br />

The Nano-U10L4-SFP+ clearly has the<br />

credentials to handle a high demand as inside<br />

its ruggedised aluminium chassis beats an Intel<br />

quad-core 1.6GHz Core i5-10210u CPU. This<br />

was teamed up with 16GB of DDR4 memory<br />

upgradeable to 64GB while the VyOS software<br />

was loaded on a 256GB M.2 NVMe SSD.<br />

Network connection options abound with<br />

base configurations providing four 2.5GbE<br />

multi-Gigabit ports. Our unit sported an<br />

additional pair of 10GbE SFP+ fibre ports for<br />

high-speed links and Polywell offers another<br />

model with eight 2.5GbE ports.<br />

Other hardware features of note include an<br />

RJ-45 serial console port and a quartet of USB<br />

3 ports, while power is handled by a small<br />

external PSU. The CPU's embedded Intel 4K<br />

UHD graphics chip has its output piped<br />

through to HDMI 2.0 and DisplayPort<br />

connections for dual monitor support.<br />

The sturdy aluminium chassis does a fine job<br />

as a heatsink as, although the motherboard<br />

has a cooling fan assembly above it, we didn't<br />

hear it ever being activated during testing. This<br />

makes the Nano-U10L4-SFP+ ideal for small<br />

office environments that value their tranquillity -<br />

it also supports a VESA wall mount bracket so it<br />

can be safely tucked out of the way.<br />

For initial deployment, we attached an HD<br />

monitor plus keyboard and followed the VyOS<br />

online quick start guide to create a gateway<br />

configuration using two 2.5GbE ports. VyOS<br />

doesn't offer a web GUI but using its CLI, we<br />

had no problems configuring our WAN and<br />

LAN interfaces, applying DHCP, DNS and NAT<br />

services, applying a base set of firewall policies<br />

and committing and saving our changes.<br />

After enabling SSH access, we dispensed<br />

with the monitor and keyboard and conducted<br />

further monitoring and configuration using the<br />

PuTTY app. Where you go from here is up to<br />

your imagination - suffice to say that VyOS is<br />

an incredibly versatile open platform.<br />

Our base firewall configuration worked fine<br />

and Polywell also provided us with a clear<br />

guide for deploying core routing and BGP<br />

services between a head office and remote<br />

site. New users may find the learning curve a<br />

little steep but VyOS provides a massive<br />

knowledge base, along with great community<br />

support and tutorials to help you get started<br />

and quickly resolve any issues.<br />

Polywell's Nano-U10L4-SFP+ delivers<br />

plenty of power in a compact and well-built<br />

package. It's ideal for hosting a wide range<br />

of business applications and teaming it up<br />

with VyOS delivers the perfect network<br />

security partnership. <strong>NC</strong><br />

Product: Nano-U10L4-SFP+<br />

Supplier: Polywell Computers<br />

Web site: www.polywell.com<br />

Sales: info.eu@polywell.com<br />

WWW.NETWORKCOMPUTING.CO.UK FEBRUARY/MARCH <strong>2024</strong> 11<br />

NETWORKcomputing<br />

@<strong>NC</strong>MagAndAwards


FEATURE: PREDICTIONS<br />

TIME TO BRING THE NETWORK UP TO SPEED<br />

KEVIN DRINKALL, DIRECTOR - MARKETING AND GTM STRATEGY, EMEA AT ZYXEL, TELLS US WHAT HE<br />

BELIEVES WILL BE THE MAJOR TRENDS IN NETWORKING TECHNOLOGY OVER THE COMING YEAR<br />

Zyxel Networks expects <strong>2024</strong> to be a<br />

year of further progressive<br />

innovation in networking. We also<br />

expect it to be a year in which customers<br />

will make serious (and in many cases,<br />

much-needed) investments to upgrade<br />

wireless technologies and further<br />

embrace multi-gigabit performance<br />

across the infrastructure.<br />

With more devices now being connected at<br />

the edge of the network, the number of entry<br />

points and vulnerabilities are growing and<br />

security will continue to be vitally important.<br />

There is also a desire for security to be as<br />

simple as possible to implement and<br />

manage. Smaller businesses in particular do<br />

not need to know about the complexities of<br />

how they are protected - they just need to<br />

know that they are protected. Improved<br />

support for Power over Ethernet (PoE)<br />

connections is needed to support the<br />

increased number of edge devices.<br />

Another trend we see is further<br />

growth in the use of 5G technology,<br />

both as a backup for fixed-line<br />

connections, and as a way of<br />

providing quick, easy-to-deploy<br />

connectivity just about anywhere.<br />

This is an increasingly popular<br />

choice where the connectivity<br />

needs to be easy to move<br />

around, or there are<br />

inadequate or no fixed-line<br />

connections.<br />

On a broader front, we expect<br />

to see increased use of remote<br />

monitoring capabilities and<br />

services, as businesses look to<br />

simplify and streamline the management of<br />

the IT systems and networks on which they<br />

are increasingly dependent.<br />

A BIG YEAR FOR WIFI UPGRADES<br />

In wireless, <strong>2024</strong> will be the year of WiFi 7 -<br />

and we also expect to see a lot more uptake<br />

of WiFi 6 and 6E. While the former is still<br />

quite new - and the IEEE 802.11be (WiFi 7)<br />

standard will not be formally ratified until<br />

quite late in <strong>2024</strong> - the technology available<br />

from Qualcomm (the chip producer with<br />

whom Zyxel Networks has a strong<br />

partnership), conforms to the proposed<br />

standard that will most certainly be rubberstamped<br />

later in the year. There are already<br />

a number of WiFi 7 access points on the<br />

market (Zyxel Networks was one of the first<br />

to announce and make a product<br />

available *1 ), and many more will be<br />

launched over the course of the year.<br />

WiFi 7 offers distinct advantages. It is<br />

significantly faster than WiFi 6/6E (around<br />

2X to 3X faster in real-world scenarios) and<br />

is much better at delivering consistent and<br />

reliable connectivity in dense environments,<br />

i.e. where there are a lot of devices<br />

connected to the WiFi in one area. In<br />

exhibition centres, sports and entertainment<br />

arenas, in schools, train stations and<br />

airports, for example, it will deliver distinct<br />

and immediate benefits.<br />

Why then, would you want to install WiFi 6<br />

or 6E? Well, for smaller businesses and<br />

homes where there won't be that many<br />

devices being connected, there won't be a<br />

lot of difference in terms of the user<br />

experience with WiFi. What the 802.11ax<br />

standard - or WiFi 6 or 6E (the 'E' stands for<br />

12 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


FEATURE: PREDICTIONS<br />

'extended range') - as it is more widely<br />

known, will give you is a noticeable<br />

performance uplift on previous standards<br />

and the ability to support more users that are<br />

using multimedia content, such as video.<br />

Upgrading to WiFi 6 or 6E will also - for<br />

now at least - be more affordable than<br />

WiFi 7. As the 802.11ax standard is fully<br />

ratified and established, there are many<br />

more devices on the market. For the<br />

businesses and homes for which WiFi 6/6E<br />

will deliver improved performance, it will<br />

be a good investment. It's also worth<br />

noting that the majority of WiFi 6/6E and<br />

all WiFi 7 devices come with WPA3<br />

protection, which provides enhanced<br />

security for both infrastructure and devices<br />

connecting wirelessly.<br />

In the end, whether you choose WiFi 7<br />

and WiFi 6 or 6E, upgrading wireless is<br />

going to be important. This year we are<br />

likely to see many more users finally taking<br />

the plunge and upgrading their ageing<br />

laptops, tablets and smartphones. Many of<br />

these would have been bought during the<br />

early days of the pandemic - three years<br />

ago or more. These new devices will<br />

support WiFi 6/6E as a minimum - and<br />

some may even have WiFi 7.<br />

The wireless networks they connect to will<br />

need to be capable of making use of their<br />

increased speed. For hotels, restaurants,<br />

cafes, bars and any other hospitality<br />

business, enabling customers to get the best<br />

and fastest access will be important. That<br />

will also be the case in schools and<br />

colleges, in hospitals and in businesses<br />

where there are guests and visitors coming<br />

and going all the time.<br />

GOING MULTI-GIG ACROSS THE<br />

WHOLE NETWORK<br />

This last point is one that applies to the<br />

whole network infrastructure. Applications<br />

and services have become much more<br />

bandwidth<br />

hungry. Video<br />

conferencing and<br />

collaboration tools, increased use<br />

of cloud applications and services, and<br />

richer content, have all pushed network<br />

traffic relentlessly upwards. There is now<br />

a need to support high throughput right<br />

across the network.<br />

This is driving the uptake of multi-gigabit<br />

switches that have the capability to deliver<br />

speeds of 2.5Gbps, 5Gbps and 10Gbps<br />

to connected devices. Zyxel Networks<br />

already offers a range of smart managed<br />

and unmanaged switches that support<br />

multiple speeds in each direction. This<br />

gives organisations the flexibility to<br />

construct a network fabric that will meet<br />

their increased need for bandwidth. This<br />

does not mean you have to upgrade every<br />

single element of the network though. In<br />

most scenarios - certainly this is the case<br />

with Zyxel Networks switches, existing Cat<br />

5E cabling will carry 2.5Gbps and in some<br />

cases 5Gbps to edge connections.<br />

We'll be adding to our multi-gig range in<br />

<strong>2024</strong> and also enhancing their PoE<br />

capabilities. We're doing this because the<br />

devices now being deployed at the network's<br />

edge, such as WiFi 6/6E and WiFi 7 access<br />

points, along with high-quality IP surveillance<br />

cameras with pan-zoom-tilt (PZT) capability,<br />

need additional power to run. These devices<br />

are usually of critical importance as they<br />

may be providing connectivity for scores of<br />

users and clearly, if you have a security<br />

camera in place, it's there for a reason. You<br />

won't want it to be out of action for any<br />

length of time. This means an increase from<br />

15.4W or 30W per port to 60W per port on<br />

a network switch (POE+ to POE++).<br />

SIMPLE, COMPREHENSIVE SECURITY<br />

Digital security also needs to be<br />

completely reliable. No organisation can<br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 13


FEATURE: PREDICTIONS<br />

afford to let<br />

its defences down,<br />

even for a few moments. It<br />

also needs to be comprehensive<br />

and cover the network from end to end.<br />

Increasing regulation is driving<br />

organisations to adopt more secure<br />

practices. The EU's NIS2 directive is due<br />

to come into force in <strong>2024</strong>, requiring<br />

organisations operating in Europe to<br />

have a specific level of cybersecurity<br />

protection in place.<br />

Every year the threats to networks<br />

multiply, and the increased dependency<br />

we have on our IT systems and<br />

connections means that any loss of<br />

access or data will be extremely<br />

damaging. This has led to digital security<br />

solutions becoming more and more<br />

complex, and while it is absolutely<br />

essential it can also be off-putting,<br />

especially for smaller businesses that<br />

have no technical or cybersecurity<br />

expertise of their own.<br />

We see two parallel trends here: a<br />

growing desire to make protecting the<br />

network simpler, and a greater willingness<br />

to place the administration and<br />

management of security in the hands of<br />

professional experts.<br />

Zyxel Networks has already responded to<br />

both of these developments. With our<br />

Connect and Protect initiative, we provide<br />

a predefined cybersecurity set-up for our<br />

devices that makes deployment much<br />

more accessible. This is provided not only<br />

on our unified security gateway, but also<br />

on our wireless access points and smart<br />

managed switches.<br />

Through the ongoing development of<br />

our Nebula cloud management and our<br />

cybersecurity cloud platforms, we're<br />

providing additional and proactive<br />

protection against all kinds of threats. For<br />

example, we've already introduced<br />

collaborative detection and response<br />

(CDR) - a feature that checks for unsafe<br />

devices connected via WiFi and works with<br />

one of Zyxel Networks' firewalls to contain<br />

them according to preset conditions.<br />

Nebula enables businesses to put<br />

security into the hands of an expert;<br />

network administrators and MSPs can<br />

keep a look-out for any potential<br />

problems or breaches remotely and take<br />

appropriate action when required. We'll<br />

be bringing forward many more security<br />

enhancements to Nebula in <strong>2024</strong>.<br />

Through these twin initiatives, we are<br />

making network security simpler and even<br />

more comprehensive for our customers.<br />

THREE BIG TRENDS<br />

In summary, there will be three key major<br />

trends in networking in <strong>2024</strong>: a largescale<br />

upgrade of wireless technology to<br />

the latest WiFi 6/6E and WiFi 7 standards;<br />

a continued move to multi-gigabit<br />

switches and infrastructure; and increased<br />

adoption of network security that is simple<br />

to install and manage. Another<br />

developing trend is the increased uptake<br />

of 5G routers for connectivity that is<br />

mobile and can be used in remote areas.<br />

Overarching all of this will be a general<br />

move to higher bandwidth and<br />

performance right across the network<br />

fabric; the sophistication of applications,<br />

content and cloud-based services - and<br />

the need to ensure security throughout the<br />

network - requires that now. In <strong>2024</strong>, it will<br />

be time to bring the network up to speed.<br />

We will also see a continued move<br />

towards remote monitoring and<br />

management of networks - and this will<br />

extend to configuration and installation.<br />

Far from being a new development, this is<br />

a growing trend that has been driven for<br />

some time by the increasing acceptance<br />

of managed services, a scarcity of<br />

advanced technical skills, and the<br />

increasing dependency that all<br />

organisations have on their IT systems,<br />

connectivity and networks.<br />

At Zyxel Networks, we have advanced<br />

the capability of our own cloud<br />

management platform, Nebula,<br />

considerably over the last couple of years.<br />

Further enhancements are being added all<br />

the time and in particular, to its security<br />

functionality, which is now becoming<br />

deeply embedded within the platform. We<br />

are using AI and machine learning in<br />

Nebula to enhance protection even more,<br />

to aid fault finding and resolution, and<br />

monitor and retune access points so that<br />

their performance is enhanced.<br />

We're also providing reporting tools that<br />

enable admins and MSPs to delve deeper<br />

into the network activity and traffic to gain a<br />

better insight into how resources are being<br />

used and make adjustments that will<br />

enhance performance and security. Nebula<br />

is continually developing and becoming an<br />

all-encompassing, end-to-end solution<br />

through which, the entire network (or<br />

multiple networks) can be monitored.<br />

This is the longer-term direction for<br />

networking. Devices will be installed,<br />

configured and managed remotely and<br />

there will be much greater collaboration<br />

and sharing of functionality between<br />

switches, wireless access points and<br />

security appliances. In <strong>2024</strong>, we will see<br />

networks progressing to the point where<br />

performance tuning and digital<br />

cybersecurity are fully integrated across all<br />

devices and everything is monitored and<br />

managed through the cloud. <strong>NC</strong><br />

1<br />

- Zyxel Networks' WBE660S WiFi 7<br />

BE22K Triple-Radio NebulaFlex Pro Access<br />

Point was launched in October 2023.<br />

14 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


PRODUCT REVIEW<br />

Perle Systems<br />

IDS-710HP-XT<br />

PRODUCT REVIEW<br />

PRODUCT<br />

REVIEWPRODUCT RE<br />

The growing demand for industrial Power<br />

over Ethernet (PoE) switches is being<br />

driven by many factors including the<br />

adoption of IoT devices, outdoor IP surveillance<br />

systems and the new high-performance Wi-Fi<br />

6/7 access points. Perle Systems is a specialist<br />

in this area and its latest IDS-710HP family can<br />

go where other PoE switches fear to tread.<br />

Available in three models, the top-end IDS-<br />

710HP-XT on review is designed to work in an<br />

extended operating temperature range of -40C<br />

to 70C for assured reliability across extreme<br />

fluctuations. Sheathed in a metal fan-less chassis<br />

with an IP20 ingress protection rating, the switch<br />

includes 35mm DIN rail attachments and Perle<br />

also offers optional panel/wall mount kits.<br />

A generous 450W power budget makes the<br />

switch supremely versatile as it can support any<br />

type and class of powered device (PD) along<br />

with single and dual-signature connections. It<br />

can supply up to 100W for 802.3bt PoE++<br />

Type 4 devices or 90W simultaneously on five<br />

ports, making it ideal for external IP cameras<br />

with remote PTZ functions and heaters.<br />

The IDS-710HP-XT offers eight PoE-enabled<br />

copper Gigabit ports and dual SFP slots<br />

supporting copper Gigabit or fibre<br />

Gigabit/2.5GbE transceivers. Fibre<br />

connections are a valuable feature as they<br />

are immune to the high levels of<br />

electromagnetic interference (EMI) frequently<br />

found in industrial environments.<br />

Power redundancy is available as the switch's<br />

terminal block supports dual inputs from<br />

separate supplies. We found it simple to deploy<br />

as we cabled it to a Phoenix Trio DINcompliant<br />

PSU and pressed the switch's reset<br />

button to initiate its Fast Setup mode. Just<br />

connect a PC to the port with the rapidly<br />

flashing LEDs, load a web browser and follow<br />

the wizard to set up your default VLAN and<br />

DHCP services along with secure CLI and web<br />

admin access.<br />

Don't be fooled by its minuscule dimensions<br />

as the IDS-710HP-XT offers a wealth of features<br />

that are all easily accessible from its web<br />

console. Standard Layer 2 features are<br />

abundant and include static and LACP link<br />

aggregation groups along with support for up<br />

to 256 VLANs plus GVRP support for dynamic<br />

VLAN creation. For VoIP networks, you can<br />

create voice VLANs to separate, prioritise and<br />

authenticate this traffic for assured call quality.<br />

Security is a high priority as 802.1x port<br />

authentication is provided and admin access<br />

can be controlled using RADIUS and<br />

TACACS+. The switch supports HTTPS web<br />

access, secure CLI sessions using SSL/TLS, the<br />

stronger SNMPv3 and the PROFINET and<br />

Modbus TCP Industrial Ethernet protocols.<br />

That big power budget means you can deploy<br />

plenty of PDs but if you're worried about<br />

exceeding it, priorities can be applied to each<br />

port. Assign low, high or critical priorities to<br />

each one and if the total draw reaches the<br />

power threshold, those with the lowest priorities<br />

will be turned off first.<br />

Support staff will approve of the PD power<br />

reset feature as they can remotely restart<br />

attached devices. Select a port from the<br />

configuration menu, disable PoE services and<br />

enable them again to force the device to reboot.<br />

Management options are outstanding as,<br />

along with the local web console, you can<br />

manage multiple switches using Perle's free<br />

Network Assist web application, which provides<br />

auto-discovery services. Organisations with<br />

geographically distributed switches can<br />

manage them all using the PerleView cloud<br />

portal, which facilitates remote access to<br />

devices along with scheduled firmware updates<br />

and alerting services.<br />

The IDS-710HP-XT is superbly built, rich in<br />

features and excellent value too, as Perle<br />

includes all features, functionality and ongoing<br />

software maintenance in the base price<br />

of the product. Businesses that need to<br />

deploy secure and reliable PoE services in<br />

extreme or hazardous environments need<br />

look no further. <strong>NC</strong><br />

Product: IDS-710HP-XT<br />

Supplier: Perle Systems<br />

Web site: www.perle.com<br />

Sales: +44 1280 825 540<br />

Price: £1,908 exc VAT<br />

WWW.NETWORKCOMPUTING.CO.UK FEBRUARY/MARCH <strong>2024</strong> 15<br />

NETWORKcomputing<br />

@<strong>NC</strong>MagAndAwards


FEATURE: PREDICTIONS<br />

FOCUSING ON THE NETWORK SPACE IN <strong>2024</strong><br />

FOLLOWING THE RECENT ANNOU<strong>NC</strong>MENT THAT HPE ARE SET<br />

TO ACQUIRE JUNIPER NETWORKS FOR $14 BILLION, HPE<br />

ARUBA NETWORKING CHIEF PRODUCT OFFICER DAVID<br />

HUGHES GIVES US HIS TOP 5 NETWORKING AND SECURITY<br />

PREDICTIONS FOR <strong>2024</strong><br />

1: The death of the standalone firewall<br />

The rise of the hybrid workforce and the<br />

extensive deployment of IoT devices have<br />

irreversibly eroded the network perimeter, and<br />

the standalone firewall is dying with it. No<br />

longer can a good "inside" be protected from<br />

a bad "outside" by a ring of firewalls. Trying to<br />

plug the gaps by deploying even more<br />

firewalls inside an organisation only adds<br />

complexity, creates room for errors, and slows<br />

down businesses that want to move rapidly.<br />

Consequently, the next-gen firewall<br />

appliance is rapidly becoming the last-gen<br />

firewall appliance. On one side, the secure<br />

service edge (SSE) is replacing firewalls and<br />

proxies with cloud delivered secure web<br />

gateway, cloud access security broker and<br />

zero trust network access. SSE provides a<br />

compelling way of managing security for users<br />

accessing applications from anywhere. On the<br />

other side, for IoT security, segmentation is<br />

needed on-prem, right at the edge of the<br />

network, and to achieve this firewall services<br />

are being built directly into access points,<br />

switches and SD-WAN gateways.<br />

Even in the data centre the introduction of<br />

top-of-rack switches with L4-7 security<br />

functionality can deliver east-west<br />

segmentation far more cost-effectively than<br />

traditional next-gen firewalls at end-of-aisle.<br />

Over the coming couple of years the next-gen<br />

firewall market will continue to decline as<br />

these new cloud based and built-in<br />

capabilities usher in a simpler way of<br />

managing secure connectivity.<br />

Industry Supporting Stat: As more<br />

organisations choose programmatic, hybrid<br />

work strategies, buyers are more likely to<br />

select firewall vendors that offer cloud-based<br />

security services with credible cloud security<br />

strategies. Gartner Critical Capabilities for<br />

Network Firewalls? (Adam Hils, Rajpreet Kaur,<br />

Thomas Lintemuth) May 16, 2023.<br />

2: Zero trust principles accelerate alignment<br />

of security and networking objectives<br />

Most organisations have separate teams<br />

managing networking and security, and in<br />

many ways their goals can be at odds with<br />

one another. In <strong>2024</strong> leading enterprises will<br />

demonstrate how zero trust principles can be<br />

employed to align the two team's interests to<br />

deliver better end user experience and<br />

business outcomes.<br />

In a typical organisation the networking<br />

team's objectives are to keep people and<br />

services connected reliably and up and<br />

running with predictably good performance.<br />

They are incented to make it easy for people<br />

to connect to anything and avoid complexity<br />

that will result in outages, latency or<br />

slowdowns. On the one hand, the security<br />

organisation is tasked with minimising risk and<br />

maintaining compliance. Too often the user<br />

and their experience are caught in the middle.<br />

An overzealous security implementation might<br />

make it slow or impossible for users to access<br />

the apps and data they need, slowing down<br />

the business. On the other hand, lax security<br />

or a networking team that aims to please by<br />

bypassing security measures can result in<br />

infiltration and ransomware.<br />

Leading enterprises will adopt zero trust<br />

architectures where the network's job is<br />

defined not in terms of connecting anything to<br />

anything, but rather as being an enforcement<br />

layer for security policy. For users accessing<br />

applications security policy may be enforced<br />

in the cloud, but for many traffic flows,<br />

particularly for IoT devices and their<br />

associated services, it will be more efficient to<br />

automatically implement this policy in access<br />

devices like access points, switches and<br />

routers. With the right level of shared visibility,<br />

automation, and clear delineation of policy<br />

and enforcement, networking and security<br />

teams will have aligned goals and deliver a<br />

better experience.<br />

Industry Supporting Stat: According to<br />

Forrester, 96% of customers stated that<br />

security and networking worked together to<br />

implement SASE.<br />

3: Measuring end user experience becomes<br />

a must<br />

In order to deliver what employees and<br />

customers expect, IT organisations will need to<br />

shift to SLOs and SLAs based on measured<br />

user experience. Users don't care what is at<br />

fault, they are focused on one simple thing: is<br />

the application they are using working well or<br />

not. User satisfaction plummets when they are<br />

16 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


FEATURE: PREDICTIONS<br />

first to find problems, and are then rebuffed<br />

by IT with reports that all devices are up<br />

and operating correctly.<br />

To address this, organisations will widely<br />

deploy digital experience management<br />

(DEM) tools, that both measure actual<br />

experience of end users and make<br />

synthetic probes to ensure infrastructure<br />

readiness even when users are not<br />

present. Organisations will likely want a<br />

mix of measurements collected from<br />

endpoint agents (like an SSE agent) and<br />

measurements collected by dedicated<br />

hardware sensors, particularly when<br />

monitoring Wi-Fi performance. Ideally<br />

these same measurements feed<br />

automated AIOps that are able to learn<br />

and then implement best practices, rapidly<br />

triage problems and automatically<br />

remediate issues.<br />

Industry Supporting Stat: By 2026, at least<br />

60% of I&O leaders will use DEM to<br />

measure application, services and endpoint<br />

performance from the user's viewpoint, up<br />

from less than 20% in 2021. (Gartner,<br />

<strong>Mar</strong>ket Guide for Digital Experience<br />

Monitoring, <strong>Mar</strong>ch 2022).<br />

4: 6GHz Wi-Fi adoption skyrockets<br />

The barriers slowing Wi-Fi deployment in<br />

the 6GHz spectrum will be removed in most<br />

geographies, and adoption will start to<br />

skyrocket. A couple of years ago, the Wi-Fi<br />

6E standard introduced support for the<br />

6GHz band, more than doubling Wi-Fi<br />

capacity, enabling more users and faster<br />

speeds. It's been rapidly adopted in some<br />

segments, but others have been more<br />

cautious. In <strong>2024</strong> the last remaining<br />

barriers to broad adoption will be resolved.<br />

First, use of the 6GHz band, particularly<br />

outdoors is subject to approval by<br />

government authorities. Although some,<br />

like the US, have been quick to open the<br />

spectrum for Wi-Fi, other countries have<br />

been slower. Fortunately, there has been<br />

much forward progress in this area, and<br />

in <strong>2024</strong> most enterprises will have<br />

6GHz spectrum accessible in most parts<br />

of the world.<br />

Second, some enterprises have been leery<br />

about adopting Wi-Fi 6E when Wi-Fi 7 is<br />

around the corner. Now with Wi-Fi 7<br />

ratified, there is no doubt that Wi-Fi 6E and<br />

Wi-Fi 7 will be interoperable, so with 6E<br />

devices and access points shipping in<br />

volume, 6GHz Wi-Fi deployments can<br />

move ahead full steam.<br />

Finally, adoption is gated by support on<br />

both access points and client devices. We<br />

are witnessing a slew of new devices that<br />

support Wi-Fi 6E, and the mainstreaming of<br />

6E access points. On top of this there are<br />

more Wi-Fi 7 devices on the horizon, and<br />

these can utilise the 6GHz band to deliver<br />

better user experience with either Wi-Fi 6E<br />

or Wi-Fi 7 access points.<br />

The combination of these developments<br />

will see a big uptake of 6GHz spectrum in<br />

<strong>2024</strong>, and with it, faster transfers and better<br />

user experience!<br />

Industry Supporting Stat: "HPE Aruba<br />

Networking hasshipped over 1.5 times the<br />

number of Wi-Fi 6E APs than any other<br />

vendor in the industry" - Sian Morgan is the<br />

lead networking analyst for Dell'Oro Group.<br />

5: AI will liberate IT admins<br />

It is sometimes quoted you that won't lose<br />

your job to AI, you'll lose your job to<br />

someone who is using AI effectively. This is<br />

absolutely becoming true for the IT admin.<br />

The increasing burden of implementing<br />

new technology and maintaining cybersecurity<br />

with a fixed or even shrinking<br />

headcount means that each admin must<br />

handle more. Fortunately, AI and<br />

automation are advancing rapidly, shifting<br />

the job from managing and configuring<br />

individual devices, to instead defining<br />

policy across a whole estate and having<br />

that policy implemented automatically and<br />

consistently. AI is also able to comb<br />

through huge volumes of data to identify<br />

anomalies and recommend (and even<br />

implement) remedies.<br />

It's now well established that AI is only as<br />

good as its dataset, and bigger, high<br />

quality datasets are key. Leading vendors<br />

will be drawing AI insights from data lakes<br />

representing millions of managed devices<br />

and hundreds of millions of endpoints.<br />

Finally large language models (LLMs) are<br />

turbo charging existing natural language<br />

interfaces and providing a more<br />

convenient way for admins to get the<br />

information they need.<br />

The bottom line is that organisations need<br />

to ensure that they are providing their IT<br />

teams the AI force-multiplier admins need<br />

to remain competitive.<br />

Industry Supporting Stat: By 2026,<br />

generative artificial intelligence (GenAI)<br />

technology will account for 20% of initial<br />

network configuration, which is an increase<br />

from near zero in 2023. (Gartner, Strategic<br />

Roadmap for Enterprise Networking,<br />

October 2023). <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 17


PRODUCT REVIEW<br />

Hornetsecurity 365<br />

Permission Manager<br />

PRODUCT REVIEW<br />

PRODUCT<br />

REVIEWPRODUCT RE<br />

Microsoft 365 (MS365) is the<br />

productivity and communications<br />

platform of choice for organisations of<br />

all sizes, with it already having reached a<br />

staggering 382 million paid seats this year. A<br />

huge number of companies, including those<br />

with hybrid working practices, clearly see the<br />

benefits of MS365 cloud collaboration services;<br />

but ensuring adequate protection of information<br />

assets, and preventing unauthorised and anonymous<br />

access, can be a major challenge.<br />

Hornetsecurity's 365 Permission Manager is the<br />

perfect solution, as it provides administrators<br />

with all the tools needed to control access<br />

permissions, monitor violations and enforce<br />

compliance policies. Easily managed from a<br />

single cloud portal, it readily allows<br />

organisations to ensure compliance with internal<br />

and external regulations, and maintain access<br />

policies across sharing sites, folders and files.<br />

Onboarding is very swift, as you simply select<br />

365 Permission Manager from Hornetsecurity's<br />

Control Panel, provide all required tenant<br />

details and authenticate with your MS365<br />

account. It avoids management issues with<br />

MS365 global administrators and potential<br />

permission creep, as it uses API connections<br />

and doesn't store any credentials.<br />

The Control Panel presents a highly<br />

informative dashboard, with pie charts showing<br />

overall compliance health, plus separate ones<br />

for SharePoint, OneDrive and Teams. A timefiltered<br />

graph reveals fixed and approved<br />

violations, while others are provided for itemlevel<br />

and policy compliance, upcoming and<br />

overdue audits, and violation trends over time.<br />

You can also view your compliance policies and<br />

365 Permission Manager does all the hard work<br />

for you, as it includes a set of predefined ones.<br />

These are all based on the ISO 27001<br />

information security management systems<br />

standard, so applying them to your organisation<br />

will help you meet certification requirements.<br />

You can easily create custom policies and set<br />

internal and external sharing criteria, while, at<br />

the site level, you set external sharing levels for<br />

all people in your organisation, existing and new<br />

guests or anyone; apply default sharing links<br />

and permissions; and set guest access expiration<br />

times in days. Policies are a very powerful<br />

feature as, if any action violates them,<br />

administrators will receive an alert and an<br />

option to approve or fix them.<br />

SharePoint site and OneDrive account<br />

exploration reveals all entities and their applied<br />

policy, while colour-coded icons show if they are<br />

compliant. Further icons highlight if they have<br />

items with anonymous access granted, those<br />

that have organisation-wide access and those<br />

with external user access permitted.<br />

Click the quick actions button and you will then<br />

be presented with five of the most powerful<br />

features of this service. With no more than three<br />

clicks, you can set an external sharing level for a<br />

Share-Point site or OneDrive account, clean up<br />

orphaned users, remove 'Everyone' permissions,<br />

revoke user or group access or set site<br />

permissions. There's much more, as 365<br />

Permission Manager presents a 'To Do' list, with<br />

all policy violations that require your attention.<br />

The list can be filtered and, with one click, you<br />

can either approve the violation or fix it: you can<br />

fix site settings or 365 Permission Manager can<br />

automatically remove user access.<br />

As you'd expect, there are plenty of reporting<br />

tools provided, with options to generate ones for<br />

full site permissions, user and group access, and<br />

also external access. An activity log provides<br />

essential auditing for all administrative activities<br />

and the portal generates daily alert summaries,<br />

which can be sent to multiple recipients.<br />

MS365 rights management presents many<br />

pain points, as it is far too easy for users to<br />

share files across this platform and so difficult<br />

for administrators to stay in control.<br />

Hornetsecurity's 365 Permission Manager<br />

brings order to this rights chaos and gives<br />

administrators the power to effortlessly enforce<br />

policy compliance and ensure access to critical<br />

data is tightly locked down. <strong>NC</strong><br />

Product: 365 Permission Manager<br />

Supplier: Hornetsecurity<br />

Web site: www.hornetsecurity.com<br />

Tel: +44 (0) 203 0869 833<br />

Sales: sales@hornetsecurity.com<br />

Contact Hornetsecurity for pricing<br />

18 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


PLEASE MAKE YOUR NOMINATIONS<br />

Nominations are now open for the Network Computing Awards of <strong>2024</strong>. We<br />

invite you - the readers of Network Computing - to tell us which companies,<br />

products and individuals have most impressed you. After nominations have<br />

closed and been counted the finalists will be revealed.<br />

NOMINATE NOW AT:<br />

WWW.NETWORKCOMPUTINGAWARDS.CO.UK<br />

ATTENTION VENDORS:<br />

In addition to the nominating/voting categories, the Awards provide opportunities<br />

for impressive work and impressive solutions to be recognised by a Judge. You can<br />

enter your customer success stories for the NETWORK PROJECT OF THE YEAR<br />

by sending in case studies. Also, you can ensure that your chosen solutions<br />

become finalists for the BE<strong>NC</strong>H TESTED PRODUCT OF THE YEAR by booking<br />

them to be independently reviewed for Network Computing.<br />

There are also opportunities to get involved with the Awards as a sponsor.<br />

For help with any of the above contact dave.bonner@btc.co.uk<br />

Sponsored by:


OPINION: NETWORK INTEGRATION<br />

THE IMPORTA<strong>NC</strong>E OF INTEGRATION FOR YOUR NETWORK<br />

CHRIS MCKIE, VP PRODUCT MARKETING SECURITY AND NETWORKING SOLUTIONS AT KASEYA,<br />

OFFERS A GUIDE TO NAVIGATING THE COMPLEXITY OF MODERN NETWORKS<br />

The world of networking has changed<br />

rapidly, along with the dynamic evolution<br />

of IT as a whole. Hybrid environments,<br />

spanning on-premises and the cloud, have<br />

become the new norm, posing significant<br />

challenges for network managers. Company<br />

networks are becoming increasingly difficult to<br />

manage, monitor and secure. And, because<br />

hardware refresh cycles in networking are<br />

traditionally slow, organisations can end up<br />

with numerous disparate components,<br />

environments and management tools, all<br />

adding to the infrastructure complexity.<br />

KEY CHALLENGES FACED BY<br />

NETWORK MANAGERS<br />

The traditional contrast of cloud versus onpremises<br />

no longer holds in today's diverse<br />

network environments. Most organisations'<br />

networks no longer fall into the binary<br />

categories of cloud or on-premise; instead, they<br />

combine a bit of everything. The widespread<br />

adoption of hybrid infrastructures, driven by<br />

business performance and security<br />

considerations, means that organisations must<br />

now navigate a hugely complex mix of cloud<br />

and on-premise network components.<br />

Moreover, post-pandemic, the global work<br />

landscape has largely shifted to a hybrid<br />

model, where employees expect to seamlessly<br />

transition between remote and office-based<br />

work. Organisations must therefore have the<br />

ability to connect everyone, everywhere, at any<br />

time to their essential workflows.<br />

This trend of employees connecting from<br />

outside the traditional network boundaries<br />

brings with it some obvious security issues.<br />

The rise of zero trust architectures and<br />

Secure Access Service Edge (SASE) solutions<br />

has addressed some of these concerns,<br />

redefining how organisations securely<br />

connect remote workers.<br />

Even more is changing on the network edge.<br />

Growing numbers of smart, IoT and<br />

operational technology (OT) devices process<br />

data locally at the periphery of the network - for<br />

example, to prevent connectivity or latency<br />

issues. Edge-as-a-Service (EaaS) is starting to<br />

attract interest and will only accelerate the<br />

adoption of edge computing and related<br />

services, presenting additional headaches in<br />

terms of security and access management.<br />

Finally, hardware upgrades have always been<br />

slow in networking. Network components are<br />

usually added as one-off purchases as<br />

required, with components typically only<br />

upgraded every 3-5 years. This means many<br />

organisations rely on very heterogenous<br />

environments that incorporate solutions from<br />

several different vendors.<br />

With so many different networking and<br />

management tools as well as different support<br />

levels for each of these components, it is no<br />

wonder that there is little integration across the<br />

typical company network.<br />

However, today's complex network<br />

requirements demand a comprehensive<br />

approach to visibility, security, network<br />

architecture, manageability and technology<br />

adoption. Ultimately, for network managers to<br />

remain efficient, they will have no choice but to<br />

consolidate, to integrate and to look at the<br />

network from a holistic perspective.<br />

THE ROLE OF INTEGRATION<br />

Integration emerges as the single solution to the<br />

challenges posed by complex networks.<br />

Bringing together the various network and IT<br />

management applications in one single<br />

management console can streamline<br />

workflows, enhance efficiency and provide<br />

valuable insights for network managers.<br />

For instance, integrating the network with a<br />

Professional Services Automation (PSA) tool can<br />

significantly speed up troubleshooting by<br />

directly tying network events to ticketing<br />

processes. Troubleshooting when something<br />

goes wrong in the company network is<br />

traditionally disjointed, with managers having to<br />

move from the network console to the ticketing<br />

system and back. Integration removes these<br />

unnecessary additional steps and streamlines<br />

problem solving and recovery.<br />

Similarly, integrating live network information<br />

with Remote Monitoring and Management<br />

(RMM) tools enables remote device<br />

management across the network, reducing the<br />

need for back-and-forth interactions. With<br />

shadow IT still a challenge for many<br />

organisations, there is another advantage to<br />

this integration: tools in RMM can be used for<br />

20 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: NETWORK INTEGRATION<br />

automatic network discovery, while live<br />

network performance data monitoring<br />

ensures networks are running smoothly.<br />

Additionally, integrating network<br />

information with documentation systems<br />

aids in compliance and auditing processes,<br />

while promoting automation and saving<br />

valuable time.<br />

Application Programming Interfaces (APIs)<br />

can be used to enable such bridging, but<br />

keeping all the involved applications<br />

synchronised and updated is crucial for<br />

seamless functionality. If done well,<br />

integration of these network-related tools<br />

allows businesses to streamline multiple<br />

workflows according to their needs.<br />

THE IMPORTA<strong>NC</strong>E OF SASE<br />

In the era of evolving network challenges,<br />

SASE solutions play a key part in building an<br />

integrated, secure and easily manageable<br />

network. Ensuring the security of a company<br />

network has always been a challenge; even<br />

moreso now the network edge as we know it<br />

no longer exists. With cyber-attacks growing<br />

in number and sophistication, businesses<br />

must implement robust network security to<br />

defend their sensitive data against<br />

ransomware, unauthorised access, data<br />

breaches and other risks. Remote users need<br />

as much, if not more, protection as those<br />

working in the office.<br />

SASE solutions have been a game-changer<br />

as they integrate security right into the<br />

network itself. They essentially provide nextgen<br />

firewall functionality in the cloud,<br />

offering granular controls for web traffic in<br />

distributed work environments. This<br />

technology is fast replacing VPNs, ensuring<br />

secure connectivity regardless of user<br />

location and extending networking and<br />

security capabilities beyond the traditional<br />

network boundaries.<br />

This gives organisations a lot more<br />

flexibility in how they implement security<br />

policies such as zero trust, content filtering<br />

and threat prevention across locations and<br />

remote users.<br />

The many benefits of SASE integration<br />

include efficient policy enforcement,<br />

simplified network management and<br />

scalability. What's more, SASE not only<br />

addresses current network complexities but<br />

also offers the flexibility to adapt to changing<br />

and future business needs - paving the way<br />

to a future-proof infrastructure.<br />

BENEFITS OF NETWORK<br />

INTEGRATION<br />

The integration of network components and<br />

solutions brings numerous benefits. One key<br />

advantage is that network issues, such as<br />

latency or blackouts, can be resolved much<br />

faster. With the necessary information at their<br />

fingertips thanks to seamless links with their<br />

ticketing system and RMM platform, network<br />

managers can pinpoint the source of any<br />

issue more quickly and significantly speed up<br />

mean time to resolution.<br />

In addition, issues can be automatically<br />

routed to the right person for prompt<br />

resolution, while easier and more transparent<br />

performance monitoring helps prevent<br />

problems from arising in the first place.<br />

Policy enforcement is more effective too,<br />

with integrated devices facilitating the<br />

consistent application of rules and access<br />

restrictions across the entire infrastructure,<br />

including edge devices. Updates, patches<br />

and upgrades can also be streamlined<br />

through tight integration, allowing for better<br />

control over their timing and therefore<br />

minimising impact on users and the network.<br />

Plus, the ability to monitor and analyse<br />

network traffic continually enables network<br />

managers to optimise data flows and<br />

balance loads more effectively.<br />

Another benefit of network integration is the<br />

ability to consolidate. SASE, for example,<br />

eliminates the need for multiple VPNs,<br />

potentially allowing downsizing of firewalls<br />

and the removal of redundant, standalone<br />

network security devices. The fact that SASE<br />

platforms are cloud managed simplifies<br />

network administration even further.<br />

Finally, as network needs change, a<br />

streamlined setup with SASE allows<br />

businesses to scale fast and adjust their<br />

infrastructure as needed.<br />

LOOKING AHEAD<br />

Business networks will continue to evolve in<br />

response to changing business needs and<br />

technological advancements. For network<br />

architects, this means they will have to<br />

continually reassess and update their<br />

strategies. Increased integration and a<br />

holistic approach are the keys to staying<br />

ahead of networking requirements.<br />

Integration is not only the answer to<br />

addressing the new complexities of the<br />

hybrid world - it will also be the linchpin for<br />

the future of network management. By<br />

embracing it and leveraging technologies<br />

like SASE, organisations can not only<br />

navigate current challenges but also position<br />

themselves for future success in an everevolving<br />

digital era. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 21


OPINION: QUANTUM TECHNOLOGY<br />

THE RISE OF QUANTUM ECOSYSTEMS<br />

IN <strong>2024</strong> AND BEYOND<br />

DR. PHILIP KRANTZ, QUANTUM ENGINEERING SOLUTIONS<br />

EXPERT AT KEYSIGHT, EXPLORES THE POTENTIAL OF QUANTUM<br />

TECHNOLOGY FOR THE YEAR AHEAD<br />

Quantum technology allows us to<br />

harness the fundamental laws of<br />

quantum mechanics to solve<br />

problems that are either intractable or even<br />

impossible using today's technology. Areas<br />

where quantum technology can offer<br />

profound impact include complex<br />

simulations and computations, secure<br />

communication, and more powerful<br />

imaging and sensor techniques.<br />

Governments and industries have<br />

recognised the necessity to invest in<br />

quantum research and early adoption of<br />

quantum-technological applications to<br />

ensure competitiveness and to be prepared<br />

for any disruptive advancements within the<br />

scope of their interests.<br />

As a response to the steady scientific<br />

progress within the quantum community<br />

during the past decades, many branches of<br />

quantum technologies have moved out of<br />

university labs into start-up ventures, hightech<br />

companies, as well as military.<br />

Consequently, the community has<br />

broadened from mainly being explored by<br />

quantum physicists to requiring a wide<br />

blend of expertise and backgrounds,<br />

ranging from various engineering<br />

disciplines to including business<br />

professionals, investors, and entrepreneurs.<br />

As part of this transition, academic and<br />

industrial quantum hubs, quantum<br />

incubators, as well as local and national<br />

quantum ecosystems have risen during the<br />

past years - most aiming to build up and<br />

foster a workforce composition required for<br />

long-term success. To this end, there has<br />

been an increased need to attract talent,<br />

both from outside these ecosystems as well<br />

as training local students and engineers, to<br />

enable sustainable technological growth.<br />

22 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: QUANTUM TECHNOLOGY<br />

In this article, we will discuss a few<br />

ongoing trends we are seeing when it<br />

comes to building up quantum<br />

ecosystems.<br />

NATIONAL QUANTUM<br />

TECHNOLOGY INITIATIVES<br />

Building up world-leading expertise in<br />

quantum technologies takes a long time,<br />

requires substantial investment, and is<br />

often facilitated through an already<br />

existing academic quantum research<br />

community. Quantum ecosystems, i.e.<br />

collaborative environments of academic<br />

and industrial quantum research teams,<br />

are often created to support mutual<br />

interests in terms of both attracting the<br />

workforce, as well as synergistically<br />

benefiting from other members' strengths<br />

and competencies.<br />

These local quantum ecosystems expand<br />

both organically via education and<br />

inorganically through attracting workforce<br />

and industries from other places to get<br />

established within the ecosystem.<br />

Therefore, access to state-of-the-art<br />

technology, beneficial start-up culture,<br />

and world-leading research teams are all<br />

examples of important factors needed for<br />

ecosystems to become successful and<br />

self-sustaining.<br />

Oftentimes, however, ecosystems<br />

experience "knowledge gaps" prohibiting<br />

them from making fast progress on certain<br />

technologies. One example is when the<br />

capability to produce high-quality quantum<br />

processor units (QPUs) is missing. For<br />

instance, due to the lack of an advanced<br />

and dedicated cleanroom facility. One<br />

common trend that we often see is that<br />

such ecosystems procure a commercial<br />

quantum processor (sometimes also<br />

including all required cryogenics and<br />

quantum control systems) containing the<br />

qubit modality (or modalities) that the<br />

country seeks to pursue.<br />

This way, local experience in quantum<br />

control and algorithms can be gained in<br />

parallel with the development of local<br />

cleanroom fabrication processes and the<br />

exploration of optimal qubit designs.<br />

During the past years, several<br />

commercial alternatives for QPUs as well<br />

as parametric amplifiers have entered<br />

the market.<br />

QUANTUM-AS-A-SERVICE (QAAS)<br />

As mentioned, getting started in quantum<br />

technology requires time, money, and<br />

manpower. This has yielded an increased<br />

market need for quantum service<br />

providers to offer quantum-as-a-service<br />

(QaaS), including, for instance, remote<br />

cloud access to quantum processors, test<br />

beds for device characterisation, as well<br />

as foundries that offer fabrication services<br />

to clients.<br />

This way, quantum research teams have<br />

the option to strategically outsource<br />

parts of their operation to a third-party<br />

QaaS provider, which can have an<br />

important impact for startups entering<br />

the quantum ecosystem with limited time<br />

and resources.<br />

While this is currently happening on a<br />

very limited scale, interest in QaaS will<br />

increase in <strong>2024</strong> and beyond. In<br />

addition, we foresee that QaaS providers<br />

may in the long run enter a role to<br />

standardise device operation,<br />

characterisation, and fabrication which<br />

allows for future benchmarking of both<br />

quantum processors as well as qubitadjacent<br />

technologies.<br />

QUANTUM IN THE CLASSROOM<br />

Another ongoing trend we are seeing is<br />

an increased need for a qualified and<br />

diverse workforce as countries ramp up<br />

their national quantum initiatives. To<br />

address this bottleneck, we foresee that<br />

the number of dedicated higher<br />

education programs focusing on quantum<br />

technologies will continue to increase in<br />

<strong>2024</strong> and beyond.<br />

Oftentimes, these programs are<br />

constructed in close collaboration with<br />

industrial partners, with access to stateof-the-art<br />

quantum control and readout<br />

technologies, so that students acquire<br />

relevant and up-to-date skills,<br />

preparing them for future quantum<br />

careers. There are also numerous<br />

industrial internships and mentorship<br />

programs that can help guide students<br />

in their future career choices.<br />

In addition to pure technical programs,<br />

there will also be an increased focus on<br />

quantum technology among business<br />

schools and entrepreneurship programs.<br />

This comes from an increased drive for<br />

business professionals to obtain basic<br />

training in quantum technology, helping<br />

them to be competitive in the highly<br />

dynamic quantum community.<br />

GENDER EQUALITY IN QUANTUM<br />

Another very positive and uprising trend is<br />

the many ongoing efforts on gender<br />

equality, aiming at increasing the ratio of<br />

women working in quantum technologies.<br />

Having access to a diversified and<br />

gender-balanced workforce is important<br />

for any industry and quantum<br />

technologies are certainly no exception.<br />

With the worldwide advancement in<br />

quantum technology research and<br />

development, the community is expanding<br />

beyond the academic realm and into<br />

startups, high-tech companies, and the<br />

military. This will give rise to quantum<br />

hubs, incubators, and local and national<br />

ecosystems all trying to build a workforce<br />

able to seize the quantum opportunity.<br />

Solving the talent gap is critical to<br />

realising the potential of quantum in the<br />

coming years and decades. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 23


OPINION: RETAIL INFRASTRUCTURE<br />

RETAIL INFRASTRUCTURE FIT FOR TODAY AND TOMORROW<br />

THE CHALLENGE OF DIGITAL TRANSFORMATION IN THE RETAIL SECTOR REQUIRES A RESILIENT<br />

AND ADAPTABLE IT INFRASTRUCTURE, ACCORDING TO HENK IJSPEERD, SALES DIRECTOR EMEA<br />

STRATEGIC SEGMENT RETAIL, AT VERTIV<br />

In the ever-evolving landscape of retail, the<br />

call for transformation is not just a<br />

buzzword but a strategic necessity, one that<br />

can make or break any business across the<br />

sector. The intricate interplay of consumer<br />

behaviours, driven by the unstoppable surge<br />

of the digital revolution and accentuated by<br />

global events such as the never-to-be<br />

forgotten COVID-19 pandemic, highlights<br />

the need for a profound and comprehensive<br />

re-evaluation of IT infrastructure.<br />

However, the task is far from simple - it's a<br />

complex landscape characterised by<br />

intricacies and challenges. Retail<br />

infrastructure should be more than a swift<br />

adaptation to immediate needs; retailers<br />

should also look ahead, consider formidable<br />

trends that loom large and navigate change<br />

armed with foresight and strategic acumen.<br />

NAVIGATING THE DIGITAL<br />

REVOLUTION<br />

The foundation of the retail sector is shifting<br />

as consumer preferences continue to pivot<br />

towards digital platforms. The impact of the<br />

pandemic accelerated this shift, pushing<br />

retailers to adapt to online models to meet<br />

consumer demands far more quickly than<br />

planned. However, this move is not just a<br />

reaction to events like COVID; it reflects a<br />

broader trend in consumer behaviour which<br />

will stand the test of time as people enjoy the<br />

speed and convenience of online shopping.<br />

The relentless pace of technological<br />

advancements - such as Artificial Intelligence<br />

(AI), Virtual Reality (VR) and Augmented<br />

Reality (AR) - add another layer of<br />

complexity, requiring retailers to be agile and<br />

innovative in adopting technologies that<br />

enhance the customer experience. Success in<br />

this dynamic environment hinges on retailers'<br />

ability to blend short-term responsiveness<br />

with a visionary outlook, ensuring they not<br />

only meet today's needs but also remain<br />

adaptive to the digital trends shaping the<br />

future of retail.<br />

Central to the success of businesses in the<br />

sector is the achievement of consistency<br />

across diverse channels. The line between<br />

online and offline experiences continues to<br />

blur, necessitating a seamless transition<br />

between virtual and physical interactions with<br />

brands. The optimisation of systems,<br />

streamlined logistics and maintaining<br />

consistent stock levels all emerge as integral<br />

components of ensuring a positive and<br />

consistent customer experience. Consumers<br />

are no longer satisfied with good customer<br />

service, they expect to be delighted.<br />

REGULATORY CHALLENGES AND<br />

ENVIRONMENTAL CONSIDERATIONS<br />

For retailers, the journey of keeping the retail<br />

infrastructure fit for purpose is marked with<br />

regulatory challenges, especially in regions<br />

facing power scarcity such as Ireland and the<br />

Netherlands. Compliance with local and<br />

international environmental regulations<br />

further amplifies the intricacies of this process.<br />

Retailers must navigate a complex landscape<br />

of rules and standards while striving to build<br />

an efficient and resilient infrastructure.<br />

Ongoing success for retailers demands not<br />

only an acute understanding of the current<br />

regulatory landscape but also an ability to<br />

strategically position infrastructure in<br />

alignment with emerging environmental<br />

standards and the latest technology<br />

24 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: RETAIL INFRASTRUCTURE<br />

innovations. This dual focus ensures not just<br />

compliance but a resilient and forwardlooking<br />

foundation capable of withstanding<br />

the regulatory changes that lie ahead.<br />

INFRASTRUCTURE PRESSURES IN<br />

THE DIGITAL ERA<br />

The surge in digital transactions and the<br />

growing reliance on technology bring a<br />

host of considerations for retail<br />

infrastructure. Storage demands,<br />

especially for vast amounts of data like<br />

CCTV images, coupled with the<br />

intricacies of delivering personalised<br />

customer experiences, present a delicate<br />

balancing act. Achieving standardisation<br />

across diverse regions is crucial, yet<br />

predicting infrastructure requirements in<br />

an era of constant technological evolution<br />

poses a formidable challenge.<br />

Beyond the digital sphere, the physical<br />

spaces of warehouses and stores pose<br />

unique challenges too. Physical security of<br />

warehouses, temperature variations in<br />

different store locations and diverse<br />

environmental conditions necessitate<br />

infrastructure solutions that are adaptable<br />

and resilient. Understanding and<br />

anticipating customer expectations in the<br />

coming years are paramount in crafting<br />

infrastructure that stands resilient against<br />

the test of time.<br />

CONTRIBUTING TO GRID STABILITY<br />

In the face of escalating pressure on<br />

energy grids, retailers also assume a<br />

crucial role beyond consumption - they<br />

become potential contributors to grid<br />

stability. The implementation of scalable<br />

Uninterruptible Power Supply (UPS)<br />

solutions with dynamic grid support<br />

features, the integration of renewable<br />

energy sources like solar panels and wind<br />

turbines, and the strategic storage of<br />

energy in batteries (Battery Energy Storage<br />

Solutions; BESS) extend beyond business<br />

continuity measures.<br />

These initiatives play a pivotal role in<br />

mitigating the strain on the grid,<br />

transforming retailers into active<br />

participants in the broader energy<br />

ecosystem. By embracing more sustainable<br />

energy practices and acting as responsible<br />

contributors to grid stability, retailers not<br />

only fortify their own infrastructure against<br />

disruptions but also contribute to the<br />

overall resilience, and help to reduce the<br />

carbon footprint of the energy infrastructure<br />

that underpins modern commerce. This<br />

dual impact underscores the integral role<br />

retailers play in shaping a more robust and<br />

sustainable future.<br />

STRATEGIC PLANNING FOR LONG-<br />

TERM RESILIE<strong>NC</strong>E<br />

At the core of future-proofing retail<br />

infrastructure lies strategic, long-term<br />

planning. The evolving retail landscape<br />

demands not just adaptability to current<br />

challenges but a proactive stance towards<br />

emerging trends. Scalable solutions that<br />

flexibly accommodate future requirements,<br />

coupled with a comprehensive<br />

understanding of regional and global<br />

dynamics, are essential for resilience in the<br />

face of uncertainty and change.<br />

Providers of critical infrastructure solutions<br />

play a pivotal role in empowering retailers<br />

for the digital age. Going beyond being<br />

solution providers, they must also be<br />

strategic partners committed to delivering<br />

the continuous availability, reliability and<br />

efficiency of essential elements in evolving<br />

retail settings. Partners with a<br />

comprehensive approach - from innovation<br />

and design to manufacturing and ongoing<br />

support - will provide a seamless and<br />

efficient experience throughout the<br />

infrastructure life cycle.<br />

Close collaboration with retailers to craft<br />

bespoke strategies that align with their<br />

unique requirements, such as the meticulous<br />

creation of comprehensive data profiles for<br />

each customer, will make the critical<br />

difference. This empowers retailers to gain<br />

invaluable insights and make informed,<br />

data-driven decisions to propel their<br />

businesses forward.<br />

One element that will help is if your<br />

partner has proven expertise in the realm of<br />

Artificial Intelligence (AI). This invaluable<br />

knowledge will strategically place<br />

organisations at the forefront of the<br />

imminent retail revolution, whereAI is<br />

poised to thrive and realise its full potential.<br />

FIT FOR THE FUTURE<br />

Considering the dynamic interplay of<br />

consumer expectations, technological<br />

evolution and regulatory landscapes, retail<br />

infrastructure transcends the realm of choice<br />

- it stands as a strategic imperative. The<br />

retail landscape, characterised by perpetual<br />

change, demands a proactive approach<br />

from retailers. It's not enough to react to<br />

current challenges; retailers must envision<br />

and enact an infrastructure capable of<br />

navigating the uncertainties that lie ahead.<br />

The journey towards implementing the<br />

right infrastructure is not a one-time event;<br />

it's an enduring commitment. It involves<br />

creating a resilient and adaptable IT<br />

infrastructure that can not only withstand<br />

disruptions but also leverage emerging<br />

opportunities, harnessing the power of<br />

digital infrastructure partners. Through this<br />

ongoing commitment, retailers can<br />

position themselves not just as entities in<br />

the present retail ecosystem but as<br />

architects shaping a brighter, more<br />

sustainable future for the entire industry.<br />

In embracing this continuous journey of<br />

evolution, retailers strengthen their<br />

relevance, ensuring that their<br />

infrastructure is not only responsive to<br />

current needs but also anticipatory of the<br />

transformative trends shaping the retail<br />

industry of tomorrow. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 25


SECURITY UPDATE<br />

BECOMING SECURE BY DESIGN<br />

CHIP DANIELS, VP, GOVERNMENT AFFAIRS AT SOLARWINDS, OUTLINES THE ROLE OF PUBLIC-<br />

PRIVATE PARTNERSHIPS IN PROTECTING OUR CYBERINFRASTRUCTURE<br />

Modern software development has<br />

made our digital world more<br />

interconnected than ever, driven<br />

by the shift to the cloud and the increased<br />

use of microservices and open-source<br />

code. The interdependent nature of our<br />

modern digital infrastructure means cyber<br />

threats targeting any one software<br />

company or product can, unfortunately,<br />

have a broad impact across the industry.<br />

Therefore, the sector must change its<br />

approach to cybersecurity and come<br />

together to better defend against mounting<br />

cyber threats.<br />

The industry must work collaboratively<br />

and in partnership with governments to<br />

share information about threats,<br />

mitigation methods, and prevention steps.<br />

While some government agencies have<br />

taken a leading role in championing this<br />

type of collaboration, there is still work to<br />

be done.<br />

To support collaboration among the<br />

public and private sectors, SolarWinds<br />

recently hosted a panel discussion in<br />

Washington D.C. featuring SolarWinds<br />

President and CEO Sudhakar<br />

Ramakrishna in conjunction with<br />

Congressman Darrell Issa (R-CA),<br />

Congressman Raja Krishnamoorthi (D-IL),<br />

and CISA Executive Assistant Director for<br />

Cybersecurity Eric Goldstein.<br />

The discussion highlighted several key<br />

ways to help the industry become Secure by<br />

Design, including the role of collaboration<br />

in creating a strong defence, supporting<br />

responsible disclosure to increase<br />

information sharing, and ensuring the<br />

industry invests in the people skills needed<br />

to defend against the newest threats.<br />

COLLABORATION FOR A STRONG<br />

DEFE<strong>NC</strong>E<br />

The role of collaboration is critical in<br />

protecting the customers of private<br />

companies, as well as defending nations<br />

against foreign adversaries. According to<br />

Goldstein, CISA is leading the<br />

collaborative effort in public-private<br />

partnerships to "ensure that we are seeing<br />

threats before they manifest on our nation's<br />

networks and taking action in response."<br />

And to support CISA's initiative in<br />

promoting widespread collaboration, "we<br />

need a model where government, industry,<br />

and our international partners are<br />

seamlessly and frictionlessly working<br />

together day in and day out to combat the<br />

threats that we're seeing today and getting<br />

ahead of the ones that we're seeing<br />

tomorrow." Companies can contribute to<br />

the industry's collective defence posture by<br />

actively participating in transparent<br />

information sharing.<br />

SUPPORTING VICTIMS IN<br />

RESPONSIBLE DISCLOSURE<br />

The practice of reporting security<br />

vulnerabilities and threats in a responsible<br />

way is critical to ensure that the sector has<br />

information about new attacks. The<br />

cornerstone of responsible disclosure is<br />

ensuring that fixes or patches are available<br />

when the issue is announced in order to<br />

limit the risk of malicious actors exploiting<br />

issues before they are fixed.<br />

Governments should further incentivise<br />

companies for responsible disclosure and<br />

information sharing. Unfortunately, this is<br />

not always the case. Given the risk that<br />

companies can be victim-shamed in the<br />

news media and even face punitive<br />

measures after<br />

disclosure, there is<br />

often a greater<br />

incentive for companies<br />

not to disclose. Ideally,<br />

the industry would foster<br />

an environment where<br />

victims can share their<br />

experiences and learnings<br />

without fear of retribution.<br />

SECURE BY DESIGN: A<br />

PROACTIVE APPROACH<br />

To successfully navigate the<br />

modern threat landscape,<br />

companies must become Secure by<br />

Design in the software development<br />

process. This means integrating security<br />

measures throughout an entire product<br />

lifecycle from inception to deployment.<br />

Ramakrishna shares an analogy: "You don't<br />

think about the airbag in a car after the car<br />

is manufactured and on the road. You think<br />

about the safety of that as you're<br />

designing it."<br />

Similarly, Secure by Design incorporates<br />

security as a foundational and inherent<br />

component of systems and applications. As<br />

a result, developers can minimise the<br />

attack surface and proactively identify and<br />

address vulnerabilities.<br />

Many governments are already refining<br />

security guidelines. In the US, for<br />

example, this includes the generation of a<br />

Software Bill of Materials (SBOM), which<br />

26 NETWORKcomputing FEBUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


SECURITY UPDATE<br />

is like a<br />

receipt of each component,<br />

library, tool, and process developers use<br />

in the build process.<br />

SBOMs are a critical step for improving<br />

the security of software products by<br />

providing visibility into their composition.<br />

According to Krishnamoorthi, "We need<br />

radical disclosure and radical sharing to<br />

make sure that everybody can learn from<br />

the attacks that are going on." As part of a<br />

more significant, nationwide Secure by<br />

Design initiative, SBOMs introduce a new<br />

standard for transparency and openness in<br />

the industry.<br />

BUILDING THE SKILLS NEEDED<br />

With more than 3.4 million open positions<br />

in the field, the demand for cybersecurity<br />

experts is higher than ever. This results<br />

from a<br />

lack of<br />

qualified<br />

individuals available<br />

to fill the roles. During the panel,<br />

Krishnamoorthi recommended allocating<br />

additional skills and vocational training<br />

resources to solve this issue. This would<br />

require increased incentives and the<br />

implementation of training in high schools<br />

and community colleges.<br />

To accomplish collaboration and<br />

transparency, the government needs more<br />

support from the private sector.<br />

Ramakrishna suggested that software<br />

companies allocate the equivalent of one<br />

trained, full-time employee to support<br />

information sharing across individuals,<br />

companies, and government agencies.<br />

This designated liaison would be a<br />

champion<br />

for working collaboratively<br />

and help ensure robust public-private<br />

partnerships amid the evolving threat<br />

landscape.<br />

WHY IT MATTERS<br />

Highly sophisticated nation-state hackers<br />

pose significant threats to the security of<br />

global digital infrastructure. By working<br />

together across the industry, we can build a<br />

resilient defence against cyberattacks and<br />

protect our digital ecosystem. Cyber<br />

resilience is not just about preventing<br />

cyberattacks but recovering quickly - and<br />

having a plan to identify and contain the<br />

attack. It is a shared responsibility<br />

requiring the cooperation of governments,<br />

businesses, and individuals. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 27


OPINION: IDENTITY MANAGEMENT<br />

AVOIDING AN IDENTITY CRISIS<br />

THOMAS MULLER-MARTIN, GLOBAL PARTNER LEAD, OMADA EXPLAINS WHY THE EVOLUTION OF MODERN<br />

IDENTITY GOVERNA<strong>NC</strong>E AND ADMINISTRATION (IGA) SOLUTIONS IS WORTH YOUR ATTENTION<br />

The field of identity governance and<br />

administration has dramatically changed<br />

in the past several years, driven in large<br />

part by trends like cloud adoption and AI.<br />

These aren't the only significant factors that<br />

have changed the landscape, of course, but<br />

they are the ones we hear of most.<br />

It's also worthwhile to look at subtle shifts that<br />

have occurred in recent years, as they allow<br />

organisations to calculate their ROI faster,<br />

illustrate consistent business value to their<br />

stakeholders, and keep the solution simple to<br />

operate, agile to extend, and conveniently<br />

scalable. Implementing IGA fast and<br />

successfully requires a modern<br />

implementation strategy.<br />

BUILT-IN PROCESSES HAVE IMPROVED<br />

In the past, customers often created highly<br />

customised onboarding, transfer and<br />

offboarding routines. Request access and<br />

approvals were different at every organisation.<br />

You saw similar trends with periodic reviews of<br />

access (recertifications), management of<br />

contractors, and other IGA-related workflows.<br />

But today, more organisations are looking for<br />

more universal approaches that don't add<br />

extra work for employees but still help<br />

maintain compliance.<br />

There are more solutions today with more<br />

mature built-in processes than they had in the<br />

past. They're far more robust, more adaptable<br />

and easier to operate. Typical use cases like<br />

generating account names according to the<br />

company standard, sending individual emails<br />

or defining individual approval patterns are<br />

now highly configurable. Some of these<br />

processes may have required code-based<br />

customisation before; now those coding tasks<br />

have shifted to business-focused advisory. In<br />

28 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: IDENTITY MANAGEMENT<br />

other words, whereas in the past IAM projects<br />

were seen as pure technical plays to shift data<br />

from A to B, now they can be positioned as a<br />

solution to a business need, not just a tool.<br />

As more organisations use the configured<br />

out-of-the-box standard, innovation can today<br />

focus on the flexibility of the core product<br />

instead of the error-prine and high-cost codebased<br />

customisation.<br />

SELF-SERVICE OPTIONS HAVE<br />

EXPANDED AS USER BASE GROWS<br />

It used to be that IGA was a domain that<br />

required specialists - a core team of two to five<br />

specialists who were tasked with keeping your<br />

organisation compliant. That approach has<br />

changed, largely out of necessity, given the<br />

number of people and roles within a typical<br />

organisation today. More people are using<br />

IGA solutions in most companies, from<br />

requesting access to recertifying and from<br />

creating role definitions to onboarding<br />

employees. To meet these needs, we've seen<br />

many IGA offerings evolve to be able to<br />

distribute tasks in an easier way, throughout<br />

the entire organisation.<br />

Operations are changing faster than in the<br />

past, and the exposure of individuals in the<br />

business has continuously risen. As the<br />

operation of the solution gets less complex and<br />

fewer tickets go to the service desk and<br />

operations team, they can focus on<br />

broadening the scope of the IGA solution<br />

(connecting to more systems), to go deeper<br />

than before (segregation of duties, risk<br />

concepts, roles) or to think outside of the box<br />

of IGA to integrations with privileged access<br />

management (PAM), customer identity and<br />

access management (CIAM), security<br />

information and event management (SIEM)<br />

and other identity-related solutions.<br />

MORE SYSTEMS, MORE IDENTITIES<br />

An average enterprise might be using as many<br />

as 130 different SaaS apps and all of these<br />

apps are also creating new digital identities.<br />

It's no wonder, then, that the number of<br />

identities that need to be managed has<br />

continuously risen in the last 10 years. With<br />

more cross-organisational collaboration, the<br />

adoption of cloud services and remote work,<br />

this trend is on an upward trajectory.<br />

The number of relations between identities<br />

and systems is exponentially increasing. Larger<br />

enterprises have many more connections than<br />

smaller ones. Additionally, not all identities and<br />

systems are under direct control anymore. For<br />

example, suppliers and contractors are<br />

typically not managed by the HR system, and<br />

your employees have work-related access to<br />

systems that you don't own.<br />

THE RISE OF INTEGRATIONS<br />

It was common in the past to see the individual<br />

identity management solution as an isolated<br />

element of your cybersecurity strategy. But<br />

things have changed, such as the rise of<br />

visionary Identity Fabric strategies. They<br />

represent a forward-looking approach to IGA,<br />

aiming to create a unified, flexible and secure<br />

identity management framework that aligns<br />

with an organisation's current and future<br />

needs. These strategies often leverage modern<br />

technologies like AI, automation and analytics<br />

to enhance identity governance and security.<br />

An emphasis on zero trust (assuming every<br />

person or device is not trustworthy until<br />

verified) is another change. It's become<br />

increasingly apparent that the many pieces of<br />

your identity infrastructure - including multifactor<br />

authentication (MFA), PAM, CIAM and<br />

IGA - need to collaborate in a seamless way.<br />

A typical enterprise has solutions by various<br />

vendors, ongoing transformation projects and<br />

extensions to the existing set of functionalities.<br />

IGA plays an essential role in this scenario, as<br />

it is the integration layer in many regards,<br />

allowing the other solutions to be<br />

more effective.<br />

IGA IN ACTION<br />

As one example, the PAM solution allows<br />

you to protect your securable assets. IGA<br />

allows you to classify those assets, create a<br />

comprehensive risk analysis and define the<br />

list of assets that need to be secured.<br />

Another use case is the deactivation of<br />

accounts triggered by third-party solutions.<br />

For instance, IGA can get the signals about<br />

unexpected user behavior from Microsoft<br />

Threat Protection and disable all personal<br />

and administrative accounts of the<br />

individual within seconds, in a compliant<br />

and auditable manner.<br />

The integration of the company's user<br />

interface for standard IGA tasks, such as<br />

requesting and approving access, is a<br />

third example that's becoming increasingly<br />

relevant. If you are using common user<br />

interfaces for your end users, such as<br />

ServiceNow, you can allow them to<br />

perform their tasks inside the platform<br />

they're familiar with. Creating open APIs<br />

and the availability of interwoven use<br />

cases is key for leveraging your IAM<br />

solutions far better.<br />

IGA AT THE CORE<br />

IGA is the core of modern identity<br />

management ecosystems. You can't fix<br />

today's problems with solution patterns<br />

from a decade ago. You need more of an<br />

advisory mindset with a business focus<br />

instead of a purely technical approach. If<br />

you're aware of the leaps of functionality<br />

that modern IAM solutions have gone<br />

through, you can reduce the effort required<br />

for integration, increase the measurable<br />

business value, achieve a more secure<br />

solution and reduce the long-tail operation<br />

and migration costs that legacy solutions<br />

have. Getting this right will enable you to<br />

leverage mega-trends like AI more<br />

effectively and maximise the value of<br />

identity governance. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 29


OPINION: BACKUPS<br />

BUNGLED BACKUPS<br />

WHY ARE BUSINESSES STILL FAILING TO BACKUP THEIR DATA? JON FIELDING, MANAGING<br />

DIRECTOR, EMEA AT APRICORN, OFFERS SOME INSIGHTS<br />

Abackup strategy is a safety net for<br />

the business and, in the event of a<br />

disaster or a data breach, it can<br />

often determine if a business sinks or<br />

swims. Being able to recover data is vital<br />

to resume normal operations, yet a<br />

growing number of businesses are finding<br />

that they are unable to recover all of their<br />

data when putting that strategy to the test.<br />

A recent poll of 201 security decision<br />

makers found that, of the 90 percent of<br />

businesses that needed to recover<br />

their data at some point over the<br />

past year, only 27 percent were<br />

able to do so, down from 45<br />

percent in 2022, according to the<br />

Apricorn Annual Survey 2023. That<br />

equates to two out of three<br />

businesses losing some of their<br />

data. The main cause of these<br />

failed backups was a lack of robust<br />

backup processes, as identified by<br />

32% of those questioned. The<br />

findings further revealed that<br />

ransomware is on the up, with a<br />

quarter naming this as the main<br />

cause of data breaches, up from 15%<br />

the previous year.<br />

WHY ARE BACKUPS FAILING?<br />

So, given the rise in<br />

ransomware attacks - which<br />

should have prompted users<br />

to double down security and<br />

focused attention on the<br />

importance of data backups -<br />

why are organisations getting<br />

worse at the practice? Part of<br />

the problem comes down to<br />

an increase in manual<br />

processing. Working habits,<br />

namely an increase in remote or mobile<br />

working, have seen more of us resorting<br />

to manually backing up data locally<br />

before then also doing so to a central<br />

location. But while this may be more<br />

convenient it's also more prone to error.<br />

Users need to remember to execute the<br />

backup and to carry out the procedure<br />

correctly, for example.<br />

The same survey uncovered a marked<br />

shift from automated to manual backups,<br />

with only half of those questioned using<br />

an automated approach, whereas that<br />

figure stood at 93 percent in 2022.<br />

Nearly half of businesses (49%) are<br />

backing up manually compared to just 6<br />

percent the year before, so there has been<br />

an extreme swing from one to the other.<br />

Moreover, while only one percent were<br />

backing up to personal storage devices<br />

before, now 16 percent are using these to<br />

provide a local backup facility.<br />

It's important to note that there are<br />

advantages and disadvantages to both<br />

localised and centralised backups, so<br />

doing so manually to a local device isn't<br />

necessarily a bad thing. What's worrying is<br />

that there is a marked decline in those<br />

adopting the 3-2-1 strategy of having at<br />

least three copies of the data, stored on<br />

at least two media, at least one of which<br />

is off-site. In fact, the ideal is to have that<br />

offsite copy air gapped so a personal<br />

storage device such as an encrypted<br />

removable hard drive or USB stick. But the<br />

survey revealed that those companies<br />

backing up to both a central and personal<br />

repository was low, with only 38 percent<br />

doing so regardless of whether they were<br />

using an automated or manual approach.<br />

30 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: BACKUPS<br />

PUT<br />

YOUR BACKUP<br />

PROCESS TO THE TEST<br />

In effect this means that the backup<br />

strategy has been reduced to a single<br />

point of failure - and this doesn't<br />

become apparent until it is put to the<br />

test. What the survey reveals is that not<br />

enough businesses are testing their<br />

backup processes to ensure they are<br />

up to date, robust and able to function<br />

correctly and efficiently. The general<br />

consensus is this should be done at<br />

least once a year but, given that it<br />

should also be tested in the event of<br />

any changes to the digital<br />

environment, i.e. when new users,<br />

applications, or systems are added, or<br />

when there's a procedural change<br />

caused by changes in workflow or<br />

compliance<br />

regulations, the reality is<br />

testing should be more frequent.<br />

Going forward there are some clear<br />

lessons to be learnt here. It's not<br />

enough to be backing up regularly -<br />

that data needs to be held in multiple<br />

locations to provide a belt and braces<br />

approach using the 3-2-1 rule so that,<br />

in the event one backup fails, the<br />

business has other options. It's for this<br />

reason also that you should ensure that<br />

your backup doesn't connect directly to<br />

the live data source, as this can make<br />

it vulnerable to malicious activity.<br />

Ideally, it should be an<br />

automated process, although manual<br />

backups do offer a convenience that is<br />

hard to argue with given the way we<br />

now flexibly work. To safeguard data,<br />

therefore, it should be held on an<br />

encrypted format and, if using<br />

hardware, look for FIPs-level security.<br />

Finally, regularly test that the backup<br />

procedure is fit for purpose and that<br />

data is fully recoverable, otherwise all of<br />

those efforts will be in vain. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards FEBRUARY/MARCH <strong>2024</strong> NETWORKcomputing 31


OPINION: 5G<br />

THE NEXT GENERATION OF CONNECTIVITY<br />

TODD MUSSMAN, WIRELESS CONNECTIVITY EXPERT AT GTT,<br />

EXPLAINS HOW WE CAN UNOCK THE POTENTIAL OF 5G FIXED<br />

WIRELESS ACCESS (FWA)<br />

In our increasingly crowded market,<br />

businesses across all sectors have to<br />

find ways to gain the competitive<br />

advantage and deliver for their<br />

customers. After all, today's consumer has<br />

higher expectations for the brands that<br />

they interact with than ever before. And, if<br />

these expectations aren't met, they will<br />

search elsewhere.<br />

In fact, according to recent research,<br />

almost one third (32%) of customers<br />

would stop doing business with a<br />

brand they loved after just one<br />

negative experience. For businesses<br />

looking to attract and retain their<br />

customers, there is simply no room<br />

for mistakes.<br />

To keep up with customer demand -<br />

and deliver the best experiences<br />

possible - connectivity is vital. It is the<br />

key to both remaining agile and<br />

ensuring business continuity, regardless<br />

of economic, societal and geopolitical<br />

conditions. It also enables businesses to<br />

scale and protect their operations from<br />

unexpected downtime and keep their<br />

costs in check.<br />

For businesses looking to<br />

boost connectivity,<br />

there are<br />

several<br />

routes<br />

they<br />

could<br />

take.<br />

One<br />

which is currently garnering much<br />

industry attention is 5G Fixed Wireless<br />

Access (FWA). This technology - which<br />

provides stable, high-speed internet -<br />

offers a high-performance, reliable<br />

answer for businesses looking to meet<br />

customer expectations and remain agile,<br />

no matter what.<br />

GAME-CHANGING TECHNOLOGY<br />

FWA is a type of 5G technology that<br />

relies on radio waves to broadcast highspeed<br />

signals across vast distances<br />

instead of fiber optic cabling, reducing<br />

the number of infrastructural challenges<br />

related to traditional broadband access.<br />

For businesses and their customers, it<br />

offers greater reliability and resiliency<br />

with guaranteed performance.<br />

By delivering ultra-fast speeds, 5G<br />

FWA enables businesses to keep up with<br />

their customer's ever-changing<br />

expectations. It does so by providing<br />

optimal connectivity for all employees,<br />

regardless of where they are logging on<br />

from. This is a game-changer, especially<br />

in challenging-to-reach locations when<br />

wireline solutions for primary connectivity<br />

are difficult to establish. Employees are<br />

not only connected to each other but<br />

their customers.<br />

Another benefit associated with 5G<br />

FWA is easy installation. Unlike<br />

traditional connections, it can be<br />

installed without any cable drilling or<br />

wiring. All a business needs to activate it<br />

is the right expertise and a 5G-enabled<br />

32 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


EVENT ORGANISERS:<br />

Do you have something coming up that may<br />

interest readers of Network Computing?<br />

Contact dave.bonner@btc.co.uk<br />

6-7<br />

MAR<br />

TECH SHOW LONDON<br />

ExCel, London<br />

https://www.techshowlondon.co.uk/BTC<br />

FORTHCOMING EVENTS<br />

<strong>2024</strong><br />

FORTHCOMING EVENTS<br />

FORTHCOMING EVENTS<br />

28<br />

MAR<br />

25<br />

APR<br />

25<br />

APR<br />

9<br />

MAY<br />

22-23<br />

MAY<br />

4-6<br />

JUN<br />

13<br />

JUN<br />

19<br />

SEP<br />

2-3<br />

OCT<br />

20-21<br />

NOV<br />

CIO/CISO NORDICS SUMMIT<br />

Copenhagen, Denmark<br />

www.cdmmedia.com/events<br />

CIO/CISO UK SUMMIT<br />

London<br />

www.cdmmedia.com/events<br />

CDO UK SUMMIT<br />

London<br />

www.cdmmedia.com/events<br />

CIO/CISO BENELUX SUMMIT<br />

Amsterdam, Netherlands<br />

www.cdmmedia.com/events<br />

DTX MA<strong>NC</strong>HESTER<br />

Manchester Central<br />

https://dtxevents.io/manchester/en/page/dtx-manchester<br />

INFOSECURITY EUROPE<br />

ExCel London<br />

https://www.infosecurityeurope.com/<br />

CIO/CISO DACH SUMMIT<br />

Frankfurt, Germany<br />

www.cdmmedia.com/events<br />

CIO/CISO IRELAND SUMMIT<br />

Dublin, Ireland<br />

www.cdmmedia.com/events<br />

UC EXPO EUROPE<br />

ExCel, London<br />

https://ucxevents.io/ucexpo/en/page/ucexpo-home<br />

DATA CENTRES IRELAND<br />

RDS, Dublin<br />

www.datacentres-ireland.com


OPINION: 5G<br />

SIM card. This also makes it far more<br />

cost effective than many of the other<br />

solutions on the market.<br />

5G FWA networks are also built with<br />

redundancy measures and backup<br />

internet connections in place, making<br />

them one of the most reliable solutions<br />

for businesses looking to stay connected<br />

at all times. By using a premise-based<br />

modem equipped with dual SIM cards,<br />

the FWA service is available across two<br />

operators' footprints. This means that<br />

businesses can switch to the network<br />

providing the best performance at a<br />

given time, increasing agility and<br />

performance.<br />

This technology has the power to<br />

transform many industries - including<br />

manufacturing, agriculture, healthcare,<br />

and banking - due to its ability to<br />

provide high-speed connectivity, rapid<br />

deployment, fewer business interruptions<br />

and improved scalability. Currently, many<br />

of these benefits are already being<br />

witnessed in retail environments, where<br />

the blending of 5G and Wi-Fi has<br />

extended connectivity, leading to<br />

improved customer experiences, reliable<br />

point of sales (POS) processing, and<br />

faster decision making.<br />

UNLOCKING THE POTENTIAL OF<br />

5G FWA WITH HELP FROM AN MSP<br />

Before businesses can unlock the 5G<br />

FWA connectivity rewards, there are<br />

some things to consider, especially when<br />

it comes to implementation. One key<br />

area that needs to be addressed is<br />

whether they have the required skillset<br />

and expertise to ensure that deployment<br />

and everything it entails - from<br />

integrating existing infrastructure to<br />

combating potential network congestion<br />

and cost, plus everything that follows the<br />

deployment - is a success.<br />

To truly unlock the potential of a 5G<br />

FWA network, organisations need to<br />

work with an experienced managed<br />

service provider (MSP) who can offer<br />

tailored solutions. They should bring to<br />

the table a global reach complemented<br />

by local knowledge and be able to<br />

address each organisations unique<br />

requirements.<br />

The right partners can also help<br />

business to keep track of connectivity<br />

performance and make the most of their<br />

investment. Using real-time reports from<br />

the moment of 5G FWA activation, they<br />

can advise on any improvement areas<br />

and keep tabs on connectivity levels. This<br />

enables businesses to react quickly and<br />

efficiently to any changes, boosting their<br />

flexibility, whilst enabling them to meet<br />

customer expectations across the board.<br />

A MORE CONNECTED FUTURE<br />

As we start a new year, meeting customer<br />

demand and providing the best<br />

experience possible will continue to be<br />

the top priority for organisations. The<br />

role that 5G FWA could play in this is<br />

clear to see. It is hardly surprising that<br />

the number of 5G FWA connections is<br />

predicted to reach 236 million worldwide<br />

by 2028, up from 19.23 million in 2022.<br />

When deployed and managed<br />

effectively, this technology can enable<br />

organisations to scale, remain agile,<br />

provide business continuity, and gain<br />

competitive advantage allowing them to<br />

meet their customers' needs quickly and<br />

efficiently. The next generation of<br />

connectivity solutions is here; and it<br />

starts with 5G FWA. <strong>NC</strong><br />

34 NETWORKcomputing FEBRUARY/MARCH <strong>2024</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


Accelerating AI<br />

Data Pipelines<br />

Proven High-Performance Storage Architectures<br />

to Support AI and ML Workloads<br />

Learn More at<br />

www.supermicro.com/AIStorage<br />

© Supermicro and Supermicro logo are trademarks of Super Micro Computer, Inc. in the US. and/or other countries.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!