SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
The coming
obsolescence of
the enterprise
network
Highlights
Adoption of new technologies has traditionally begun in enterprises and then shifted to
consumers. Over the past decade during the mobile boom, however, we have seen just the
opposite.
Driven by mass mobile adoption and the BYOD trend, enterprise IT organizations have been
forced to turn their focus towards network security and virtualization beyond servers and storage.
As a consequence, we predict that enterprise-owned and operated internal networks will soon
become obsolete. This will open up a major opportunity for operators to provide a range of
as-a-service offerings, such as end-to-end Enterprise Network-as-a-Service (ENaaS).
Discussion Paper: The coming obsolescence of the enterprise network 3
Introduction
Every CIO requires a clear vision of the IT transformation that mobile adoption, BYOD and the cloud are
bringing about: the necessity to reach beyond server and storage virtualization and to rethink network
security. This transformation will lead to the obsolescence of internal network infrastructure – and
network operators should be ready to take advantage of this opportunity.
Technology adoption has traditionally begun in enterprises and then moved to consumers. But over
the past decade, we have experienced a revolution in the consumer segment that is now coming to
enterprise.
As consumers, we have instant access to information, communication, location services and video,
using any device, fixed or mobile, on any network. But many enterprises are still stuck using telephony
and e-mail for communication and collaboration, and that is about it. This disconnect between our
lives as consumers and our lives as enterprise employees is the root cause of the Bring Your Own
Device (BYOD) trend as well as the consumerization of enterprise IT.
Mobile adoption and BYOD, however, are not without their drawbacks. Both are the cause of major
concern within IT organizations today, largely because providing security for mobile devices is
significantly different from doing so elsewhere in the enterprise.
To meet the increasing and often-contradictory demands of users and business organizations for
increased device flexibility and productivity, while still maintaining corporate security, IT organizations
have to rethink everything from network security to network infrastructure to what employees have on
their desktops.
From guarding the fences to protecting information at the source
In a classic end-to-end, perimeter-protection scheme, the strategy is to minimize risks by not trusting
users, by maintaining the status quo, and by allowing only locked-down devices managed by the IT
department.
However, with an increasing variety of mobile devices within an enterprise (including BYOD), plus a
huge number of connected machines and sensors, maintaining such an environment will be an uphill
and ultimately futile battle.
If business-critical information is going unprotected, even as the network perimeter is maintained, it’s
clear the conventional security model is broken. Enterprise IT organizations may instead need to
change their network security strategy to protect information at the source, not on the perimeter. And
when the focus shifts from protecting the device to the application environment, this allows for any
and all device types, even BYOD, while the really valuable components – user data and business-
critical information – remain safe.
In this shift to protecting information at the source, we predict that desktop virtualization technology
will play an important role.
Furthermore, as a result of the decreasing importance of perimeter protection, the enterprise access
networks have to be separated from the core network. This separation of the access and core
networks then triggers a significant shift: the obsolescence of the enterprise network.
Discussion Paper: The coming obsolescence of the enterprise network 4
The obsolescence of the enterprise network
In a world where perimeter security and end-point protection were the first and last lines of defense,
the power to command or control the internal enterprise (W)LAN network was key.
But when the focus shifts to protecting business-critical information rather than controlling and
protecting the access ports to the corporate intranet, the enterprise (W)LAN is no longer a strategic
asset. Instead, any internet connection that offers acceptable coverage and capacity is essentially fine.
If IT departments no longer need to command or control the access network, why not let someone
else provide that service, if they can do it better, faster and cheaper?
The value of owning internal infrastructure then becomes a question of operational efficiency,
minimized TCO and increased availability, agility and robustness of network services.
For companies that both equip their employees with a virtualized desktop and move all their business-
critical applications to the cloud, the entire intranet infrastructure might disappear from their balance
sheet altogether.
The operator opportunity
The cloud holds many advantages for enterprises. The pay-as-you-go business model enables
enterprises of all sizes to gain access to powerful resources and solutions without any capital
expenditure. The cloud enables companies to focus more on their business and less on the technology
technology needed to run it. By moving enterprise network infrastructure to the cloud, enterprises can
take advantage of future economies of scale.
This shift is also advantageous for network operators. For them, the obsolescence of enterprise-
owned and operated internal networks opens up an unprecedented opportunity for growth in the years
to come, by providing end-to-end Enterprise Network-as-a-Service (ENaaS).
Figure: The move from classic, perimeter, end-point protection of the corporate intranet to protecting
business-critical information at the source. As perimeter protection becomes less important, enterprise
access networks become separated from the core network
Discussion Paper: The coming obsolescence of the enterprise network 5
Let’s keep talking
This arena will be a vital battlefield in the convergence of telecom and IT. The telecom industry already
possesses essential components that could completely change the dynamics of enterprise
networking.
 But there are a few fundamental questions:
 How should the industry address this opportunity?
 How do we achieve economies of scale while leaving room for differentiation?
 What does a winning go-to-market strategy look like?
 Which bundled enterprise offerings are likely to get the most traction in the market?
Come and talk to us!

Weitere ähnliche Inhalte

Was ist angesagt?

Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09
meyersb1
 
Cloud Computing for SMBs
Cloud Computing for SMBsCloud Computing for SMBs
Cloud Computing for SMBs
white paper
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
OpenSourceCamp
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
EuroCloud
 
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
TFM&A
 

Was ist angesagt? (20)

GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...
 
Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09
 
Cloud Computing for SMBs
Cloud Computing for SMBsCloud Computing for SMBs
Cloud Computing for SMBs
 
Cloud ID
Cloud IDCloud ID
Cloud ID
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
Featured White Paper: PowerCloud's CloudCommand!
Featured White Paper:  PowerCloud's CloudCommand! Featured White Paper:  PowerCloud's CloudCommand!
Featured White Paper: PowerCloud's CloudCommand!
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeter
 
GDS Summit Keynote - manufacturing at software speed draft
GDS Summit Keynote  - manufacturing at software speed draftGDS Summit Keynote  - manufacturing at software speed draft
GDS Summit Keynote - manufacturing at software speed draft
 
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
 
The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computing
 
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
 
Cloud Computing in Indonesia
Cloud Computing in IndonesiaCloud Computing in Indonesia
Cloud Computing in Indonesia
 
Edge Computing: Drivers and Trends
Edge Computing: Drivers and TrendsEdge Computing: Drivers and Trends
Edge Computing: Drivers and Trends
 

Ähnlich wie Discussion paper: ”The coming obsolescence of the enterprise network”

NTT i3 Point of View: Network Infrastructure Elasticity
NTT i3 Point of View:  Network Infrastructure ElasticityNTT i3 Point of View:  Network Infrastructure Elasticity
NTT i3 Point of View: Network Infrastructure Elasticity
NTT Innovation Institute Inc.
 
Capturing_the_value_of_the_internet_of_Things_IBM_PoV
Capturing_the_value_of_the_internet_of_Things_IBM_PoVCapturing_the_value_of_the_internet_of_Things_IBM_PoV
Capturing_the_value_of_the_internet_of_Things_IBM_PoV
Carl Allen
 
Deep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of ThingsDeep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of Things
ijtsrd
 
Visualizing Your Network Health
Visualizing Your Network HealthVisualizing Your Network Health
Visualizing Your Network Health
DellNMS
 
Visualizing your Network Health
Visualizing your Network HealthVisualizing your Network Health
Visualizing your Network Health
DellNMS
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
Julius Adams
 
Economics of Cloud Computing_Jim Cooke
Economics of Cloud Computing_Jim CookeEconomics of Cloud Computing_Jim Cooke
Economics of Cloud Computing_Jim Cooke
Jim Cooke
 

Ähnlich wie Discussion paper: ”The coming obsolescence of the enterprise network” (20)

Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computing
 
NTT i3 Point of View: Network Infrastructure Elasticity
NTT i3 Point of View:  Network Infrastructure ElasticityNTT i3 Point of View:  Network Infrastructure Elasticity
NTT i3 Point of View: Network Infrastructure Elasticity
 
5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
 
Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIOOvum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
 
IoT Benefits of Cloud Platform.pdf
IoT Benefits of Cloud Platform.pdfIoT Benefits of Cloud Platform.pdf
IoT Benefits of Cloud Platform.pdf
 
Data Center Trends And Network Security Impact
Data Center Trends And Network Security ImpactData Center Trends And Network Security Impact
Data Center Trends And Network Security Impact
 
Capturing_the_value_of_the_internet_of_Things_IBM_PoV
Capturing_the_value_of_the_internet_of_Things_IBM_PoVCapturing_the_value_of_the_internet_of_Things_IBM_PoV
Capturing_the_value_of_the_internet_of_Things_IBM_PoV
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0
 
Deep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of ThingsDeep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of Things
 
Visualizing Your Network Health
Visualizing Your Network HealthVisualizing Your Network Health
Visualizing Your Network Health
 
Visualizing your Network Health
Visualizing your Network HealthVisualizing your Network Health
Visualizing your Network Health
 
VMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry ExpertsVMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry Experts
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
Economics of Cloud Computing_Jim Cooke
Economics of Cloud Computing_Jim CookeEconomics of Cloud Computing_Jim Cooke
Economics of Cloud Computing_Jim Cooke
 
Prakash Mana, Cloudbrink CEO, Shares Cloudbrink 2024 Predictions.pptx
Prakash Mana, Cloudbrink CEO, Shares Cloudbrink 2024 Predictions.pptxPrakash Mana, Cloudbrink CEO, Shares Cloudbrink 2024 Predictions.pptx
Prakash Mana, Cloudbrink CEO, Shares Cloudbrink 2024 Predictions.pptx
 

Mehr von Ericsson

Mehr von Ericsson (20)

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applications
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of Things
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN Orchestration
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Discussion paper: ”The coming obsolescence of the enterprise network”

  • 1. The coming obsolescence of the enterprise network
  • 2. Highlights Adoption of new technologies has traditionally begun in enterprises and then shifted to consumers. Over the past decade during the mobile boom, however, we have seen just the opposite. Driven by mass mobile adoption and the BYOD trend, enterprise IT organizations have been forced to turn their focus towards network security and virtualization beyond servers and storage. As a consequence, we predict that enterprise-owned and operated internal networks will soon become obsolete. This will open up a major opportunity for operators to provide a range of as-a-service offerings, such as end-to-end Enterprise Network-as-a-Service (ENaaS).
  • 3. Discussion Paper: The coming obsolescence of the enterprise network 3 Introduction Every CIO requires a clear vision of the IT transformation that mobile adoption, BYOD and the cloud are bringing about: the necessity to reach beyond server and storage virtualization and to rethink network security. This transformation will lead to the obsolescence of internal network infrastructure – and network operators should be ready to take advantage of this opportunity. Technology adoption has traditionally begun in enterprises and then moved to consumers. But over the past decade, we have experienced a revolution in the consumer segment that is now coming to enterprise. As consumers, we have instant access to information, communication, location services and video, using any device, fixed or mobile, on any network. But many enterprises are still stuck using telephony and e-mail for communication and collaboration, and that is about it. This disconnect between our lives as consumers and our lives as enterprise employees is the root cause of the Bring Your Own Device (BYOD) trend as well as the consumerization of enterprise IT. Mobile adoption and BYOD, however, are not without their drawbacks. Both are the cause of major concern within IT organizations today, largely because providing security for mobile devices is significantly different from doing so elsewhere in the enterprise. To meet the increasing and often-contradictory demands of users and business organizations for increased device flexibility and productivity, while still maintaining corporate security, IT organizations have to rethink everything from network security to network infrastructure to what employees have on their desktops. From guarding the fences to protecting information at the source In a classic end-to-end, perimeter-protection scheme, the strategy is to minimize risks by not trusting users, by maintaining the status quo, and by allowing only locked-down devices managed by the IT department. However, with an increasing variety of mobile devices within an enterprise (including BYOD), plus a huge number of connected machines and sensors, maintaining such an environment will be an uphill and ultimately futile battle. If business-critical information is going unprotected, even as the network perimeter is maintained, it’s clear the conventional security model is broken. Enterprise IT organizations may instead need to change their network security strategy to protect information at the source, not on the perimeter. And when the focus shifts from protecting the device to the application environment, this allows for any and all device types, even BYOD, while the really valuable components – user data and business- critical information – remain safe. In this shift to protecting information at the source, we predict that desktop virtualization technology will play an important role. Furthermore, as a result of the decreasing importance of perimeter protection, the enterprise access networks have to be separated from the core network. This separation of the access and core networks then triggers a significant shift: the obsolescence of the enterprise network.
  • 4. Discussion Paper: The coming obsolescence of the enterprise network 4 The obsolescence of the enterprise network In a world where perimeter security and end-point protection were the first and last lines of defense, the power to command or control the internal enterprise (W)LAN network was key. But when the focus shifts to protecting business-critical information rather than controlling and protecting the access ports to the corporate intranet, the enterprise (W)LAN is no longer a strategic asset. Instead, any internet connection that offers acceptable coverage and capacity is essentially fine. If IT departments no longer need to command or control the access network, why not let someone else provide that service, if they can do it better, faster and cheaper? The value of owning internal infrastructure then becomes a question of operational efficiency, minimized TCO and increased availability, agility and robustness of network services. For companies that both equip their employees with a virtualized desktop and move all their business- critical applications to the cloud, the entire intranet infrastructure might disappear from their balance sheet altogether. The operator opportunity The cloud holds many advantages for enterprises. The pay-as-you-go business model enables enterprises of all sizes to gain access to powerful resources and solutions without any capital expenditure. The cloud enables companies to focus more on their business and less on the technology technology needed to run it. By moving enterprise network infrastructure to the cloud, enterprises can take advantage of future economies of scale. This shift is also advantageous for network operators. For them, the obsolescence of enterprise- owned and operated internal networks opens up an unprecedented opportunity for growth in the years to come, by providing end-to-end Enterprise Network-as-a-Service (ENaaS). Figure: The move from classic, perimeter, end-point protection of the corporate intranet to protecting business-critical information at the source. As perimeter protection becomes less important, enterprise access networks become separated from the core network
  • 5. Discussion Paper: The coming obsolescence of the enterprise network 5 Let’s keep talking This arena will be a vital battlefield in the convergence of telecom and IT. The telecom industry already possesses essential components that could completely change the dynamics of enterprise networking.  But there are a few fundamental questions:  How should the industry address this opportunity?  How do we achieve economies of scale while leaving room for differentiation?  What does a winning go-to-market strategy look like?  Which bundled enterprise offerings are likely to get the most traction in the market? Come and talk to us!