Year: 2023
Why the Internet Stinks for User-to-Cloud Workload Performance <br><h5>And what to do about it</h5>
Why the Internet Stinks for User-to-Cloud Workload Performance
And what to do about it
The Internet has become the de facto Wide Area Network (WAN) for user-to-cloud workloads.  Almost every organization is leveraging cloud services such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a[...]
Read Post >
The Role of Identify Brokers in a SASE Solution
The Role of Identify Brokers in a SASE Solution
In my previous blog on identity-aware SASE I discussed zero trust, the role of SASE, and the importance of identity in access controls. Another blog on SASE Proxy explained how SASE solutions obtain users’ identities after authenticating[...]
Read Post >
Aryaka Presented at Networking Field Day 30
Aryaka Presented at Networking Field Day 30
Ever wondered after doing something for the first time, why you waited so long to do it? I guess we all know that feeling. And so, it goes for us at Aryaka after presenting at Networking Field[...]
Read Post >
The Present And Future Of Enterprise Security
The Present And Future Of Enterprise Security
Without argument, growth or change is inevitable. The enterprise security landscape has evolved significantly over the past few decades, driven by technological advancements and changing security threats. In the past, enterprise security was primarily focused on physical[...]
Read Post >
Reflecting on the Aryaka Accelerate Global Partner Program
Reflecting on the Aryaka Accelerate Global Partner Program
Thank You to My Channel Mentors I spent more than 18 years at Lumen, almost half of my life, and while there, I learned from some great mentors. I learned from them all the fundamentals of creating[...]
Read Post >
Convergence of various kinds of proxies for SASE
Convergence of various kinds of proxies for SASE
Why Proxies in SASE? Gone are the days when the packet level security was considered sufficient. Due to the sophistication of attacks, it is becoming imperative to do deep content inspection for various kinds of protections. Identity[...]
Read Post >
Aryaka women in tech – Support. Empower.  Grow.
Aryaka women in tech – Support. Empower. Grow.
The International Day of Women in Technology and Science is celebrated every year on the 11th of February to acknowledge the achievements of women in the field of technology and science. This day serves as a reminder[...]
Read Post >
SD-WANswers with ChatGPT <br><h5>“Hey ChatGPT, why do some enterprises still avoid using SD-WAN?”</h5>
SD-WANswers with ChatGPT
“Hey ChatGPT, why do some enterprises still avoid using SD-WAN?”
ChatGPT is incredible.  I mean, it not only has all the answers, it has them in seconds.  How do you compete!?  You don’t.  You leverage it … and have a bit of fun along the way. Real[...]
Read Post >
Resistance Breeds Resilience
Resistance Breeds Resilience
This year’s Black History Month theme is Black Resistance. African Americans have had to resist systemic oppression for far too many generations. The racism, poverty, lack of access to education, housing, and jobs – the eroding right[...]
Read Post >
The Benefits of Converging Network and Security
The Benefits of Converging Network and Security
If you’re following the networking and security space, I’m sure you’ve read a lot about convergence over the past year or so. And, every day you probably have the best example of convergence in your pocket. Your[...]
Read Post >
What is Not SASE?: 5 Common Misconceptions Around SASE
What is Not SASE?: 5 Common Misconceptions Around SASE
SASE (Secure Access Service Edge) is a new approach to network security that integrates multiple security and networking functions into a single cloud-based platform. However, there are many misconceptions around SASE that can prevent businesses from fully[...]
Read Post >
Network Security: Protecting Your Digital Assets
Network Security: Protecting Your Digital Assets
In today’s digital age, data has become one of the most valuable assets for businesses and individuals alike. As we rely more and more on technology to store and transmit sensitive information, the importance of network security[...]
Read Post >