Edge is about reducing latency between users or data and applications. In the cloud that might mean replicating to another availability zone. Globally there are dozens of locations that can get you lower latency.
We recently wrapped up extensive performance testing of our TLS based tunnels when compared to IPSec and direct (no encryption) connections. For the sake of brevity we’ll post the results in a series of blog posts.
Trustgrid enables cloud applications to integrate to localized data with low latency and high availability. SaaS providers connect to remote data sets over the Trustgrid network and can route data directly to local users without that data leaving the country.
The team at Trustgrid often laments the lack of innovation in WAN technologies. Many are quick to point to SD-WAN as an example of innovation, and they’re right. SD-WAN is pretty cool but it’s target market is very limited.
As Michael Vizard notes here, virtualization of network features helps automate the onerous and often changing tasks of compliance. Legacy systems demand massive amounts of labor or expensive toolsets (or both) to achieve even baseline compliance.
In the year that saw social media engineering, massive data breaches, and a run-away ransomware problem, it’s no surprise to learn that American banks did not fare well either.
Connectivity solutions will be increasingly challenged to implement the most advanced security. Enterprise scale banks can produce enterprise scale APIs but community financial institutions must rely on different methods, frequently to several vendors at a time.
Network segmentation tools, like Trustgrid, offer ways to deploy truly private networks that could remain logically-gapped from the internet.
“GCS brings 17 years of IT services expertise that is a perfect compliment to Trustgrid’s OpenEdge product suite,” says Mark Stavrou, CEO of Trustgrid.
VMware’s NSX is a datacenter SDN product that is spear heading the “micro segmentation” architecture. Segmenting the networks by application or service reduces the attack surface to the individual application or service exposed. It implicitly denies all other traffic in that segment.
The rise of cloud and the growing “zero trust” movement have left NACs out in the cold. Today’s Network Access Control were built for authentication and authorization in a trusted, local network or over a centralized WAN- concepts that have proven cumbersome, prone to breach, and expensive.
The promises of nearly free and unlimited bandwidth have helped the cloud originate most technology innovation over the last several years. Whether Google Fiber, 4G (now 5G), or the inevitable trend of more-for-less in technology, there was good reason to think that bandwidth and latency would not limit future success.