SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
The coming
obsolescence of
the enterprise
network
Highlights
Adoption of new technologies has traditionally begun in enterprises and then shifted to
consumers. Over the past decade during the mobile boom, however, we have seen just the
opposite.
Driven by mass mobile adoption and the BYOD trend, enterprise IT organizations have been
forced to turn their focus towards network security and virtualization beyond servers and storage.
As a consequence, we predict that enterprise-owned and operated internal networks will soon
become obsolete. This will open up a major opportunity for operators to provide a range of
as-a-service offerings, such as end-to-end Enterprise Network-as-a-Service (ENaaS).
Discussion Paper: The coming obsolescence of the enterprise network 3
Introduction
Every CIO requires a clear vision of the IT transformation that mobile adoption, BYOD and the cloud are
bringing about: the necessity to reach beyond server and storage virtualization and to rethink network
security. This transformation will lead to the obsolescence of internal network infrastructure – and
network operators should be ready to take advantage of this opportunity.
Technology adoption has traditionally begun in enterprises and then moved to consumers. But over
the past decade, we have experienced a revolution in the consumer segment that is now coming to
enterprise.
As consumers, we have instant access to information, communication, location services and video,
using any device, fixed or mobile, on any network. But many enterprises are still stuck using telephony
and e-mail for communication and collaboration, and that is about it. This disconnect between our
lives as consumers and our lives as enterprise employees is the root cause of the Bring Your Own
Device (BYOD) trend as well as the consumerization of enterprise IT.
Mobile adoption and BYOD, however, are not without their drawbacks. Both are the cause of major
concern within IT organizations today, largely because providing security for mobile devices is
significantly different from doing so elsewhere in the enterprise.
To meet the increasing and often-contradictory demands of users and business organizations for
increased device flexibility and productivity, while still maintaining corporate security, IT organizations
have to rethink everything from network security to network infrastructure to what employees have on
their desktops.
From guarding the fences to protecting information at the source
In a classic end-to-end, perimeter-protection scheme, the strategy is to minimize risks by not trusting
users, by maintaining the status quo, and by allowing only locked-down devices managed by the IT
department.
However, with an increasing variety of mobile devices within an enterprise (including BYOD), plus a
huge number of connected machines and sensors, maintaining such an environment will be an uphill
and ultimately futile battle.
If business-critical information is going unprotected, even as the network perimeter is maintained, it’s
clear the conventional security model is broken. Enterprise IT organizations may instead need to
change their network security strategy to protect information at the source, not on the perimeter. And
when the focus shifts from protecting the device to the application environment, this allows for any
and all device types, even BYOD, while the really valuable components – user data and business-
critical information – remain safe.
In this shift to protecting information at the source, we predict that desktop virtualization technology
will play an important role.
Furthermore, as a result of the decreasing importance of perimeter protection, the enterprise access
networks have to be separated from the core network. This separation of the access and core
networks then triggers a significant shift: the obsolescence of the enterprise network.
Discussion Paper: The coming obsolescence of the enterprise network 4
The obsolescence of the enterprise network
In a world where perimeter security and end-point protection were the first and last lines of defense,
the power to command or control the internal enterprise (W)LAN network was key.
But when the focus shifts to protecting business-critical information rather than controlling and
protecting the access ports to the corporate intranet, the enterprise (W)LAN is no longer a strategic
asset. Instead, any internet connection that offers acceptable coverage and capacity is essentially fine.
If IT departments no longer need to command or control the access network, why not let someone
else provide that service, if they can do it better, faster and cheaper?
The value of owning internal infrastructure then becomes a question of operational efficiency,
minimized TCO and increased availability, agility and robustness of network services.
For companies that both equip their employees with a virtualized desktop and move all their business-
critical applications to the cloud, the entire intranet infrastructure might disappear from their balance
sheet altogether.
The operator opportunity
The cloud holds many advantages for enterprises. The pay-as-you-go business model enables
enterprises of all sizes to gain access to powerful resources and solutions without any capital
expenditure. The cloud enables companies to focus more on their business and less on the technology
technology needed to run it. By moving enterprise network infrastructure to the cloud, enterprises can
take advantage of future economies of scale.
This shift is also advantageous for network operators. For them, the obsolescence of enterprise-
owned and operated internal networks opens up an unprecedented opportunity for growth in the years
to come, by providing end-to-end Enterprise Network-as-a-Service (ENaaS).
Figure: The move from classic, perimeter, end-point protection of the corporate intranet to protecting
business-critical information at the source. As perimeter protection becomes less important, enterprise
access networks become separated from the core network
Discussion Paper: The coming obsolescence of the enterprise network 5
Let’s keep talking
This arena will be a vital battlefield in the convergence of telecom and IT. The telecom industry already
possesses essential components that could completely change the dynamics of enterprise
networking.
 But there are a few fundamental questions:
 How should the industry address this opportunity?
 How do we achieve economies of scale while leaving room for differentiation?
 What does a winning go-to-market strategy look like?
 Which bundled enterprise offerings are likely to get the most traction in the market?
Come and talk to us!

Mais conteúdo relacionado

Mais procurados

GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...PODIS Ltd
 
Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09meyersb1
 
Cloud Computing for SMBs
Cloud Computing for SMBsCloud Computing for SMBs
Cloud Computing for SMBswhite paper
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy ciscoOpenSourceCamp
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation HubsMestizo Enterprises
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...IOSR Journals
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.Atanu Roy Chowdhury
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeterinfra-si
 
GDS Summit Keynote - manufacturing at software speed draft
GDS Summit Keynote  - manufacturing at software speed draftGDS Summit Keynote  - manufacturing at software speed draft
GDS Summit Keynote - manufacturing at software speed draftEquinix
 
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...TFM&A
 
The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computingSyam Madanapalli
 
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...Dell Technologies
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...Thierry Coupaye
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelIJERA Editor
 
Cloud Computing in Indonesia
Cloud Computing in IndonesiaCloud Computing in Indonesia
Cloud Computing in IndonesiaHeru Sutadi
 

Mais procurados (20)

GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...
 
Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09
 
Cloud Computing for SMBs
Cloud Computing for SMBsCloud Computing for SMBs
Cloud Computing for SMBs
 
Cloud ID
Cloud IDCloud ID
Cloud ID
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
Featured White Paper: PowerCloud's CloudCommand!
Featured White Paper:  PowerCloud's CloudCommand! Featured White Paper:  PowerCloud's CloudCommand!
Featured White Paper: PowerCloud's CloudCommand!
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeter
 
GDS Summit Keynote - manufacturing at software speed draft
GDS Summit Keynote  - manufacturing at software speed draftGDS Summit Keynote  - manufacturing at software speed draft
GDS Summit Keynote - manufacturing at software speed draft
 
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
 
The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computing
 
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
 
Cloud Computing in Indonesia
Cloud Computing in IndonesiaCloud Computing in Indonesia
Cloud Computing in Indonesia
 
Edge Computing: Drivers and Trends
Edge Computing: Drivers and TrendsEdge Computing: Drivers and Trends
Edge Computing: Drivers and Trends
 

Semelhante a Discussion paper: ”The coming obsolescence of the enterprise network”

Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
 
Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computingCirro
 
NTT i3 Point of View: Network Infrastructure Elasticity
NTT i3 Point of View:  Network Infrastructure ElasticityNTT i3 Point of View:  Network Infrastructure Elasticity
NTT i3 Point of View: Network Infrastructure ElasticityNTT Innovation Institute Inc.
 
Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014Philippe Boivineau
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks Abaram Network Solutions
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies Shamima Akther
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringInfyiot Solutions
 
IoT Benefits of Cloud Platform.pdf
IoT Benefits of Cloud Platform.pdfIoT Benefits of Cloud Platform.pdf
IoT Benefits of Cloud Platform.pdfPridesys IT Ltd.
 
Capturing_the_value_of_the_internet_of_Things_IBM_PoV
Capturing_the_value_of_the_internet_of_Things_IBM_PoVCapturing_the_value_of_the_internet_of_Things_IBM_PoV
Capturing_the_value_of_the_internet_of_Things_IBM_PoVCarl Allen
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0Susan Wu
 
Deep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of ThingsDeep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of Thingsijtsrd
 
Visualizing Your Network Health
Visualizing Your Network HealthVisualizing Your Network Health
Visualizing Your Network HealthDellNMS
 
Visualizing your Network Health
Visualizing your Network HealthVisualizing your Network Health
Visualizing your Network HealthDellNMS
 
VMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry ExpertsVMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry Expertsvmblog
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
Economics of Cloud Computing_Jim Cooke
Economics of Cloud Computing_Jim CookeEconomics of Cloud Computing_Jim Cooke
Economics of Cloud Computing_Jim CookeJim Cooke
 
Prakash Mana, Cloudbrink CEO, Shares Cloudbrink 2024 Predictions.pptx
Prakash Mana, Cloudbrink CEO, Shares Cloudbrink 2024 Predictions.pptxPrakash Mana, Cloudbrink CEO, Shares Cloudbrink 2024 Predictions.pptx
Prakash Mana, Cloudbrink CEO, Shares Cloudbrink 2024 Predictions.pptxPrakash Mana
 

Semelhante a Discussion paper: ”The coming obsolescence of the enterprise network” (20)

Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computing
 
NTT i3 Point of View: Network Infrastructure Elasticity
NTT i3 Point of View:  Network Infrastructure ElasticityNTT i3 Point of View:  Network Infrastructure Elasticity
NTT i3 Point of View: Network Infrastructure Elasticity
 
5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
 
Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIOOvum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
 
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringIIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
IIoT : Real-time Decision-making is Enabled Through Real-time Monitoring
 
IoT Benefits of Cloud Platform.pdf
IoT Benefits of Cloud Platform.pdfIoT Benefits of Cloud Platform.pdf
IoT Benefits of Cloud Platform.pdf
 
Data Center Trends And Network Security Impact
Data Center Trends And Network Security ImpactData Center Trends And Network Security Impact
Data Center Trends And Network Security Impact
 
Capturing_the_value_of_the_internet_of_Things_IBM_PoV
Capturing_the_value_of_the_internet_of_Things_IBM_PoVCapturing_the_value_of_the_internet_of_Things_IBM_PoV
Capturing_the_value_of_the_internet_of_Things_IBM_PoV
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0
 
Deep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of ThingsDeep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of Things
 
Visualizing Your Network Health
Visualizing Your Network HealthVisualizing Your Network Health
Visualizing Your Network Health
 
Visualizing your Network Health
Visualizing your Network HealthVisualizing your Network Health
Visualizing your Network Health
 
VMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry ExpertsVMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry Experts
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
Economics of Cloud Computing_Jim Cooke
Economics of Cloud Computing_Jim CookeEconomics of Cloud Computing_Jim Cooke
Economics of Cloud Computing_Jim Cooke
 
Prakash Mana, Cloudbrink CEO, Shares Cloudbrink 2024 Predictions.pptx
Prakash Mana, Cloudbrink CEO, Shares Cloudbrink 2024 Predictions.pptxPrakash Mana, Cloudbrink CEO, Shares Cloudbrink 2024 Predictions.pptx
Prakash Mana, Cloudbrink CEO, Shares Cloudbrink 2024 Predictions.pptx
 

Mais de Ericsson

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020Ericsson
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN OrchestrationEricsson
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson
 

Mais de Ericsson (20)

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applications
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of Things
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN Orchestration
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Discussion paper: ”The coming obsolescence of the enterprise network”

  • 1. The coming obsolescence of the enterprise network
  • 2. Highlights Adoption of new technologies has traditionally begun in enterprises and then shifted to consumers. Over the past decade during the mobile boom, however, we have seen just the opposite. Driven by mass mobile adoption and the BYOD trend, enterprise IT organizations have been forced to turn their focus towards network security and virtualization beyond servers and storage. As a consequence, we predict that enterprise-owned and operated internal networks will soon become obsolete. This will open up a major opportunity for operators to provide a range of as-a-service offerings, such as end-to-end Enterprise Network-as-a-Service (ENaaS).
  • 3. Discussion Paper: The coming obsolescence of the enterprise network 3 Introduction Every CIO requires a clear vision of the IT transformation that mobile adoption, BYOD and the cloud are bringing about: the necessity to reach beyond server and storage virtualization and to rethink network security. This transformation will lead to the obsolescence of internal network infrastructure – and network operators should be ready to take advantage of this opportunity. Technology adoption has traditionally begun in enterprises and then moved to consumers. But over the past decade, we have experienced a revolution in the consumer segment that is now coming to enterprise. As consumers, we have instant access to information, communication, location services and video, using any device, fixed or mobile, on any network. But many enterprises are still stuck using telephony and e-mail for communication and collaboration, and that is about it. This disconnect between our lives as consumers and our lives as enterprise employees is the root cause of the Bring Your Own Device (BYOD) trend as well as the consumerization of enterprise IT. Mobile adoption and BYOD, however, are not without their drawbacks. Both are the cause of major concern within IT organizations today, largely because providing security for mobile devices is significantly different from doing so elsewhere in the enterprise. To meet the increasing and often-contradictory demands of users and business organizations for increased device flexibility and productivity, while still maintaining corporate security, IT organizations have to rethink everything from network security to network infrastructure to what employees have on their desktops. From guarding the fences to protecting information at the source In a classic end-to-end, perimeter-protection scheme, the strategy is to minimize risks by not trusting users, by maintaining the status quo, and by allowing only locked-down devices managed by the IT department. However, with an increasing variety of mobile devices within an enterprise (including BYOD), plus a huge number of connected machines and sensors, maintaining such an environment will be an uphill and ultimately futile battle. If business-critical information is going unprotected, even as the network perimeter is maintained, it’s clear the conventional security model is broken. Enterprise IT organizations may instead need to change their network security strategy to protect information at the source, not on the perimeter. And when the focus shifts from protecting the device to the application environment, this allows for any and all device types, even BYOD, while the really valuable components – user data and business- critical information – remain safe. In this shift to protecting information at the source, we predict that desktop virtualization technology will play an important role. Furthermore, as a result of the decreasing importance of perimeter protection, the enterprise access networks have to be separated from the core network. This separation of the access and core networks then triggers a significant shift: the obsolescence of the enterprise network.
  • 4. Discussion Paper: The coming obsolescence of the enterprise network 4 The obsolescence of the enterprise network In a world where perimeter security and end-point protection were the first and last lines of defense, the power to command or control the internal enterprise (W)LAN network was key. But when the focus shifts to protecting business-critical information rather than controlling and protecting the access ports to the corporate intranet, the enterprise (W)LAN is no longer a strategic asset. Instead, any internet connection that offers acceptable coverage and capacity is essentially fine. If IT departments no longer need to command or control the access network, why not let someone else provide that service, if they can do it better, faster and cheaper? The value of owning internal infrastructure then becomes a question of operational efficiency, minimized TCO and increased availability, agility and robustness of network services. For companies that both equip their employees with a virtualized desktop and move all their business- critical applications to the cloud, the entire intranet infrastructure might disappear from their balance sheet altogether. The operator opportunity The cloud holds many advantages for enterprises. The pay-as-you-go business model enables enterprises of all sizes to gain access to powerful resources and solutions without any capital expenditure. The cloud enables companies to focus more on their business and less on the technology technology needed to run it. By moving enterprise network infrastructure to the cloud, enterprises can take advantage of future economies of scale. This shift is also advantageous for network operators. For them, the obsolescence of enterprise- owned and operated internal networks opens up an unprecedented opportunity for growth in the years to come, by providing end-to-end Enterprise Network-as-a-Service (ENaaS). Figure: The move from classic, perimeter, end-point protection of the corporate intranet to protecting business-critical information at the source. As perimeter protection becomes less important, enterprise access networks become separated from the core network
  • 5. Discussion Paper: The coming obsolescence of the enterprise network 5 Let’s keep talking This arena will be a vital battlefield in the convergence of telecom and IT. The telecom industry already possesses essential components that could completely change the dynamics of enterprise networking.  But there are a few fundamental questions:  How should the industry address this opportunity?  How do we achieve economies of scale while leaving room for differentiation?  What does a winning go-to-market strategy look like?  Which bundled enterprise offerings are likely to get the most traction in the market? Come and talk to us!