Digital Transformation

Digital Transformation using a cloud architecture involves numerous components: 

  • Secure Access Service Edge (SASE) network architecture, 

  • Choosing a suite of Software as a Service (SaaS) applications that best fit operations, 

  • Configurating and using SaaS vendor integrations for chosen applications, 

  • Use Infrastructure as a Service (IaaS) and applications for non-SaaS applications, 

  • Deploy and configure appropriate security throughout, 

  • Review operations, agility, and productivity enhancements with and adjust for work anywhere mobility, 

  • Update organizational goals, culture, and policy with new and changing operational models. 

Cloud services architecture allows an 80/20 split in Information Technology (IT) responsibilities.

 

  • Large infrastructure providers like Google, Microsoft, and Amazon can take on responsibilities for data center operations and infrastructure.  

  • Software vendors can make their full suite of applications available with integrations available with other cloud vendors. 

  • All the base maintenance, patching, health monitoring, repairs and fixing, upgrades over time, and most operational components are cared for by the vendor. 

  • The service consumer is responsible for configuring applications and services to fit their operations (the 20%). 

 

This allows for a much more agile and sophisticated deployment with 80% of the cost shared across a much larger user base. 

By moving to a cloud architecture, 80% of the work in traditional models can be moved to application and infrastructure service vendors that provide a much richer environment deployed on a very large scale.  A rich full suite of integrated services are available for organizations to custom configure for their operations. 

Secure Access Service Edge

(SASE) Architecture

Simplify setup, management and improve performance

Cloud

Internet Firewall

Cloud

WAN Firewall

SASE Global

Backbone

(Middle Mile)

QoS

Mobile Workers connect to the closest POP globally

SD-WAN

Mobile Workers

Remote Sites

Worker Identity based access from anywhere to WAN & Internet

Multiple internet links, Link optimized, Application acceleration

SD-WAN

SD-WAN

Branch Offices

VPN

Corporate Data Centers

Headquarters

& Campus

LAN Sites

Cloud Data Centers

Microsoft

Amazon

Google

Monitoring & Security

Data Analytics

Cloud Data Centers

(IaaS / PaaS)

Middle Mile managed backbone, QoS

VPN

LAN

SD-WAN

Internet

Remote Desktop / VDI for Legacy Apps

Shortest Path Bridging

(IEEE 802.1AQ)

SASE Network Components

  • Universal Wide Area Network (WAN) and Internet access security independent of worker location or mobility, identity based with the same options available for workers no matter the location: office, branch, corporate data center, cloud data center, remote locations or home (security is integrated across all components, not just networking)

  • Cloud based global software defined firewalls for WAN and Internet

  • Identity based security based on the user, independent of location, enables network segmentation based on user anywhere on the WAN

  • Application aware network security applied using policies based on user identity and application identity – enables global application prioritization and improved user experience 

  • Managed middle mile internet networks integrated with last mile SD-WAN site connectivity for better application quality of service and availability

  • Improved cost efficiency as scaling connectivity becomes incremental with multiple broadband connections aggregated using SD-WAN

  • Integrated with campus network Shortest Path Bridging (SPB) software defined networks for fast operational scaling and performance

  • Simplicity provided through advanced software defined networks allows improved business agility,

  • Enhanced traffic visibility and management allows improved efficiencies and performance.

  • Enables hybrid application deployment and migration.  Applications become services that can be moved easily from corporate data centre, to cloud IAAS, and cloud SaaS solutions – with minimal impact on the end user

Core Business Applications - Cloud

  • Easily scale up or down with application agility - fast onboarding and scaling,

  • Upgrades and core application components seamlessly vendor managed by their experts,

  • Configuration managed and defined by user organization,

  • Cloud vendors offer standard integration with other cloud vendors allowing enhanced customized work flow and operations,

  • Integrated authentication (SAML) improves ease of use and user experience.

  • Availability allows work anywhere mobility,

  • Significant number of options for security allows for wide range of security features to fit many organizations

Security Management & Incident Response

  • Integrated directory services and authentication simplifies management and agility, while improving user experience

  • Integrated multifactor authentication options improve security,

  • Security monitoring with advanced analytics enhances security detection capabilities to reduce business risk

  • Device management cloud systems enhance deployment agility and emergency security response capabilities improving operational availability,

  • Integrated network and device management systems and data analytics improve security and availability,

  • Personnel security awareness monitoring and training systems improve the most important part of active security – people 

Data Analytics

  • Make decisions faster by making information available to staff in near real time

  • Used to develop strategies based on real data from a variety of sources,

  • Insights used to improve products and services,

  • Measure value proposition and understand customers better than your competitors, 

  • Artificial Intelligence (AI) helps customers with real time application decisions, responses, and animation. 

 
 
 
 

ADDRESS

 

Waterloo, ON   N2L 1S7

FOLLOW US

© 2019 by Data Perceptions Inc.

  • White Facebook Icon
  • White LinkedIn Icon
  • White Twitter Icon