SD-WAN https://business.hughes.com/ en Why Not Test Drive a Managed SD-WAN Solution? https://business.hughes.com/resources/blog/why-not-test-drive-managed-sd-wan-solution <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/596" typeof="schema:Person" property="schema:name" datatype="">Olivia Bell</span></span> <span class="field field--name-created field--type-created field--label-hidden">Wed, 09/09/2020 - 19:12</span> <div class="field title">Why Not Test Drive a Managed SD-WAN Solution?</div> <div class="field field-post-type field--name-field-post-type field--label-hidden field__item">Blog Post</div> <div class="field field-blog-categories field--name-field-blog-categories field--label-hidden field__items"> <div class="field__item odd"> <a href="/taxonomy/term/?type=blog_post"></a> </div> <div class="field__item even"> <a href="/taxonomy/term/?type=blog_post"></a> </div> </div> <div class="field field-image field--name-field-image field--label-hidden field__item"> <img src="/sites/business.hughes.com/files/styles/post_detail_image/public/Test%20Drive%20SD-WAN.jpg?itok=uo_aeL_z" width="683" height="302" alt="sd-wan_test_drive" typeof="foaf:Image" class="image-style-post-detail-image" /> </div> <div class="clearfix text-formatted field body field--name-body field--label-hidden field__item"><h4>Now you can pilot an <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> network tailored for your operations—and it’s risk-free!</h4> <p> </p> <p>Enterprises with multiple locations—like retailers, restaurants, financial services, retail petroleum and convenience stores—often struggle when it comes to their networks. Some challenges include:</p> <ul><li>Integrating new tools, apps, and cloud-based services with legacy network technologies</li> <li>Having sites located in different areas with access to vastly different telecommunications infrastructure and broadband capabilities</li> <li>Lacking resources to research, plan and implement enterprise-wide network solutions</li> <li>Missing expertise to lead complex and comprehensive network upgrades</li> </ul><p>Any of that sound familiar? If so, you’re not alone. Even enterprises with fairly large IT teams face these hurdles. But perhaps the greatest challenge for distributed enterprises of all shapes and sizes is the degree of uncertainty associated with all aspects of the upgrade process.</p> <div style="width:300px; float:right; border-left: 2px solid #1fc2b2; margin-left:12px;"> <div style="padding-left:8px;"><img alt="Hughes-Digital-Signage-Solutions" src="https://business.hughes.com/sites/business.hughes.com/files/Hughes_Is_Managed_SD-WAN_1.jpg" style="padding-bottom:8px;" /><b>WANsform Your Enterprise</b><br /> Before you can transform customer experience, you must <a href="http://business.hughes.com/wansform">WANsform</a> your enterprise. Learn how Hughes <a href="https://business.hughes.com/what-we-do/networking/managed-sd-wan">Managed SD-WAN</a> is enabling digital transformation and achieving real results. <ul><li><a href="https://business.hughes.com/who-we-are/collateral-library/mpls-managed-sd-wan-journey">MPLS vs. SD-WAN</a></li> <li><a href="https://business.hughes.com/why-sdwan" title="Learn About Managed SD-WAN">Why SD-WAN?</a></li> <li><a href="https://business.hughes.com/wifi-analytics-in-retail">WiFi Analytics: </a>Insight Every Step of the Way</li> <li><a href="https://business.hughes.com/digital-signage-solutions-how-to-increase-customer-engagement">Digital Signage Solutions</a>: Engagement Starts Here</li> <li><a href="https://business.hughes.com/our-technologies/networking-platforms/hr4860-secure-sdwan-gateway">SD-WAN Appliance</a>: 4860 is SD-WAN transformation in a box</li> </ul></div> </div> <p>That uncertainty, the worry over not getting the right solution or being stuck with a costly solution that doesn’t deliver on promises, causes many enterprises to sit on the sidelines without moving forward with network plans until they’re absolutely forced to do so.</p> <p>And that makes sense when you consider we’ve been conditioned to want low risk when contemplating big purchases. After all, would you buy a car without taking it for a test drive? Not likely. Even ice cream stores offer taste samples so customers can be confident in their choice of flavor!</p> <p><strong>The Industry’s Best Kept Secret</strong></p> <p>But sitting on the sidelines isn’t necessary (nor is it prudent). Hughes has a dedicated team of Solution Architects and Engineers to design, deliver, and implement <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">Managed SD-WAN</a> proof-of-concept pilot programs that are tailor-made for prospective customers—fully demonstrating a network’s capabilities and allowing the customer to try it at their sites, and validate the results, before they ever buy an SD-WAN platform.</p> <p>These small-scale <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">Managed SD-WAN</a> pilot deployments, which typically involve 3 to 5 customer sites, show how a solution will work in their actual environment. Since the proof of concept is customized to meet the customer’s real-world challenges, it is then easier and faster to scale up across the entire enterprise once the pilot ends. Key findings from the pilot can also be integrated into final plans, adapting and improving the solution based on the pilot results. Most important, as is the case with any test drive, the customer is under no obligation to proceed and there are no costs associated with the pilot. It is truly a free sampling of the solution—one that the customer can experience for 60 to 90 days.</p> <p><strong>How to Take Your Own <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> Test Drive</strong></p> <p>The Hughes small-scale pilot approach follows the exact same process as our larger <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">Managed SD-WAN</a> engagements. In this way, customers get to experience the full benefits of managed services. Following are the high-level steps involved:</p> <ul><li><strong>Conduct discovery session</strong>—The process begins with an initial discussion where the dedicated Hughes team learns about specific customer pain points and goals. We also assign Project Management resources to establish regular meetings and touchpoints, set project schedules and deadlines, and track progress.</li> <li><strong>Define the project test plan</strong>—With an understanding of wants, needs, and resources, the Hughes team defines test criteria and determines what success looks like. This includes identifying pilot sites.</li> <li><strong>Design the solution</strong>—Our Solution Architects, Engineers and networking product experts collaborate to design a comprehensive managed service solution. Because <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN solutions</a> often come with peripheral solutions, like wireless access points and VoIP phones, it can be a complex process to deploy a range of networking products that span LAN to WAN. This is where our multi-domain expertise is critical for integrating the different technologies.</li> <li><strong>Deploy the solution</strong>—This step covers all aspects of installation, addressing the edge, circuits, security profiles, networking policies, backhaul connections to data centers, field support services, and production. It’s all the elements associated with getting the Managed <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN solution</a> up and running; which typically starts with the first lab site, co-located with personnel who can validate applications (often at HQ), and progresses to the additional production branches. During the design phase, our team recommends which sites are ideal for testing, based on goals, and infrastructure issues such as cabling, circuits, and cell connectivity. But in all instances, we overcome the challenges.</li> <li><strong>Take the wheel</strong>—With the pilot in place, the customer can experience the solution firsthand. Moreover, it’s an opportunity to see how Hughes can simplify network complexity, reduce strain on the IT team, validate architectures, and ensure that the solution meets specific needs. And with Hughes there to support the pilot and any future deployment, the IT team is also freed up to address the enterprise’s business needs and consequently become more agile. As a discovery phase, the pilot provides the chance to iterate the solution in the smaller test environment so it can be scaled into production more quickly if desired.</li> </ul><p>Getting to this test drive stage can be done in a relatively short period of time, with the first lab sites going live as soon as 2 weeks after the initial discovery session. So, when you consider the test drive is a no-risk, cost-free option, isn’t it time you considered taking your own <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">Managed SD-WAN solution</a> for a spin?</p> <p> </p> <h4><strong>If you would like to learn more about how to set up your own Managed SD-WAN test drive, please fill out this <u><a href="https://business.hughes.com/contact-us">contact form</a></u> and someone will get back to you in the next business day.</strong></h4> <p> </p> <p><strong><span style="line-height:normal"><span style="color:black">About the Authors</span></span></strong></p> <div> <div> <div style="float:left; margin-right:10px;"><img alt="Nick-Coval-headshot" height="74" src="https://business.hughes.com/sites/business.hughes.com/files/Nick%20Coval%20Headshot%202020.png" width="74" /></div> <p><em><strong>Nick Coval</strong> is a seasoned Enterprise Architect who builds complex enterprise-class network solutions for large organizations with distributed locations. He is a passionate technologist with a progressive vision for developing solutions with the customer and end-user objectives in mind. Follow Nick Coval on <a href="https://www.linkedin.com/in/NickCoval">LinkedIn</a> and Twitter </em><a href="https://twitter.com/nickcoval">@NickCoval</a><em>.</em></p> </div> </div> </div> <div class="field field-post-date field--name-field-post-date field--label-hidden field__item"><time datetime="2020-09-10T12:00:00Z" class="datetime">2020-09-10</time> </div> <div class="field panelizer field--name-panelizer field--label-hidden field__items"> <div class="field__item odd"><div class="js-form-item form-item js-form-type-item form-type-item js-form-item- form-item-"> <label>full</label> Using default called "blog" </div> </div> </div> <div class="field field-disable-image field--name-field-disable-image field--label-above"> <div class="field__label">Disable Blog Header Image</div> <div class="field__item">false</div> </div> Wed, 09 Sep 2020 19:12:15 +0000 Olivia Bell 3461 at https://business.hughes.com Who Can You Trust? Enterprise Security and Zero-Trust Approaches https://business.hughes.com/resources/blog/who-can-you-trust-enterprise-security-and-zero-trust-approaches <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/596" typeof="schema:Person" property="schema:name" datatype="">Olivia Bell</span></span> <span class="field field--name-created field--type-created field--label-hidden">Thu, 09/03/2020 - 13:22</span> <div class="field title">Who Can You Trust? Enterprise Security and Zero-Trust Approaches</div> <div class="field field-post-type field--name-field-post-type field--label-hidden field__item">Blog Post</div> <div class="field field-blog-categories field--name-field-blog-categories field--label-hidden field__items"> <div class="field__item odd"> <a href="/taxonomy/term/?type=blog_post"></a> </div> <div class="field__item even"> <a href="/taxonomy/term/?type=blog_post"></a> </div> </div> <div class="field field-image field--name-field-image field--label-hidden field__item"> <img src="/sites/business.hughes.com/files/styles/post_detail_image/public/CIOs%20and%20Trust.jpg?itok=CqbiAuNn" width="683" height="299" alt="open_laptop_dark_background" typeof="foaf:Image" class="image-style-post-detail-image" /> </div> <div class="clearfix text-formatted field body field--name-body field--label-hidden field__item"><p><em>CIO’s cite unauthorized network access as top concern.</em></p> <p><em>In June, the Wall Street Journal asked Chief Information Officers (CIOs) across the globe what kept them up at night. All voiced concerns that the coronavirus has changed how we work, shop, and play, and consequently unveiled new network vulnerabilities. <a href="https://business.hughes.com/resources/blog/two-strategies-address-top-cio-concerns">In an earlier blog post</a>, we explored two of their <a href="https://www-wsj-com.cdn.ampproject.org/c/s/www.wsj.com/amp/articles/whats-keeping-cios-up-at-night-11592606027">top worries</a>, along with strategies and solutions to ease their minds. Here, we look at another key concern – an ever-expanding “attack surface” – and provide insights into what CIOs should consider.</em></p> <p> </p> <p>In the WSJ, Jim Routh, head of enterprise information risk management, at Massachusetts Mutual Life Insurance Co., described the issue well when he said, “My top concern is reduction of the attack surface for the enterprise—the combined points where an unauthorized user can try to enter or extract data from a company.” This attack surface, which he noted enterprises strive to keep as small as possible through basic security protocols, is increased when more employees are working from home.</p> <p>But risk isn’t just a function of the number of users on the network. The Internet of Things (IoT) compounds the challenge. IoT includes all the smart devices or machines on a network, like thermostats, heat pumps, refrigerators, flood sensors, security cameras, healthcare equipment, wearables, emergency monitoring, and management tools, and so much more. Collectively, these users and IoT devices vastly increase the endpoints that add to this ever-expanding “attack surface.”</p> <div style="width:300px; float:right; border-left: 2px solid #1fc2b2; margin-left:12px;"> <div style="padding-left:8px;"><img alt="Hughes-Digital-Signage-Solutions" src="https://business.hughes.com/sites/business.hughes.com/files/Hughes_Is_Managed_SD-WAN_1.jpg" style="padding-bottom:8px;" /><b>WANsform Your Enterprise</b><br /> Before you can transform customer experience, you must <a href="http://business.hughes.com/wansform">WANsform</a> your enterprise. Learn how Hughes <a href="https://business.hughes.com/what-we-do/networking/managed-sd-wan">Managed SD-WAN</a> is enabling digital transformation and achieving real results. <ul><li><a href="https://business.hughes.com/who-we-are/collateral-library/mpls-managed-sd-wan-journey">MPLS vs. SD-WAN</a></li> <li><a href="https://business.hughes.com/why-sdwan" title="Learn About Managed SD-WAN">Why SD-WAN?</a></li> <li><a href="https://business.hughes.com/wifi-analytics-in-retail">WiFi Analytics: </a>Insight Every Step of the Way</li> <li><a href="https://business.hughes.com/digital-signage-solutions-how-to-increase-customer-engagement">Digital Signage Solutions</a>: Engagement Starts Here</li> <li><a href="https://business.hughes.com/our-technologies/networking-platforms/hr4860-secure-sdwan-gateway">SD-WAN Appliance</a>: 4860 is SD-WAN transformation in a box</li> </ul></div> </div> <p>Enterprises must also factor the risks associated with the shift to a cloud environment, largely driven by Software as a Service (SaaS). Because SaaS gives customers access to their enterprise applications over the Internet, it greatly simplifies user access to enterprise resources and applications. Also, rather than having software hosted at a data center and installed across network devices, applications can be built, maintained, and updated more easily via the cloud. While SaaS provides flexibility and many other advantages, it increases the network attack surface since provider locations are not under enterprise control and are often widely distributed. That causes challenges for existing or legacy <a href="https://business.hughes.com/sd-wan-networking/managed-security">network protections</a> to provide adequate security coverage.</p> <p><strong>Creating a Circle of Trust</strong></p> <p>So, what’s an enterprise to do? Jeff Bradbury, senior marketing director at Hughes North America, said one approach is to create trust levels within the security environment. By understanding how attack surfaces keep growing, and what users need access to which resources and tools, organizations can deploy protections based on the sensitivity of the data and the users who need access to it.  More sensitive resources and data are more highly protected, with fewer users and systems given access to it, and less sensitive items can use more standard protections and can be opened to more users and systems accessing it. By limiting the “attack vectors” into the protected enclaves and monitoring user access to those areas, IT security teams reduce the pathways for unauthorized access to their computer devices or networks, and limit potential attacker’s ability to exploit system vulnerabilities. Deploying protection processes in this way creates a layered approach to security, with the last layer at the heart of the enterprise system having the greatest level of protection.</p> <p>One example is using an identity-based approach for system access that can be set by type of device, including IoT and mobile devices. This includes being able to limit access to only approved devices and setting roles for “non-human” users, for those networks involving machine-to-machine connectivity requiring little to no human input.</p> <p>“Endpoints that interact with various network resources and SaaS applications are authenticated and secured within the context of that access or communication request, typically a user id and password or some system generated access code” he explained. One challenge with this traditional approach is that once the endpoint is authenticated, full access is allowed until that endpoint ends the authenticated session, opening a potential threat vector. These requests can be further validated and secured based on other parameters, such as enterprise policies for governance, geo location, and time of day. In a similar approach, but taking it another step forward, is the “zero trust” model that verifies every access request before permission is granted, no matter where that request comes from.</p> <p>These approaches vary from the more typical process in which any authenticated device “inside” the network is deemed to be a trusted device. With today’s remote workforce, where few people are working “inside” the network, identity-based or zero trust models are a more effective option for safeguarding the network.</p> <p><strong>Expanding Your Circle of Trust</strong></p> <p>Mr. Bradbury noted that one rarely discussed risk to network security is the issue of partner and third-party system access. “Many enterprises allow system access to their business providers and teaming partners, without realizing that this too expands the attack surface and makes their network system more vulnerable. If you provide unfettered access to your network, you are trusting that their network is as secure as yours is.”</p> <p>That’s a big leap of faith. Yet Mr. Bradbury finds enterprises provide access to all sorts of people and businesses, without confirming that those entities are keeping security patches and configurations updated.</p> <p>“Some of the biggest cyber hacks have occurred from third-party cloud services platforms that didn’t properly install a patch, enabling hackers to get inside the data system or loyalty program to steal customer information,” he said.</p> <p>Mr. Bradbury’s advice is to ask yourself, “Do all these partners need to be in my circle of trust?” If they do, decide whether they need full access to the entire network or whether you can provide them with isolated access to certain subsystems. Another option is to provide time-based access, giving them the ability to use network resources at certain times of the month or quarter, then closing their access down at other times. As new partners and technologies are added to the trusted environment, consider how you will grant access and tightly manage risk levels.</p> <p>Given attack surfaces will only continue to expand, it’s reassuring to know these strategies are well-suited for a dynamic network environment and can help you decide who to trust – regardless of what may change.</p> </div> <div class="field field-post-date field--name-field-post-date field--label-hidden field__item"><time datetime="2020-09-03T12:00:00Z" class="datetime">2020-09-03</time> </div> <div class="field panelizer field--name-panelizer field--label-hidden field__items"> <div class="field__item odd"><div class="js-form-item form-item js-form-type-item form-type-item js-form-item- form-item-"> <label>full</label> Using default called "blog" </div> </div> </div> <div class="field field-disable-image field--name-field-disable-image field--label-above"> <div class="field__label">Disable Blog Header Image</div> <div class="field__item">false</div> </div> Thu, 03 Sep 2020 13:22:13 +0000 Olivia Bell 3426 at https://business.hughes.com Demystifying Secure SD-WAN https://business.hughes.com/resources/blog/demystifying-secure-sd-wan <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/596" typeof="schema:Person" property="schema:name" datatype="">Olivia Bell</span></span> <span class="field field--name-created field--type-created field--label-hidden">Thu, 07/16/2020 - 13:19</span> <div class="field title">Demystifying Secure SD-WAN</div> <div class="field field-post-type field--name-field-post-type field--label-hidden field__item">Blog Post</div> <div class="field field-blog-categories field--name-field-blog-categories field--label-hidden field__items"> <div class="field__item odd"> <a href="/taxonomy/term/?type=blog_post"></a> </div> <div class="field__item even"> <a href="/taxonomy/term/?type=blog_post"></a> </div> </div> <div class="field field-image field--name-field-image field--label-hidden field__item"> <img src="/sites/business.hughes.com/files/styles/post_detail_image/public/secure%20SD-WAN%20demystified.png?itok=F2-PbaSH" width="683" height="299" alt="secure_sdwan" typeof="foaf:Image" class="image-style-post-detail-image" /> </div> <div class="clearfix text-formatted field body field--name-body field--label-hidden field__item"><p><a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> has been front and center in making the digital transformation a reality. To support digital innovation initiatives, businesses across industries are looking at <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD‑WAN</a> to keep up with cloud enablement, real-time apps for their customers, Point‑of‑Sale (POS) transactions, site operations and management, and employee communications and training. Gartner predicts that by 2023, 93% of organizations will be using some form of <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> for their WAN edge to save money, increase application performance, and simplify their network deployment and management. While SD-WAN can provide benefits to an enterprise, many of the available solutions lack smart and responsive managed security.</p> <p>The <a href="https://business.hughes.com/sd-wan-networking/managed-security">SD-WAN security</a> offerings from various vendors can be grouped into three general categories:</p> <ol><li><strong>Cloud-based</strong>. With a cloud-based offering, the <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> device is not doing any local inspection and offloads all packets to a cloud service.</li> <li><strong>Third-party integration</strong>. This comes in the form of service chaining, in which multiple virtual services are working together within the physical box.</li> <li><strong>Built-in security</strong>. As the name suggests, the security inspection happens within the physical box itself. These appliances are traditional security devices, such as next generation firewalls (NGFW), that have <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> as a feature. </li> </ol><div style="width:300px; float:right; border-left: 2px solid #1fc2b2; margin-left:12px;"> <div style="padding-left:8px;"><img alt="Hughes-Digital-Signage-Solutions" src="https://business.hughes.com/sites/business.hughes.com/files/Hughes_Is_Managed_SD-WAN_1.jpg" style="padding-bottom:8px;" /><b>WANsform Your Enterprise</b><br /> Before you can transform customer experience, you must <a href="http://business.hughes.com/wansform">WANsform</a> your enterprise. Learn how Hughes <a href="https://business.hughes.com/what-we-do/networking/managed-sd-wan">Managed SD-WAN</a> is enabling digital transformation and achieving real results. <ul><li><a href="https://business.hughes.com/who-we-are/collateral-library/mpls-managed-sd-wan-journey">MPLS vs. SD-WAN</a></li> <li><a href="https://business.hughes.com/why-sdwan" title="Learn About Managed SD-WAN">Why SD-WAN?</a></li> <li><a href="https://business.hughes.com/wifi-analytics-in-retail">WiFi Analytics: </a>Insight Every Step of the Way</li> <li><a href="https://business.hughes.com/digital-signage-solutions-how-to-increase-customer-engagement">Digital Signage Solutions</a>: Engagement Starts Here</li> <li><a href="https://business.hughes.com/our-technologies/networking-platforms/hr4860-secure-sdwan-gateway">SD-WAN Appliance</a>: 4860 is SD-WAN transformation in a box</li> </ul></div> </div> <p>Security is central to any successful SD-WAN deployment, and maintaining a secure network has never been more complex or more important. In a distributed enterprise, a branch or site can be far less secure due to the lack of security built into the <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN solution</a>. Locations that are directly connected to the Internet with security tools—such as firewalls, URL filtering, or even antivirus applications—become vulnerable to cyber-attacks.</p> <p>A fully integrated and centralized <a href="https://business.hughes.com/sd-wan-networking/managed-security">secure SD-WAN</a> is the answer for businesses with several branches.</p> <p><strong>What is secure SD-WAN?</strong></p> <p>According to Network World, “Secure SD-WAN is what combines both network and security into one integrated platform.” The secure SD-WAN solution can be placed on premises or can be edge-based at the branch location, in the cloud, or in between.</p> <p>With several <a href="https://business.hughes.com/sd-wan-networking/managed-security">secure SD-WAN</a> options available, it is important that you find a service or solution that provides the right level of security without compromising your application and operations productivity. It is a best practice to bring your network, operations, and security teams into the overall enterprise <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> strategy. This group should collectively determine whether you have the time and expertise to implement and manage a secure <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN solution</a>. They should then consider network, operations, applications, cloud ramp, and security needs. Some applications require PCI certifications and compliance, while others require advanced threat management, intrusion prevention, advanced malware protection, and URL filtering at the edge or in the cloud.</p> <p>One of the most crucial early decisions to make as you assess your current and future networking needs is whether to pursue a Managed Service Provider (<a href="https://business.hughes.com/sd-wan-networking/managed-networks">MSP</a>) or Do‑It‑Yourself (DIY) approach. Such a decision requires a clear understanding of your resources, budget, applications, security, and other network needs now and in the future. Large organizations may have sufficient IT resources and network architects available to design and deploy a <a href="https://business.hughes.com/sd-wan-networking/managed-security">secure SD-WAN</a> in house. However, the maintenance, support, and management can be a headache due to ever-changing complexities on an existing network.</p> <p>Branches may have different network infrastructure, transport, or operations requirements. The tools and processes built for on-premises and cloud networks are not the same. While changing your network to <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> is a step in the right direction, it is wise to partner with an experienced <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">managed SD-WAN</a> provider who can evaluate and tailor a circuit design that can adapt to your current and future business requirements. An <a href="https://business.hughes.com/sd-wan-networking/managed-networks">MSP</a> can also take over the complexities of your installation, maintenance, service, and support.</p> <p><strong>How do you get a secure SD-WAN that fits all of your business needs?</strong><a name="security" id="security"></a></p> <p>First, work with an experienced <a href="https://business.hughes.com/sd-wan-networking/managed-networks">MSP</a> who can give you a wide range of <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN solutions</a> to find the right solution for your specific needs at the branch level. The <a href="https://business.hughes.com/sd-wan-networking/managed-networks">MSP</a> should have nationwide access to installers and a centralized Network Operations Center (NOC) and Security Operations Center (SOC) to provide 24/7 service and support for your distributed branches. For a <a href="https://business.hughes.com/sd-wan-networking/managed-security">secure SD-WAN</a>, the SOC needs to have visibility into each branch to monitor threat levels, manage the network gateways, and manage systems that are found to be vulnerable or infected by any malware or security attacks.</p> <p>An <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> <a href="https://business.hughes.com/sd-wan-networking/managed-networks">MSP</a> supplies the hardware, software, and networking and transport services required to deliver the appropriate application or service at each branch. Based on your service-level agreement, monitoring, uptime performance, and support can be determined at the branch level.</p> <p>The right <a href="https://business.hughes.com/sd-wan-networking/managed-security">secure SD-WAN</a> service partner can provide access to a wide variety of service options to best fit your business needs, from fully managed to DIY to a hybrid model.</p> <p>Ultimately, it's all about measurements. <a href="https://business.hughes.com/tailored-sdwan-makes-difference">See our eight fit points to better understand how your SD-WAN may or may not be measuring up</a>.</p> <p> </p> <p><strong><span style="line-height:normal"><span style="color:black">About the Author</span></span></strong></p> <div> <div style="float:left"> </div> <div><img alt="Tim Tang" height="200" src="https://business.hughes.com/sites/business.hughes.com/files/Shahid%20Javed%20headshot.png" style="width:60px; height:60px; padding-right:8px; float:left" width="200" /><p><em><strong>Shahid Javed </strong>is a Director of Enterprise Marketing and a seasoned B2B marketing expert. He works across various enterprise markets that are driving digital transformation and making them aware of the Right Connection from HughesON for their business needs. Follow Shahid Javed on <a data-saferedirecturl="https://www.google.com/url?q=https://www.linkedin.com/in/shahidjaved&amp;source=gmail&amp;ust=1595355920050000&amp;usg=AFQjCNF_bcfNusrCFnoUx5Gn8wdZlZUTbQ" href="https://www.linkedin.com/in/shahidjaved" target="_blank">LinkedIn</a> and Twitter </em><a href="https://twitter.com/shahidj"><i>@ShahidJ</i></a><em>.</em></p> </div> </div> </div> <div class="field field-post-date field--name-field-post-date field--label-hidden field__item"><time datetime="2020-07-16T12:00:00Z" class="datetime">2020-07-16</time> </div> <div class="field panelizer field--name-panelizer field--label-hidden field__items"> <div class="field__item odd"><div class="js-form-item form-item js-form-type-item form-type-item js-form-item- form-item-"> <label>full</label> Using default called "blog" </div> </div> </div> <div class="field field-blog-author field--name-field-blog-author field--label-hidden field__items"> <div class="field__item odd"><a href="/resources/blog/shahid-javed" hreflang="en">Shahid Javed</a></div> </div> <div class="field field-disable-image field--name-field-disable-image field--label-above"> <div class="field__label">Disable Blog Header Image</div> <div class="field__item">false</div> </div> Thu, 16 Jul 2020 13:19:24 +0000 Olivia Bell 3376 at https://business.hughes.com SD-WAN Fit Points: Service Levels and Partnerships https://business.hughes.com/resources/blog/sd-wan-fit-points-service-levels-and-partnerships <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/596" typeof="schema:Person" property="schema:name" datatype="">Olivia Bell</span></span> <span class="field field--name-created field--type-created field--label-hidden">Fri, 06/12/2020 - 02:49</span> <div class="field title">SD-WAN Fit Points: Service Levels and Partnerships</div> <div class="field field-post-type field--name-field-post-type field--label-hidden field__item">Blog Post</div> <div class="field field-blog-categories field--name-field-blog-categories field--label-hidden field__items"> <div class="field__item odd"> <a href="/taxonomy/term/?type=blog_post"></a> </div> <div class="field__item even"> <a href="/taxonomy/term/?type=blog_post"></a> </div> </div> <div class="field field-image field--name-field-image field--label-hidden field__item"> <img src="/sites/business.hughes.com/files/styles/post_detail_image/public/sd-wan%20fit%20point%20partnership%20service.png?itok=uLgRgvjc" width="683" height="299" alt="fit_point_partnership_service" typeof="foaf:Image" class="image-style-post-detail-image" /> </div> <div class="clearfix text-formatted field body field--name-body field--label-hidden field__item"><p><em>In this <a href="https://business.hughes.com/resources/blog/sd-wan-fit-points-security">blog series</a>, we presented 8 Fit Points for a tailor-made <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN solution</a> that can make all the difference in your business. In this fourth and last installment, we explore the last two critical elements to success: the roles of service levels and partnerships.</em></p> <p>One of the most critical early decisions to make as you assess your current and future networking needs is whether to pursue a Managed Service Provider (<a href="https://business.hughes.com/sd-wan-networking/managed-networks">MSP</a>) or do-it-yourself (DIY) approach. Such a decision requires having a clear understanding of your needs. Do you have remote workers who need secure access to the network’s resources? Are you relying more on cloud applications? Do you have plans to rollout new technologies, devices, or service capabilities?</p> <p>Armed with such insights, you can then consider the level of skills and expertise you have in-house. This is especially important if you are transitioning to a Software-defined Wide Area Network (<a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a>). Also, think about the time and energy it will require to either develop or recruit the skills and resources you may need. Even if you have the in-house capabilities, you may decide to use your own resources for more business-critical items and use an MSP for certain expertise and services. The right <a href="https://business.hughes.com/sd-wan-networking/managed-networks">MSP</a> partner can provide access to a broad buffet of service options—from fully managed offerings to “bring your own broadband”, to shared service models that will enable you to deploy portions of a DIY approach and use a hybrid model elsewhere as desired.</p> <div style="width:300px; float:right; border-left: 2px solid #1fc2b2; margin-left:12px;"> <div style="padding-left:8px;"><img alt="Hughes-Digital-Signage-Solutions" src="https://business.hughes.com/sites/business.hughes.com/files/Hughes_Is_Managed_SD-WAN_1.jpg" style="padding-bottom:8px;" /><b>WANsform Your Enterprise</b><br /> Before you can transform customer experience, you must <a href="http://business.hughes.com/wansform">WANsform</a> your enterprise. Learn how Hughes <a href="https://business.hughes.com/what-we-do/networking/managed-sd-wan">Managed SD-WAN</a> is enabling digital transformation and achieving real results. <ul><li><a href="https://business.hughes.com/who-we-are/collateral-library/mpls-managed-sd-wan-journey">MPLS vs. SD-WAN</a></li> <li><a href="https://business.hughes.com/why-sdwan" title="Learn About Managed SD-WAN">Why SD-WAN?</a></li> <li><a href="https://business.hughes.com/wifi-analytics-in-retail">WiFi Analytics: </a>Insight Every Step of the Way</li> <li><a href="https://business.hughes.com/digital-signage-solutions-how-to-increase-customer-engagement">Digital Signage Solutions</a>: Engagement Starts Here</li> <li><a href="https://business.hughes.com/our-technologies/networking-platforms/hr4860-secure-sdwan-gateway">SD-WAN Appliance</a>: 4860 is SD-WAN transformation in a box</li> </ul></div> </div> <p>To determine which approach will best fit your business, pinpoint how much service coverage you need by asking the following questions:</p> <ul><li>What level of technical expertise do you have in-house?</li> <li>Do you need extended hours or 24/7 coverage?</li> <li>Can you deploy a large-scale network change without interrupting your core business or do you want a partner to help ensure a smooth transition?</li> <li>Do you want or need zero-touch provisioning?</li> <li>How much time over the next 5 years do you want your team to devote to network maintenance and updating?</li> <li>How quickly will your team be able to adjust network behaviors to reflect changing business practices or technology deployments?</li> <li>Do you anticipate the need to run test pilots in one location, followed by a roll out of a proven proof of concept elsewhere?</li> <li>Do you have a help desk and ticketing system that needs support?</li> </ul><p>With a clearer understanding of available resources (and gaps) you can then consider your service level requirements.</p> <p><strong>Ensuring Service Levels</strong></p> <p>Typically, with an <a href="https://business.hughes.com/sd-wan-networking/managed-networks">MSP</a> there is a service level agreement (SLA) in place to address and guide certain aspects of network service, like its quality and availability, and to specify who is responsible for managing performance. Even if you apply a DIY approach, it is essential to consider how you will ensure network service levels. For example:</p> <ul><li>Are you ready to assume the burden of staying current with the latest technology updates and advances?</li> </ul><ul><li>How much time are you willing to expend managing the day-to-day operations, especially if they require extended hours, 24x7 coverage, or on-site support?</li> <li>Is your team equipped to handle network optimization tasks?</li> <li>Do you need access to network analytics?</li> <li>Will you be dependent on manual processes? Or, are you willing and able to invest in integration with all your vendors and Internet service providers (ISPs) to achieve efficiencies?</li> <li>Will you be transitioning away from MPLS and toward broadband? And, are you willing to take on the management of multiple ISPs and service plans across the network?</li> </ul><p>As Gartner noted in its DIY vs MNS report (2017), based on an organization’s IT capabilities, an MSP is the recommended way to deliver network infrastructure if you are not operating at an advanced capabilities level. Even if you can deliver at this heightened level of service management, you may still choose to use an <a href="https://business.hughes.com/sd-wan-networking/managed-networks">MSP</a> over the DIY approach because you prefer having a lean IT team, are focused on reducing CAPEX or other cost control measures, or are building agility and scalability into your operations. While a fully managed solution may carry similar costs as the DIY option when viewed from a TCO perspective, the benefits associated with greater capabilities, improved team flexibility, expanded network automation and optimization efforts, and greater efficiencies in execution of day-to-day operations and maintenance tasks will pay quick dividends.</p> <p>Ultimately, you should consider whether your IT staff might be best served by focusing on improving operational or business processes rather than on managing your network. And whether you want a reliable partner who is able to not only look ahead to trends and market changes, but also handle the day-to-day patching and release updates associated with network maintenance. Again, while fully managed solutions may be pricier, there is no doubt the <a href="https://business.hughes.com/sd-wan-networking/managed-networks">MSP</a> offers greater capabilities at a similar cost while also providing a simplified and more direct way toward meeting or exceeding SLAs with the business owners.</p> <p><strong>Preserving Your Partnerships</strong></p> <p>You’ve invested great time and expense in your network. And you may have components in your technology stack (along with technology partners) that you like and want to continue to use. Maybe you rely heavily on Cisco for all your routers and switches. Or, you consider Fortinet security to be a must-have component of your overall security architecture. It’s reasonable to want any new solution to work with parts of your existing infrastructure and for it to include your preferred technology partners.</p> <p>The right MSP partner should be willing and able to integrate your favorites into your <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN solution</a>. There should be no need to sacrifice what’s already working for you. The <a href="https://business.hughes.com/sd-wan-networking/managed-networks">MSP</a> should also be able to deliver best-of-breed options to close specific capabilities gaps. In this way they provide a blended solution that is truly tailored for your business. Some MSPs, such as Hughes, have forged their own partnerships with industry leaders like Cisco, Fortinet, and VMware that can deliver added benefits.</p> <p>To identify which stack components and partners to preserve, ask yourself these questions:</p> <ul><li>What parts of your infrastructure currently perform well?</li> <li>What would you like to keep?</li> <li>Do any parts of your infrastructure hold certifications or meet compliance regulations that you’d like to hang on to?</li> </ul><p>As we close this 4-part blog series, (including posts on <a href="https://business.hughes.com/resources/blog/sd-wan-fit-points-security">security</a>, <a href="https://business.hughes.com/resources/blog/sd-wan-fit-points-bandwidth-and-cost">bandwidth and cost</a>, and <a href="https://business.hughes.com/resources/blog/sd-wan-fit-points-cloud-access-real-time-apps-and-agility">cloud access, real-time apps, and agility</a>) remember that by using the 8 Fit Points as your guide, you can assess your current situation and consider your network needs thoroughly and holistically. You’ll be able to look far beyond the numbers to better understand which decisions will lead you to an <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN solution</a> that fits your business just right.</p> <p><strong><span style="line-height:normal"><span style="color:black">About the Authors</span></span></strong></p> <div> <div style="float:left"> </div> <div><img alt="Jeff-Bradbury" height="74" src="https://business.hughes.com/sites/business.hughes.com/files/Jeff_Bradbury_6060.jpg" style="width:74px; height:74px; padding-right:8px; float:left" width="60" /><p><em><strong>Jeff Bradbury</strong> works across markets to help distributed organizations identify trends that are driving digital transformation and adopt technologies critical to connecting their customers, employees, and locations. Follow Jeff Bradbury on <a href="https://www.linkedin.com/in/jeffbradbury">LinkedIn</a> and Twitter </em><a href="https://twitter.com/TechXformation">@TechXformation</a><em>.</em></p> <p> </p> <div> <div style="float:left; margin-right:10px;"><img alt="Nick-Coval-headshot" height="74" src="https://business.hughes.com/sites/business.hughes.com/files/Nick%20Coval%20Headshot%202020.png" width="74" /></div> <p><em><strong>Nick Coval</strong> is a seasoned Enterprise Architect who builds complex enterprise-class network solutions for large organizations with distributed locations. He is a passionate technologist with a progressive vision for developing solutions with the customer and end-user objectives in mind. Follow Nick Coval on <a href="https://www.linkedin.com/in/NickCoval">LinkedIn</a> and Twitter </em><a href="https://twitter.com/nickcoval">@NickCoval</a><em>.</em></p> </div> </div> </div> </div> <div class="field field-post-date field--name-field-post-date field--label-hidden field__item"><time datetime="2020-06-11T12:00:00Z" class="datetime">2020-06-11</time> </div> <div class="field panelizer field--name-panelizer field--label-hidden field__items"> <div class="field__item odd"><div class="js-form-item form-item js-form-type-item form-type-item js-form-item- form-item-"> <label>full</label> Using default called "blog" </div> </div> </div> <div class="field field-blog-author field--name-field-blog-author field--label-hidden field__items"> <div class="field__item odd"><a href="/resources/blog/jeff-bradbury" hreflang="en">Jeff Bradbury</a></div> <div class="field__item even"><a href="/resources/blog/nick-coval" hreflang="en">Nick Coval</a></div> </div> <div class="field field-disable-image field--name-field-disable-image field--label-above"> <div class="field__label">Disable Blog Header Image</div> <div class="field__item">false</div> </div> Fri, 12 Jun 2020 02:49:34 +0000 Olivia Bell 3336 at https://business.hughes.com Mobile Apps: Not Just for Take-Out https://business.hughes.com/resources/blog/mobile-apps-not-just-take-out <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/596" typeof="schema:Person" property="schema:name" datatype="">Olivia Bell</span></span> <span class="field field--name-created field--type-created field--label-hidden">Thu, 05/21/2020 - 21:07</span> <div class="field title">Mobile Apps: Not Just for Take-Out</div> <div class="field field-post-type field--name-field-post-type field--label-hidden field__item">Blog Post</div> <div class="field field-blog-categories field--name-field-blog-categories field--label-hidden field__items"> <div class="field__item odd"> <a href="/taxonomy/term/?type=blog_post"></a> </div> </div> <div class="field field-image field--name-field-image field--label-hidden field__item"> <img src="/sites/business.hughes.com/files/styles/post_detail_image/public/restaurant%20mobile%20app_header.png?itok=vl4NNE-S" width="683" height="299" alt="mobile_app_user" typeof="foaf:Image" class="image-style-post-detail-image" /> </div> <div class="clearfix text-formatted field body field--name-body field--label-hidden field__item"><p><em>Could mobile apps help restaurants reopen by offering a safer, contactless way to serve dine-in patrons?</em></p> <p>Nearly all businesses have been hard hit by this pandemic. Yet the restaurant industry faces some unique challenges as establishments confront how best to keep patrons and staff safe upon reopening. How can they minimize contact points, ensure safe distancing, and instill confidence in customers? As I consider all of the ways the dining experience will change in the wake of this current pandemic, I think about the way mobile device apps have grown during the current crisis and about the great promise they hold going forward. They offer a contact-free way to order and pay for food, even for dine-in patrons, and provide a significant upside for <a href="https://business.hughes.com/signage/customer-experience" target="_blank">customer experience</a>, servers, and the restaurant itself in terms of order accuracy, efficiency, and social engagement (Related: to manage all of the features a mobile app can provide for your customers, you need a network that rises to the occasion and strong <a href="https://business.hughes.com/sd-wan-networking/managed-wi-fi">Guest Wi-Fi</a> services to support the expanded demand apps and additional devices add to the network. Learn more about an <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN solution</a> here).</p> <div style="width:300px; float:right; border-left: 2px solid #1fc2b2; margin-left:12px;"> <div style="padding-left:8px;"><img alt="Hughes Digital Signage Solutions" src="https://business.hughes.com/sites/business.hughes.com/files/Hughes_Is_Managed_SD-WAN_1.jpg" style="padding-bottom:8px;" /><b>WANsform Your Enterprise</b><br /> Before you can transform customer experience, you must <a href="http://business.hughes.com/wansform">WANsform</a> your enterprise. Learn how Hughes <a href="https://business.hughes.com/what-we-do/networking/managed-sd-wan">Managed SD-WAN</a> is enabling digital transformation and achieving real results. <ul><li><a href="https://business.hughes.com/who-we-are/collateral-library/mpls-managed-sd-wan-journey">MPLS vs. SD-WAN</a></li> <li><a href="https://business.hughes.com/why-sdwan" title="Learn About Managed SD-WAN">Why SD-WAN?</a></li> <li><a href="https://business.hughes.com/wifi-analytics-in-retail">WiFi Analytics: </a>Insight Every Step of the Way</li> <li><a href="https://business.hughes.com/digital-signage-solutions-how-to-increase-customer-engagement">Digital Signage Solutions</a>: Engagement Starts Here</li> <li><a href="https://business.hughes.com/our-technologies/networking-platforms/hr4860-secure-sdwan-gateway">SD-WAN Appliance</a>: 4860 is SD-WAN transformation in a box</li> </ul></div> </div> <p>Some restaurant chains have been utilizing tabletop ordering and payment devices for the last few years. But they still require customers to touch a surface that others may have touched; and device costs can be prohibitive for many. At the same time, most have a mobile app in place to support secondary functions, like take-out and delivery orders. Since the mobile app resides on the customer’s personal device, it’s a safe surface that only they touch.</p> <p>With an app, a patron can review menu items and make food or drink choices in advance, speeding up the ordering process. The restaurant can additionally make recommendations and offer special promotions or add-ons, or even call up past orders to recommend as a re-order or to select past favorites. Of course, contactless payment is a benefit of an app as well.</p> <p>Relying more on a mobile app can also improve a restaurant’s processes. For example, if patrons make reservations and place orders in advance, a restaurant will be better able to manage inventory and can prepare the prep line for upcoming food orders for quicker, more efficient service. Another key advantage is eliminating the need for printed menus that must be cleaned after each use or printed daily.</p> <p>Servers and wait-staff can still offer in-person advice and guidance, but their primary role would be focused on welcoming the customer and delivering food. The app, however, can expand a restaurant’s ability to share information and provide enhanced service. Imagine a virtual sommelier being able to interact with and provide product knowledge or recommendations to a table of diners.</p> <p>I am intrigued by the many ways a restaurant app might transform both restaurant operations and the dining experience, making it safer (and more efficient) for servers and staff to do their jobs while giving patrons the confidence they need to go out to eat with friends and family. I, for one, am hungry for that type of experience!</p> <p> </p> <p><strong>About the Author</strong></p> <div><img alt="Mike Tippets" src="https://business.hughes.com/sites/business.hughes.com/files/Mike_Tippets_Headshot.jpg" style="width:60px; height:60px; padding-right:8px; float:left" /><p><em><strong>Mike Tippets</strong> is the Vice President for Enterprise Marketing &amp; Organizational Development at Hughes. He leads a team that helps multi-site businesses engage, communicate, grow and make The Right Connection with their staff and their customers. Follow Mike Tippets on <a href="https://www.linkedin.com/in/miketippets/">LinkedIn</a> and Twitter </em><a href="https://twitter.com/HughesMediaVP">@HughesMediaVP</a><em>.</em></p> <p> </p> </div> </div> <div class="field field-post-date field--name-field-post-date field--label-hidden field__item"><time datetime="2020-05-21T12:00:00Z" class="datetime">2020-05-21</time> </div> <div class="field panelizer field--name-panelizer field--label-hidden field__items"> <div class="field__item odd"><div class="js-form-item form-item js-form-type-item form-type-item js-form-item- form-item-"> <label>full</label> Using default called "blog" </div> </div> </div> <div class="field field-blog-author field--name-field-blog-author field--label-hidden field__items"> <div class="field__item odd"><a href="/resources/blog/mike-tippets-vice-president-enterprise-marketing" hreflang="en">Mike Tippets, Vice President, Enterprise Marketing</a></div> </div> <div class="field field-disable-image field--name-field-disable-image field--label-above"> <div class="field__label">Disable Blog Header Image</div> <div class="field__item">false</div> </div> Thu, 21 May 2020 21:07:05 +0000 Olivia Bell 3301 at https://business.hughes.com Teleworking Is Showing How Managed SD-WAN Will Improve Remote Site Connectivity https://business.hughes.com/resources/blog/teleworking-showing-how-managed-sd-wan-will-improve-remote-site-connectivity <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/596" typeof="schema:Person" property="schema:name" datatype="">Olivia Bell</span></span> <span class="field field--name-created field--type-created field--label-hidden">Thu, 05/14/2020 - 03:10</span> <div class="field title">Teleworking Is Showing How Managed SD-WAN Will Improve Remote Site Connectivity</div> <div class="field field-post-type field--name-field-post-type field--label-hidden field__item">Blog Post</div> <div class="field field-blog-categories field--name-field-blog-categories field--label-hidden field__items"> <div class="field__item odd"> <a href="/taxonomy/term/?type=blog_post"></a> </div> <div class="field__item even"> <a href="/taxonomy/term/?type=blog_post"></a> </div> </div> <div class="field field-image field--name-field-image field--label-hidden field__item"> <img src="/sites/business.hughes.com/files/styles/post_detail_image/public/remote%20telework.png?itok=-XPmGjnA" width="683" height="299" alt="remote_telework" typeof="foaf:Image" class="image-style-post-detail-image" /> </div> <div class="clearfix text-formatted field body field--name-body field--label-hidden field__item"><p>Like many people, I started working from home about 6 weeks ago. I quickly realized that “business as usual” and working remotely was not going to be as easy as expected. With people now teleworking and attending classes online (in addition to increasing their streaming and other entertainment‑driven bandwidth usage) the demand on typical broadband connections has grown. For some, like me, this is their first experience doing daily work exclusively through remote network connectivity.</p> <div style="width:300px; float:right; border-left: 2px solid #1fc2b2; margin-left:12px;"> <div style="padding-left:8px;"><img alt="Hughes Digital Signage Solutions" src="https://business.hughes.com/sites/business.hughes.com/files/Hughes_Is_Managed_SD-WAN_1.jpg" style="padding-bottom:8px;" /><b>WANsform Your Enterprise</b><br /> Before you can transform customer experience, you must <a href="http://business.hughes.com/wansform">WANsform</a> your enterprise. Learn how Hughes <a href="https://business.hughes.com/what-we-do/networking/managed-sd-wan">Managed SD-WAN</a> is enabling digital transformation and achieving real results. <ul><li><a href="https://business.hughes.com/who-we-are/collateral-library/mpls-managed-sd-wan-journey">MPLS vs. SD-WAN</a></li> <li><a href="https://business.hughes.com/why-sdwan" title="Learn About Managed SD-WAN">Why SD-WAN?</a></li> <li><a href="https://business.hughes.com/wifi-analytics-in-retail">WiFi Analytics: </a>Insight Every Step of the Way</li> <li><a href="https://business.hughes.com/digital-signage-solutions-how-to-increase-customer-engagement">Digital Signage Solutions</a>: Engagement Starts Here</li> <li><a href="https://business.hughes.com/our-technologies/networking-platforms/hr4860-secure-sdwan-gateway">SD-WAN Appliance</a>: 4860 is SD-WAN transformation in a box</li> </ul></div> </div> <p>This new surge of activity brings network strain, resulting in severely degraded video quality for virtual team meetings—or worse—calls that fail to connect. People are experiencing application slowness, video and voice connection failures in the middle of crucial business meetings, and students learning from home must have the ability to join their new virtual classrooms without hiccups. This emulates the remote business site that depends on network connections for business productivity applications, voice-over-IP, employee communication and training applications and more.</p> <p>So, the question is: What is the best way to strengthen underperforming connections?</p> <p>Hughes, through its <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">Managed SD-WAN</a> technology, offers a solution. For me, this meant implementing a VeloCloud SD-WAN appliance in my home and having it connected to the Hughes <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">Managed SD-WAN</a> service. The setup was quick, and the configuration was automatic. Since adding this to the broadband connection at home, my work experience, the online education experience for my family and our streaming entertainment experiences have all improved. After this experience, I reflected on how this <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN solution</a> and similar solutions used at distributed retail locations improve application performance and network reliability.</p> <p><strong>How Managed SD-WAN Can Help Remote Business Locations</strong></p> <p>The same <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> technology that enterprises rely on to improve the network and application performance at their corporate locations can also address the needs of users at remote locations (e.g. stores and branches). However, trying to maintain and deliver this service to remote locations is resource intensive. This is where a <a href="https://business.hughes.com/sd-wan-networking/managed-networks">managed service provider</a>, taking on this effort and offering ongoing support, can become an essential partner.</p> <p>With a Hughes <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">Managed SD-WAN</a>, a business can take control and quickly find a solution to remote network connectivity problems. Hughes Managed SD-WAN prioritizes applications and optimizes the routing of traffic across the Internet, taking advantage of high‑capacity connections or even multiple Internet connections, helping everyone on a network stay connected.</p> <p>One feature that enables <a href="https://business.hughes.com/why-sdwan">SD-WAN</a> to resolve video and voice disruptions is through the use of Forward Error Correction (FEC). By compensating for intermittent or even continuous packet loss, <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN solutions</a> with FEC make a noticeable difference in the remote connectivity dilemma. Additional data is automatically inserted into the data stream when packet loss is detected, ensuring that the application can recover lost data at the other end of the connection. This alone greatly improves the quality of voice and video connections, offering real-time recovery to replace any data lost during transfer.</p> <p>A second feature that <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> uses for an improved Internet experience is combining two different connections that are both active at all times. This is most commonly accomplished by adding an LTE connection. LTE is used because it requires the least effort to implement, data plans can be pooled across all sites, and because the second circuit is usually used less frequently (meaning it can be a smaller and less expensive connection type). By configuring the SD-WAN to use both circuits at the same time in an active-active configuration, it chooses the circuit that has the best performance in that moment. In essence, SD-WAN actively scans and monitors both circuits to choose the path of least resistance.</p> <p>Some <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN solutions</a> can even direct traffic on a packet‑by‑packet basis. The graphic below depicts how both circuits alone were experiencing performance issues but achieved an excellent quality score when combined. This is the power of SD-WAN with dual circuits.</p> <div alt="sdwan_and_fios_dashboard" data-embed-button="media_browser" data-entity-embed-display="media_image" data-entity-embed-display-settings="post_detail_image" data-entity-type="media" data-entity-uuid="84341e79-5913-47fb-8368-86600861eb1a" data-langcode="en" title="SD-WAN vs. Fios Dashboard" class="align-center embedded-entity"> <img src="/sites/business.hughes.com/files/styles/post_detail_image/public/Verizon%20fios%20dashboard.png?itok=LmoPdor-" alt="sdwan_and_fios_dashboard" title="SD-WAN vs. Fios Dashboard" typeof="foaf:Image" class="image-style-post-detail-image" /></div> <p>Supporting a remote location requiring intense and continuous access to the Internet is a big task but, as demonstrated above, not impossible. As both a managed service provider and managed security service provider, Hughes delivers a fully managed network as well as industry-leading security services so that those working at remote locations can focus on their work and other essential online tasks.</p> <p>Using a <a href="https://business.hughes.com/sd-wan-networking/managed-networks">managed service provider</a>, like Hughes, offers a number of benefits on top of providing a <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">Managed SD-WAN</a> solution. Hughes has the experience to seamlessly deliver service anywhere across North America, the security needed to protect critical enterprise and customer information, and the expertise to deliver it all efficiently and effectively. Hughes is offering a range of Managed SD-WAN services, give us a call at 1-888-716-6856 or <a href="https://business.hughes.com/contact-us">contact us</a> and we can discuss the tailored SD-WAN service that meets your business needs.</p> <p> </p> <p><strong><span style="line-height:normal"><span style="color:black">About the Author</span></span></strong></p> <div> <div style="float:left"> </div> <div><img alt="Tim Tang" height="200" src="https://business.hughes.com/sites/business.hughes.com/files/Tim_Tang_Hughes.jpg" style="width:60px; height:60px; padding-right:8px; float:left" width="200" /><p><em><strong>Tim Tang</strong> helps distributed organizations achieve the promise of digital transformation by sharing ideas across industries and helping customers stay ahead of the ever-increasing pace of change. Follow Tim Tang on <a href="https://www.linkedin.com/in/tangtim/">LinkedIn</a> and Twitter </em><a href="https://twitter.com/TimTang4Retail">@TimTang4Retail</a><em>.</em></p> </div> </div> </div> <div class="field field-post-date field--name-field-post-date field--label-hidden field__item"><time datetime="2020-05-14T12:00:00Z" class="datetime">2020-05-14</time> </div> <div class="field panelizer field--name-panelizer field--label-hidden field__items"> <div class="field__item odd"><div class="js-form-item form-item js-form-type-item form-type-item js-form-item- form-item-"> <label>full</label> Using default called "blog" </div> </div> </div> <div class="field field-blog-author field--name-field-blog-author field--label-hidden field__items"> <div class="field__item odd"><a href="/resources/blog/tim-tang-director-enterprise-solutions" hreflang="en">Tim Tang, Director, Enterprise Solutions</a></div> </div> <div class="field field-disable-image field--name-field-disable-image field--label-above"> <div class="field__label">Disable Blog Header Image</div> <div class="field__item">false</div> </div> Thu, 14 May 2020 03:10:15 +0000 Olivia Bell 3291 at https://business.hughes.com Connecting Our Healthcare Providers with Telehealth Services https://business.hughes.com/resources/blog/connecting-our-healthcare-providers-telehealth-services <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/596" typeof="schema:Person" property="schema:name" datatype="">Olivia Bell</span></span> <span class="field field--name-created field--type-created field--label-hidden">Thu, 05/07/2020 - 15:51</span> <div class="field title">Connecting Our Healthcare Providers with Telehealth Services</div> <div class="field field-post-type field--name-field-post-type field--label-hidden field__item">Blog Post</div> <div class="field field-blog-categories field--name-field-blog-categories field--label-hidden field__items"> <div class="field__item odd"> <a href="/taxonomy/term/?type=blog_post"></a> </div> </div> <div class="field field-image field--name-field-image field--label-hidden field__item"> <img src="/sites/business.hughes.com/files/styles/post_detail_image/public/telehealth.png?itok=5dxTxGMB" width="683" height="299" alt="telehealth_support" typeof="foaf:Image" class="image-style-post-detail-image" /> </div> <div class="clearfix text-formatted field body field--name-body field--label-hidden field__item"><p>With Health Care Providers (HCPs) across the country devoted to providing the care our communities need more than ever, Hughes offers, not just our thanks, but also our support.</p> <div style="width:300px; float:right; border-left: 2px solid #1fc2b2; margin-left:12px;"> <div style="padding-left:8px;"><img alt="Hughes-Digital-Signage-Solutions" src="https://business.hughes.com/sites/business.hughes.com/files/Hughes_Is_Managed_SD-WAN_1.jpg" style="padding-bottom:8px;" /><b>WANsform Your Enterprise</b><br /> Before you can transform customer experience, you must <a href="http://business.hughes.com/wansform">WANsform</a> your enterprise. Learn how Hughes <a href="https://business.hughes.com/what-we-do/networking/managed-sd-wan">Managed SD-WAN</a> is enabling digital transformation and achieving real results. <ul><li><a href="https://business.hughes.com/who-we-are/collateral-library/mpls-managed-sd-wan-journey">MPLS vs. SD-WAN</a></li> <li><a href="https://business.hughes.com/why-sdwan" title="Learn About Managed SD-WAN">Why SD-WAN?</a></li> <li><a href="https://business.hughes.com/wifi-analytics-in-retail">WiFi Analytics: </a>Insight Every Step of the Way</li> <li><a href="https://business.hughes.com/digital-signage-solutions-how-to-increase-customer-engagement">Digital Signage Solutions</a>: Engagement Starts Here</li> <li><a href="https://business.hughes.com/our-technologies/networking-platforms/hr4860-secure-sdwan-gateway">SD-WAN Appliance</a>: 4860 is SD-WAN transformation in a box</li> </ul></div> </div> <p>The latest congressional stimulus has awarded $200 million to the Federal Communications Commission (FCC) <a href="https://www.fcc.gov/document/fcc-fights-covid-19-200m-adopts-long-term-connected-care-study">to implement telehealth programs</a>. The objective is to help manage the strain on the healthcare system by treating non-COVID-19 patients outside of hospitals. Remote medical appointments, held via video chat, teleconference or even over the phone, are essential to offloading on-site examinations, follow-ups and consultations from hospitals and medical centers struggling to keep pace.</p> <p> </p> <div alt="Telehealth_support_3" data-embed-button="media_browser" data-entity-embed-display="media_image" data-entity-embed-display-settings="scalable_image" data-entity-type="media" data-entity-uuid="d1ad6e39-00c4-4bbf-8609-afce8eba4922" data-langcode="en" title="Telehealth Support 3" class="align-center embedded-entity"> <img src="/sites/business.hughes.com/files/styles/scalable_image/public/GettyImages-1062130130_Resized_1.png?itok=RztRRjNm" alt="Telehealth_support_3" title="Telehealth Support 3" typeof="foaf:Image" class="image-style-scalable-image" /></div> <p> </p> <p>In an effort to make the program as expedient as possible, HCPs can request funding for telehealth services now, and then pick their vendors later. There is no competitive bidding process, funding is at 100%, and HCPs have flexibility in how they implement their telehealth services. Guidance on the application process is available on <a href="https://www.fcc.gov/document/guidance-covid-19-telehealth-program-application-process">the FCC website</a>.</p> <p>With the FCC considering proposals on a first come, first serve basis, time is of the essence. <strong>Hughes can help HCPs with the application for funding, especially around solutions such as</strong>:</p> <ul><li><strong>Providing home access for patients</strong> - delivering connectivity for patients in their homes to connect with their providers for chronic health management, remote monitoring or post-acute care (e.g., after surgery or even recovering from COVID-19).</li> <li><strong>At-home connectivity for medical professionals</strong> – using advanced dual-path terminals and networking solutions for home-based providers to support the increased demand for remote and telehealth services (for remote monitoring or video calls, for instance).</li> <li><strong>Connecting new or temporary sites</strong> – we can deploy connectivity to businesses or homes rapidly, helping connect sites impacted by the COVID-19 crisis.</li> <li><strong>Adding <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> to existing networks at hospitals and care facilities</strong> – to improve connectivity and application performance at sites where emergency and other services are offered today.</li> </ul><p>While HCPs work to deliver the care our communities so desperately need, Hughes stands ready to help support their telehealth programs.</p> <p>For more information, <a href="mailto:Rohit.Tripathi@hughes.com">email us today</a>.</p> <p><strong><span style="line-height:normal"><span style="color:black">About the Author</span></span></strong></p> <div> <div style="float:left"> </div> <div><img alt="Rohit-Tripathi" height="125" src="https://business.hughes.com/sites/business.hughes.com/files/Rohit_Tripathi_125_0.jpg" style="width:60px; height:60px; padding-right:8px; float:left" width="125" /><p><em><strong>Rohit Tripathi</strong> </em>is a digital transformation evangelist, assisting healthcare organizations extract the greatest value from their digital investments. He is particularly interested in establishing telehealth as a widely used delivery mechanism for care.</p> </div> </div> </div> <div class="field field-post-date field--name-field-post-date field--label-hidden field__item"><time datetime="2020-05-07T12:00:00Z" class="datetime">2020-05-07</time> </div> <div class="field panelizer field--name-panelizer field--label-hidden field__items"> <div class="field__item odd"><div class="js-form-item form-item js-form-type-item form-type-item js-form-item- form-item-"> <label>full</label> Using default called "blog" </div> </div> </div> <div class="field field-blog-author field--name-field-blog-author field--label-hidden field__items"> <div class="field__item odd"><a href="/resources/blog/rohit-tripathi" hreflang="en">Rohit Tripathi</a></div> </div> <div class="field field-disable-image field--name-field-disable-image field--label-above"> <div class="field__label">Disable Blog Header Image</div> <div class="field__item">false</div> </div> Thu, 07 May 2020 15:51:21 +0000 Olivia Bell 3286 at https://business.hughes.com SASE Part 4: Security and Connectivity Converge for a Digital Transformation https://business.hughes.com/resources/blog/sase-part-4-security-and-connectivity-converge-digital-transformation <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/596" typeof="schema:Person" property="schema:name" datatype="">Olivia Bell</span></span> <span class="field field--name-created field--type-created field--label-hidden">Fri, 04/03/2020 - 15:59</span> <div class="field title">SASE Part 4: Security and Connectivity Converge for a Digital Transformation</div> <div class="field field-post-type field--name-field-post-type field--label-hidden field__item">Blog Post</div> <div class="field field-blog-categories field--name-field-blog-categories field--label-hidden field__items"> <div class="field__item odd"> <a href="/taxonomy/term/?type=blog_post"></a> </div> <div class="field__item even"> <a href="/taxonomy/term/?type=blog_post"></a> </div> <div class="field__item odd"> <a href="/taxonomy/term/?type=blog_post"></a> </div> </div> <div class="field field-image field--name-field-image field--label-hidden field__item"> <img src="/sites/business.hughes.com/files/styles/post_detail_image/public/SASE%20security%20and%20connectivity.png?itok=bmrwjiX9" width="683" height="299" alt="security_and_connectivity" typeof="foaf:Image" class="image-style-post-detail-image" /> </div> <div class="clearfix text-formatted field body field--name-body field--label-hidden field__item"><p><em>In our <a href="https://business.hughes.com/resources/blog/sase-series-part-1-sd-wans-new-sase-sassy-friend">first blog post</a> of this series on Secure Access Service Edge, or SASE (pronounced “sassy”), we looked at the prevailing cloud environment and its impact on network security; and explored the promising marriage between SASE and <a href="https://business.hughes.com/sd-wan-networking/managed-security">SD-WAN</a>. <a href="https://business.hughes.com/resources/blog/sase-part-2-security-view">In Part 2</a>, we looked at the risk associated with endpoints and SASE’s approach to securing the network. <a href="https://business.hughes.com/resources/blog/sase-part-3-connectivity-everywhere-everyone-and-everything">In Part 3</a>, we explored the role of SASE and SD-WAN in facilitating the type of secure and ubiquitous connectivity we’ve all grown to expect. In our fourth and final blog post of the series, we look at the two key elements of SASE’s offerings—security and connectivity—and what it means to network architecture when they converge.</em></p> <div style="width:300px; float:right; border-left: 2px solid #1fc2b2; margin-left:12px;"> <div style="padding-left:8px;"><img alt="Hughes-Digital-Signage-Solutions" src="https://business.hughes.com/sites/business.hughes.com/files/Hughes_Is_Managed_SD-WAN_1.jpg" style="padding-bottom:8px;" /><b>WANsform Your Enterprise</b><br /> Before you can transform customer experience, you must <a href="http://business.hughes.com/wansform">WANsform</a> your enterprise. Learn how Hughes <a href="https://business.hughes.com/what-we-do/networking/managed-sd-wan">Managed SD-WAN</a> is enabling digital transformation and achieving real results. <ul><li><a href="https://business.hughes.com/who-we-are/collateral-library/mpls-managed-sd-wan-journey">MPLS vs. SD-WAN</a></li> <li><a href="https://business.hughes.com/why-sdwan" title="Learn About Managed SD-WAN">Why SD-WAN?</a></li> <li><a href="https://business.hughes.com/wifi-analytics-in-retail">WiFi Analytics: </a>Insight Every Step of the Way</li> <li><a href="https://business.hughes.com/digital-signage-solutions-how-to-increase-customer-engagement">Digital Signage Solutions</a>: Engagement Starts Here</li> <li><a href="https://business.hughes.com/our-technologies/networking-platforms/hr4860-secure-sdwan-gateway">SD-WAN Appliance</a>: 4860 is SD-WAN transformation in a box</li> </ul></div> </div> <p>Today, security and connectivity operate largely independent of one another. In most cases, they are premises-based. Even with an <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN solution</a>, the buying decisions still happen separately from each other. Yet as we’ve noted in previous posts, secure access and stable connectivity are essential for every enterprise. For true digital transformation to occur—where users and endpoints alike are able to connect to networked resources, no matter where and when they need it—both must be addressed in tandem.</p> <p>SASE essentially opens the door to this type of “digital enterprise.” Because SASE is a cloud-based approach, the security fabric can be scaled up or down based on need; enhanced or upgraded with additional feature-rich functionality; and expanded to accommodate an ever-growing network perimeter.</p> <p>So, what does this mean for an enterprise?</p> <p>Because <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> is “the foundation that SASE is built upon,” according to <a href="https://www.sdxcentral.com/security/definitions/what-is-sase-secure-access-service-edge/">SDX Central</a>, integrating the two and making holistic buying decisions better ensures an end-to-end approach to optimized security and connectivity.</p> <p>Here are some examples, taken from use cases, to illustrate what it looks like for the enterprise and its users:</p> <ul><li>A large enterprise has thousands of employees working from home, connecting with colleagues and customers via video conference calls to do their jobs.</li> <li>Users at a mid-sized healthcare organization access MS Office365 and the company’s medical records system and experience consistent application performance regardless of whether they are working at corporate headquarters or the branch office.</li> <li>An oil and gas company monitors a network of remote device sensors collecting and reporting data in a cost-efficient and secure manner, so they can guard against outages and protect public safety.</li> <li>A retailer establishes pop-up locations quickly and easily to mirror seasonal customer demand, all the while having secure access to its back-office and point-of-sale applications.</li> </ul><p>These are just a few examples of how enterprises can be digitally transformed when security and connectivity converge, as they do when SASE and <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> are integrated.</p> <p>To learn more about SASE and SD-WAN, check out our earlier blog posts.</p> <p> </p> <p><strong><span style="line-height:normal"><span style="color:black">About the Authors</span></span></strong></p> <div> <div style="float:left; margin-right:10px;"><img alt="Nick-Coval-headshot" height="74" src="https://business.hughes.com/sites/business.hughes.com/files/nick_coval.jpg" width="74" /></div> <p><em><strong>Nick Coval</strong> is a seasoned Enterprise Architect who builds complex enterprise-class network solutions for large organizations with distributed locations. He is a passionate technologist with a progressive vision for developing solutions with the customer and end-user objectives in mind. Follow Nick Coval on <a href="https://www.linkedin.com/in/NickCoval">LinkedIn</a> and Twitter </em><a href="https://twitter.com/nickcoval">@NickCoval</a><em>.</em></p> </div> <p> </p> <div> <div style="float:left"> </div> <div><img alt="Jeff-Bradbury" height="60" src="https://business.hughes.com/sites/business.hughes.com/files/Jeff_Bradbury_6060.jpg" style="width:60px; height:60px; padding-right:8px; float:left" width="60" /><p><em><strong>Jeff Bradbury</strong> works across markets to help distributed organizations identify trends that are driving digital transformation and adopt technologies critical to connecting their customers, employees, and locations. Follow Jeff Bradbury on <a href="https://www.linkedin.com/in/jeffbradbury">LinkedIn</a> and Twitter </em><a href="https://twitter.com/TechXformation">@TechXformation</a><em>.</em></p> </div> </div> </div> <div class="field field-post-date field--name-field-post-date field--label-hidden field__item"><time datetime="2020-04-02T12:00:00Z" class="datetime">2020-04-02</time> </div> <div class="field panelizer field--name-panelizer field--label-hidden field__items"> <div class="field__item odd"><div class="js-form-item form-item js-form-type-item form-type-item js-form-item- form-item-"> <label>full</label> Using default called "blog" </div> </div> </div> <div class="field field-blog-author field--name-field-blog-author field--label-hidden field__items"> <div class="field__item odd"><a href="/resources/blog/nick-coval" hreflang="en">Nick Coval</a></div> <div class="field__item even"><a href="/resources/blog/jeff-bradbury" hreflang="en">Jeff Bradbury</a></div> </div> <div class="field field-disable-image field--name-field-disable-image field--label-above"> <div class="field__label">Disable Blog Header Image</div> <div class="field__item">false</div> </div> Fri, 03 Apr 2020 15:59:39 +0000 Olivia Bell 3181 at https://business.hughes.com SASE Part 3: Connectivity Everywhere, For Everyone and Everything https://business.hughes.com/resources/blog/sase-part-3-connectivity-everywhere-everyone-and-everything <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/596" typeof="schema:Person" property="schema:name" datatype="">Olivia Bell</span></span> <span class="field field--name-created field--type-created field--label-hidden">Fri, 03/27/2020 - 18:53</span> <div class="field title">SASE Part 3: Connectivity Everywhere, For Everyone and Everything</div> <div class="field field-post-type field--name-field-post-type field--label-hidden field__item">Blog Post</div> <div class="field field-blog-categories field--name-field-blog-categories field--label-hidden field__items"> <div class="field__item odd"> <a href="/taxonomy/term/?type=blog_post"></a> </div> <div class="field__item even"> <a href="/taxonomy/term/?type=blog_post"></a> </div> </div> <div class="field field-image field--name-field-image field--label-hidden field__item"> <img src="/sites/business.hughes.com/files/styles/post_detail_image/public/GettyImages-647510456_Resized.png?itok=VG87S3IZ" width="683" height="383" alt="cloud-apps-mobile-device-2" typeof="foaf:Image" class="image-style-post-detail-image" /> </div> <div class="clearfix text-formatted field body field--name-body field--label-hidden field__item"><p><em>In our <a href="https://business.hughes.com/resources/blog/sase-series-part-1-sd-wans-new-sase-sassy-friend">first blog post</a> of this series on Secure Access Service Edge, or SASE (pronounced “sassy”), we looked at the prevailing cloud environment and its impact on network security; and explored the promising marriage between SASE and <a href="https://business.hughes.com/sd-wan-networking/managed-security">SD-WAN</a>. <a href="https://business.hughes.com/resources/blog/sase-part-2-security-view">In Part </a><a href="https://business.hughes.com/resources/blog/sase-part-2-security-view">2</a>, we looked at the risk associated with endpoints and SASE’s approach to securing the network. In this installment, we explore the role of SASE and SD-WAN in facilitating the type of secure and ubiquitous connectivity we’ve all grown to expect.</em></p> <p>We all know that connectivity is crucial. Gone are the days when we would accept outages in stride or expect to be offline for brief periods of maintenance. We now expect ubiquitous coverage, wherever we are, all hours of the day (and night!)</p> <div style="width:300px; float:right; border-left: 2px solid #1fc2b2; margin-left:12px;"> <div style="padding-left:8px;"><img alt="Hughes-Digital-Signage-Solutions" src="https://business.hughes.com/sites/business.hughes.com/files/Hughes_Is_Managed_SD-WAN_1.jpg" style="padding-bottom:8px;" /><b>WANsform Your Enterprise</b><br /> Before you can transform customer experience, you must <a href="http://business.hughes.com/wansform">WANsform</a> your enterprise. Learn how Hughes <a href="https://business.hughes.com/what-we-do/networking/managed-sd-wan">Managed SD-WAN</a> is enabling digital transformation and achieving real results. <ul><li><a href="https://business.hughes.com/who-we-are/collateral-library/mpls-managed-sd-wan-journey">MPLS vs. SD-WAN</a></li> <li><a href="https://business.hughes.com/why-sdwan" title="Learn About Managed SD-WAN">Why SD-WAN?</a></li> <li><a href="https://business.hughes.com/wifi-analytics-in-retail">WiFi Analytics: </a>Insight Every Step of the Way</li> <li><a href="https://business.hughes.com/digital-signage-solutions-how-to-increase-customer-engagement">Digital Signage Solutions</a>: Engagement Starts Here</li> <li><a href="https://business.hughes.com/our-technologies/networking-platforms/hr4860-secure-sdwan-gateway">SD-WAN Appliance</a>: 4860 is SD-WAN transformation in a box</li> </ul></div> </div> <p>With the recent health crisis, this need has been magnified. We’ve seen how indispensable the network is for enabling an enterprise to remain operational and connected to employees, customers, constituents, vendors, and partners. Applications and devices that are hosted by the network require a continuous, secure, and stable connection to maintain session integrity and functionality. Network users also expect a certain level of application performance and security so they can complete their tasks safely and efficiently. Failing to meet those expectations creates significant dissatisfaction in the user experience.</p> <p><strong>Continuous, Robust Connectivity</strong></p> <p>Within standard network architectures, having control and visibility into the devices and systems on a network are also critical—and equally dependent on robust connectivity. It is not acceptable for issues of reliability and security to hamper monitoring, productivity, or mobility. This holds true when considering SASE; seamless connectivity is simply a must in order to securely envelope all users and devices along the entire network.</p> <p>Achieving and maintaining such connectivity is one of the benefits of implementing a strong Software-defined Wide Area Network (SD-WAN) solution; one that optimizes application performance and uptime in spite of whether the network has vastly different broadband access types and infrastructures (which is common in the distributed enterprise).</p> <p>The fact is, despite the continued growth in broadband availability, speed, coverage, and quality, all still vary considerably based on geography and infrastructure capability. This is especially true for branch or office locations in exurban areas. Yet <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a> enables continuous and robust connectivity to support a distributed environment.</p> <p><strong>Why the MSP/MSSP Matters</strong></p> <p>As we noted in Part 1,  providers like Hughes—that are both a <a href="https://business.hughes.com/sd-wan-networking/managed-networks">Managed Service Provider</a> (MSPs) and a Managed Security Service Provider (MSSP)—have expertise and experience in deploying multi-thousand site SD-WAN implementations and delivering security to the edge in a distributed network. They also understand the challenges and apply best practices when integrating the two.</p> <p>Additionally, they have established proven service provider relationships which enable them to stitch together a dependable enterprise network from multiple broadband providers and to augment the viability of deploying SD-WAN over distributed branches. This is imperative if they are successfully deploying again and again over broad geographic areas.</p> <p>For these reasons, MSPs are far likelier to be able to pair SASE with SD-WAN successfully. In doing so, they’ll merge a diverse underlay of broadband connectivity; the SD-WAN, which provides improved app performance and user experience; and the critical and necessary security architecture (including a Zero Touch model) to control who and what can access the network. These three elements ensure the type of secure yet ubiquitous connectivity—anywhere, any time—that both enterprises and users demand.</p> <p>To learn more about SASE and SD-WAN, check out <a href="https://business.hughes.com/resources/blog/sase-series-part-1-sd-wans-new-sase-sassy-friend">Part 1</a> and <a href="https://business.hughes.com/resources/blog/sase-part-2-security-view">Part 2</a> of this series. In <a href="https://business.hughes.com/resources/blog/sase-part-4-security-and-connectivity-converge-digital-transformation">Part 4</a>, we explore what it means when security and connectivity converge.</p> <p>(And, read how <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">Managed SD-WAN</a> from Hughes <a href="https://business.hughes.com/resources/blog/sd-wan-fit-points-cloud-access-real-time-apps-and-agility">utilizes application prioritization and network agility</a>).</p> <p> </p> <p><strong><span style="line-height:normal"><span style="color:black">About the Authors</span></span></strong></p> <div> <div style="float:left; margin-right:10px;"> </div> </div> <div> <div style="float:left"> </div> <div><img alt="Jeff-Bradbury" height="60" src="https://business.hughes.com/sites/business.hughes.com/files/Jeff_Bradbury_6060.jpg" style="width:60px; height:60px; padding-right:8px; float:left" width="60" /><p><em><strong>Jeff Bradbury</strong> works across markets to help distributed organizations identify trends that are driving digital transformation and adopt technologies critical to connecting their customers, employees, and locations. Follow Jeff Bradbury on <a href="https://www.linkedin.com/in/jeffbradbury">LinkedIn</a> and Twitter </em><a href="https://twitter.com/TechXformation">@TechXformation</a><em>.</em></p> </div> </div> <p> </p> <div> <div style="float:left; margin-right:10px;"><img alt="Seejo-Sebastine-headshot" height="74" src="https://business.hughes.com/sites/business.hughes.com/files/Seejo%20Sebastine%20headshot.png" width="74" /></div> <p><em><strong>Seejo Sebastine </strong>leads the technology strategy and execution team that drives Hughes’ leadership position as a Global Managed Service Provider. He was instrumental in the growth of the SD-WAN portfolio at Hughes.</em></p> </div> <p> </p> </div> <div class="field field-post-date field--name-field-post-date field--label-hidden field__item"><time datetime="2020-03-26T12:00:00Z" class="datetime">2020-03-26</time> </div> <div class="field panelizer field--name-panelizer field--label-hidden field__items"> <div class="field__item odd"><div class="js-form-item form-item js-form-type-item form-type-item js-form-item- form-item-"> <label>full</label> Using default called "blog" </div> </div> </div> <div class="field field-blog-author field--name-field-blog-author field--label-hidden field__items"> <div class="field__item odd"><a href="/resources/blog/jeff-bradbury" hreflang="en">Jeff Bradbury</a></div> <div class="field__item even"><a href="/resources/blog/seejo-sebastine" hreflang="en">Seejo Sebastine</a></div> </div> <div class="field field-disable-image field--name-field-disable-image field--label-above"> <div class="field__label">Disable Blog Header Image</div> <div class="field__item">false</div> </div> Fri, 27 Mar 2020 18:53:36 +0000 Olivia Bell 3171 at https://business.hughes.com SASE Part 2: The Security View https://business.hughes.com/resources/blog/sase-part-2-security-view <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="/user/596" typeof="schema:Person" property="schema:name" datatype="">Olivia Bell</span></span> <span class="field field--name-created field--type-created field--label-hidden">Sat, 03/21/2020 - 23:20</span> <div class="field title">SASE Part 2: The Security View</div> <div class="field field-post-type field--name-field-post-type field--label-hidden field__item">Blog Post</div> <div class="field field-blog-categories field--name-field-blog-categories field--label-hidden field__items"> <div class="field__item odd"> <a href="/taxonomy/term/?type=blog_post"></a> </div> <div class="field__item even"> <a href="/taxonomy/term/?type=blog_post"></a> </div> <div class="field__item odd"> <a href="/taxonomy/term/?type=blog_post"></a> </div> </div> <div class="field field-image field--name-field-image field--label-hidden field__item"> <img src="/sites/business.hughes.com/files/styles/post_detail_image/public/GettyImages-906499466.jpg?itok=NfI5lLSK" width="683" height="383" alt="Thumbnail" title="sd_wan_walking_in_server_room" typeof="foaf:Image" class="image-style-post-detail-image" /> </div> <div class="clearfix text-formatted field body field--name-body field--label-hidden field__item"><p><em>In our <a href="https://business.hughes.com/resources/blog/sase-series-part-1-sd-wans-new-sase-friend">first blog post</a> of this series on Secure Access Service Edge, or SASE (pronounced “sassy”), we looked at the titanic shifts accelerating a move away from traditional data centers to the cloud, and the impact on network security. We also explored the promising marriage between SASE and <a href="https://business.hughes.com/sd-wan-networking/managed-security">SD-WAN</a>. In Part 2 of the series, we go deeper, looking at the risk caused by an exploding number of endpoints and SASE’s approach to securing the network and mitigating risk.</em></p> <p>Let’s begin by exploring Software as a Service (SaaS)—one of the primary drivers compelling enterprises and government agencies to move to the cloud environment. SaaS gives customers access to their enterprise applications over the Internet, rather than having the software be hosted at a data center and requiring physical installation across network devices. With SaaS, applications can be built, maintained, and updated automatically in the cloud.</p> <div style="width:300px; float:right; border-left: 2px solid #1fc2b2; margin-left:12px;"> <div style="padding-left:8px;"><img alt="Hughes-Digital-Signage-Solutions" src="https://business.hughes.com/sites/business.hughes.com/files/Hughes_Is_Managed_SD-WAN_1.jpg" style="padding-bottom:8px;" /><b>WANsform Your Enterprise</b><br /> Before you can transform customer experience, you must <a href="http://business.hughes.com/wansform">WANsform</a> your enterprise. Learn how Hughes <a href="https://business.hughes.com/what-we-do/networking/managed-sd-wan">Managed SD-WAN</a> is enabling digital transformation and achieving real results. <ul><li><a href="https://business.hughes.com/who-we-are/collateral-library/mpls-managed-sd-wan-journey">MPLS vs. SD-WAN</a></li> <li><a href="https://business.hughes.com/why-sdwan" title="Learn About Managed SD-WAN">Why SD-WAN?</a></li> <li><a href="https://business.hughes.com/wifi-analytics-in-retail">WiFi Analytics: </a>Insight Every Step of the Way</li> <li><a href="https://business.hughes.com/digital-signage-solutions-how-to-increase-customer-engagement">Digital Signage Solutions</a>: Engagement Starts Here</li> <li><a href="https://business.hughes.com/our-technologies/networking-platforms/hr4860-secure-sdwan-gateway">SD-WAN Appliance</a>: 4860 is SD-WAN transformation in a box</li> </ul></div> </div> <p>In addition to SaaS, the issue of workforce mobility has complicated matters for network security and management. With sophisticated and targeted cyber-attacks, such as ransomware, each user endpoint, or device, constitutes a potential risk when it comes to security. Yet giving workers the flexibility to work remotely or from branch offices has essentially become a requirement. This has been clear during the health crisis when millions of employees have needed to find a way to work from home and access their networks.</p> <p><strong>A Growing “Attack Surface”</strong></p> <p>Endpoint risk isn’t just limited by the number of users on the network. The Internet of Things (IoT) compounds the challenge further. IoT includes all the smart devices or machines on a network, like thermostats, heat pumps, refrigerators, flood sensors, security cameras, healthcare equipment, wearables, emergency monitoring, and management tools, and so much more.</p> <p>Collectively, these users and endpoints comprise (and increase) the attack surface.</p> <p>With the network attack surface so highly distributed, especially as it extends to multiple cloud service providers and locations not under enterprise control, it is a challenge for existing or legacy network protections to provide adequate security coverage.</p> <p>That’s where SASE comes in. SASE protects against this explosion of network entry points, even when they are not controlled by the enterprise. SASE provides the security fabric that enables identity-based control and context, where the identity is associated to users or user groups. This allows for the granting of access to all employees or even access based on roles, or by the creation of sub-groups for specific teams or by management level.</p> <p>This identity-based approach can also be set by type of device, including IoT and mobile devices. This includes being able to limit system access to only approved devices and setting roles for “non-human” users, for those networks involving machine-to-machine connectivity requiring little to no human input.</p> <p>With SASE, all of these endpoints that interact with various network resources and SaaS applications, public and private cloud resources, data centers, and others (like vendor and partner resources) are authenticated and secured within the context of that particular access or communication request. Requests can also be set based on other parameters, such as enterprise policies for governance, geo location, and time of day.</p> <p><strong>The Zero Touch Model</strong></p> <p>SASE depends on a centralized security broker to provide the visibility, policy framework, management structures, and service level agreements necessary to effectively execute endpoint access, security, and control measures. This varies from the more typical approach in which any authenticated device “inside” the network is deemed to be a trusted device. Under this scenario, if a hacker attacks a server and hijacks a device on the network, the network is vulnerable from this insider attack.</p> <p>SASE assumes that no request can be trusted automatically. In this way, SASE applies a “Zero Trust” model, verifying every access request before permission is granted, no matter where that request comes from. With SASE’s Zero Trust approach, the security fabric between users and resources tightens and reduces the attack surface. The result? Significantly decreased risk and heightened security across the entire enterprise network – regardless of how many endpoints or how distributed it may be.</p> <p>In Part 3 of our series, we explore connectivity everywhere, for everyone and everything, and the role SASE and SD-WAN have in making that a reality. To learn more about SASE and <a href="https://business.hughes.com/sd-wan-networking/managed-sd-wan">SD-WAN</a>, read <a href="https://business.hughes.com/resources/blog/sase-series-part-1-sd-wans-new-sase-friend">Part 1</a> in our series.</p> <p> </p> <p><strong><span style="line-height:normal"><span style="color:black">About the Author</span></span></strong></p> <div> <div style="float:left; margin-right:10px;"><img alt="Nick-Coval-headshot" height="74" src="https://business.hughes.com/sites/business.hughes.com/files/nick_coval.jpg" width="74" /></div> <p><em><strong>Nick Coval</strong> is a seasoned Enterprise Architect who builds complex enterprise-class network solutions for large organizations with distributed locations. He is a passionate technologist with a progressive vision for developing solutions with the customer and end-user objectives in mind. Follow Nick Coval on <a href="https://www.linkedin.com/in/NickCoval">LinkedIn</a> and Twitter </em><a href="https://twitter.com/nickcoval">@NickCoval</a><em>.</em></p> </div> <p> </p> </div> <div class="field field-post-date field--name-field-post-date field--label-hidden field__item"><time datetime="2020-03-19T12:00:00Z" class="datetime">2020-03-19</time> </div> <div class="field panelizer field--name-panelizer field--label-hidden field__items"> <div class="field__item odd"><div class="js-form-item form-item js-form-type-item form-type-item js-form-item- form-item-"> <label>full</label> Using default called "blog" </div> </div> </div> <div class="field field-blog-author field--name-field-blog-author field--label-hidden field__items"> <div class="field__item odd"><a href="/resources/blog/nick-coval" hreflang="en">Nick Coval</a></div> </div> <div class="field field-disable-image field--name-field-disable-image field--label-above"> <div class="field__label">Disable Blog Header Image</div> <div class="field__item">false</div> </div> Sat, 21 Mar 2020 23:20:44 +0000 Olivia Bell 3146 at https://business.hughes.com