Develop once, deploy anywhere, deliver everywhere

Develop once, deploy anywhere, deliver everywhere

Adding secure networking to the developer platform empowers product teams to develop once, deploy anywhere and deliver everywhere – with network security, reliability, performance and control built-in.

Teams are enabled to approach applications, networking and security as a unified software system. Sounds simple, but recent history shows us that changing the model to put powerful functions into the developer platform creates a new art of the possible for innovators.

Into the heart of the developer platform

Let's look at three recent revolutions;

These innovators didn’t build better mousetraps.? Instead, they flipped the entire model.? They took a critical capability which mainly lived outside of the developer platform and transformed it into an integrated developer capability.

This model change empowers developers to innovate, which improves the capability, which enables even more developers to innovate.? Developer platforms power flywheels. Flywheels which have revolutionized just about every industry as software has eaten the world. But software has not yet eaten secure networking.

3 ships passing in the night

Let’s look at the opposite model.? Secure networking is not part of the developer platform:

  1. Private WANs (MPLS-WAN, SD-WAN) are proprietary and infrastructure-dependent walled gardens with very limited reach.
  2. The maze of bolted-on security (firewalls, SASE, etc.) is another complex and separate walled garden with almost zero extensibility.
  3. Applications can barely communicate with either walled garden. This isn't a software system. It is why we are losing the cybersecurity war.

Applications, networking and security are effectively three ships passing each other in the night.? The result is a unending parade of better mousetraps - new security products, which don’t result in secure products (as stated very well by Jen Easterly, we need more secure products - not more security products). This is because the model itself is wrong.?

Develop once, deploy anywhere, deliver everywhere

We need to reinvent the model by transforming secure networking to insert it into the developer platform - just like we did during the revolutions listed above, and many other examples including domains as disparate as data (#postgres, #mongodb); CMS (#wordpress); and AI (#pytorch, #llama, #mistral).

Changing the model to add secure networking to the developer platform enables teams to approach applications, networking and security as one software ecosystem.? Especially when it is open source based - the same recipe which revolutionized the rest of the world.

Their products control programmable, zero inherent trust, full mesh overlay networks which reach anywhere the Internet reaches, with built-in performance and telemetry. ?The secure networking functionality becomes part of their developer platform, with the controls and abstractions needed to innovate, and the open source basis necessary for extensibility and agility. We move to secure-by-design by mitigating against the world's greatest security threat: the model of bolting-on security to inherently insecure networks.

Rudford Hamon

Account Manager at NetFoundry | Safeguarding Assets with Design-in Cybersecurity and Networking | Secure-By-Design | Embed ZeroTrust Networking

5 个月

3D status! Develop once. Deploy anywhere. Deliver everywhere.

回复
Harshil Gupta

Director at Envoque Solutions Private Limited

5 个月

[Scalable - Flexible - Secure] by design.

回复

要查看或添加评论,请登录

Galeal Zino的更多文章

  • The AI fork in the road

    The AI fork in the road

    We are at a fork in the road. In one direction, AI is basically meaningless in the context of cybersecurity and…

    1 条评论
  • Your private AI is public

    Your private AI is public

    Many enterprises are deploying private AI. Keeping the AI (e.

    4 条评论
  • Security-first

    Security-first

    You'll find the Castillo de San Marcos National Monument area in St. Augustine, Florida.

    6 条评论
  • The only way to win the cybersecurity war

    The only way to win the cybersecurity war

    I know the future I don’t have a crystal ball, nor a predictive AI, but I do know how the next UnitedHealth, Snowflake…

    2 条评论
  • UnitedHealth breach

    UnitedHealth breach

    Note: I helped with the breach recovery but all info below is public, and all opinions are my own. The notorious $1.

    10 条评论
  • Open source magic

    Open source magic

    Open source innovation "No matter who you are, most of the smartest people work for someone else” This terrific…

    1 条评论
  • Simple, secure LLMs accelerates innovation

    Simple, secure LLMs accelerates innovation

    Generative AI value is highest when the LLMs are simple and secure to manage. So NetFoundry is thrilled to help AI…

    2 条评论
  • Zero trust Ansible

    Zero trust Ansible

    DevOps goals hit a brick wall You already know how awesome Ansible is. Unfortunately, you have also experienced the…

    3 条评论
  • A trillion dollar cybersecurity assumption

    A trillion dollar cybersecurity assumption

    Cyberattacks will cost us $1 trillion this year, despite our spending of $150 billion trying to protect ourselves. Old…

    3 条评论
  • Attacking Ransomware

    Attacking Ransomware

    Gas, toilet paper, ransomware and the business WAN The ransomware attack on the Colonial Pipeline business WAN raised…

社区洞察

其他会员也浏览了