Welcome!

SDN Journal Authors: Elizabeth White, Pat Romanski, TJ Randall, Yeshim Deniz, Liz McMillan

Related Topics: SDN Journal

SDN Journal: Blog Post

Software Defined Networking | Part 5 By @MJannery | @CloudExpo [#SDN #Cloud]

Now, Never, Don’t Know? A 10-Part Series (part 5)

In part 4 of our series on SDN, I discussed some of SDN's most commonly asserted benefits. Here I'll look at the drawbacks, the majority of which are organizational or financial and not technical.  The most commonly cited reasons for actively not deploying SDN are:

Staffing

SDN requires significant staff re-training or recruitment.  There are very few staff with proven SDN deployment / management skills making recruitment difficult and therefore re-training of existing staff is necessary.  Of course having retrained those staff, their retention with their new, highly desirable, scarce skills might prove problematic too!

Reorganization

To use SDN effectively there needs to be a sharing of knowledge between business requirements, applications, servers and networking teams.  This might take the form of cross-discipline teams, or individuals with broad cross-discipline understanding.  Without this, mapping services to application requirements and ultimately network requirements cannot occur effectively.  This type of breakdown or merging of traditional ‘silos' is already occurring - e.g., with the emergence of DevOps - albeit slowly!

Cost

Whilst proponents of SDN cite the real cost benefits of running a more highly utilized network and the less quantifiable benefits of a more agile network with more rapid application and service deployment, re-scaling, etc. they often fail to factor in the costs of retraining, reorganization, new hardware and software licenses and the hidden costs of loss of business continuity during initial deployment.

Security

Whilst tighter, more dynamic security enforcement is recognized as an advantage of SDN, it is also a new, rapidly evolving technology with new protocols and new weaknesses and vulnerabilities.  Such a lack of maturity and the possibilities for compromising the network control layers make SDN an appealing target for hackers, industrial espionage, etc.

In part 6, we'll take a look at obstacles to deployment.

More Stories By Michael Jannery

Michael Jannery is CEO of Entuity. He is responsible for setting the overall corporate strategy, vision, and direction for the company. He brings more than 30 years of experience to Entuity with 25 years in executive management.

Prior to Entuity, he was Vice President of Marketing for Proficiency, where he established the company as the thought, technology, and market leader in a new product lifecycle management (PLM) sub-market. Earlier, Michael held VP of Marketing positions at Gradient Technologies, where he established them as a market leader in the Internet security sector, and Cayenne Software, a leader in the software and database modeling market. He began his career in engineering.

CloudEXPO Stories
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
Historically, some banking activities such as trading have been relying heavily on analytics and cutting edge algorithmic tools. The coming of age of powerful data analytics solutions combined with the development of intelligent algorithms have created new opportunities for financial institutions. In his session at 20th Cloud Expo, Sebastien Meunier, Head of Digital for North America at Chappuis Halder & Co., discussed how these tools can be leveraged to develop a lasting competitive advantage in priority areas: customer analytics, financial crime prevention, regulatory compliance and risk management.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
According to the IDC InfoBrief, Sponsored by Nutanix, “Surviving and Thriving in a Multi-cloud World,” multicloud deployments are now the norm for enterprise organizations – less than 30% of customers report using single cloud environments. Most customers leverage different cloud platforms across multiple service providers. The interoperability of data and applications between these varied cloud environments is growing in importance and yet access to hybrid cloud capabilities where a single application runs across clouds remains elusive to most organizations. As companies eagerly seek out ways to make the multi cloud environment a reality, these new updates from Nutanix provide additional capabilities to streamline the implementation of their cloud services deployments.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secures more than 4,000 modern applications for its Enterprise customers around the world.