Note: I haven’t been able to blog as much as I’ve wanted to recently (…the product of having a 12 year old and 12 week old), but wanted to provide a little insight on several pieces of research we’ve published recently…
This Magic Quadrant covers 13 vendors that provide hardware and/or software solutions to deliver connectivity within enterprise data centers. I won’t go into great detail here on the vendors and their placement but will point out that two vendors met inclusion for the first time this year: Cumulus and Big Switch. This is indicative that the real product differentiation is in software and the massive need for highly automated solutions. Not surprisingly, the need for “network agility” is a major driver for investment in data center networking technology. As we pointed out in the research, the three primary market drivers are
- Replacement of existing data center switches that are becoming obsolete
- Expansion of network infrastructure to support new applications/services
- Adoption of new solutions to increase agility, ease of operations and cost-effectiveness of existing infrastructure
You can catch the full report here.
This enterprise-focused Hype Cycle evaluates the networking and communications technologies that are emerging, have become widely adopted, and are being hyped by the service providers, vendors and the press (and analysts/bloggers). This year, we cover 33 network technologies, with several technologies are hangin’ round the peak of inflated expectations, including vCPE, SDWAN services, 25/50 Gig Eth, and SDP (Software-Defined Perimeter). I remember the good ole days when SDN stood alone. Meanwhile technologies like Ethernet Fabrics (18,000 production deployments now) and Hybrid WANS are climbing the slope enlightenment towards the plateau of productivity. On the horizon, several new technologies are emerging including 5G, Intent-based networking, and OCP just to name a few. Within the hype cycle, we go beyond just placement and dive into the definition, market position/adoption, business impact and provide advice about the technology. And despite the hype, way too often, legacy runs the world.
…because we all (regularly) attend meetings where the WiFi password is scribbled on the whiteboard… or on a post-it
Summary: Unauthenticated wireless connectivity for guest access is a disaster waiting to happen. IT infrastructure and operations leaders responsible for planning network infrastructure need to apply policy enforcement and understand the needs and characteristics of each usage scenario.
Read Complimentary Relevant Research
Predicts 2017: Artificial Intelligence
Artificial intelligence is changing the way in which organizations innovate and communicate their processes, products and services. Practical...
View Relevant Webinars
How to Live Without Mobile Device Management
This webinar addresses the growing trend of users refusing to have enterprise management of their mobile devices due to privacy concerns....
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.