News & Resources


Partner Spotlight

Check back for new products, provoking thought leadership and other exciting news from the Companies and Industry Organizations that partner with Automation Exchange!


Thought Leadership Council Reports

Our Partners and companies with upgraded listings have the option of purchasing a report generated by the Thought Leadership Council (TLC), a unique research initiative. TLC is a select group of 140+ communications service providers (CSPs) with network-level expertise.

Council members take part in surveys and interviews about key communications trends and technologies. TLC circumvents traditional industry hype to ascertain how service providers are really responding to important industry happenings. What makes this initiative so unique is that participants discuss issues in a completely anonymous forum, enabling them to share insights and express business realities that otherwise could not be shared.

Following are examples of key TLC reports that address trends in automation:

This vendor-sponsored report indicates that service assurance is a key factor to CSP automation plans.

This TLC report indicates that CSPs already have started automating networks, despite that they don't have master plans in place to do so.


Automation Exchange Editorial Calendar

Check back for new products, provoking thought leadership and other exciting news from the Companies and Industry Organizations that partner with Automation Exchange! Contact us today to learn how your company can create research, white papers, webinars, videos and more that reflects Automation Exchange's Editorial Calendar:

Q4 2018 – Network Automation
Q1 2019 – Virtualization & Automation: The Impact of NFV, SDN and Cloud Native
Q2 2019 – Automation & Security
Q3 2019 – Performance/Service Assurance & Automation
Q4 2019 – Automation in the Era of AI, Machine Learning, Blockchain & Emerging Technologies
Q1 2020 – Monetizing Automation


Industry Organization Partners

Automation Exchange is proud to partner with the following organizations to promote automation:

News

Arrcus Scores $30M & Takes Network 'Democratization' to the Edge
7/23/2019
Arrcus is extending its architecture from the data center to the edge, using high-density 100G/400G white box networking hardware based on Broadcom Jericho2 processors.
Verizon Paves Fast Lane to Equinix Data Centers
7/22/2019
Verizon is looking to build shortcuts between enterprises and their assets located in Equinix data centers.
5G Momentum Props Up Ericsson's Q2
7/17/2019
The Networks division is helping the Swedish operator improve its top line numbers but 'strategic contracts' hit margins and other divisions are still in turnaround mode, dragging the vendor's share price down.

Webinars

Taming the IT Infrastructure Monster in 5G Networks
Wednesday, July 24, 2019 - 11:00 a.m. New York/ 4:00 p.m. London

As communications service providers (CSPs) begin deploying 5G, they will leverage Network Functions Virtualization (NFV) where software is disaggregated from hardware. However, NFV implies a shift in end-to-end validation responsibility from equipment vendors to system integrators or CSPs themselves. CSPs will therefore incur new risks for the end-to-end solution as elements are acquired and integrated independently. The extensive use of IT infrastructure and the 5G network architecture also makes the networks more vulnerable from a security standpoint.

In this webinar, we’ll first look at 5G network adoption, use cases, requirements and deployment challenges:

  • 5G adoption, major use cases, network slicing
  • 5G network cloud characteristics, technical requirements, business requirements
  • Risk in-sourcing, management and operation complexity, security, evolving standards, IT lifecycles

We’ll then focus on the ways in which these challenges can be addressed:

  • Secure infrastructure
  • Cloud consumption models to reduce CAPEX
  • Investment protection to avoid vendor lock-in
  • Risk mitigation using pre-validated software and hardware stacks
  • Standards-based infrastructure
  • Faster introduction of IT innovations to reduce OPEX

By attending this webinar, participants will walk away with a greater understanding of how they can manage their 5G infrastructure costs while keeping their networks secure.

Delivering on the Promise of Segment Routing with SRover6, SRv6 and SRv6+
Tuesday, July 30, 2019 - 11:00 a.m. New York/ 4:00 pm London

Segment Routing (SR) was introduced to the market just a few years ago with a promise that it would simplify network transport by seamlessly interworking with IPv6, reduce complexity by moving state information from the network to the packet, and provide an end-to-end transport architecture that spans multiple network domains.

Adoption of SR is growing, but will SR deliver on its promise? In this webinar we will explore the state of SR today; what is working, what’s not, and perhaps more importantly, what is the industry doing to ensure broad, reliable adoption at scale for this promising new technology. Please join representatives from Heavy Reading and Juniper Networks as we discuss:

  • How SR-MPLS (SRover6), SRv6, and SRv6+ are enabling end-to-end network deployment
  • SRv6+ and why we need it
  • The use of a centralized controller for SR Traffic Engineering
  • How a centralized SR controller simplifies SR management across multiple network domains

IT Security Is Broken – Can Zero Trust Access Fix It?
Tuesday, August 6, 2019 - 11:00 a.m. New York/ 4:00 p.m. London

Fixing a broken IT security infrastructure is no longer just a backroom problem – it’s now a top boardroom priority. As the breaches at Equifax and the American Medical Collection Agency show, holes in your attack surface can cripple your company’s bottom line.

In this webinar, we will focus on what’s wrong with IT security infrastructure today and how to quickly implement a Zero Trust Access across the modern hybrid enterprise to fix it.

Key Takeaways:

  • Critical flaws in security infrastructure
  • How organizations play right into hackers’ hands
  • Six key questions to ask about your security profile
  • Three approaches to Zero Trust: identity, data and access
  • How Zero Trust Access enables digital transformation

Educational Resources