Cloud Networking Q&A

Q: What is cloud networking?

Cloud networking, or “Software Defined Networking” is a modern style of network device management that allows a remote individual or organisation to perform network changes remotely. When a cloud network device is powered up, it will connect to a secure remote service that will identify the device, and then send the configuration details over the internet.

Q: What is the difference between cloud network devices and traditional network devices?

Traditional network devices store their configuration on the device themselves, whereas cloud network devices only contain the operating system and firmware, without storing the configuration. Most traditional network devices store only their own configuration and are not aware of the configuration of the entire network.

Q: Why should we use a cloud network?

A cloud network can be managed easily by a third party, allowing easy configuration and monitoring of the network from a remote location. The configuration of a cloud network is done at a site level, rather than per device, so that every device is working from a single configuration location, this prevents misconfiguration of devices that would require a technician to attend on site and resolve. If a cloud network device fails, needs replacement or upgrading, network devices need no configuration or updating, as the site configuration will be updated and sent to each device automatically.

Q: What network devices will our organisation need?

For a basic office, a router or security gateway is required to manage your internet connection, and identify potential threats. A network switch allows the connection of multiple devices to the network via ethernet cables, more advanced switches can provide power to some devices over existing network cables. If your office requires a wireless network, you will need at least one access point to broadcast the network signal.

Q: I’ve heard of cloud network providers having data-breaches in the past, could that happen here?

Our remote management system is locked down by strong encryption and security policies that prevent any unauthorised users from connecting to the management system. Our system is running on our cloud infrastructure, and not using a vendor delivered solution across multiple third party providers.