The Network Meets the Cloud

It was sixteen years back that I was staring at a Cisco router prompt and trying to grapple with the difference between a startup configuration and a running configuration. Things have come a long way and there have been tectonic shifts in the technology especially in its impact on everyday life and how we consume technology but little has changed when it comes to networking. This was the challenge in front of us as we started on this journey. Our marching orders were very straightforward; create a solution that does not need more that three clicks to set up, a solution that brings palpable value to our customers in less than 15 minutes, and a solution that operates without further customer involvement; well that was the norm in the Cloud when you wanted to use Google Mail or Box.net or set up a sandbox in Salesforce.com.

Eleven months later as we launch our service with many capabilities, the one constant is the need to keep it simple, easy to use, and easy to consume. You will notice this when you use our data feed management to set up log upload feeds across a diverse set of log formats or navigate through our dashboard to get a sense of your cloud exposure and you will certainly experience it as you go through three clicks and introduce our network transparently between your end users and your cloud services. You will go through that process without thinking about VLANs or Access Control Lists; you will not need to configure routes or WCCP and you can create a trial without worrying about DNS or X.509 certificates. Come try us out, and you will realize that three clicks is more than a marketing slogan for Skyhigh, it is our engineering touchstone.

Written by:
kaushik2

Kaushik Narayan

Co-Founder and CTO at Skyhigh Networks, where he is responsible for Skyhigh's technology vision and software architecture.

See All Posts by This Author

Next In Trending

2014: The Year of the Data Breach

Even if you didn’t follow the cyber security news this year, it was hard to miss the headline-making breaches at Sony and widespread vulnerabilities like ...

By Kaushik Narayan | December 10, 2014