{"id":5951,"date":"2025-05-18T05:24:15","date_gmt":"2025-05-17T21:24:15","guid":{"rendered":"https:\/\/cicserver.com\/how-cybersecurity-cloud-and-genai-are-driving-enterprises-toward-naas\/"},"modified":"2025-05-18T05:24:15","modified_gmt":"2025-05-17T21:24:15","slug":"how-cybersecurity-cloud-and-genai-are-driving-enterprises-toward-naas","status":"publish","type":"post","link":"https:\/\/cicserver.com\/de\/how-cybersecurity-cloud-and-genai-are-driving-enterprises-toward-naas\/","title":{"rendered":"How Cybersecurity, Cloud and GenAI are Driving Enterprises Toward NaaS"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div data-module=\"content\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Digital transformation has redefined how enterprises do business, as they search for ways to improve operations and better serve their customers. Organizations have modernized their networks to enable hybrid work, support cloud connectivity and lay the groundwork for new technologies such as generative AI (GenAI).<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Yet, navigating an interconnected digital world remains a constant challenge. One option to help smooth the journey is Network-as-a-Service (NaaS).<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Several key factors will influence the <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/enterprise-connectivity\/the-time-is-now-for-network-as-a-service-naas-\">market growth of NaaS<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> in the near future, and enterprises should take advantage of those opportunities.<\/span><\/p>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\" id=\"The rising tide of cyber threats: Why security is a top priority\" style=\"scroll-margin-top:10rem;scroll-snap-margin-top:10rem\">The rising tide of cyber threats: Why security is a top priority<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The threat of significant cyberattacks against both public and private organizations is at an all-time high, according to <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/www.mef.net\/mef-state-of-the-industry-report-sase\/\">MEF&#8217;s\u00a0State of the Industry Report \u2013 SASE: Validating Cyber Defense in an Era of Unprecedented Threats<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">, published in June 2024. The cost of these attacks is also expected to grow, with Cybersecurity Ventures predicting that cybercrime&#8217;s financial impact will increase from $8 trillion in 2023 (7.7% of global GDP) to $10.5 trillion by 2025 (~9.5% of global GDP).<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Several factors are driving this surge in cyberattacks, among them:<\/span><\/p>\n<div data-component=\"basic-list\" class=\"BasicList BasicList_nestedLevel_0 BasicList_variant_unordered BasicList_limited\">\n<ul data-testid=\"basic-list-unordered\" class=\"BasicList-UnorderedList\">\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The continued adoption of digital technologies across industries.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The inability of overstretched cybersecurity measures to keep up with evolving threats.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The rising use of AI by cybercriminals.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">A lack of qualified cybersecurity professionals.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Ongoing geopolitical instability.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Together, these elements fuel the growing scale, complexity, speed and financial impact of cyberattacks.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">In response, enterprises are prioritizing cybersecurity as a critical investment. Secure access service edge (SASE) has emerged as a key way for companies to protect remote and hybrid work models. <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/network-security\/sase-architecture-a-checklist-for-sase-savvy-businesses\">SASE combines software-defined WAN<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> (SD-WAN) with cloud-based security features, such as secure service edge and zero trust. Among other attributes, SASE safeguards users, devices and applications at scale, regardless of their location &#8212; whether in public or private clouds, on-premises or across mobile and internet environments.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Cybersecurity&#8217;s next phase will find enterprises evolving from secure SD-WAN to SASE and eventually adopting NaaS services equipped with integrated SASE capabilities. This will allow companies to streamline and strengthen their security deployments without requiring them to manage and maintain their own infrastructure.<\/span><\/p>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\" id=\"Multi-cloud strategies drive agility and resilience\" style=\"scroll-margin-top:10rem;scroll-snap-margin-top:10rem\">Multi-cloud strategies drive agility and resilience<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Cloud computing continues to be a primary driver for digital transformation across industries. Providers&#8217; platforms offer the essential infrastructure, foundations and software to modernize IT systems and streamline business operations. As a result, enterprises are seeking ways to connect with various cloud service providers. This allows them to optimize expenses, avoid vendor lock-in and ensure greater redundancy and flexibility in their cloud environments.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">It&#8217;s no surprise, then, that worldwide spending on public cloud services continues to grow substantially. According to mid-2024 forecasts by both Gartner and IDC, cloud spending was expected to jump 20% year-over-year in 2024, with rapid advances in AI driving the surge.\u00a0Gartner <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2024-05-20-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-surpass-675-billion-in-2024\">predicted<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> that worldwide public cloud services revenues would reach $675 billion in 2024 and climb another 22% to $825 billion in 2025. By 2026, 75% of organizations will adopt a cloud-based digital transformation model, according to the firm.<\/span><\/p>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\" id=\"Generative AI: A game changer in enterprise transformation\" style=\"scroll-margin-top:10rem;scroll-snap-margin-top:10rem\">Generative AI: A game changer in enterprise transformation<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">GenAI is reshaping entire industries by automating tasks, enhancing data-driven decision-making and personalizing customer experiences. <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/data-center-networking\/how-ai-energy-requirements-are-shaping-data-center-investment\">Enterprises are tapping GenAI<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> for diverse applications like translation, content creation and product and service innovation, driving unprecedented digital transformation. Look for GenAI adoption to increase as companies look for other ways to improve their operations.<\/span><\/p>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\" id=\"Modern NaaS: The future of enterprise networks \u00a0\" style=\"scroll-margin-top:10rem;scroll-snap-margin-top:10rem\">Modern NaaS: The future of enterprise networks \u00a0<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Modern NaaS addresses enterprise needs for security and cloud migration by providing scalable, on-demand connectivity. It supports multi-cloud environments and high-performance AI tasks while enhancing edge computing for real-time applications.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Key NaaS benefits include the following:<\/span><\/p>\n<div data-component=\"basic-list\" class=\"BasicList BasicList_nestedLevel_0 BasicList_variant_unordered BasicList_limited\">\n<ul data-testid=\"basic-list-unordered\" class=\"BasicList-UnorderedList\">\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">Dynamic resource allocation. <\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Supports high-performance AI and GenAI tasks.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">Integrated security features<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">. Protects data in transit.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">Cloud-like consumption models. <\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Enables near real-time provisioning and flexible scaling.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">Automated management<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">. Simplifies provisioning and optimization.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">End-to-end visibility<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">. Highlights both networks and ecosystem partners.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/www.mef.net\/network-as-a-service\/#blueprint\">MEF&#8217;s 2025 NaaS Industry Blueprint<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> outlines a path for on-demand, globally interconnected networks designed to help organizations unlock services and tap new revenue streams through federated ecosystems and standardized frameworks.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">As digital transformation accelerates, enterprises require seamless, secure and scalable services to achieve their goals. Modern NaaS enables businesses to secure their networks, connect to cloud providers and use emerging tools such as GenAI.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Standardized frameworks and federated NaaS ecosystems will create globally integrated networks to fuel collaboration and help companies stay ahead in a rapidly evolving market. By aligning with these innovations, businesses can transform challenges into growth opportunities, positioning themselves for long-term success.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_italic\">(<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold ContentText-BodyTextChunk_italic\">Editor\u2019s note:<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_italic\">\u00a0This article is part of our\u00a0<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link ContentText-BodyTextChunk_italic\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/author\/mef\">regular series of articles<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_italic\">\u00a0from the industry experts at MEF.)<\/span><\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold ContentText-BodyTextChunk_italic\">Pascal Menezes, CTO at MEF,<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_italic\"> is a proven technology thought leader, sales evangelist, product manager and seasoned IP architect with decades of experience in internetworking, next-generation information systems, and communication architectures. Pascal currently serves as Chief Technology Officer at MEF. He is focused on SD-WAN, SASE, cloud scale architectures, real-time media networks, Software Defined Networks (SDN), Network Function Virtualization (NFV) and Lifecycle Service Orchestration (LSO).<\/span><\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold ContentText-BodyTextChunk_italic\">See his collection of Network Computing articles\u00a0<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link ContentText-BodyTextChunk_bold ContentText-BodyTextChunk_italic\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/author\/pascal-menezes\">here<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold ContentText-BodyTextChunk_italic\">.<\/span><\/span><\/p>\n<\/div>\n<p><script defer=\"\" async=\"\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&amp;version=v18.0\" data-ot-ignore=\"true\"><\/script><br \/>\n<br \/><\/p>","protected":false},"excerpt":{"rendered":"<p>Digital transformation has redefined how enterprises do business, as they search for ways to improve operations and better serve their customers. Organizations have modernized their networks to enable hybrid work, support cloud connectivity and lay the groundwork for new technologies such as generative AI (GenAI). Yet, navigating an interconnected digital world remains a constant challenge. [&hellip;]<\/p>","protected":false},"author":3,"featured_media":5952,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-5951","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/comments?post=5951"}],"version-history":[{"count":0,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5951\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media\/5952"}],"wp:attachment":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media?parent=5951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/categories?post=5951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/tags?post=5951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}