<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Councilio: Cyber and Networks]]></title><description><![CDATA[Focused analysis of the security and connectivity layers underpinning today’s digital enterprises. These articles explore the evolution and shifting role of network and security platforms in a cloud-first world to help you understand where control points are moving, and how to align your organisation’s network and security investments with a service-based future.]]></description><link>https://www.petercarradvisory.com/s/cyber-and-networks</link><image><url>https://substackcdn.com/image/fetch/$s_!np7r!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4670db80-3e67-47db-92d9-29ec400d9176_750x750.png</url><title>Councilio: Cyber and Networks</title><link>https://www.petercarradvisory.com/s/cyber-and-networks</link></image><generator>Substack</generator><lastBuildDate>Sat, 04 Apr 2026 22:19:27 GMT</lastBuildDate><atom:link href="https://www.petercarradvisory.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Peter Carr Advisory Pty Ltd]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[thepetercarrblog@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[thepetercarrblog@substack.com]]></itunes:email><itunes:name><![CDATA[Peter Carr]]></itunes:name></itunes:owner><itunes:author><![CDATA[Peter Carr]]></itunes:author><googleplay:owner><![CDATA[thepetercarrblog@substack.com]]></googleplay:owner><googleplay:email><![CDATA[thepetercarrblog@substack.com]]></googleplay:email><googleplay:author><![CDATA[Peter Carr]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Extreme Networks Recasts Platform Credibility]]></title><description><![CDATA[Why Technology and Commercials Must Align]]></description><link>https://www.petercarradvisory.com/p/extreme-networks-recasts-platform</link><guid isPermaLink="false">https://www.petercarradvisory.com/p/extreme-networks-recasts-platform</guid><dc:creator><![CDATA[Peter Carr]]></dc:creator><pubDate>Tue, 30 Sep 2025 01:35:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jP-B!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75d3a82e-e990-4444-bc56-6c621d35aa5e_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jP-B!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75d3a82e-e990-4444-bc56-6c621d35aa5e_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jP-B!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75d3a82e-e990-4444-bc56-6c621d35aa5e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!jP-B!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75d3a82e-e990-4444-bc56-6c621d35aa5e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!jP-B!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75d3a82e-e990-4444-bc56-6c621d35aa5e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!jP-B!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75d3a82e-e990-4444-bc56-6c621d35aa5e_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jP-B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75d3a82e-e990-4444-bc56-6c621d35aa5e_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/75d3a82e-e990-4444-bc56-6c621d35aa5e_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1927872,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.petercarradvisory.com/i/174308354?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75d3a82e-e990-4444-bc56-6c621d35aa5e_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jP-B!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75d3a82e-e990-4444-bc56-6c621d35aa5e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!jP-B!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75d3a82e-e990-4444-bc56-6c621d35aa5e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!jP-B!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75d3a82e-e990-4444-bc56-6c621d35aa5e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!jP-B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75d3a82e-e990-4444-bc56-6c621d35aa5e_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A platform isn&#8217;t real until the commercials match the architecture. True platforms require alignment of technology and commercial models. Two horses, one saddle.</figcaption></figure></div><p>In enterprise technology, pricing rarely seems to receive the same design discipline as the product. For engineering teams, it is an afterthought. Get it working first, worry about monetisation later. We&#8217;re seeing that a lot with AI. </p><p>For marketing, it is a pre-market spreadsheet exercise. By the time a customer sees the bill of materials, the service price is often little more than a rolled-up number derived from decomposed SKUs. A platform without commercial simplification still behaves like a bundle of products in your finance system.</p><p>Networking has suffered from this for decades. Vendors flooded the market with endless SKUs for switches, routers, controllers, and feature packs until every customer contract looked like an ERP order form. The brilliance of engineering was cancelled out by the incoherence of pricing, and customers felt it immediately.</p><p>This is the context in which Extreme Networks is now positioning Platform ONE. They are recognising something simple. That pricing design is part of platform design. And that focus is promising. </p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.petercarradvisory.com/p/extreme-networks-recasts-platform?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Councilio! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.petercarradvisory.com/p/extreme-networks-recasts-platform?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.petercarradvisory.com/p/extreme-networks-recasts-platform?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p>Extreme is quickly building credibility in unforgiving campus environments where orchestration matters more than simplification and where trust is the only true currency. Platform ONE builds on that foundation by collapsing not just networking and AI into a single management fabric, but also by treating licensing design as an architectural choice.</p><p>Instead of a labyrinth of SKUs, Extreme is deliberately moving to a simplified tiered structure, where device families fall into pooled subscription tiers and features are organised at standard, advanced, and premium levels. Consumption-based models are emerging for providers. The point isn&#8217;t that all sprawl has vanished. It hasn&#8217;t. But that Extreme is at least talking about it and attempting to collapse both the technology stack and the commercial stack in one move. That intent is too rare in this industry.</p><p>Cisco continues to dominate on scale, but its licensing and global go to market is still defined by complexity. DNA Center and its associated licensing tiers remain dense, with additional charges for security, analytics, and AI features. Customers often complain that Cisco contracts feel like a puzzle only specialists can decode.</p><p>HPE Aruba has pushed hard into unified network management, but its commercial approach still leans on bundles and feature packs. Licensing simplification has been incremental, not transformative. The architecture may be improving, but the contract experience has not kept pace.</p><p>Juniper, with its Mist AI platform, has differentiated strongly on automation and assurance in the IT ops space. Yet its SKU catalogue remains broad, particularly across switching and routing, where legacy and modern lines coexist. The platform promise is compelling, but the commercial coherence is uneven.</p><p>Against this backdrop, Extreme&#8217;s attempt to collapse catalogue complexity is not just a feature, it is a differentiator. It also signals a willingness to compete not only on technology depth but also on customer experience at the contract level. There are broader lesssons here for everyone. </p><p>Especially in other sectors that show how uneven the pricing field remains. </p><p>In the emerging world of platform, ERP incumbents still cling to SKU proliferation. Salesforce&#8217;s Einstein 1 struggles with the sprawl of acquired clouds. Microsoft uses bundling (e.g. E3, E5 etc.) to mask complexity but rarely eliminates it. Broadcom and VMware have gone even further, collapsing portfolios into bundles and enforcing subscription-only models, but at the cost of customer trust. Even ServiceNow, the current strongest example of platform gravity, faces criticism for SKU sprawl as it figures out how to layer AI into its pricing.</p><p>The lesson is consistent. Platform rationalisation without commercial simplification still feels like buying point solutions. Commercial simplification without platform depth is just a prettier lock-in. The winners will be those who do both.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DirS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed678120-770d-4a36-96b9-a869ec153c5c_2074x1126.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DirS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed678120-770d-4a36-96b9-a869ec153c5c_2074x1126.png 424w, https://substackcdn.com/image/fetch/$s_!DirS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed678120-770d-4a36-96b9-a869ec153c5c_2074x1126.png 848w, https://substackcdn.com/image/fetch/$s_!DirS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed678120-770d-4a36-96b9-a869ec153c5c_2074x1126.png 1272w, https://substackcdn.com/image/fetch/$s_!DirS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed678120-770d-4a36-96b9-a869ec153c5c_2074x1126.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DirS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed678120-770d-4a36-96b9-a869ec153c5c_2074x1126.png" width="1456" height="790" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed678120-770d-4a36-96b9-a869ec153c5c_2074x1126.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:790,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2873783,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.petercarradvisory.com/i/174308354?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed678120-770d-4a36-96b9-a869ec153c5c_2074x1126.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DirS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed678120-770d-4a36-96b9-a869ec153c5c_2074x1126.png 424w, https://substackcdn.com/image/fetch/$s_!DirS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed678120-770d-4a36-96b9-a869ec153c5c_2074x1126.png 848w, https://substackcdn.com/image/fetch/$s_!DirS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed678120-770d-4a36-96b9-a869ec153c5c_2074x1126.png 1272w, https://substackcdn.com/image/fetch/$s_!DirS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed678120-770d-4a36-96b9-a869ec153c5c_2074x1126.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">APAC Industry Analyst Roundtable with CEO, Ed Meyercord to discuss the GA of Platform One</figcaption></figure></div><p>Extreme is betting that credibility in the platform era depends on collapsing the architecture and the catalogue together. Platform ONE arrives as a genuinely merged management fabric, paired with a licensing model that signals simplification. The company hasn&#8217;t solved every challenge. Only real-world renewals will reveal whether coherence survives procurement. But I applaud the unmistakable intent.</p><p>That it comes from a networking vendor, not an ERP incumbent, is part of the point. Extreme is showing that commercial design is inseparable from platform design. If they can carry this through execution, Platform ONE won&#8217;t just be another launch but it could demonstrate that the future of platforms belongs not only to those who unify the technology, but to those who collapse the catalogue as well.</p><p>The other signal worth noting is financial. Extreme has been executing share repurchases ($25 million in the last quarter as part of a broader $200 million authorisation). It&#8217;s a move that only makes sense if cash generation and balance sheet strength are in order. Buybacks are never the whole story, but in Extreme&#8217;s case they do reinforce a picture of a company confident enough to return capital while funding growth. Taken alongside the strategic direction of Platform ONE, it suggests a business that is not just talking about platform, but delivering operationally and commercially.</p><h4>Recommendations</h4><p>Recommendations are available to paid subscribers.</p>
      <p>
          <a href="https://www.petercarradvisory.com/p/extreme-networks-recasts-platform">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Future of Zero Trust]]></title><description><![CDATA[Why Zscaler&#8217;s Exchange Model Positions It as a Neutral Security Broker]]></description><link>https://www.petercarradvisory.com/p/the-future-of-zero-trust</link><guid isPermaLink="false">https://www.petercarradvisory.com/p/the-future-of-zero-trust</guid><dc:creator><![CDATA[Peter Carr]]></dc:creator><pubDate>Tue, 23 Sep 2025 00:11:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/3eb5a5b1-0353-4bee-8c7f-db253d2d5110_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6YRQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f69f395-d701-4601-a090-2a9f541f05df_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6YRQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f69f395-d701-4601-a090-2a9f541f05df_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6YRQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f69f395-d701-4601-a090-2a9f541f05df_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6YRQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f69f395-d701-4601-a090-2a9f541f05df_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6YRQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f69f395-d701-4601-a090-2a9f541f05df_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6YRQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f69f395-d701-4601-a090-2a9f541f05df_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6f69f395-d701-4601-a090-2a9f541f05df_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2277424,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.petercarradvisory.com/i/173807069?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f69f395-d701-4601-a090-2a9f541f05df_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6YRQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f69f395-d701-4601-a090-2a9f541f05df_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6YRQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f69f395-d701-4601-a090-2a9f541f05df_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6YRQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f69f395-d701-4601-a090-2a9f541f05df_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6YRQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f69f395-d701-4601-a090-2a9f541f05df_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Think of Zscaler as the data security equivalent of a human checkpoint at every airport gate where everyone is verified before they can pass. There are no exceptions and no shortcuts.</figcaption></figure></div><p>The security industry has always chased grand unifications. Every few years another vendor promises the single pane of glass. That one platform to tame the chaos of logs, alerts, and events. Today that ambition has shifted to SIEM and observability. Splunk, Elastic, and Sumo tout the union of performance and security telemetry. Datadog has added SIEM features. The logic is simple. If you already monitor every metric and trace, why not correlate them with threats and compliance rules?</p><p>It is a seductive vision. I wrote a short <a href="https://substack.com/@peterlawrencecarr/note/c-86665496">note </a>on it back in January. It is also exactly what makes American cloud security company Zscaler<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> interesting. Because they have chosen a different path. They don&#8217;t want to be your appliance partner or SIEM or observability console. Instead, they have doubled down on being something completely different: the broker in the middle that sits between every user, device, and application. </p><p>Think of PayPal, Stripe, or Square. Those companies didn&#8217;t become banks or storefronts. They became the trusted intermediaries, verifying and settling every transaction. Zscaler plays the same role in security. They are not the bank. They are not the store. They are the exchange.</p><p>This positioning isn&#8217;t theoretical, but nor is it entirely new. Large institutions have always needed brokers to connect users, applications, and networks. What makes Zscaler different is not that it invented the broker role, but that it has re-engineered it by delivering what used to be physical infrastructure as software. Zscaler already plays that role at serious scale, brokering connections for large banks and governments in Asia Pacific via thirty-two regional data centres, including five across Australia and New Zealand. You don&#8217;t get embedded at that level unless the fabric is trusted.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.petercarradvisory.com/p/the-future-of-zero-trust?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Councilio! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.petercarradvisory.com/p/the-future-of-zero-trust?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.petercarradvisory.com/p/the-future-of-zero-trust?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p>The technical decision was simple but radical. Zscaler rejected the heavy bill-of-materials and hardware-centric model of security appliances, re-imagining security enforcement as a cloud-native service delivered through a single global fabric capable of inspecting and enforcing traffic in real time. </p><p>That shift matters because enterprises now run in a distributed, SaaS-first world. Workers log in from homes and branches no longer bound by the corporate perimeter, apps live far beyond the company data centre, and disruption across all lines of business is a constant. </p><p>Under these modern conditions, backhauling traffic through appliances suddenly feels as dated as routing digital payments through cheques. Practically speaking, in Zscaler&#8217;s model, a user (or asset) in Brisbane or Bengaluru simply connects to the nearest node, traffic is inspected, then brokered to its destination, be that Salesforce, Microsoft 365, or even a legacy app in a dusty data centre. Enforcement follows the user, not the network.</p><p>The philosophy is blunt. Zero Trust at scale. No safe zones, no trusted locations. No user or device is trusted simply for being &#8220;inside&#8221; the LAN. Everyone and everything is effectively off the network. This isn&#8217;t just an elegant architecture. It tackles the hard truth that many cyberattacks don&#8217;t come from shadowy outsiders but from trusted staff, stolen identities, or compromised devices already inside the perimeter. By removing the assumption of internal trust, Zscaler minimises the blast radius so that when compromise happens, its impact stays contained.</p><p>The adoption challenge Zscaler faces is not whether the architecture works. It does. But whether companies can change their mindset. Because while it sounds (theoretically) simple, it also collides with thirty years of entrenched network thinking. Network engineers have built LANs the same way for decades. Firewalls, proxies, and intrusion appliances have defined security. Vendors like Palo Alto, Cisco, and Fortinet thrived on it. Zscaler grew up serving those same customers, many of whom remain comfortable with boxes.</p><p>But the perimeter is dissolving. In an as-a-Service world, traffic rarely touches the old edge. Users connect from everywhere, applications live anywhere, and <em>inside</em> and <em>outside</em> are blurred. What makes Zscaler different is that enforcement has to travel with the traffic. </p><blockquote><p>Zscaler&#8217;s model works because it is a service, not a product. Like PayPal, it sells trust, not hardware. But its go-to-market still carries the weight of the old appliance world. The sales channels, the network diagrams, even the SKUs all echo a product company. That mismatch matters, because Zscaler is not just another vendor in the replacement cycle. It is a displacement company. It isn&#8217;t swapping out one firewall for a shinier firewall, or one VPN concentrator for another. It is displacing the entire premise that appliances belong at the centre of enterprise security. Closing the gap between what it truly is (a trust service built to displace the old model), and how it still presents itself to the market will be one of Zscaler&#8217;s biggest hurdles to its next wave of growth.</p></blockquote><p>On trust, I think the roadmap is good. Suspicious files can be detonated in safe zones. Analytics can act as early-warning radar. Decoys can trap anyone targeting AI systems. Large language model requests can be filtered to stop leakage and runaway costs. I think that taken together these moves also hint at a bigger ambition. Not just to broker traffic, but to broker data itself. Zscaler is already branding this layer <em>Zscaler Data Fabric (for Security)</em>.</p><p>That stance sets it apart from others. If I look at other recent announcements in the security provider market, Dynatrace is embedding security into developer pipelines, Check Point is buying its way into AI-native stacks, and BeyondTrust is treating AI agents as identities to govern. Each aims to own vertical slices of the stack whereas Zscaler defines itself by horizontal neutrality. It connects to everyone, competes with no one.</p><p>This is where the PayPal analogy sharpens. PayPal began as a settlement layer, then expanded into wallets and credit. Stripe grew from API payments into billing and treasury. Square evolved from card readers into a full financial ecosystem. Each began as a broker, and once they had earned ubiquity, they built outward <em><strong>along the trust curve</strong></em>. </p><p>Zscaler now faces the same pivot. It has already proven itself as the trusted exchange for traffic. The question is what comes next? In that sense, the future of Zscaler will be defined less by whether it can broker trust (it can), and more by what it builds on top of the trust it has already earned. In commercial terms, I think the former means protecting the base, whereas the latter is where whole new client personas begin to emerge. </p><p>For now, its strength lies in what it refuses to do. It does not build a SIEM. It does not chase observability. It streams logs outward, keeping neutrality intact. That neutrality is its moat. But at times it can also make the company&#8217;s positioning feel a little defensive, or at least not fully committed to being different. To truly own the role of global broker, it is important that Zscaler defines itself in positive terms, not just by what it declines.</p><p>I think it is too easy or basic to say that neutrality also makes Zscaler an irresistible acquisition target. </p><p>On paper you could imagine Datadog acquiring it to close the loop from detection to enforcement. Or Cisco, now owning Splunk, finally delivering the platform story it has promised. But an acquisition would kill neutrality. Splunk would no longer prioritise a Cisco-owned Zscaler. Elastic and Sumo would pull back. The very thing that makes Zscaler valuable would evaporate.</p><p>Perhaps that is why Zscaler stays out of analytics. Its value is being the settlement layer of the cloud era. They are the broker that every connection flows through, and where every flow is verified before it proceeds. If the industry keeps buying physical appliances, its position weakens. But if SaaS adoption continues to accelerate (explode), Zscaler becomes a more dominant logical control point. It is very easy to see a future where economic gravity favours the broker.</p><p>I found myself wondering just how big Zscaler can get. Can they achieve ubiquity? Do they even aspire to that? PayPal only became indispensable once it reached small merchants. Stripe lowered the barrier for developers. Square armed caf&#233;s and market stalls. Ubiquity turns brokers into ecosystems.</p><p>Zscaler has already convinced banks, governments, and multinationals. But can Zero Trust become as default and invisible as tapping a card at checkout? Or will Zscaler settle into the IBM path of seeking to dominate at the top, but never chase ubiquity? Microsoft built for ubiquity. IBM never did.</p><p>That choice between broad reach and elite dominance now looms. If Zscaler can cross the line, it becomes the PayPal of security. If not, it remains a trusted brand at the top end, while others shape the mainstream.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_pj9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92424ffe-c465-47f4-bc68-a6c1c5da404f_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_pj9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92424ffe-c465-47f4-bc68-a6c1c5da404f_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!_pj9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92424ffe-c465-47f4-bc68-a6c1c5da404f_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!_pj9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92424ffe-c465-47f4-bc68-a6c1c5da404f_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!_pj9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92424ffe-c465-47f4-bc68-a6c1c5da404f_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_pj9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92424ffe-c465-47f4-bc68-a6c1c5da404f_1536x1024.png" width="727.9971313476562" height="485.4980869083614" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/92424ffe-c465-47f4-bc68-a6c1c5da404f_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:727.9971313476562,&quot;bytes&quot;:2439210,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.petercarradvisory.com/i/173807069?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92424ffe-c465-47f4-bc68-a6c1c5da404f_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_pj9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92424ffe-c465-47f4-bc68-a6c1c5da404f_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!_pj9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92424ffe-c465-47f4-bc68-a6c1c5da404f_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!_pj9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92424ffe-c465-47f4-bc68-a6c1c5da404f_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!_pj9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92424ffe-c465-47f4-bc68-a6c1c5da404f_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Either way, the broker model has history on its side. When executed in its purest form, it tends to win. And when it does, it rewrites the rules for everyone else.</p><h4>Recommendations</h4><p>Recommendations are available to paid subscribers. </p>
      <p>
          <a href="https://www.petercarradvisory.com/p/the-future-of-zero-trust">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Extreme Networks and the Platform Shift ]]></title><description><![CDATA[The Challenger Platform for the Campus-Dense, Always-On Enterprise]]></description><link>https://www.petercarradvisory.com/p/extreme-networks-and-the-platform</link><guid isPermaLink="false">https://www.petercarradvisory.com/p/extreme-networks-and-the-platform</guid><dc:creator><![CDATA[Peter Carr]]></dc:creator><pubDate>Mon, 30 Jun 2025 02:45:02 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8e29a297-c096-47aa-a724-494bf5e0e418_1536x2048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Walk into any CIO&#8217;s office and ask what&#8217;s harder: launching a new app, shifting cloud providers, or replacing their core networking stack. The first two will get you a project plan. The last one will get you a long pause, maybe a chuckle, and a story about a data center migration from 2007 (back when &#8220;Green Data Centres&#8221; and farting cows were the rage), that nearly ended someone&#8217;s career.</p><p>In the world of enterprise infrastructure, networking isn&#8217;t just a technical layer. It&#8217;s the circulatory system. That&#8217;s why in most parts of enterprise IT, gaining a new customer is a win. But in networking, it&#8217;s an act of displacement. A decision to rip and replace the connective tissue of an entire organisation.</p><p>For challenger brands like Extreme Networks, every new customer is more than a logo. It&#8217;s a signal. They don&#8217;t win customers by being cheaper or louder. They earn defections by being trusted to replace the system that underpins everything else. From connectivity to compliance and from performance to security.</p><p>That system is usually Cisco. And it&#8217;s not just embedded in racks. It&#8217;s embedded in workflows, certifications, procurement policy, and a culture of &#8220;no one ever got fired for buying&#8230;&#8221;. The very thing that makes network infrastructure critical, its invisibility, also makes it the least welcome place for disruption.</p><p>But there is a shift happening. And it&#8217;s not just about price-performance ratios or better dashboards. It&#8217;s about understanding what kind of enterprise environments now dominate our lives and designing for those realities.</p><p>That&#8217;s where Extreme&#8217;s position becomes clear. They are a medium-to-high-density campus solution provider. And that&#8217;s not a limitation. It&#8217;s a strategy. Because the world, it turns out, is made of campuses.</p><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.petercarradvisory.com/p/extreme-networks-and-the-platform?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Councilio! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.petercarradvisory.com/p/extreme-networks-and-the-platform?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.petercarradvisory.com/p/extreme-networks-and-the-platform?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><div><hr></div><h4><strong>We Already Live in Campuses</strong></h4><p>From the moment we leave home, we move through connected campuses. The medical centre where we get our blood test. The office co-working space. The university precinct that blends students, researchers, and business startups. The Westfield shopping centre that&#8217;s also a logistics hub and entertainment zone. The airport and its lounges. The linear transport network. The stadium. The library. The council chambers and the aquatic centre and the school.</p><p>These places are not just locations. They are digital ecosystems. Each one combines dense connectivity with security requirements, roaming endpoints with compliance obligations, and real-time user experiences with invisible infrastructure. Each one combining public access with private operations.</p><p>Extreme didn&#8217;t stumble into this space. They designed for it. These are the environments where traditional architectures struggle, where packet flow alone is not enough, and where intelligence, resilience, and visibility become the real differentiators.</p><p>That&#8217;s why the controversy over 15-minute cities always feels a little absurd to me. Not because it isn&#8217;t worth questioning urban planning agendas. But because we already live this way. We <em>are</em> campus citizens. We just never called it that. Moving from one digitally enabled campus to another, with expectations that connectivity will follow us, protect us, and respond to us. The question is not whether this model is coming. It&#8217;s who&#8217;s building for it.</p><blockquote><p><strong>The Casino Example</strong></p><p>Think about what a casino is today. It&#8217;s a gaming floor, yes, but also a hotel, a live entertainment venue, a fleet of restaurants, a retail precinct, and a car park with license plate recognition. It may have an adjacent conferencing centre. It runs a mobile guest app. It operates a complex internal surveillance system. It&#8217;s a magnet for cyber threats and a fully PCI-compliant financial transaction processor.</p><p>That&#8217;s not one network, it&#8217;s dozens of overlapping systems running on a tightly integrated fabric. And that fabric must serve the competing needs of guest experience, staff operations, security policy, compliance, and uptime requirements so strict that a few seconds of latency can cost millions in lost revenue or compromised trust.</p><p>Now imagine walking into that environment with a PowerPoint deck and a generic promise to &#8220;simplify operations.&#8221; It&#8217;s laughable. In these environments, you don&#8217;t win with simplification. You win with orchestration. You win with platform. </p><p>You need to secure every node, monitor every endpoint, and predict failures before they happen. You need to visualise patterns across the entire topology, from PoE switches buried in the data center to Wi-Fi 6E access points hidden in the penthouse suite. And you need to integrate all of it with security platforms, aging business systems, and real-time applications, without taking any of them offline or breaking operational continuity.</p><p>All of that, by the way, must be done while unseating the incumbent vendor that&#8217;s had a decade-long head start.</p><p>This is where Extreme Networks shows up differently. Not as a hardware company, but as a platform company. One that understands that the edge is now everywhere, and that modern networking is no longer defined by data flow alone. It&#8217;s defined by experience assurance, by AI-driven operational insight, and by the clarity to act before things break.</p></blockquote><p>This is what many still miss about the evolution of enterprise networking. The network has moved up the stack. It&#8217;s not about better speeds or lower latency alone. It&#8217;s about visibility, integration, and control. It&#8217;s also part of the transition to a new 21st century architecture. </p><p>To call a switch or a wireless access point &#8220;hardware&#8221; in 2025 is a category error. Yes, it moves packets. Yes, it consumes PoE. But what makes that switch viable and competitive is not just throughput or power efficiency. It&#8217;s the AIOps-infused monitoring layer, the seamless tie-in to observability pipelines, the SIEM integration, the dashboard designed to speak to humans, not just Level 3 engineers. </p><p>In environments like Disney Studios in Sydney, that difference isn&#8217;t theoretical. It&#8217;s operational. It can determine whether a production crew brings a container load of their own networking gear for a three-day or nine-month shoot, or simply plugs into an environment that works. Because at that level, it&#8217;s no longer about the hardware, it&#8217;s about the <em>service</em>. </p><p>It&#8217;s the same for an airport tenant or a Westfield pop-up. They&#8217;re not network engineers. They&#8217;re retailers, logistics operators, content creators. What they need is a ready network. One that responds like a service, not like a project.</p><blockquote><p>The network becomes something consumed, not owned. Something trusted to perform, not configured line by line. Regardless of the client, the expectation is the same: walk in, plug in, and deliver. The value isn&#8217;t in the ports. It&#8217;s in the promise.</p></blockquote><p>In environments like casinos, stadiums, and elite sports facilities, the stakes aren&#8217;t just technical. They are experiential and financial. Every switch, every access point, every SD-WAN route is now a live source of telemetry. That data doesn&#8217;t just describe the health of the network, it tells the business how people move, where they congregate, how long they dwell, what services they access, and how the environment responds in real time.</p><p>This is behavioural analytics in a physical space. For a casino, it means understanding the movement of high-value guests, optimising staffing and security in real time, or predicting operational anomalies before they disrupt VIP services. For a stadium, it could mean identifying congestion points during halftime, adjusting digital signage dynamically, or ensuring mobile ordering apps perform flawlessly under load.</p><p>The power isn&#8217;t in the individual hardware components anymore. The power is in the platform. That&#8217;s what allows these businesses to respond before something fails, to personalise experiences as they unfold, and to protect operations without slowing them down.</p><p>This is why the network is no longer infrastructure but a strategic asset. Not because it moves packets efficiently, but because it gives the business awareness. And that awareness translates directly into revenue, loyalty, safety, and control.</p><div><hr></div><p>Extreme knows this. And that&#8217;s why their roadmap matters. Especially around the release of it&#8217;s next generation <strong><a href="https://www.extremenetworks.com/platform-one">Extreme Platform ONE</a></strong>. </p><p>They&#8217;re not just building out campus infrastructure. They&#8217;re building a control layer that spans switching, routing, wireless, edge, and analytics and crucially, that speaks to the systems businesses already rely on to keep their operations flowing.</p><p>Nowhere is that platform vision clearer than in Extreme&#8217;s partnership with ServiceNow.</p><p>This isn&#8217;t just about integration points. It&#8217;s a philosophical alignment. The network is no longer a passive utility. It&#8217;s an active participant in the service layer of the enterprise.</p><p>By connecting directly into ITSM workflows, Extreme can turn anomalies into actions. Incident creation becomes automated. Root cause analysis becomes contextual. Escalation is enriched by live data. In many cases, the resolution process begins before the user is even aware of an issue.</p><p>The network becomes a trigger for intelligence. Service management stops being reactive. It becomes self-sustaining. That&#8217;s what it means to turn ITSM into a <em>fait accompli</em>. The event occurs. The action is taken. The record is already written. It&#8217;s a different rhythm of operations entirely.</p><p>And it&#8217;s a glimpse of how platforms, not just products, will define enterprise expectations from here on.</p><h4><strong>The Friendly Challenger with a Strategic Edge</strong></h4><p>What makes Extreme particularly compelling is that they&#8217;ve done all this while staying grounded. Their teams show up. Their customers seem to like working with them. They don&#8217;t disappear after the deal closes. And in an industry where relationships are often transactional, that&#8217;s strategic.</p><p>Because displacing an incumbent isn&#8217;t just about proving you&#8217;re better. It&#8217;s about being trusted to take over. In the most critical environments. Under the most unforgiving constraints. With the full understanding that success will not be measured by product performance but by operational clarity, reduced downtime, fewer escalations, and smarter decisions made faster.</p><p>That&#8217;s the platform play. Not just offering better tooling. But offering better outcomes. Repeatedly. Predictably. And quietly.</p><p>So yes, they&#8217;re a (billion dollar) challenger brand. But not an outsider. They&#8217;ve earned their place. And in a world defined by connected campuses, experience-driven expectations, and rising operational complexity, they may be the most future-aligned networking platform you&#8217;re not yet working with.</p><p>If you&#8217;re rethinking your enterprise architecture, put Extreme on your Day One list. Not because they&#8217;re perfect. But because they understand the world as it is. And the network as it must become.</p><p>They may have entered the market many years ago as a hardware vendor, but they are emerging as something far more strategic. Their latest monitoring capabilities don&#8217;t just enhance visibility, but push directly into an area I have been calling out for a while: the convergence of SIEM and Observability.</p><p>They&#8217;re not simply showing you what&#8217;s happening on their own gear. They&#8217;re offering multi-vendor visibility and cross-domain manageability, powered by interactive AI, running on a public and private and hybrid cloud-native platforms. This isn&#8217;t an overlay. It&#8217;s a redefinition of how the enterprise experiences its network.</p><p>But look closer, and a longer-term trajectory also becomes visible.</p><p>This is not just about managing infrastructure. It&#8217;s about owning the context that flows through it. About turning telemetry into insight, insight into automation, and automation into business advantage.</p><p>That&#8217;s the quiet transition happening here. From hardware vendor, to control platform, to data broker. One capable of shaping how the modern enterprise sees itself, secures itself, and makes decisions in real time.</p><p>And the most interesting part? They&#8217;re doing it without making a scene. </p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.petercarradvisory.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Councilio is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p><em>Disclosure: I attended the Extreme Networks APAC Analyst Summit in June 2025 as a guest. The event was held at Disney Studios Australia, one of Extreme&#8217;s flagship customers.</em></p>]]></content:encoded></item><item><title><![CDATA[Gary Kasparov and the New Code Generation]]></title><description><![CDATA[Man vs. Machine in the Era of AI and Secure Coding]]></description><link>https://www.petercarradvisory.com/p/gary-kasparov-and-the-new-code-generation</link><guid isPermaLink="false">https://www.petercarradvisory.com/p/gary-kasparov-and-the-new-code-generation</guid><dc:creator><![CDATA[Peter Carr]]></dc:creator><pubDate>Mon, 09 Dec 2024 21:45:58 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/934233fa-6f5c-41f9-b27c-8e5bd9a15752_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The match between Gary Kasparov and IBM&#8217;s Deep Blue in 1997 captured the world&#8217;s imagination as the ultimate &#8220;man versus machine&#8221; showdown. It wasn&#8217;t just about chess. It symbolised humanity grappling with the rise of artificial intelligence. </p><p>Kasparov&#8217;s initial victory over Deep Blue in 1996 highlighted the enduring dominance of human intuition and strategy over machine calculation. However, his loss in the rematch a year later marked a turning point, demonstrating the rapid evolution of machine capabilities. </p><p>This shift symbolised the potential of machines to not only challenge but also surpass even the brightest human minds in specific contexts. In the broader narrative, it underscores how humans and machines, while distinct in strengths, are increasingly intertwined. It&#8217;s a theme that resonates strongly in the modern era of AI-assisted software development and secure coding.</p><p>Fast forward to today, and the narrative of &#8220;man versus machine&#8221; has transformed. We are no longer pitting individuals against algorithms in isolated competitions; instead, we&#8217;re entering an era where humans and AI must collaborate, particularly in critical areas like software development and cybersecurity. </p><p>However, while organisations continue to heavily invest in once-in-a-generation technologies, investment in the developer community who use and manage these tools hasn&#8217;t kept pace. </p><p>This imbalance has historically been difficult to address, but today, new platforms and solutions make it easier than ever to equip people with the skills needed to keep up with rapid technological advancements that will ultimately keep our businesses safe and secure. </p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.petercarradvisory.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Peter Carr Blog is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h4>The State of Developers in the Modern Era</h4><p>Developers are the architects of our digital world, and their role has never been more pivotal or complex. As organisations increasingly adopt AI-assisted tools like GitHub Copilot and ServiceNow NowAssist<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> and Atlassian&#8217;s ROVO<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> , the focus is shifting toward augmenting human capabilities rather than replacing them.  </p><p>However, this shift brings a new set of challenges. While tools like these promise greater efficiency and support of the development teams, the veracity of the underlying AI models in relation to security and reliability should still be in question.</p><p>Based on a few conversations I've had, Anthropic's Claude and OpenAI ChatGPT are often regarded as the most dependable models from a security perspective. This kind of infers that other models can pose significantly higher risks depending on the underlying development languages being used. What it doesn&#8217;t change is the importance of thoughtful selection and implementation of AI tools in development workflows.</p><p>For organisations, the key challenges in developing secure code are relatively straightforward to identify. One major issue is the lack of visibility into their developers' actual skill levels. While they may know which programming languages their teams are using, they often don&#8217;t have a clear understanding of whether those developers have been properly trained or possess the necessary expertise in those languages; such as specific accreditations or certifications that validate their proficiency.</p><p>Secondly, boards and executive leadership teams consistently rank cybersecurity as a top priority, but there&#8217;s often a disconnect at the operational level. Secure coding practices, which are critical to preventing vulnerabilities, frequently lag behind because this level of detail is rarely addressed strategically. Likewise, CISOs may not realise the extent of these gaps until insecure practices surface in code commits. Without adequate training and tools, developers are left to navigate these challenges on their own, increasing the risk of vulnerabilities.</p><p>Finally, the wide range of programming languages and frameworks commonly used by development teams significantly complicates efforts to maintain secure coding practices. With potentially dozens of languages in use within a single organisation, standardising training, enforcing security protocols, and ensuring consistent expertise across teams becomes an increasingly complex task. Without closing these gaps in developer skills and secure coding practices, every language or framework in use becomes a potential threat vector. Each instance of inadequate training or oversight creates an opportunity for vulnerabilities to emerge, broadening the organisation&#8217;s attack surface. </p><h4>A Fundamental IT Management Challenge</h4><p>These skills gaps are not a new problem, nor should they be overshadowed by the excitement around AI and other emerging technologies. They stem from a foundational IT management principle that has been a cornerstone of frameworks like ITIL for decades: Workforce and Capacity Management. Addressing these gaps has always been critical, but the stakes are even higher in today&#8217;s rapidly evolving technological landscape.</p><p>Workforce and Capacity Management is an essential part of service design. It ensures that employees have the skills to meet both current and future demands. Yet, in many organisations, this critical ITIL principle is overlooked. Particularly within IT departments, where skill gaps often go unnoticed the further you move from the boardroom. </p><p>Leadership teams frequently assume their technical staff are fully equipped, but this assumption is rarely backed by the necessary investment in understanding or addressing skill deficiencies. Instead of focusing on training and development, organisations tend to hire for talent and leave existing gaps unaddressed, creating a significant risk for both operational efficiency and security.</p><p>The Skills Framework for the Information Age (<a href="https://sfia-online.org/en">SFIA</a>) offers a structured approach to assessing and developing skills, but it&#8217;s under-utilised at an operational level. </p><blockquote><p>If we were to strip it all back, insecure code, regulatory risks, and the absence of secure-by-design practices simply stem from a failure to align developer skills with organisational needs.</p></blockquote><h4>Secure Code Warrior: A New Paradigm</h4><p>Enter Secure Code Warrior (SCW), a platform company seeking to redefine developer training and risk management. Historically viewed as a developer training tool, Secure Code Warrior has evolved into a comprehensive solution for securing development practices at scale. So if you are an organisation with its own large DevOps team, or one with a significant outsourced or offshore capability, there are two clear cost-benefit opportunities that this kind of capability can provide developer-reliant organisations: </p><ol><li><p>Unlike traditional security training, the platform focuses on role-based and context-specific training. Developers learn to embed security into their work from the outset. An approach known as <em>Secure by Design</em>. </p></li><li><p>The platform enables organisations to shift the risk conversation from &#8220;which <em><strong>product</strong></em> is at risk?&#8221; to &#8220;which <em><strong>developer</strong></em> is at risk?&#8221; By using trust scores and integration into Git repositories, organisations can gain insights into developer skills and repository security and address problems literally at the source (i.e. the developers fingertips).</p></li></ol><p>A third significant cost-benefit opportunity for &#8220;end-user&#8221; client organisations lies in the indirect systems integrator (SI) sector. </p><h4>Global Scale Body Shops</h4><p>The SI sector operates differently from traditional outsourcing contracts. SIs typically focus on delivering large-scale, custom-coded projects that require significant programming efforts. They are big projects that may or may not extend into managed services relationships. These projects often involve vast pools of developers, many of whom the client never directly interacts with. Instead, the client only sees the outputs of their work at various development milestones.</p><p>When bidding for work, SIs often showcase &#8220;resource pools&#8221; with expertise in specific technologies. However, clients typically lack visibility into the individual developers or teams responsible for the work, either because these resources are based in offshore centers or clients simply don&#8217;t ask. As a result, the quality of the final product has traditionally been the sole measure of success, while the skills and performance of those building it remain largely unexamined. Until something goes awry.</p><p>This lack of visibility creates a significant gap in the SI business model. Clients are unable to assess the skills or readiness of the developers involved at the point of contracting, leaving them reliant on the SI&#8217;s assurances about resource capabilities<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a>. Overcoming this challenge would offer tremendous value to clients, enabling them to make more informed decisions and ensure higher-quality outcomes.</p><p>Platforms like SCW now make this possible. By providing insights into developer skills, coding practices, and even trust scores, SCW would allow clients to evaluate the capabilities of individual developers or teams within a prospective SI before work even begins. </p><blockquote><p>This shift would transform how clients and SIs approach project resourcing, offering unprecedented transparency and enabling higher confidence in project delivery and significant points of differentiation amongst the SIs themselves.</p></blockquote><h4>The Role of AI and the Future of Development</h4><p>AI-assisted development tools are reshaping the industry, but they come with caveats. Large language models (LLMs) like OpenAI&#8217;s GPT and Anthropic&#8217;s <a href="https://www.anthropic.com/claude">Claude </a>are revolutionising secure coding but are only as reliable as their training data. That is because languages with comparatively sparse representation across the internet, such as COBOL or Salesforce&#8217;s OOL, <a href="https://developer.salesforce.com/docs/atlas.en-us.apexcode.meta/apexcode/apex_intro_what_is_apex.htm">APEX</a>, provide less feedstock for the LLMs, and therefore remain higher-risk areas.</p><p>Despite these challenges, the opportunities are immense. In five years, AI tools may well eradicate entire classes of vulnerabilities, such as SQL injection. That is a very good thing. Developers&#8217; roles should also start to shift from writing code to architecting secure, scalable systems. That is a very good thing. And secure-by-design should no longer be a niche practice but a baseline expectation.</p><p>Kasparov&#8217;s experience against Deep Blue taught us an important lesson: machines excel at specific tasks, but humans bring strategic thinking and adaptability to the table. In the age of AI and secure coding, this dynamic remains true. </p><blockquote><p>Developers and AI must coexist, leveraging each other&#8217;s strengths while maintaining rigorous checks and balances.</p></blockquote><p>The future isn&#8217;t about taking sides in the man-versus-machine debate or rushing toward quick, yet risk-prone solutions. Instead, it&#8217;s about fostering a thoughtful collaboration between human expertise and machine capabilities to achieve secure and sustainable outcomes. It&#8217;s about creating a symbiotic relationship where developers are empowered to innovate securely and AI serves as an enabler, not a replacement. </p><p>By embracing platforms like <a href="https://www.securecodewarrior.com/">Secure Code Warrior</a> and focusing on the fundamentals of IT management, organisations can turn the challenge of secure development back into the transformative opportunity it has always been.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.petercarradvisory.com/p/gary-kasparov-and-the-new-code-generation?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.petercarradvisory.com/p/gary-kasparov-and-the-new-code-generation?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p><a href="https://www.servicenow.com/docs/bundle/xanadu-application-development/page/script/now-assist-for-code/concept/now-assist-code-landing.html">ServiceNow's Now Assist for Code</a> is integrated directly into the ServiceNow script editor and provides real-time, context-aware code suggestions based on natural language prompts. It can generate code snippets, optimise existing code, and offer recommendations tailored to the specific context within the ServiceNow environment. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p><a href="https://www.atlassian.com/software/rovo">ROVO </a>is designed to enhance team productivity within the DevOps environment, with additional support for developers through integration with AI coding assistants like Codeium. Codeium can be embedded directly into developers' IDEs and connected to Bitbucket repositories, providing contextual assistance, AI-generated code suggestions, and chat support. This integration is intended to boost coding efficiency and streamline workflows within the Atlassian ecosystem.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>This issue highlights a fundamental flaw in most labor-hire contractual models, which often rely on third parties providing personnel to address client challenges without sufficient emphasis on expertise. While Independent Software Vendors (ISVs) and PaaS providers attempt to mitigate this by implementing their own badge, certification, and accreditation programs, these assurances are seldom requested or reviewed by clients, leaving a critical gap in verifying the quality and suitability of the talent provided.</p></div></div>]]></content:encoded></item></channel></rss>