As cloud migration becomes the norm for IT, enterprises of all sizes need to connect, secure and manage complex physical and cloud datacenters. This is a significant challenge for most organizations especially when multiple datacenters, mobile users and remote locations are involved. To ensure secure access to cloud assets companies tend to enforce trombone routing through existing perimeter firewall that impact their users experience. Security point solutions may lead to fragmented policy with no real visibility and control.
![]() |
Ofir
![]() |
Hai Zamir is VP of Infrastructure at Spotad with over 20 years of IT and Data expertise. Prior to Spotad, Hai was a Senior Data group leader at Cellcom, where he led the group to the next generation of big data platforms and application infrastructure. |
As cloud migration becomes the norm for IT, enterprises of all sizes need to connect, secure and manage complex physical and cloud datacenters. This is a significant challenge for most organizations especially when multiple datacenters, mobile users and remote locations are involved. To ensure secure access to cloud assets companies tend to enforce trombone routing through existing perimeter firewall that impact their users experience. Security point solutions may lead to fragmented policy with no real visibility and control.