Search Itential

  • Filter

  • Sort By

Found 1783 results

in "All Categories"

Transformations

CSV to JSON

This Pre-Built Transformation enables users to convert comma separated data (csv data) into JSON by the first line of the csv data as keys and all following lines as values.

Read More >

Blog

What Gartner’s 2025 Market Guide Means for Network Leaders & Why It’s Time to Rethink Your Automation Strategy

Network automation has reached an inflection point. According to the newly released Gartner® 2025 Market Guide for Network Automation Platforms, enterprise IT and network teams are facing mounting pressure to scale automation — but most are falling short due to tool sprawl, siloed workflows, and manual processes that continue to dominate operations. This year’s Market

Read More >

Blog

How to Orchestrate Unique SD-WAN Configs Across Thousands of Branches

Deploying SD-WAN at scale sounds doable — modern controllers allow you to push config to many routers at once, and almost every SD-WAN vendor out there offers some automation capabilities. But reality isn’t so clean. For most teams, they’re faced with complex, multi-vendor environments, and a challenge that’s difficult to solve: unique configurations. Many routers

Read More >

Blog

The Future of Network Configuration: Moving from Reactive Changes to Proactive Validation

In today’s fast-evolving IT landscape, the traditional approach of reactive, manual network changes is no longer sustainable. And to tell the truth, even fully automated changes without oversight carry risks. As networks grow in complexity — spanning multi-cloud environments, hybrid infrastructures, and a vast array of connected devices — it’s only becoming more critical to

Read More >

Blog

Why Network Automation Is No Longer Optional (& How Itential Makes It Stupid Easy)

It’s true — getting started in network automation can feel intimidating as hell. You hear people talk about it like you need to have a PhD in Python just to get started. Meanwhile, you’re out here juggling VLAN and interface changes, troubleshooting the same issue for the third time this week, and wondering if you’ll

Read More >

Blog

Struggling with DORA Compliance? Network Orchestration Can Make the Difference for E.U. Financial Institutions

As of January 17th this year, the Digital Operational Resilience Act (DORA) is in effect for financial institutions and third-party ICT partners operating in the EU. The DORA rules aren’t just a compliance checkbox — they’re a mandate to rethink operational resilience in an era of rising cyber threats and complex networks. Failing to comply risks

Read More >

Blog

The Future of NetOps: Delivering Network Services Like the Rest of IT

For years, networking has operated separately from the rest of IT infrastructure. While compute, storage, and applications moved toward cloud-first, API-driven models, networking has remained mostly manual and ticket-driven. That’s no longer sustainable. In my recent TNOps Podcast conversation with Scott Robohn and Ethan Banks, we explored how networking must evolve — not just by

Read More >

Blog

Automation at Scale: Powering ISP Success for BEAD Broadband Rollout

The Broadband Equity, Access, and Deployment Program (BEAD) is a $42.45 billion push to bring high-speed internet to every corner of the United States, targeting unserved and underserved communities. For internet service providers (ISPs), this means rolling out complex broadband networks, activating new services, and ensuring all services can be properly billed across rural counties and

Read More >

Blog

The Automation Paradox: Why More Scripts ≠ More Control

Let’s start with a truth every NetEng pro knows: scripts are awesome — until they’re not. You write one to drop a VLAN. It works. You feel like a rockstar. Then you write 50 more, and suddenly you’re drowning in a mess of dependencies, version mismatches, and operators pinging you while you’re watching the game

Read More >

Blog

Customer Spotlight: How a Major FinTech Is Delivering Secure, Consistent, & Compliant Network Operations

When your network underpins sensitive financial transactions, every misconfiguration, delay, or security gap can introduce risks that impact customers and compliance. For the network team at a major FinTech company, ensuring security across their vast, complex infrastructure had become an uphill battle. Despite their skills and best efforts, they struggled to keep up with security

Read More >