Hardware is Dead

Technically, hardware can never really ‘die’, because all software in existence runs on hardware of some kind or the other. So when we make an admittedly provocative statement about the death of hardware, what we’re really talking about is the dying emphasis on hardware as the determining factor in businesses of today.

The incredible fragmentation that we are witnessing today on the client computing side due to the explosion of mobile devices of all kinds is one half of the story. The transformation of server side computing to cloud computing is the other half of this compelling story.

The first revolution: BYOD. Or just ‘Use any device’

Larry Dignan of ZDNet talks about Gartner’s predictions on the BYOD front (read here)

“In a presentation by Gartner analysts Leslie Fiering and Stephen Kleynhans, the client computing world in 2018 is heavy on bring your own device and bring your own application. The average personal cloud will sync with at least six different devices.”


BYOD is widely acknowledged as a big challenge facing organizations today, and a large numbers of security vendors look to capitalize on the uncertainty created by the need to allow end-users to use their own devices in a hitherto tightly restricted environment. As we see it, the real implication of BYOD is that end-users will increasingly find their job functions becoming device-agnostic. The client device (usually a workstation or laptop) will no longer be important, and organisational security policy will have to evolve to embrace this new trend by insulating end-users from the risks of device compromise.

For instance, the NERC (North American Electricity Reliability Corporation www.nerc.com ) standards discuss ways to protect against end-user device compromise when implementing electronic secure perimeters (for instance, a perimeterized datacenter). These standards help protect systems which run the US national electricity grid! Businesses of today need to take a leaf out of their books and develop elegant procedures which allow end-users to use virtually any device without compromising security.

We here at CipherGraph deliver mobile device support out of the box, so that end-users can use any device they like.

The second revolution: Cloud

On the server side, the trend is even more disruptive and exciting. Dedicated servers and on-premise deployments are giving way to cloud deployments that are easy to maintain and scale on demand. Routers and network hardware are giving way to software defined networking that allows you to modify network policy and operation on the fly. The ‘Cloud State of Mind’ is all about doing away with the need for specialized hardware with rudimentary software embedded – which is hard to maintain, higher TCO involved, and does not adapt to your changing requirements.

We believe that the network of the future will be software focussed – and hence software-defined rather than hardware-defined. Traditional hardware vendors will have to adapt or find that their customer-base prefers to go with virtual appliances and cloud-based solutions that are simpler, more affordable, and perform better than any hardware equivalent! After all, a while ago, a representative of a traditional hardware vendor claimed to us that ‘This can’t be done in the cloud as the cloud lacks hardware acceleration’. The cloud is larger and more capable than any hardware, any device that any of us can deploy.

And what the ‘Cloud State of Mind’ brings to VPN hardware and clunky remote access solutions – the CipherGraph Cloud Access Gateway.

Learn More

Unleash the power of TWO revolutions in your business today! Contact us at info@ciphergraph.com