Sulagna Saha

Sulagna Saha

About the Author:

Sulagna Saha is a technology writer. She covers all the latest things in enterprise tech. For the last three years, she has focused on cloud computing, AI, cybersecurity, application development, data storage and networking. These are deeply technical subjects. So she likes to dig into the details, and help readers break through the jargons and consume information easily. Her stories talk about how IT solutions can help their intended users navigate the day-to-day responsibilities at work, and why companies should adopt a certain technology over the other. Sulagna talks to company leaders, software engineers, SMEs and spokespeople to bring new research and insider perspective to her work. In her free time, Sulagna can be found spending time with her toddler, browsing a book or experimenting in the kitchen. Traveling and movies are other things that she is passionate about.

Articles by Sulagna Saha

Cisco Integrates Accedian into Crosswork to Deliver Uninterrupted Service Assurance

May 17, 2024

At the Tech Field Day Extra at Cisco Live EMEA 2024, Cisco demoed a solution that helps operators overcome these challenges consistently, and deliver flawless quality of service (QoS) to the users. Cisco taps into the capabilities of Crosswork and Accedian to provide teams managing massive-scale multivendor, multi-domain networks a freeway to automated network assurance. Sulagna Saha discusses in this article on Gestalt IT.

Cyber Insurance Premiums Rise Amid a Flurry of High-Profile Cyberattacks

May 16, 2024

In this Security Field Day article, Sulagna Saha discusses how high-profile cyberattacks have caused insurance premiums to rise significantly as discussed in the Delegate Roundtable recorded at the recent Security Field Day event. Tom Hollingsworth and the attending delegates discussed pricy premiums, the pains of cyber claims, and the market driving adoption of new technologies.

Dissecting Cloud Networking

May 15, 2024

At the recent Networking Field Day event, Tom Hollingsworth, Event Lead, and the panel of attending delegates, sat down to settle if cloud networking is just a misnomer for traditional networking, or is it a new discipline ready to take IT by storm. In this article, Sulagna Saha discusses how cloud networking differs from traditional networking.

Reflecting on a Half Year of AI Innovation | Utilizing Tech 06×12

May 6, 2024

We knew that 2024 would be the year of AI right from the start, but this season of the podcast has seen incredible development and change. This final episode of Utilizing Tech Season 6 features hosts Frederic Van Haren, Allyson Klein, and Stephen Foskett discussing the current state of AI infrastructure half-way through 2024.

Aryaka Launches Unified SASE Delivered as a Service

April 29, 2024

For the past fifteen years, Aryaka has built a robust network that provides reliable connectivity and guaranteed performance to businesses across continents. Now they have layered in security to provide a unified solution that delivers security-driven networking. In this Security Field Day article, Sulagna Saha discusses Aryaka’s Unified SASE as a Service.

Using AI in Modern Applications with Matthew Wallace | Utilizing Tech 06×10

April 22, 2024

As we consider the impact of AI on modern applications, we should consider the ways that this technology will improve these products. This episode of Utilizing Tech brings Matthew Wallace, CTO of Kamiwaza AI, to discuss the adoption of AI in application development with Allyson Klein and Stephen Foskett.

Zerto – Ransomware Protection through Data Isolation

April 18, 2024

Zerto is one of the companies in the cybersecurity front that is keeping the fight against ransomware going with increasingly sophisticated security solutions. At the recent Security Field Day event in Silicon Valley, the company showcased two solutions within the Zerto Platform that isolate and lock data from bad actors, making recovery swift and unfussy. In this Security Field Day article, Sulagna Saha discusses how Zerto is using data isolation to combat and protect against ransomware.

Go to Top