Your Network’s Edge: The RAD Way

In this episode of Your Network’s Edge: The RAD Way, we explore the evolving landscape of business cloud access and telco cloud services. We’ll look at the shift towards hybrid cloud architectures and the increasing demand for direct, managed access to cloud resources, driven by digital transformation and the burgeoning impact of AI.

The podcast discusses critical considerations for businesses accessing cloud services, including network performance monitoring, security, data sovereignty, and cost control, while also examining how telcos are adapting their networks to offer enhanced cloud connectivity. Furthermore, we share insights from a survey of telecom professionals, revealing their motivations for adopting telco cloud services and the growing importance of network edge clouds to meet the specific requirements of modern business applications.

Chapters
(00:00) Introduction – Hybrid Cloud & AI in Enterprise Connectivity
(01:05) Hybrid Cloud Basics & East–West Traffic Explained
(02:42) AI’s Impact on Data Traffic and Physical–Digital Convergence
(04:32) Bursty Traffic Patterns & The Need for Deterministic Performance
(06:00) Security, Data Sovereignty & End‑to‑End Observability
(07:30) Evolution of Connectivity – Internet, SD‑WAN & Secure Service Edge (SSE)
(09:10) Direct Cloud Access – Private, High‑Performance Connections
(11:15) Managing Performance – End‑to‑End Visibility and Troubleshooting
(12:28) Quantum‑Safe Encryption & The “Harvest Now, Decrypt Later” Threat
(14:00) DDoS in the Cloud Era – Layer 2 Connection Security Challenges
(15:08) AI‑Powered DDoS Detection and Mitigation
(16:00) Telco Survey Insights – Market Shifts & Strategic Directions
(17:20) Telco Competitive Edge – The Importance of the Network Edge
(18:15) Closing Summary & Future Outlook on AI‑Driven Connectivity

Follow RAD:
https://www.rad.com/
https://www.linkedin.com/company/rad-data-communications/ 
https://www.facebook.com/RAD.Data.Communications/ 
@RADdatacomms
https://www.youtube.com/@Raddatacom 

What is Your Network’s Edge: The RAD Way?

Welcome to Your Network’s Edge by RAD, where innovation meets connectivity. This podcast highlights how RAD’s technologies are empowering businesses and service providers. In every episode, we provide in-depth insights into the world of IoT, 5G, network Edge, and AI-powered networking, showcasing how RAD’s solutions empower service providers and critical infrastructure operators to stay ahead.

Whether you’re a communications service provider, an industrial IoT professional, or someone passionate about the tech driving modern connectivity, this podcast offers valuable perspectives. Tune in to discover how RAD’s customer-centric approach and market-leading solutions are redefining networking for a connected world.

[Unknown Speaker A] Welcome to the deep dive. Today we're uh diving head first into how businesses are connecting to the cloud. And maybe more importantly, why those, you know, invisible threads of telecommunication networks are now more critical than ever before. We're seeing this fundamental reshaping really of enterprise connectivity. It's driven by relentless digital transformation and well, let's face it, the huge rise of AI.

[Unknown Speaker B] Exactly. And this deep dive is really all about understanding the powerful, um, managed carrier networks underneath it all. The ones providing that essential access to these crucial cloud services. We'll explore the new challenges, sure, but also the incredible opportunities this brings for businesses and for the Telcos connecting them. And to help us navigate this uh rapidly changing landscape, we'll be drawing on some unique insights from a recent independent survey. It focuses specifically on Telco cloud access.

[Unknown Speaker A] Right. Our mission today is simple. Cut through the jargon, reveal the key trends, the challenges, some are pretty complex, and also some genuinely innovative solutions emerging in this vital area. We want to help you get well informed quickly. You know, those aha moments that just make sense of it all. Okay, so, to really grasp this evolving landscape, we have to start with, well, the cornerstone of modern business connectivity, the hybrid cloud.

[Unknown Speaker B] It's become the de facto standard, hasn't it? It's no longer just about using one public cloud or, you know, sticking only to your own private data center. Instead, you're seeing businesses strategically spreading their applications, their data, which is precious, and their compute resources across multiple public clouds, private clouds, and yes, still their own private data centers. It's a truly distributed digital footprint.

[Unknown Speaker A] And this, well, this has profound implications for the Telco network. Essentially, the Telco network is now inheriting what used to be kind of confined within a data center network. This leads to entirely new traffic paradigms. Like we're seeing a significant jump in what's called east-west traffic. East-west traffic. Okay, explain that a bit.

[Unknown Speaker B] Think of it like this. Traditional north-south traffic is data moving in and out of your main data center or maybe a cloud.

[Unknown Speaker A] Right.

[Unknown Speaker B] East-west is data moving sideways. So from one application to another within the cloud or maybe even between different clouds or regions, it's like the internal chatter between systems and it's exploding as apps become more distributed.

[Unknown Speaker A] Got it. So it's not just about getting to the cloud anymore.

[Unknown Speaker B] Exactly. It means Telcos are connecting not just business sites to the cloud, but increasingly data center sites to cloud locations as well to enable that critical intercloud communication.

[Unknown Speaker A] Okay, we've talked hybrid cloud implications, but what happens when you throw AI into this mix? I mean, how does that specifically amplify these network demands? What does it mean for data traffic?

[Unknown Speaker B] Oh, it's a massive multiplier. A huge one. The entire AI life cycle, right? From collecting raw data to model training and then that continuous inferencing.

[Unknown Speaker A] Yeah.

[Unknown Speaker B] It introduces even more of this east-west traffic. And if you connect that to the broader picture of digital transformation, well, it's really about capturing physical spaces.

[Unknown Speaker A] Physical spaces? Like what?

[Unknown Speaker B] Think of a manufacturing workshop floor or complex hospital operations and bringing them into the digital realm. This happens using, you know, tons of IoT sensors, cameras constantly streaming video, machines reporting operational data.

[Unknown Speaker A] Uh-huh.

[Unknown Speaker B] All that stuff. Then AI takes this digital picture and reasons feedback back to the physical world, creating this incredibly powerful closed loop system.

[Unknown Speaker A] Wow.

[Unknown Speaker B] And this dynamic, as you can probably imagine, is driving just exponential data growth across the network.

[Unknown Speaker A] And we're talking specific use cases here that really push the network, aren't we? There's the whole life cycle of distributed data, things like uh migration, sync, backup, recovery, all happening constantly across these different cloud locations. Then you've got access to elastic compute. Imagine a business suddenly needing to burst to cloud compute for peak loads or maybe accessing remote GPUs for special tasks. And this is of course profoundly affected by AI, which demands just massive on-demand processing power. And that brings us to the AI life cycle itself. Huge data ingestion from devices, sensors, cameras, you've got federated training, distributed training, even augmented generation pulling data from remote LLMs.

[Unknown Speaker B] Yeah, and what's fascinating here is how these new use cases dictate new characteristics for the data traffic itself. For example, AI training can mean these massive bursts of data running for hours straight, followed by periods of, well, relative calm, very bursty.

[Unknown Speaker A] Right, unpredictable.

[Unknown Speaker B] Exactly. And we're also seeing more upstream traffic. Think endpoints sending continuous video streams up for AI analysis. All of this demands a critical new requirement, deterministic performance.

[Unknown Speaker A] Deterministic performance. Okay, that sounds important. What does it really mean in practice?

[Unknown Speaker B] Imagine say a real-time medical procedure being guided remotely or maybe an autonomous vehicle reacting to its environment. A tiny unpredictable delay or a dropped packet, it could be catastrophic. Deterministic performance ensures data arrives not just quickly, but consistently within precise guaranteed time frames. It makes the network behave less like a best effort public road and more like a precisely timed dedicated railway line.

[Unknown Speaker A] Ah, okay. That makes sense. Predictability is key.

[Unknown Speaker B] It's a level of network predictability that, you know, used to be reserved only for mission critical industrial systems.

[Unknown Speaker A] Yeah.

[Unknown Speaker B] But now is becoming expected for everyday business operations.

[Unknown Speaker A] So, okay, we've established this critical need for deterministic performance, but what other non-negotiables are businesses really pushing for in this new cloud era? What else is top of mind?

[Unknown Speaker B] Well, security is always, always a primary concern. That hasn't changed. But increasingly, because of things like data sovereignty and privacy regulations, businesses now deeply desire to control the movement of their data.

[Unknown Speaker A] Uh, right. GDPR and things like that.

[Unknown Speaker B] Exactly. This isn't just about ticking a compliance box. It's a significant new focus on having granular control over where data resides and where it travels. They also want end-to-end observability. They need to see what's happening across this whole distributed hybrid cloud network so they can quickly troubleshoot problems. It's about gaining clear visibility into what's become a very complex environment.

[Unknown Speaker A] Makes sense. And what we're also hearing, I think, is that businesses want these services, networking included, delivered as a service, available on demand, you know, much like how they consume cloud compute today.

[Unknown Speaker B] Yes, that flexibility is key.

[Unknown Speaker A] And crucially, they absolutely want the ability to control and hopefully optimize what can become really complex network and cloud service costs. Because let's be honest, cloud network services, they are not cheap. Those costs can quickly spiral if you're not managing them properly.

[Unknown Speaker B] Definitely. Cost control is a huge factor.

[Unknown Speaker A] Okay, so maybe let's trace the journey of cloud connectivity for a moment. Where did this all start?

[Unknown Speaker B] It really began with the internet providing just, you know, universal access. And for a long time that was kind of enough. Then as businesses adopted more cloud services, SD-WAN solutions emerged.

[Unknown Speaker A] Right, SD-WAN came along.

[Unknown Speaker B] These were designed to enhance performance and reliability over regular broadband in the internet. They brought things like automation, better observability, service awareness. It was like upgrading from, I don't know, a local road to a slightly more optimized highway maybe.

[Unknown Speaker A] Yeah, that's a good analogy. And that evolution continued, didn't it? SD-WAN was joined by Secure Service Edge or SSE. This was a major shift, moving the security perimeter itself from individual business sites to a cloud hosted location.

[Unknown Speaker B] Why was that so important?

[Unknown Speaker A] Well, it was essential for adhering to that multi-hyper cloud architecture we talked about and also supporting the growing number of remote workers needing secure access from anywhere. It basically acknowledged that the old castle and mode security model just didn't work anymore when your castle was effectively everywhere.

[Unknown Speaker B] Right, the perimeter dissolved. Okay.

[Unknown Speaker A] And this brings us then to the next major step, direct cloud access. We're now seeing businesses actively looking for direct cloud access with, you know, the utmost performance and crucially that deterministic performance we discussed earlier. So what exactly is direct cloud access? How does it differ fundamentally from say just an enhanced SD-WAN connection over the public internet?

[Unknown Speaker B] Okay, so direct cloud access offers truly private, dedicated access. It's established directly between your network and the cloud provider's network. Critically, it bypasses the public internet altogether.

[Unknown Speaker A] Bypasses the internet. Okay.

[Unknown Speaker B] Think of it like having your own dedicated secure express lane directly into the cloud provider's data center instead of using that shared public highway with everyone else. It's often called things like direct connect or express road by the hyperscalers.

[Unknown Speaker A] Ah, I've heard those terms.

[Unknown Speaker B] Right. And this service gives you private access over the Telco network, not just to your private business workloads in the cloud, but also to public cloud resources like specialized storage or high performance GPUs. It's implemented in a couple of main ways. Either the Telco can host its own demarcation device, basically a specialized network box right at the hyperscaler location.

[Unknown Speaker A] Okay.

[Unknown Speaker B] That marks the boundary where the Telco network connects directly into the hyperscaler's infrastructure. It aggregates traffic from different business sites to offer one unified direct cloud connect service. Or, alternatively, the business customer might host their own router at the hyperscaler location and then use a layer three or maybe a layer two VPN service provided by the Telco to get that access.

[Unknown Speaker A] Got it. But the key takeaway here, and it seems like a really critical one, is that in both scenarios, the access network bypasses the internet entirely. So this provides a fully managed private access service. It ensures the required performance levels are met and importantly gives businesses that precise control over data movement, unlike traffic just flowing over the public internet. It's about taking that variability out of the equation.

[Unknown Speaker B] Precisely. And this managed underlay based access, it's being further enhanced now for better observability and troubleshooting. Solutions are now providing end-to-end service aware observability. They do this by dividing the connectivity into three distinct domains: the local area network, the direct cloud access link itself, and then the cloud domain on the other side.

[Unknown Speaker A] How do they do that?

[Unknown Speaker B] It's typically achieved by intelligently collecting and analyzing traffic samples at key points. This gives you a clear, granular picture of performance across that entire chain. So you can pinpoint exactly where a problem might be rather than just knowing, you know, something is slow somewhere.

[Unknown Speaker A] That level of visibility must be invaluable. Okay, moving to another critical area. Let's revisit SSE, that Secure Service Edge as the sort of de facto security architecture. We talked about how all business traffic gets on-ramped through this cloud hosted security perimeter, applying zero trust principles, other cloud access security measures. But what else is on the horizon? Especially when we think about really future proofing our data security?

[Unknown Speaker B] Well, something that's truly fascinating and frankly quite unsettling is the emerging discussion around quantum safe encryption.

[Unknown Speaker A] Quantum safe encryption. Okay.

[Unknown Speaker B] The risk is very real. Quantum computers are developing incredibly rapidly. Soon they'll likely be available as a service from cloud providers. And these machines could potentially break common network encryption methods we rely on today, things like RSA based IPsec, Macsec, MQTT TLS, potentially in a matter of hours.

[Unknown Speaker A] Hours? Wow.

[Unknown Speaker B] Yeah. And this isn't just a problem for, you know, some distant future. Hackers are already thought to be employing harvest now decrypt later attacks.

[Unknown Speaker A] Harvest now decrypt later. What's that?

[Unknown Speaker B] They're storing encrypted data today with the full intent to decrypt it in say three to five years when quantum computers become more common and powerful enough. This means your critical business data harvested today could be completely compromised down the line.

[Unknown Speaker A] That's genuinely chilling. So what does this mean for, you know, the average business with sensitive data? What can they even do?

[Unknown Speaker B] Well, carriers are already looking into upgrading their infrastructure to be quantum safe. And they're starting to offer quantum safe encryption services to businesses, often through solutions like post quantum Macsec. What this signals really is that businesses need to start thinking about crypto agility.

[Unknown Speaker A] Crypto agility?

[Unknown Speaker B] Yeah, designing their systems so they can easily swap out encryption methods as new quantum safe standards emerge rather than, you know, waiting for some kind of quantum computing Y2K moment to hit.

[Unknown Speaker A] That harvest now decrypt later concept is really unsettling. Paints a stark picture of proactive attackers.

[Unknown Speaker B] Okay, but shifting to another cloud security risk, one that's maybe more immediate for many, DDoS attacks. Distributed denial of service. Cloud connectivity offers huge benefits, sure, but it can also be leveraged for attacks targeting business sites, right?

[Unknown Speaker A] Mhm.

[Unknown Speaker B] How are carriers adapting to mitigate that threat?

[Unknown Speaker A] Yeah, this presents a significant challenge because those traditional DDoS scrubbing centers, they kind of become irrelevant for certain types of cloud access, especially layer two direct cloud access services.

[Unknown Speaker B] Why irrelevant?

[Unknown Speaker A] Well, imagine traditional scrubbing centers like a big detour system. They divert all your traffic to a security checkpoint, clean it up and send it back. That works okay for layer three internet traffic where data gets routed like mail with an address. But with direct cloud access, which often operates at layer two, it's more like a private sealed tunnel directly to the cloud. There's no easy detour point built in.

[Unknown Speaker B] Oh, okay. So the old security checkpoint can't easily intercept the traffic in that private tunnel.

[Unknown Speaker A] Exactly. It means Telcos need new, smarter ways to spot and stop attacks within that private tunnel itself. So the augmentation solution being offered now involves collecting traffic samples directly from the network devices within that path and then applying AI based threat intelligence to detect and mitigate these DDoS attacks. It's effectively adapting security to the specific nature of these layer two direct cloud connections.

[Unknown Speaker B] AI fighting AI in a sense. Okay, given everything we've discussed, the demands, the challenges, these new solutions, it really begs the question, what are the Telcos themselves actually seeing and planning? We've got some really illuminating insights here from that recent independent survey we mentioned, 250 senior telecom pros, tier one Telcos across North America, Europe, Asia Pacific. It gives us a great pulse on where the industry sees itself heading.

[Unknown Speaker A] Indeed. And we looked at their motivations for operating a Telco cloud in the first place. Roughly 24% are primarily focused on strengthening their own infrastructure, using virtual networking, hosting virtual network functions, that sort of thing. A larger group, 29%, plan to offer managed services, especially data services, clearly aiming to move up the value chain beyond just connectivity.

[Unknown Speaker B] Makes sense, offering more value.

[Unknown Speaker A] Then you have 25% who are evolving to become network edge cloud providers for their business customers. And another 22% are focused on hosting third-party providers on their infrastructure.

[Unknown Speaker B] So it shows a diverse set of strategies, doesn't it?

[Unknown Speaker A] It does. But the underlying insight, I think, is that Telcos are now battling for different pieces of the overall cloud pie. Some are doubling down on foundational infrastructure, others aiming for those higher value managed services, and a significant portion are pivoting to become the edge itself. This isn't just about offering cloud access. It feels like they're redefining their core business model for the digital age. That is a powerful shift in their identity. So building on that, why do Telcos believe businesses will actually choose their Telco cloud services over say going straight to a hyperscaler or using other options? What's their perceived competitive edge?

[Unknown Speaker B] Well, about 19% cited access to managed services as the key driver. Another 26% mentioned attractive pricing bundles, you know, combining network security and cloud. But here's where it gets really interesting. A significant 55%, over half, believe their physical location at the network edge is a key differentiator.

[Unknown Speaker A] Edge location itself.

[Unknown Speaker B] Yes. They see it as enabling that managed access with lower latency by bypassing the internet, which, as we've discussed, is a huge deal for deterministic performance. And crucially, 42% believe that rising AI demands will inevitably shift business workloads from on-premise servers to the Telco edge cloud. Why? Because businesses will see scalable resources closer to their actual premises.

[Unknown Speaker A] That's a compelling vision. Telcos becoming this new hyper local extension of the cloud. That 55% figure really underscores the strategic importance of the edge for Telcos. Okay, so looking at the flip side, what are the current managed access methods businesses are actually using today according to this survey? What does the data show?

[Unknown Speaker B] Right, looking at the current methods, the survey data shows 62% are using direct cloud access already. 59% are using third-party SD-WAN services and 34% are opting for their service provider's managed SD-WAN offering. Additionally, 40% are still using traditional layer two and layer three VPNs.

[Unknown Speaker A] So quite a mix still.

[Unknown Speaker B] A definite mix. But what's truly fascinating here is that among those still using layer 23 VPNs, a notable 21%, about one in five, are already recognizing the importance of deterministic networking. They're specifically citing the need to bound latency and jitter for their Telco cloud access.

[Unknown Speaker A] Even with older VPN tech, they see the need.

[Unknown Speaker B] Yes. It highlights this growing awareness of these really stringent performance requirements. It indicates the market isn't just asking for better networks anymore. It's demanding a level of precision that again was once only reserved for very specific mission critical systems. It's like a silent signal that the future of enterprise applications is just inherently tied to network predictability.

[Unknown Speaker A] And it all loops back, doesn't it? Back to what we started with. Digital transformation, the rise of immersive applications like VR and AR. These truly demand those deterministic networks, you know, low loss, bounded latency, bounded jitter particularly right there at the Telco edge to really function effectively, to come alive. Okay, so, to quickly recap our deep dive today, we've explored the really significant shift towards hybrid cloud architectures. We've seen the profound and growing impact of AI on network traffic patterns and the escalating demands from businesses for both robust security and that granular control over data movement. We've also seen how Telcos are actively responding to these challenges with innovative solutions like direct cloud access and by strategically positioning themselves with edge cloud services. They're effectively reinventing their role in this whole digital ecosystem.

[Unknown Speaker B] Yeah, and as we always try to emphasize, knowledge is really most valuable when it's understood and then applied. Consider how this evolving network infrastructure isn't just, you know, a technical upgrade. It's a fundamental enabler for the next wave of digital innovation. We're talking about everything from highly efficient industrial IoT deployments to truly immersive VR and AR experiences. They're poised to reshape entire industries and how we all interact with technology.

[Unknown Speaker A] Which brings us to a final provocative thought for you, our listeners, to consider. With this increasing convergence of the physical and digital worlds and this really urgent looming need for quantum safe encryption, how might businesses need to rethink their entire data strategy? Not just their network, but their whole approach to data to truly future proof their operations in a world that's going to be increasingly driven by AI and ubiquitous high performance connectivity. Something to mull over.