{"id":51673,"date":"2023-04-28T11:02:00","date_gmt":"2023-04-28T11:02:00","guid":{"rendered":"https:\/\/www.networkworld.com\/article\/3694870\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth.html#tk.rss_security"},"modified":"2023-04-28T11:02:00","modified_gmt":"2023-04-28T11:02:00","slug":"aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/","title":{"rendered":"Aruba banks on integrated security, AI, NaaS for enterprise growth"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/06\/23\/10\/group-of-executives_collaborate_board-room_board_mentor_advisory-board_colleagues_networking_by-alphaspirit-getty-images-2400x1600-100818573-large-100929428-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>Security, AI, and <a href=\"https:\/\/www.networkworld.com\/article\/3599213\/what-are-data-centers-how-they-work-and-how-they-are-changing-in-size-and-scope.html\">network-as-a-service (NaaS)<\/a> were top of mind for Aruba Networks execs at their Atmosphere customer conference this week.<\/p>\n<p>\u201cTen years ago for most network operators their main job was making sure connectivity was reliable and security was someone else\u2019s problem. It was outside their perimeter,&#8221; said David Hughes, senior vice president, chief product and technology officer with Aruba. &#8220;But today all perimeters have dissolved and the network has expanded,\u201d .<\/p>\n<p>\u201cThe networking team is now responsible for making sure connectivity is secure from the start. Bolting it on somewhere won\u2019t cut it anymore, it needs to be built into the network,\u201d Hughes said.<\/p>\n<p>Aruba has made a number of moves to further its integrated security\/networking strategy including its recent buy and integration of Axis Security and its security service edge (SSE) platform with Aruba&#8217;s SD-WAN and SASE offerings.<\/p>\n<p>This so-called <a href=\"https:\/\/www.networkworld.com\/article\/3686538\/enterprises-turn-to-single-vendor-sase-for-ease-of-manageability.html\">single vendor SASE<\/a> offering brings networking and security technologies all together gives businesses &nbsp;the role-based control &nbsp;they need to protect people everywhere, accessing applications anywhere, Hughes said.<\/p>\n<p>The <a href=\"https:\/\/www.networkworld.com\/article\/3599213\/what-are-data-centers-how-they-work-and-how-they-are-changing-in-size-and-scope.html\">data center<\/a> is another area Aruba is focusing on with integrated security with its &nbsp;CX 10000 switch, a top-of-rack, L2\/3 data-center box. It includes an integrated programmable data processing unit (DPU) support that supports L4-L7 stateful software services including firewall, DDoS, encryption, network address translation, load balancing, network telemetry, and automation that can be applied to protect widely distributed workloads.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>\u201cIn the data center, where operators used to only be worried about north-south traffic and having a firewall to control what comes in and out of the data center has changed,\u201d Hughes said. \u201cOrganizations want to implement much tighter control and segmentation for east-west traffic. So if you have a bunch of containers, you really want them to have very limited access to data-center resources. Being able to segment and secure that traffic is a big requirement and that is efficiently handled by the 10k.\u201d<\/p>\n<p>AI was also a big part of the discussion at Atmosphere in part because the vendor <a href=\"https:\/\/www.networkworld.com\/article\/3694648\/aruba-introduces-a-simplified-naas-offering.html\">enhanced its Aruba Central<\/a> management platform with AIops and other new visibility features.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>For example, the company has added a more visual interface and intelligent-assurance indicators that alert admins of network and device problems in real time. The metrics are derived from correlating access, LAN, servicies, WAN, and application data to improve visibility and reporting capabilities.<\/p>\n<p>New AIops features that help operators more quickly discover problems and fix them. \u201cWith the amount of data we can now gather from the network and user experience we can better use it to feed AI models and to help customers identify clusters of error signs and in some cases, the these things can be insights or suggestions to the operator of how things could adapt or change to get better outcomes,\u201d Hughes said.&nbsp; \u201cWhat we are seeing is that customers are getting more comfortable with the system delivering automated remediation or closed-loop operations.\u201d<\/p>\n<p>\u201cWhat Aruba has is a ton of data scientists that continually working with the data that the system collects and try to figure out what insights can we automate better? How do we help our customers find the needle in the haystack?,\u201d Hughes said.<\/p>\n<p>Hughes also talked about generative AI,&nbsp; ChatGBT.&nbsp;<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>\u201cObviously, that kind of natural language processing is something that matters. So we use natural language processing in our kind of main query bar, so when someone wants to do something they can ask in plain English,\u201d Hughes said \u201cNatural language interfaces are going to become more and more prevalent. And the ability to process things like support cases and reducing trouble tickets, and feeding into those natural language interfaces, that&#8217;s also going to be something of a game changer going forwards.\u201d<\/p>\n<p>Another area Hughes expects will grow substantially this year is the use of network-as-a-service (NaaS). In <a href=\"https:\/\/blogs.arubanetworks.com\/corporate\/top-6-networking-predictions-for-2023\/\" rel=\"nofollow\">a blog earlier this year&nbsp;<\/a>Hughes wrote that by the end of 2023, he expected that 20% of organizations will have adopted a NaaS strategy. That would enable IT to accelerate network modernization yet stay within budget, IT resources, and schedule constraints, Hughes wrote.<\/p>\n<p>At Atmosphere, Aruba rolled out Agile <a href=\"https:\/\/www.networkworld.com\/article\/3624637\/what-is-network-as-a-service-naas.html\">NaaS<\/a>, aimed at streamlining the process of choosing network infrastructure components available through the service to better fit customers\u2019 business needs. The idea with Agile NaaS is to include design and development tools customers can use to plan a network project up front and then offers a range of acquisition, deployment, and management models to build it out.<\/p>\n<p>\u201cWhat we&#8217;ve heard from customers about NaaS &nbsp;is they want flexibility and agility, and it&#8217;s not one size fits all,\u201d Hughes said. \u201cAnd so you have situations like someone that wants to pay all upfront, but they&#8217;d love someone to manage it for them or someone that wants to pay over time, but they want to control everything very tightly themselves.\u201d&nbsp;<\/p>\n<aside class=\"nativo-promo nativo-promo-3 tablet desktop smartphone\" id> <\/aside>\n<p>\u201cWhat we do is provide a toolkit for our customers and our partners so that they can choose which pieces they want to kind of build their NaaS service,\u201d Hughes said.<\/p>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">\n<p> <strong>Next read this:<\/strong> <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3694870\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nSecurity, AI, and network-as-a-service (NaaS) were top of mind for Aruba Networks execs at their Atmosphere customer conference this week.\u201cTen years ago for most network operators their main job was making sure connectivity was reliable and security was someone else\u2019s problem. It was outside their perimeter,&#8221; said David Hughes, senior vice president, chief product and technology officer with Aruba. &#8220;But today all perimeters have dissolved and the network has expanded,\u201d .\u201cThe networking team is now responsible for making sure connectivity is secure from the start. Bolting it on somewhere won\u2019t cut it anymore, it needs to be built into the network,\u201d Hughes said.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51674,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[9458,1061],"class_list":["post-51673","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-network-management-software","tag-network-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Aruba banks on integrated security, AI, NaaS for enterprise growth 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Aruba banks on integrated security, AI, NaaS for enterprise growth 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-28T11:02:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/06\/23\/10\/group-of-executives_collaborate_board-room_board_mentor_advisory-board_colleagues_networking_by-alphaspirit-getty-images-2400x1600-100818573-large-100929428-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Aruba banks on integrated security, AI, NaaS for enterprise growth\",\"datePublished\":\"2023-04-28T11:02:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\\\/\"},\"wordCount\":860,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth.jpg\",\"keywords\":[\"Network Management Software\",\"Network Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\\\/\",\"name\":\"Aruba banks on integrated security, AI, NaaS for enterprise growth 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth.jpg\",\"datePublished\":\"2023-04-28T11:02:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth.jpg\",\"width\":150,\"height\":100},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Management Software\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/network-management-software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Aruba banks on integrated security, AI, NaaS for enterprise growth\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Aruba banks on integrated security, AI, NaaS for enterprise growth 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/","og_locale":"en_US","og_type":"article","og_title":"Aruba banks on integrated security, AI, NaaS for enterprise growth 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-04-28T11:02:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/06\/23\/10\/group-of-executives_collaborate_board-room_board_mentor_advisory-board_colleagues_networking_by-alphaspirit-getty-images-2400x1600-100818573-large-100929428-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Aruba banks on integrated security, AI, NaaS for enterprise growth","datePublished":"2023-04-28T11:02:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/"},"wordCount":860,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth.jpg","keywords":["Network Management Software","Network Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/","url":"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/","name":"Aruba banks on integrated security, AI, NaaS for enterprise growth 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth.jpg","datePublished":"2023-04-28T11:02:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth.jpg","width":150,"height":100},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/aruba-banks-on-integrated-security-ai-naas-for-enterprise-growth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Network Management Software","item":"https:\/\/www.threatshub.org\/blog\/tag\/network-management-software\/"},{"@type":"ListItem","position":3,"name":"Aruba banks on integrated security, AI, NaaS for enterprise growth"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51673"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51673\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51674"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}