Navigating the technical challenges of cloud.microsoft

Navigating the technical challenges of cloud.microsoft

Transitioning to cloud.microsoft is not just a superficial change; it requires intrinsic technical adjustments that may affect your network’s security and performance. So, according to CACI’s network security experts, what are the technical challenges that may arise with this transition and what solutions are available to businesses to ease it? 

Identifying & resolving the technical challenges

  • DNS configuration and management: Transitioning to a unified domain requires meticulous DNS configuration. Therefore, you must ensure your DNS settings are correctly aligned with the new domain structure for uninterrupted access to Microsoft 365 services. This involves updating DNS records, modifying conditional forwarders, checking root hints, or even changing DNS resolvers in your network to cope with the new .microsoft root TLD and correctly route all subdomains.
  • Proxy and firewall adjustments: Adjustments to proxy settings and firewall rules are necessary with the new domain. This includes updating allow-lists and ensuring traffic to and from cloud.microsoft is filtered and monitored correctly. Implementing robust proxy configurations will be necessary to maintain secure and efficient access to Microsoft 365 services through the transition period.
  • Code and API integrations: The unified domain offers a more streamlined approach for businesses leveraging custom API integrations with Microsoft 365. Ensuring that all scripts, code, API gateway and native API calls are updated to reflect the new domain is essential for maintaining functionality and security in any collaboration integrations.
  • Security protocols and compliance: The cloud.microsoft domain’s enhanced security features necessitate a thorough review of your existing security protocols. This might include implementing advanced threat protection, ensuring compliance with industry standards and leveraging Microsoft’s security tools to monitor and mitigate potential threats. 

Challenges and solutions

  • Firewall reconfiguration: Shifting to a new domain will cause existing firewall rules and policies to be updated, which can be a complex and lengthy process, particularly for large organisations with extensive firewall configurations. CACI can assist by conducting a thorough audit of your current firewall settings with our Firewall Optimisation Assessment, identifying necessary changes and implementing these updates to ensure seamless access to Microsoft 365 services.
  • Proxy PAC file updates: Proxy Auto-Configuration (PAC) file logic will need to be updated to reflect the new domain, which involves modifying the scripts that determine how web browsers and other user agents can automatically select the appropriate proxy server. CACI’s NetDevOps experts can help rewrite, optimise and test these PAC files to ensure they are correctly configured, minimising disruptions to your 365 network traffic.
  • DNS reconfiguration: Updating DNS settings to accommodate the new domain structure will be critical. This includes modifying DNS records, resolver chains, forward lookup zones and conditional forwarders to manage the new subdomain and root TLD routing. CACI can provide comprehensive DNS management and optimisation services, ensuring that all changes are correctly implemented and that your DNS infrastructure remains secure and efficient.
  • Network infrastructure adjustments: Beyond firewalls and proxies, other network infrastructure components such as load balancers, VPNs, SDCI (ExpressRoute) and intrusion detection systems may also require reconfiguration. CACI’s team of expert network security engineers can assess your entire network setup, identify areas that need adjustment and implement the necessary changes to ensure compatibility with the cloud.microsoft domain.
  • Compliance and security: Adhering to industry standards and compliance regulations will be paramount for your network. The transition to cloud.microsoft offers enhanced security features, but these must be properly configured and monitored. CACI can help you leverage these security enhancements, implement advanced threat protection measures and ensure that your network remains compliant with all relevant regulations. 

How CACI can help

As a trusted advisor with deep network and security expertise across sectors from finance, through telco, media, and government, CACI is uniquely positioned to help your business leverage the full potential of Microsoft 365 and the new cloud.microsoft domain.  With over 20 years of experience in cloud services and a deep understanding of Microsoft technologies, CACI can provide tailored solutions that meet your specific business needs. Our team of experts will ensure a smooth transition to the cloud.microsoft domain, minimising disruptions and maximising efficiency. 

CACI offers a comprehensive range of services, from initial consultation to ongoing support, ensuring you get the most from your Microsoft 365 investment. Our Managed Network Services help maintain your network and security, all while prioritising compliance and utilising the enhanced security features of the cloud.microsoft domain. Book a consultation with us today to discover how CACI can support help your organisation navigate the  Microsoft system change requirements here. 

Introduction to Enterprise Architecture and Process Modelling

Introduction to Enterprise Architecture and Process Modelling

This blog is the first part of a two-part series exploring the roles of Enterprise Architecture and Process Modeling in ensuring compliance with security standards. You can find part two of this series here.

In today’s highly regulated business environment, organisations are increasingly required to demonstrate their adherence to strict information security standards. Compliance audits, whether for regulatory frameworks such as GDPR, HIPAA or ISO/IEC 27001, require a detailed understanding and documentation of an organisation’s processes and systems.

Enterprise Architecture (EA) and Process Modelling (PM) play pivotal roles in ensuring that organisations are well-prepared for these audits. In this blog series, the roles and key benefits of using EA and PM to streamline and enhance the process of achieving information security compliance will be uncovered, along with recommendations for organisations that are in the process of adopting and integrating them.

Information security compliance is critical for organisations to protect sensitive data, maintain customer trust and avoid legal penalties. Preparing for a compliance audit can be daunting, requiring comprehensive documentation, risk assessments and evidence of control implementations. Enterprise Architecture and Process Modelling provide systematic approaches to managing these complexities, ensuring that organisations are not only compliant, but also agile in responding to evolving security requirements.

What is Enterprise Architecture (EA)?

Enterprise Architecture (EA) is a strategic methodology aimed at defining and standardising the structure, operations and governance of an organisation. EA offers a comprehensive perspective on an organisation’s processes, information systems, technologies, and their interrelationships. This holistic view is instrumental in aligning IT strategies with business objectives, ensuring that technological initiatives support and enhance the overall goals of the organisation.

What is Process Modelling (PM)?

Process Modelling entails the creation of detailed representations of an organisation’s processes. These models are utilised to visualise, analyse, and optimise business processes, thereby facilitating the identification of inefficiencies, bottlenecks and risks. Within the realm of information security, process models are invaluable for understanding how data flows through an organisation, pinpointing potential vulnerabilities, and determining how security controls are implemented.

Conclusion

The integration of Enterprise Architecture (EA) and Process Modelling (PM) is essential for organisations looking to meet stringent information security compliance standards. As the regulatory landscape continues to evolve, these frameworks not only facilitate a thorough understanding of an organisation’s processes and systems but also enhance agility in adapting to new security requirements.

By leveraging EA and PM, organisations can streamline their compliance efforts, ensuring comprehensive documentation and effective risk management. Ultimately, this proactive approach not only safeguards sensitive data and maintains customer trust but also positions organisations to thrive in a complex regulatory environment. Embracing these methodologies will empower organisations to navigate compliance audits with confidence and resilience, paving the way for sustainable success in the digital age.

If you would like to find out about Enterprise Architecture and Process Modelling, you can do so here in my latest whitepaper. You can also reach out to our experts at moodenquiries@caci.co.uk if you would like to discuss how Mood can help your organisation’s requirements.

How a Digital Twin of an Organisation (DTO) leads to continuous improvement

How a Digital Twin of an Organisation (DTO) leads to continuous improvement

Businesses face ongoing challenges when it comes to inefficient, outdated processes that are difficult to monitor and improve. These inefficiencies result in higher operational costs, slower delivery times and bottlenecks that impact productivity and stakeholder and customer satisfaction. Tracking performance across large and complex organisations can also be challenging, especially when data is scattered and out of date. Traditional performance management approaches are often reactive as well, relying on historical data rather than providing real-time insights. This lack of timely, actionable information makes it difficult to drive continuous improvement and optimise performance across departments. 

So, how does a platform like Mood help organisations enhance their operational processes and performance monitoring capabilities? 

How to enhance operational processes to lead to continuous improvement

When effectively executed, optimised operational processes can have a tremendous impact on an organisation. Organisations need a comprehensive, real-time view of performance across all levels of the business. Therefore, optimising processes requires real-time visibility, the ability to continuously monitor workflows and the relevant tools to identify and resolve inefficiencies. By visualising end-to-end processes and integrating performance data, businesses can drive continuous improvement, reduce costs and enhance service delivery. Integrating performance metrics with live operational data and visualising results in an accessible way will also enable businesses to identify areas for improvement, implement changes quickly and continuously monitor their impact.  

What difference will optimising processes for continuous improvement make for an organisation?

Optimised processes lead to faster operations, lower costs and a more agile organisation. Continuous improvement becomes a core capability, allowing businesses to remain competitive and quickly adapt to change. The nature of DTOs real-time performance monitoring will also lead to faster, data-driven decision-making and more effective continuous improvement initiatives. As a result, an organisation will become more efficient, agile and aligned with strategic goals. This approach will also establish a culture of innovation and an openness to learning across the wider business. 

How Mood helps optimise operational processes for continuous improvement

Mood provides a non-technical, dynamic platform with everything a business needs to create and manage a Digital Twin of an Organisation, providing real-time visibility into every aspect of the process and integrates real-time performance metrics across processes, systems and departments. With integrated analytics and predictive insights, Mood helps identify inefficiencies and enables continuous process optimisation. By modelling potential improvements and implementing changes seamlessly, it also drives operational excellence and ongoing process improvement across the organisation. 

Its customisable dashboards and analytics allow stakeholders to monitor performance in real time and identify areas for improvement. By linking these insights to the broader enterprise architecture and strategic objectives, continuous improvement initiatives will always be aligned with long-term business goals, driving consistent operational excellence. 

To learn more about how Mood can transform your business, speak to one of our experts directly. 

 

Why effective project prioritisation in consultancy is crucial

Why effective project prioritisation in consultancy is crucial

When it comes to consultancy, project prioritisation is critical so that customers receive urgent or important work first before less vital items. In straightforward projects with one product owner and a finite backlog, you can approach this issue by working through the backlog and asking them to label them using MoSCoW, the prioritisation technique used in project management and business analysis to help stakeholders understand the importance of various requirements, for example.It’s when you move to a project with multiple product owners and an ever extending backlog that the problems appear, however.  

So, what are the common project prioritisation challenges arising in consultancy nowadays and what solutions are available to consultants to solve them? 

Common challenges in consultancy around project prioritisation

Within each project, each stakeholder (this could be from multiple products, multiple product owners or stakeholders without a product owner) will bring their own backlog, each believing that their demands are the most important and that all your resources are theirs to use. Negotiating between these product owners can be difficult, especially as they may have their own deadlines that they’ve committed to, perhaps only needing your resources for part of their project and a delay could cause their entire project not being delivered on time.  

While earlier and clearer communication would undoubtedly help with these issues in the long run, where do consultants start in the meantime? 

How consultants can improve project prioritisation

Consultants that refer to a categorical prioritisation list for each project (such as the example below) will notice immediate and significant improvements. By scoring each project against a list of categories, with the resulting score used to order the backlog and any incoming items, their respective priority and importance will be illustrated to the wider business.  The category list is:  

Once a project has been scored on each of these points, the total score is calculated. This is then used to rank projects against each other. It’s important to reassess the time rating approximately every three months, as this rating will need to be increased to reflect the real-world situation.  

Benefits of this approach

The advantage of adopting this approach is that it enables you to provide an explanation as to why certain projects are higher priority than others rather than using a more subjective approach. It’s possible to add a higher rating to categories so that the calculation better represents the company’s priorities.  

Potential difficulties of this approach

Some of the issues we’ve noticed so far are that these categories don’t necessarily work as well for enabling items such as a pilot, which won’t deliver any benefit to the system on its own but is required before the new feature can be started. To bolster this, we had to consider the ultimate deliverable being enabled, otherwise, the supporting item would score too low.  

Technical debt is another type of work that doesn’t quite fit into these categories, which is why we ultimately decided to remove it and prioritise it separately.  

 Despite all the categorisation and discussions, you can end up with a list that doesn’t quite correspond with your gut feeling based on market trends. To mitigate this, a review was organised every few months to monitor scoring accuracy.  

Conclusion  

For projects without a finite backlog where upfront prioritisation isn’t possible, this approach allows you to prioritise against existing work in flight. However, it’s important to account for the amount of time, effort and morale downturn it takes to pause and restart.  

This method of prioritisation is ultimately particularly a useful tool for prioritising the constant stream of incoming projects from multiple product owners. The conversations that come out of the prioritisation are also of substantial value, and to some extent, enable the prediction of what will be delivered in the near future.  

To learn more about project prioritisation in consultancy, speak to one of CACI’s experts today. 

How building a network automation content library accelerates efforts

How building a network automation content library accelerates efforts

CACI  has a rich heritage in network engineering, IT infrastructure, delivery assurance and network automation, including NetDevOps practices such as network coding, CI/CD pipeline optimisation, network lifecycle management and more. Our network automation experts engage in a variety of activities for our clients, a few of which include:

Telco (ISP)

  • Build out of a NetBox NSoT (Network Source of Truth) and modelling of an ISP lab environment that allows for seamless network inventory management, such as VLANs, VRFs, IP linknets, cabling, chassis-to-blade mapping and more.

Telco (ISP)

  • Build out of a Python Flask-based application (including frontend, backend and API) “LabDash” to enable management of changing Telco inventory, such as line cards, SFP transceivers, patching – within a lab environment used for Telecommunications (Security) Act 2021 (TSA) testbed and network build-out activities.

Finance

  • Build out of a customised observability solution to complement in-flight NMS, OSS and BSS tooling, with customised metrics around specific values of SNAT count, TCP session count and related for a complex load-balanced application solution.

Defence

  • Build out of IaC blueprints to deploy complex NVA router, NVA firewall, Load Balancer ADC and other centralised infrastructure as part of an Azure landing zone deployment.

In everything we do, we always follow DevOps and software development practices, most notably being “DRY” (Don’t Repeat Yourself). As such, we are building a library of automations and network code that can benefit future clients through a faster delivery of NetDevOps solutions – leading to a flywheel of network affects, meaning the more we do for clients, the more we learn and can apply our shared learnings – and code libraries, modules and approaches – to accelerate network automation efforts for future clients.

Automation library

Giving back to the network automation community

We know that we can’t do this alone, and equally to ensure we  attract and maintain top-quality NetDevOps talent and network automation consultants, we give back to the wider network automation community by building several tools within our public GitHub Repository. These include:

PAC File Performance Comparer 

PAC File Performance Comparer is intended to be run on an ad-hoc basis to allow for a quick comparison using the Pacparser to calculate both the time difference (i.e. performance optimisation gain of the JavaScript PAC code refactor) and conformity against a test set of URL behaviours (i.e. proxy or direct) for a “before” and “after” PAC (Proxy Auto-Configuration File) refactoring exercise.

Azure JSON IP Feed to Juniper SRX Checker

Azure JSON IP Feed to Juniper SRX Checker is intended to be run on a periodic (i.e. daily) basis to check for updates, changes or deletions made by Microsoft to their Azure IP Address Ranges as per the Microsoft-published Azure IP Ranges and Service Tags – Public Cloud JSON feed and convert into Junos SRX-compatible security policy syntax/configuration.

Adding to our sandpit

Whenever we develop a module, code, artefact or solution for a client, we always ensure that we contribute any non-sensitive elements of this network code back to our “sandpit”, which is a growing area of internal “scraps” of code and approaches that we use internally to accelerate our development of solutions for clients. This enables our NetDevOps engineers to accelerate their developments into clients’ environment and build on shared learnings within our wider network automation practice.

Below is just a small sample of some of the things we’ve already done and can do faster again – perhaps to help you if your NetDevOps is feeling more like NetDevOops:

  • ajax-code-snippets
  • azure-f5-bigip-ha-cluster-cfe-do
  • azure-natgw-azlb-stress-tester
  • azure-zscaler-ip-lookup-csv
  • caci-ns-employee-profile-tools
  • certificate-automation-python
  • credly-certs-badging
  • cytoscape-network-topology-viewer
  • gartner-market-vendor-scraper
  • hostnames-geoip
  • megaport-api-provisioner
  • network-weathermap-visualiser

Ready to turn your NetDevOops into NetDevOps?

At CACI, we’re well-versed across all areas of IT infrastructure – be that IT, delivery assurance, cloud, network or DevOps and systems administration. Our expert consultants have worked across a large spectrum of clients in varying stages of digital transformation, some with adherence to more agile-led delivery lifecycle, others with adherence to more waterfall-led delivery lifecycle – and have experience across a plethora of industry frameworks, from TOGAF to SAFe to more traditional ITIL deployments.

Get in touch and let us help you assure and stabilise your cloud, IT or network infrastructure to fulfil the four key DORA DevOps metrics in your company (or ask us what they are if you don’t already know) and accelerate your NetDevOps and SRE success!

Why consultancy is the perfect profession for problem solvers

Why consultancy is the perfect profession for problem solvers

Puzzle Consultancy

Those who relish the thrill of solving puzzles and the rush of competition are likely to find a perfect match in the world of consultancy. This profession, often associated with high-stakes business decisions and strategic planning, can offer a dynamic environment where one’s passion for learning, problem-solving and helping businesses thrive can come to life. So, how exactly does consultancy work become the ultimate puzzle, providing endless opportunities to learn, solve problems and see tangible benefits unfold? 

The endless puzzle: continuous learning in consultancy 

One of the most exhilarating aspects of consultancy is the constant influx of new challenges. Just like puzzles, each project presents a unique problem to solve, often requiring fresh knowledge and innovative thinking. The variety in consultancy work— ranging from industries like healthcare and finance to technology and retail— ensures that there’s always something new to learn. For puzzle enthusiasts, this is akin to encountering a new, complex puzzle every day. 

Each client and project creates an opportunity to dive into new territories, understand different business models and stay updated with industry trends. This constant learning keeps minds sharp and satisfies curiosity, with every assignment more intricate and rewarding than the last. 

The competitive edge: thriving on problem-solving and strategy  

Consultancy isn’t just about applying standard solutions, it’s about crafting unique strategies that can give clients a competitive edge. This aspect will resonate deeply with those that are naturally competitive. Just as one would approach any challenge with the goal of finding the best and most efficient solution, the aim in consultancy is to devise strategies that not only solve a client’s problem, but also position them favourably in their market. 

The thrill of this competitive element is a significant motivator. It can drive creative thinking, meticulous data analysis and team collaboration to brainstorm the best approaches. The satisfaction that comes from cracking a particularly tough problem or devising a winning strategy can be immensely rewarding, much like completing a particularly challenging puzzle. 

The reward of impact: helping businesses improve 

While the intellectual stimulation and competitive aspects of consultancy can be exciting, the real joy comes from seeing tangible impacts. There’s a unique satisfaction in knowing that recommendations and strategies can significantly improve a business’ operations, profitability or market position, as though seeing the pieces of a puzzle come together to form a clear and complete picture. 

Helping businesses in this way can provide a profound sense of accomplishment, with each success story a testament to the hard work and strategic thinking that goes into project work. This impact-driven aspect of consultancy adds depth to the puzzle-solving experience, making it not just an intellectual exercise, but a meaningful endeavour that positively affects real businesses and people. 

Consultancy as the ultimate puzzle

Consultancy is the ultimate puzzle— one that’s ever-evolving and endlessly rewarding. For those who enjoy puzzles and competition, it offers a perfect blend of continuous learning, problem-solving and the thrill of seeing tangible results. Consultancy is a career that challenges the mind, fosters creativity and provides an unparalleled opportunity to make a real difference to organisations and people. It not only satisfies a love for challenges, but also fuels a passion for helping others succeed.  

Find out how CACI’s expert consultants can support your unique business needs by getting in touch with us here. 

Insights from the Northumbrian Water Innovation Festival 2024

Insights from the Northumbrian Water Innovation Festival 2024

Attending the Northumbrian Water Innovation Festival last month was a very informative experience for our CACI Mood team, filled with insightful discussions and ground-breaking innovations. Held at Newcastle Racecourse, the festival brought together 3,000 people from 32 countries, creating a vibrant and diverse atmosphere. As a proud sponsor, we had the opportunity to support this great event and showcase Mood’s innovation capabilities at our exhibition stand. 

An Inspiring Setting for Innovation 

From the outset of the event, it was clear that this was not just another industry conference; it was an opportunity to break down barriers, open dialogue, and explore new ideas in a completely different context.  

The festival’s structure, which included a record 37 sprints, facilitated rapid problem-solving and idea generation. These sprints were filled with thought-provoking discussions, and we were lucky to hear insights from the likes of British Olympians Steve Cram CBE and Ellie Simmonds, who shared valuable perspectives. 

Specific Innovations and Collaborative Approaches 

One of the most striking aspects of the festival was the diversity of participants, which included suppliers like us, industry veterans, and aspiring professionals. This diversity enriched every discussion with fresh insights and novel approaches, underscoring the value of varied viewpoints in problem-solving.  

Notable innovations included solutions for improving water quality, achieving net zero emissions, and reducing pollution and leakage. A particularly impactful sprint, led by data-giant Cognizant, focused on leveraging AI technology to enhance the health of local rivers. 

Overcoming Business Challenges 

The festival also highlighted the importance of overcoming challenges through collaboration. The structured yet flexible format of the workshops, including design sprints and daily dashes, ensured that participants remained focused and productive. These sessions were expertly guided by sprint leads, facilitating a collaborative environment where participants could step out of their usual roles and approach problems from different angles. 

Personal and Professional Insights 

Engaging with a diverse group in a non-work environment allowed me to gain new perspectives on the challenges facing our water sector clients. It was refreshing to address issues in a setting where creativity was encouraged, and there were no predefined expectations about the “right” way to approach a problem. Professionally, the festival highlighted the importance of stepping outside our usual routines to generate actionable ideas. 

The Value of Participation 

Participating in the festival was more than just a productive use of time; it was an investment in the future of our water industry. The insights gained and connections made will undoubtedly contribute to more effective and innovative solutions for our clients.  

The festival demonstrated that breaking away from conventional settings and embracing a more open and creative approach can lead to endless possibilities. 

Looking Forward 

Moving forward from the festival, we hope apply elements of it to foster a more open and creative environment in our meetings and workshops. Encouraging diverse participation and thinking outside the box will continue to drive innovation in our projects and add value for our clients.

The Innovation Festival was a remarkable experience that highlighted the power of creativity, diversity, and open collaboration. I am eagerly looking forward to seeing the outcomes of this festival and am confident they will drive positive change in the water sector and beyond.

For more details on the festival, visit www.innovationfestival.org. 

Discover the power of Mood here.

Top network automation trends in 2024

Top network automation trends in 2024

Network automation has become increasingly prevalent in enterprises and IT organisations over the years, with its growth showing no signs of slowing down.  

In fact, as of 2024, the Network Automation Market size is estimated at USD 25.16 billion (GBP 19.78 billion), expected to reach USD 60.59 billion (GBP 47.65 billion) by 2029. By 2028, a growth rate of 20% is predicted in this sector in the UK. Within CACI, we are seeing a higher demand for network automation than ever before, supporting our clients in NetDevOps, platform engineering and network observability. 

So, how is the network automation space evolving, and what are the top network automation trends that are steering the direction of the market in 2024?  

Hyperautomation

With the increasing complexity of networks that has come with the proliferation of devices, an ever-growing volume of data and the adoption of emerging technologies in enterprises and organisations, manual network management practices have become increasingly difficult to uphold. This is where hyperautomation has been proving itself to be vital for operational resilience into 2024. 

As an advanced approach that integrates artificial intelligence (AI), machine learning (ML), robotic process automation (RPA), process mining and other automation technologies, hyperautomation streamlines complex network operations by not only automating repetitive tasks, but the overall decision-making process. This augments central log management systems such as SIEM and SOAR with functions to establish operationally resilient business processes that increase productivity and decrease human involvement. Protocols such as gNMI and gRPC for streaming telemetry and the increased adoption of service mesh and overlay networking mean that network telemetry and event logging are now growing to a state where no one human can adequately “parse the logs” for an event. Therefore, the time is ripe for AI and ML to push business value through AIOps practices to help find the ubiquitous “needle” in the ever-growing haystack. 

Enterprises shifting towards hyperautomation this year will find themselves improving their security and operational efficiency, reducing their operational overhead and margin of human error and bolstering their network’s resilience and responsiveness. When combined with ITSM tooling such as ServiceNow for self-service delivery, hyperautomation can truly transcend the IT infrastructure silo and enter the realm of business by achieving wins in business process automation (BPA) to push the enterprise into true digital transformation. 

Increasing dependence on Network Source of Truth (NSoT)

With an increasing importance placed on agility, scalability and security in network operations, NSoT is proving to be indispensable in 2024, achieving everything the CMDB hoped for and more. 

As a centralised repository of network-related data that manages IP addresses (IPAM), devices and network configurations and supplies a single source of truth from these, NSoT has been revolutionising network infrastructure management and orchestration by addressing challenges brought on by complex modern networks to ensure that operational teams can continue to understand their infrastructure. It also ensures that data is not siloed across an organisation and that managing network objects and devices can be done easily and efficiently, while also promoting accurate data sharing via data modelling with YAML and YANG and open integration via API into other BSS, OSS and NMS systems.  

Enterprises and organisations that leverage the benefits of centralising their network information through NSoT this year will gain a clearer, more comprehensive view of their network, generating more efficient and effective overall network operations. Not to mention, many NSoT repositories are much more well-refined than their CMDB predecessors, and some – such as NetBox – are truly a joy to use in daily Day 2 operations life compared to the clunky ITSMs of old. 

Adoption of Network as Service (NaaS)

Network as a Service (NaaS) has been altering the management and deployment of networking infrastructure in 2024. With the rise of digital transformation and cloud adoption in businesses, this cloud-based service model enables on-demand access and the utilisation of networking resources, allowing enterprises and organisations to supply scalable, flexible solutions that meet ever-changing business demands. 

As the concept gains popularity, service providers have begun offering a range of NaaS solutions, from basic connectivity services such as virtual private networks (VPNs) and wide area networks (WANs) to the more advanced offerings of software-defined networking (SDN) and network functions virtualisation (NFV).  

These technologies have empowered businesses to streamline their network management, enhance performance and lower costs. NaaS also has its place at the table against its aaS siblings (IaaS, PaaS and SaaS), pushing the previously immovable, static-driven domain of network provisioning into a much more dynamic, elastic and OpEx-driven capability for modern enterprise and service providers alike. 

Network functions virtualisation (NFV) and software-defined networking (SDN)

A symbiotic relationship between network functions virtualisation (NFV), software-defined networking (SDN) and network automation is proving to be instrumental in bolstering agility, responsiveness and intelligent network infrastructure as the year is underway. As is often opined by many network vendors, “MPLS are dead, long live SD-WAN”; which, while not 100% factually correct (we still see demand in the SP space for MPLS and MPLS-like technologies such as PCEP and SR), is certainly directionally correct in our client base across finance, telco, media, utilities and increasingly government and public sectors. 

NFV enables the decoupling of hardware from software, as well as the deployment of network services without physical infrastructure constraints. SDN, on the other hand, centralises network control through programmable software, allowing for the dynamic, automated configuration of network resources. Together, they streamline operations and ensure advanced technologies will be deployed effectively, such as AI-driven analytics and intent-based networking (IBN). 

We’re seeing increased adoption of NFV via network virtual appliances (NVA) deployed into public cloud environments like Azure and AWS for some of our clients, as well as an increasing trend towards packet fabric brokers such as Equinix Fabric and Megaport MVE to create internet exchange (IX), cloud exchange (CX) and related gateway-like functionality as the enterprise trend towards multicloud grows a whole gamut of SDCI cloud dedicated interconnects to stitch together all the XaaS components that modern enterprises require. 

Intent-based networking (IBN)

As businesses continue to lean into establishing efficient, prompt and precise best practices when it comes to network automation, intent-based networking (IBN) has been an up-and-coming approach to implement. This follows wider initiatives in the network industry to push “up the stack” with overlay networking technologies such as SD-WAN, service mesh and cloud native supplanting traditional Underlay Network approaches in Enterprise Application provision. 

With the inefficiencies that can come with traditional networks and manual input, IBN has come to network operations teams’ rescue by defining business objectives in high-level, abstract manners that ensure the network can automatically configure and optimise itself to meet said objectives. Network operations teams that can devote more time and effort to strategic activities versus labour-intensive manual configurations will notice significant improvements in the overall network agility, reductions in time-to-delivery and better alignment with the wider organisation’s goals. IBN also brings intelligence and self-healing capabilities to networks— in case of changes or anomalies detected in the network, it enables the network to automatically adapt itself to address those changes while maintaining the desired outcome, bolstering network reliability and minimising downtime. 

As more organisations realise the benefits of implementing this approach, the rise of intent-based networking is expected to continue, reshaping the network industry as we know it. The SDx revolution is truly here to stay, and the move of influence of the network up the stack will only increase as reliance on interconnection of all aspects becomes the norm. 

How CACI can support your network automation journey? 

CACI is adept at a plethora of IT, networking and cloud technologies. Our trained cohort of network automation engineers and consultants are ready and willing to share their industry knowledge to benefit your unique network automation requirements. 

From NSoT through CI/CD, version control, observability, operational state verification, network programming and orchestration, our expert consulting engineers have architected, designed, built and automated some of the UK’s largest enterprise, service provider and data centre networks, with our deep heritage in network engineering spanning over 20 years. 

Take a look at Network Automation and NetDevOps at CACI to learn more about some of the technologies, frameworks, protocols and capabilities we have, from YAML, YANG, Python, Go, Terraform, IaC, API, REST, Batfish, Git, NetBox and beyond. 

To find out more about enhancing your network automation journey, get in touch with us today.  

Unmet needs and data driven decisions: how Milton Keynes uses technology to support vulnerable young people

Unmet needs and data driven decisions: how Milton Keynes uses technology to support vulnerable young people

In the first part of our case study with Milton Keynes Youth Offending Team we explored how the team uses ChildView. We examined how the system supports the team’s administrative functions such as reporting, and how the YOT is supported by CACI. In this, the second part of the case study, we sat down with Diz Minnitt, head of youth justice and support service at Milton Keynes, to look at the benefits ChildView has brought to the council outside of its office walls. How does ChildView support work with vulnerable young people in a rapidly expanding population? What tangible difference does flexible reporting bring to the YOT? How does technology help to join the dots in each young person’s journey to provide a single view of them, helping to improve outcomes and reduce elements such as reoffending? How can systems support in identifying more unmet earlier, to help with prevention?

We start by taking a broader perspective on the multi-agency approach within Milton Keynes. The MK Together Safeguarding Partnership brings together senior leaders from key agencies in Milton Keynes to agree ways to co-ordinate local safeguarding services, act as a strategic leadership group in supporting and engaging others and implement local and national learning, including from serious child safeguarding incidents. It has created an improvement in communication and accountability with the right people routinely updated.

“Working within this context has provided an opportunity for us to advocate on the part of people and families that the local authorities are working with,” begins Diz. “These are very vulnerable people and families; children in care, children in need and youth with unmet needs who are in the criminal justice system. We’re really starting to realise the importance of unmet needs and increasing our understanding of what stronger partnership working can achieve.”

Unmet needs – speech, language and communication needs (SLCN)

Following research and partnership work with the Association of Youth Offending Team Managers AYM in 2016, Diz told us about his original focus on identifying speech and language needs and developing what the YOS could do to help. “Following professor Karen Bryan’s original study in 2007, which identified 60% of children in contact with YOTs as having speech, language and communication needs, in 2008 we undertook our own four-month study with a speech and language therapist.

“We focused the assessments on key sub-groups in the service, those with repeat offending, disrupted education history or no education provision and those with suspected SEND (special educational needs and disabilities), and what we found was that 88% of these groups had significant SLCN – significantly higher than professor Bryan’s 60%.

“This was much closer to Prof Bryan’s figure of 60-90% for young people in custody, but what it highlighted was that there was a majority of those in contact with the service who had undiagnosed SLCN. Furthermore, these needs are very difficult to spot without a full assessment and hence are often referred to as hidden disabilities.

“Having effectively tested and proved the findings of professor Bryan’s academic study as a local reality in the high risk groups, particularly among young people who are repeat offenders, it was clear to me that such crucial unmet needs should inform youth justice and prevention practice across the entire system. Communication and the understanding that comes from this is key to thinking, processing, anticipating and understanding consequences. If we carried on as if children automatically have these skills, when it was clear they don’t, this was a recipe for failure carrying consequences for these children and for the rest of society.”

Connecting multiple agencies and teams

“It’s essential to reflect the importance of interconnection to this, too,” says Diz. “Most organisations, even those within the same local authority, frequently operate in siloes. They focus and prioritise the work that they need to do, that applies directly to them. However, achieving shared applied learning across the whole system to real life situations is the real world challenge and ultimately helps in achieving the goal of improving outcomes for vulnerable children.

“For example, it’s very clear that there’s an increased chance of a child with unmet needs entering the youth justice system. With the right focus this risk can be significantly reduced. Where people do not take a holistic view of this known risk, opportunities get missed and all professionals and departments don’t get the benefit from the insights and feedback that come from identification.”

Funding new projects, finding evidence

“For a new prevention project, you can only get funding once there’s a proof of concept,” explains Diz. “The SEND team at Milton Keynes initially picked up the bill for the speech and language therapy provision after the initial four-month funded period as they could see the benefits it would bring. Further funding for speech and language therapists was then obtained from NHS England, the Office for the Police and Crime Commissioner, the Home Office and most recently as part of Turnaround funding.

“This has consistently increased our screening and assessment capacity, meaning that we could identify SLCN earlier and can now clearly evidence that 88% of children and young people in contact with the service have SLCN. Milton Keynes is now one of a handful of youth justice services in the UK with speech and language therapists (SLTs) embedded in the team where an SLCN assessment is conducted by an SLT with every child.

“These assessments enable all of those professionals working with the child and their family to have greater insight, providing real opportunities for coherent, coordinated working with the child’s needs at the forefront.

“This complements the wider SEND focus and the understanding of needs arising from adverse childhood experiences amongst children across Milton Keynes. It also helps us to target interconnection with other parts of Milton Keynes’s services.”

“Like many Youth Offending Services we were in a position where we could see the impact as other services were cut due to the impact of austerity measures around funding. We had already begun to see the benefit of SLCN assessments and we had the evidence that children coming into the YJ system weren’t having their needs identified prior to contact with the YOT.

“As SEND support to schools started to be charged for we could see a nightmare scenario with the levels of children with previously unrecognised and unmet needs increasing as a direct consequence of schools being forced to make challenging decisions about how they use their reducing resources.

“To seek to counteract this predicted increase we started working with both secondary and primary schools offering SLCN assessments for their children who were at greatest risk of exclusion. With these assessments we discovered that 96% of those that schools had considered excluding have SLCN, confirming the ‘hidden disability’ impact of SLCN.

Promoting Reintegration Reducing Exclusion

“As well as providing free assessments to the schools, we also provided free specialist training around how to work effectively with children with SLCN and a host of other associated SEND needs. This removed a barrier as schools were no longer having to justify difficult choices with their budgets and enabled schools to develop better ways to support individual children and to adapt the whole school environment to enable swifter identification and support for those children with SLCN.

“This approach also supported a more compassionate way of thinking regarding challenging behaviour as we stress that, supported by the evidence, behaviour is an indicator of underlying causes that needs to be explored and understood.

“We have connected with different organisations to establish and evidence the research links and we saw more interconnects and overlaps with ACEs and SLCN. SLCN is not the only need, but its identification is frequently indicative of other symptoms of complex underlying needs. Identifying SLCN can trigger the process of further investigation.

“This overall approach is based upon our increasing knowledge of the needs that ultimately result in children finding themselves in the youth justice system. We can see clearly when this journey starts to arise and by definition the more we can go up these known tributaries to identify and meet needs earlier the more we can prevent children from being excluded from school, moved into alternative education or placed on part time timetables, finding themselves exploited or involved in offending behaviour.

“We need to use all of the information available to intelligently adapt the system collectively to identify and meet needs earlier. These children do not have the luxury of pausing, rewinding and replaying their lives if we collectively as professionals get it wrong or lack diligence and professional curiosity in our approach.”

“Childview has proved essential in enabling us to capture and extract the data needed for the evaluation of Promoting Reintegration Reducing Exclusion (PRRE) that has been undertaken by the Cambridge Institute of Criminology (CIC) in Cambridge University. The CIC are due to present their report imminently, but this was commissioned following some of the early indicators of PRRE which highlighted that we potentially see examples of unconscious adultification of children. The current systems in schools can become too focused on the behaviours without seeing beyond these to other symptoms and root causes of that behaviour. They can fail to understand reasons for the presenting behaviour and therefore can act to exclude prematurely.”

Data driven decisions

“With the introduction of the Early Support Project in 2018 we saw a 25% reduction in first time entrants to the youth justice system in its first 12 months.

“Milton Keynes is growing rapidly as a city and our resources haven’t always been tailored to match this growth. There has been an increase in gang-related activities post-Covid with an increase in the number of children coming into the system who were previously unknown to our services and those of key partner agencies. This reinforces the importance for us to act earlier.

“Milton Keynes also has a very young population which means a larger population pool of potential first time entrants into our youth justice system. Following an increase in knife related offences we developed a new strand of the ESP, ACT-Now which is focused explicitly on this area. Our ACT-Now model works by establishing direct contact with a young person whilst they are still in police custody within 90-minutes of us being contacted by the police. We then have a follow up visit with the young person and parents/carers within 48 hours to agree how we can work with them voluntarily. This has led to very positive engagement and a very low level of reoffending to date by those children who have been supported using this model. None of the reoffending to date (around 5%) has related to further knife carrying.

“The ACT-Now work has been funded by the Police and Crime Commissioner and the initial success led to the same approach being funded by him to operate in Slough and other parts of the Thames Valley area are being considered for further expansion. ACT-Now is being viewed very positively by the Home Secretary who is monitoring progress with the approach and it has recently been shared as a model of best practice amongst the network of police and crime commissioners.

“As well as significantly increasing timeliness of dealing with these offences, which is crucial for young people to understand the consequences of their actions, we are seeing improved outcomes for these young people and reduced reoffending rates.

“The cost argument is very effective for the police. Their approach is different to ours, but the outcomes are mutually beneficial. It’s cost effective and demonstrably reducing repeat offending. Reduced crime means fewer victims and we can demonstrate this from our data captured in detail in Childview.

Using ChildView to tackle capture and analyse data for tangible action points

“The Early Support Project aims to measure the reoffending rate over two years. The rate for young people who have been through the service is currently 1.81% and we have worked with c.500 young people. We know that the methodology, therefore, works. Correctly identifying needs earlier greatly improves outcomes for these young people.

“Childview has been crucial in all of this in providing the opportunity to capture and analyse significant amounts of data on the different cohorts of children covered under the different strands of the Early Support Project. For many years we have used the prevention extended functionality which we purchased. The identify tool is extremely adaptable, enabling us to add different elements for the various strands, such as new screening and assessment methodologies. We can capture data about the different elements of the project work, most importantly providing verifiable evidence around the impacts and outcomes achieved.

“Further, Childview uniquely allows life event characteristics such as undiagnosed SLCN, trauma and ACEs to be captured and used to add value to the analysis. This enables us to create rich sub-sets of our prevention data and thoroughly learn about what impact we are having and what is working. We can look at the numbers, the work we are doing that makes a difference and the profiles in our Early Support Project, Turnaround, ACT-Now and PRRE.

“We need to analyse the pathways of all these cases via logging their identified adverse and trauma life experiences as well as referrals in and out of our projects. These include referrals for SLCN, SEND, substance use and mental health. ChildView is a flexible and adaptable system that enables us to track all of our different service and project approaches and methodologies.”

Youth Resilience Project

“Our Youth Resilience Project offers one-to-one mentoring at all stages of the youth justice pathway supplementing other models through support that is available end-to-end. It can be used at the beginning of their journey, for those children just starting to work with the service or those who already engaged with us, through to those transitioning out of the youth justice system.

“ChildView’s additional functionality helps us to differentiate needs from data captured and to enquire about the ways we can facilitate targeted prevention and help to children. It enables us to build practice-based evidence and utilise this information to inform where we need to build service system capacity and capability to reduce or eliminate criminal behaviour. Having the flexibility to shape and use our data from local project work is essential to us, this helps to reveal patterns and insight from our work and therefore to evidence and highlight the resources needed.

“However, ChildView also provides a standard framework for monitoring youth justice, for example first time entrants, offending and reoffending to ensure we create consistent information about impact. We aim to always focus on improving outcomes and data is essential to achieving this. The outcomes for children are ultimately what matters.

“All members of the team can access the data and interpret it. It’s transparent and accessible across the service. Because we share a common system with many other services in Thames Valley we can share our methodologies, learning and customisation with other youth justice services. This helps us to pool and build knowledge and approaches to improve outcomes for children in our domain.”

How Tameside Council uses ChildView’s full case data exchange functionality

How Tameside Council uses ChildView’s full case data exchange functionality

Tameside Council has been using ChildView from CACI since 2014 to support its vital work in supporting vulnerable young people across its services. One specific area of functionality within ChildView that Tameside Council finds particularly useful, is the full case data exchange. 

The full case data exchange functionality enables Tameside Council to share and receive all the data held on a young person’s case. “It was taking so long to manually input the data associated with a full case,” explains Louise Hope, data and analysis lead. “Our business support function has been getting busier, with more work in referrals meetings and taking notes, resulting in less time for admin tasks such as this. We put together a business case for using the full case data exchange functionality and implemented it. 

“Essentially we wanted to save time. It has also helped us to improve the accuracy of our data; the data otherwise is only as good as the person inputting it. If they make mistakes and miss things, then our data is poorer as a result.” 

The full case data exchange functionality in ChildView enables youth justice services to send and receive all the data recorded on a young person with other youth offending teams (YOTs) using ChildView. If young people move services, then their record can move with them. “We use it to send and receive cases with other YOTs,” says Louise. “We would like to use it for everything but have found that there is some confusion around the process with other YOTs, whereby they only send us the asset rather than the full case. Once other YOTs understand the process, it will improve it further.” 

One of the main benefits of the functionality is to save time and improve efficiency. At a time when services are getting busier, this is a helpful facet of the full case data exchange. “Absolutely we’ve saved time through using the functionality,” says Louise. “Although it’s tough to say exactly how much time because each case is a different size. I would say, however, that we save at least a couple of hours on a standard case. Also, if the data is being input manually, we would never ask someone to add all contacts, for example; they would be attached as a pdf. So, we get a richer base of information whilst saving an average of two hours.” 

A richer base of information helps YOTs to pick up information more easily and understand the context and nuance of a young person’s journey. Where information gets lost or incorrectly recorded, vital information disappears with it. “It’s certainly beneficial to have all of the information and all of the contacts,” concludes Louise. “Having a rich seam of data makes it much easier to find information, too. Then, you can see where that information has come from, with an evidence base and contacts of who recorded what. If we have any questions, it makes it very easy to follow up with that person. There’s also increased confidence in the data that we have as a result of the improved accuracy of the data being added to our system. With accuracy and a trail of contacts, it makes each young person’s journey more transparent to us.” 

For more information on how ChildView supports the vital work of youth justice teams across the UK, please visit: www.caci.co.uk/childview