Vendor Native Management Platforms

Deep integration, advanced telemetry, and AI-driven operations deliver exceptional automation within vendor ecosystems – but 87% of enterprise networks are multi-vendor, creating coordination gaps these platforms weren’t designed to solve.

Why This Research Matters

Vendor-native management platforms represent the pinnacle of network automation within their ecosystems. Cisco Catalyst Center, Arista CloudVision, and Juniper Mist showcase what’s possible when hardware vendors build deeply integrated management systems for their own equipment – zero-touch provisioning, AI-enhanced operations, comprehensive telemetry, and predictive analytics that would be difficult to replicate in multi-vendor environments.

These platforms excel in their domain: homogeneous networks where 80%+ of infrastructure comes from a single vendor, enabling advanced features, simplified operations, and cohesive user experiences that justify significant investment.

However, research reveals a fundamental tension: 87% of enterprise networks are multi-vendor in practice, driven by mergers and acquisitions, best-of-breed selection strategies, specialized vendor requirements, and legacy infrastructure with 10+ year refresh cycles.

What you’ll find:
  • Platform-specific deep dives – Catalyst Center capabilities and scale limits (100K endpoints), CloudVision state-streaming architecture, Mist AI-driven wireless operations

  • Documented limitations – Where single-vendor platforms struggle with multi-vendor coordination and business workflow requirements

  • Multi-vendor operational reality – 42.3% of engineering time on routine maintenance, separate specialist teams per vendor

  • Strategic decision frameworks – When vendor-native platforms deliver maximum ROI vs. when orchestration is required

Who this is for:
  • Teams evaluating single-vendor standardization strategies
  • Organizations with vendor platform investments wondering about multi-vendor coordination
  • Leaders deciding whether to pursue vendor consolidation or embrace orchestration
  • Engineers assessing when vendor-specific advanced features justify standardization

The goal: Help you understand when vendor-native platforms are the right answer (homogeneous environments, vendor-specific advanced features) and when multi-vendor complexity requires orchestration to coordinate workflows across heterogeneous infrastructure.

Key Research Findings

Challenge Category Research Finding Business Impact Source
Specialist Team Overhead Organizations maintain separate teams for different vendors’ equipment Increased operational costs and reduced efficiency IEEE Study, 2014
Routine Maintenance Time Network engineers spend 42.3% of time on tasks that could be automated Significant opportunity cost in complex environments IEEE Study, 2014
Integration Complexity Lack of uniformity in management interfaces across vendors Manual coordination overhead and error risk Anuta Networks, 2020
Tool Proliferation Most enterprises plagued with too many vendor-specific tools Increased management burden and training costs Anuta Networks, 2020
Multi-Vendor Coordination Networks span physical, virtual, cloud, and SDN without orchestration Manual coordination required across teams Itential, 2024
Orchestration Adoption Underutilized due to perceived complexity and steep skills requirements Limited scalability of automation efforts Gartner Market Guide

The Vendor Management Platform Landscape

Platform Categories & Strategic Positioning

Network vendor management platforms fall into three primary categories, each with distinct capabilities and limitations:

Single-Vendor Excellence Platforms: Platforms like Cisco Catalyst Center, Arista CloudVision, and Juniper Mist deliver exceptional automation and intelligence within their vendor ecosystem. These platforms leverage deep integration with their hardware to provide features like AI-enhanced operations, zero-touch provisioning, and comprehensive telemetry that would be difficult to replicate in multi-vendor environments.

Multi-Vendor NMS Solutions: Traditional network management systems attempt broad device support but typically offer only basic configuration management and monitoring capabilities. These solutions struggle with the depth of automation and intelligence available in vendor-specific platforms.

Network Orchestration Platforms: Solutions like Itential provide orchestration across multiple vendor domains, coordinating workflows that span vendor-specific tools, cloud APIs, and business systems. These platforms address the integration and coordination challenges that emerge in heterogeneous environments.

The Single-Vendor vs. Multi-Vendor Reality

Research consistently demonstrates the gap between single-vendor platform capabilities and multi-vendor operational reality:

Network Complexity Reality:
  • 87% of enterprise networks are multi-vendor in practice due to mergers, acquisitions, specialized requirements, and best-of-breed selection strategies (Industry Analysis, 2024)
  • Organizations attempt single-vendor strategies but face inevitable drift toward heterogeneity over 3-5 year planning cycles
  • Legacy infrastructure persists with optical devices having 10+ year refresh cycles, creating permanent multi-vendor scenarios

Management Interface Fragmentation:

“Every vendor designs management interfaces that are optimized for a particular set of products and customers” – resulting in administrators needing deep expertise across multiple disparate systems (Anuta Networks, 2020).

This fragmentation manifests in:

  • Different CLI syntaxes and command structures requiring specialized training
  • Inconsistent API designs and authentication mechanisms complicating automation
  • Proprietary data models preventing unified analytics and reporting
  • Varied software update processes multiplying operational overhead

Vendor-Specific Platform Deep Dive

Cisco Catalyst Center:
Campus & Enterprise Focus

Core Capabilities:
  • Intent-based automation for policy definition and enforcement across Cisco campus infrastructure

  • SD-Access fabric management with LISP control plane orchestration and VXLAN data plane automation

  • AI/ML-powered assurance with network analytics and anomaly detection

  • Zero-touch provisioning for rapid device deployment at scale

  • Integration with Cisco ISE for policy-based segmentation and zero-trust security

Scale and Scope:
  • Supported endpoints: Up to 100,000 network endpoints (switches, wireless controllers, access points)

  • SD-Access fabric limits: 6,000 endpoints per fabric site, 2,000 in traditional networks beyond Layer-2 handoff

  • Wireless controller scale: Comprehensive WLC management for Catalyst 9800 series

  • Deployment models: Physical appliance, virtual appliance, or SaaS hybrid options

Documented Limitations:
  • Cisco-exclusive architecture: Platform designed exclusively for Cisco Catalyst networking equipment with no third-party device support

  • Mobility configuration constraints: Cannot configure multiple controllers simultaneously in provision workflows (Cisco Documentation, 2024)

  • Default group restrictions: Cannot create mobility groups named “default” which resets configurations (Cisco Documentation, 2024)

  • Manual intervention requirements: Wireless controller reboots required for virtual IP changes in mobility configurations

  • Multi-vendor integration gap: Requires separate orchestration layer to coordinate with non-Cisco infrastructure

Strategic Positioning: Catalyst Center represents Cisco’s vision of AI-driven campus automation, delivering exceptional capabilities when organizations standardize on Cisco infrastructure. The platform’s limitations emerge in heterogeneous environments requiring coordination with other vendors’ equipment or cloud-native services.

Arista CloudVision:
Data Center & Campus Automation

Core Capabilities:
  • State-streaming architecture with NetDL (Network Data Lake) for real-time and historical network state

  • CloudVision Studios for network-wide automation with configlets and tags-based device grouping

  • Zero-touch provisioning as a service for automated device onboarding

  • Network-wide change control with configuration rollback, snapshots, and compliance verification

  • Cognitive analytics leveraging AI/ML models trained on NetDL data for operational insights

Architectural Approach:
  • Platform over point product philosophy: Multi-domain management for data center, campus, WAN, and multi-cloud

  • Cloud-native design: Same feature set across SaaS and on-premises deployment options

  • Real-time telemetry: Modern approach replacing legacy SNMP polling with high-performance state streaming

  • Turn-key automation workflows: Pre-packaged Studios for common deployment patterns and Arista Validated Designs

Documented Limitations:
  • Arista EOS exclusive: Platform fundamentally designed for Arista EOS-based switches and routers

  • Proprietary state streaming: High-performance binary API limited to Arista devices with EOS SysDB architecture

  • Studios vendor lock-in: Point-and-click automation workflows tightly coupled to Arista device capabilities

  • Third-party device gaps: No native support for non-Arista networking equipment in state streaming or Studios

  • Multi-vendor coordination: Requires external orchestration for workflows spanning Arista and other vendor domains

Strategic Positioning: CloudVision delivers on Arista’s promise of bringing cloud-grade automation to enterprise networking, with unparalleled visibility and operational efficiency within Arista’s ecosystem. The platform’s state-streaming architecture and NetDL foundation provide powerful capabilities that are inherently tied to EOS devices.

Juniper Mist:
AI-Driven Wireless & Wired Assurance

Core Capabilities:
  • AI-driven wireless operations with machine learning for RF optimization and user experience troubleshooting

  • Marvis Virtual Network Assistant providing natural language interface for network operations and diagnostics

  • SaaS-native architecture with multi-tenant cloud delivery for global scale

  • Wired and wireless assurance with client journey tracking and application performance visibility

  • Microservices-based APIs for integration with IT workflows and automation frameworks

Strategic Positioning: Mist pioneered AI-driven wireless networking, delivering exceptional user experience in wireless environments. The platform has expanded to include wired assurance, creating a comprehensive campus solution for Juniper infrastructure deployments.

Documented Limitations:
  • Juniper device focus: Platform primarily designed for Juniper Mist access points and EX series switches

  • Limited multi-vendor support: Minimal capabilities for managing non-Juniper networking equipment

  • Wireless-first design: Wired assurance capabilities less mature than wireless operations

  • Campus scope: Less applicable to data center fabrics or service provider networks

  • Orchestration requirements: Integration with other vendor platforms requires external orchestration layer

The Multi-Vendor Challenge: Research Findings

Operational Overhead in Heterogeneous Environments

Research quantifies the specific challenges enterprises face when managing multi-vendor networks:

Skills and Training Burden:
  • Separate specialist teams required: Organizations maintain distinct teams for different vendors’ equipment due to proprietary interfaces and operational models

  • 42.3% of time on routine tasks: Network engineers spend nearly half their time on maintenance activities that could potentially be automated in homogeneous environments (IEEE Study, 2014)

  • Reduced cross-training efficiency: Engineers specializing in one vendor’s platform face steep learning curves when supporting other vendors’ equipment

Tool Proliferation and Management Complexity:

“Most enterprises are plagued with too many monitoring and automation tools. Most tools target particular vendor or solve specific problems. Network administrators can’t waste precious time in managing and maintaining a plethora of tools” (Anuta Networks, 2020).

The multi-tool reality manifests as:

  • Separate management consoles for each vendor’s equipment

  • Inconsistent authentication systems requiring multiple credentials and access control frameworks

  • Fragmented data repositories preventing unified reporting and analytics

  • Redundant monitoring systems creating alert fatigue and investigation overhead

Integration & Interoperability Challenges

The Proprietary Protocol Problem:

“Vendors often use diverse proprietary protocols, standards, and management interfaces. These differences introduce a significant interoperability challenge that decreases the ability of the components to work together seamlessly” (SGRwin, 2024).

Specific integration challenges include:

Configuration Management Inconsistencies:
  • Varied configuration formats: CLI syntax differences require separate automation scripts for each vendor

  • Inconsistent API implementations: REST APIs vary in authentication, data models, and error handling approaches

  • Different backup and restore mechanisms: No unified approach for configuration management across vendors

  • Proprietary feature implementations: Similar features configured completely differently across platforms

Telemetry and Monitoring Gaps:
  • Diverse SNMP MIB structures: Each vendor exposes different Object Identifiers (OIDs) for similar metrics

  • Incompatible streaming telemetry: gRPC, NETCONF, and proprietary streaming protocols require separate collection infrastructure

  • Inconsistent log formats: Syslog, SNMP traps, and vendor-specific event formats complicate correlation

  • Fragmented performance data: No standardized approach to network-wide performance monitoring

Workflow Coordination Overhead:

“Networks span physical, virtual, cloud, and SDN environments. Domain-specific tools automate their silos, but without orchestration, changes require manual coordination across teams” (Itential, 2024).

The coordination challenge manifests as:

  • Manual handoffs between vendor domains in multi-step processes

  • Spreadsheet-based tracking of changes spanning multiple platforms

  • Email-based coordination replacing automated workflow orchestration

  • Delayed service delivery due to cross-platform dependencies

Security & Compliance Implications

Vendor-Specific Security Challenges:
  • Inconsistent patch management: Different vendors release security updates on varied schedules with unique application procedures

  • Fragmented vulnerability tracking: No unified view of security posture across multi-vendor infrastructure

  • Compliance verification complexity: Demonstrating configuration compliance requires separate audits per vendor platform

  • Access control inconsistencies: Separate RBAC implementations prevent unified identity and access management

The Orchestration Requirement

Why Vendor Platforms Need Orchestration

Research from Gartner and industry analysts identifies the fundamental gap between single-domain automation and enterprise-wide orchestration:

The Automation vs. Orchestration Distinction:

Network Automation operates at the domain level:

  • Executes single tasks like configuration changes within a vendor’s ecosystem

  • Utilizes Python scripts, Ansible playbooks, or vendor-specific APIs

  • Provides efficiency gains within a technology domain

  • Requires high-code proficiency or vendor-specific expertise

Network Orchestration coordinates across domains and systems:

  • Orchestrates multiple tasks across different vendors and platforms

  • Validates requests, invokes appropriate tools (vendor controllers, cloud APIs, Ansible)

  • Enforces policies and updates ITSM systems for end-to-end processes

  • Enables standardized, repeatable services across heterogeneous infrastructure

“Orchestration remains underutilized by I&O teams due to perceived complexity, assumed loss of control and steep skills requirements” (Gartner Market Guide)

Despite these adoption challenges, orchestration addresses critical enterprise requirements that vendor-specific platforms cannot fulfill:

Orchestration Capabilities Required in Multi-Vendor Environments

Cross-Vendor Workflow Coordination:
  • Service provisioning spanning multiple vendors: Configuring a new application VLAN may require changes to Cisco switches, Arista data center fabric, Palo Alto firewalls, and F5 load balancers

  • Change management processes: Coordinating pre-check validation, execution, and post-check verification across disparate platforms

  • Rollback and remediation: Managing configuration rollback when changes affect multiple vendor domains

  • End-to-end service validation: Testing connectivity and performance across the complete multi-vendor path

Business System Integration:
  • ServiceNow ITSM coordination: Automating ticket creation, approval workflows, and change documentation

  • IPAM and inventory synchronization: Maintaining consistent IP address management and device inventory across platforms

  • Cloud service integration: Coordinating network changes with AWS, Azure, or Google Cloud networking services

  • Application dependency mapping: Understanding service relationships across multi-vendor infrastructure

Standardization and Abstraction:
  • Unified service catalog: Presenting network services consistently regardless of underlying vendor implementation

  • Policy-based automation: Translating business intent into vendor-specific configurations automatically

  • Template-driven provisioning: Abstracting vendor differences behind standardized service models

  • Consistent reporting and analytics: Aggregating data from multiple platforms into unified operational views

The Market Reality: Orchestration Market Growth

Industry research quantifies the growing need for orchestration capabilities:

Network Orchestration Market Projections:
  • 2024 Market Size: $9.22 billion globally for network automation and orchestration solutions

  • 2033 Projection: $47.17 billion, representing 19.89% compound annual growth rate (CAGR)

  • Primary Drivers: Operational efficiency requirements, multi-cloud adoption, 5G network complexity

  • Key Restraint: Integration complexity with legacy systems and diverse vendor equipment (Business Research Insights, 2024)

SDN Orchestration Specific Growth:
  • 2023 Market Size: $1.32 billion for SDN orchestration solutions

  • 2032 Projection: $44.57 billion, representing 47.3% CAGR

  • Growth Drivers: Digital transformation initiatives, hybrid multi-cloud adoption, need for network agility

  • Adoption Barriers: High implementation costs, integration with legacy infrastructure (Business Research Insights, 2024)

These market projections reflect the fundamental gap between vendor-specific automation capabilities and enterprise orchestration requirements in heterogeneous environments.

Strategic Decision Framework

When Vendor-Specific Platforms Work Well

Vendor management platforms deliver maximum value in specific scenarios:

Optimal Single-Vendor Scenarios:
  • Greenfield deployments with no legacy infrastructure constraints

  • Campus networks with unified vendor strategy and management commitment

  • Small to medium businesses with limited vendor diversity and simpler integration requirements

  • Specialized use cases where vendor-specific advanced features provide competitive advantage

Single-Vendor Advantages:
  • Deep integration capabilities leveraging proprietary hardware and software synergies

  • Advanced AI/ML features trained on specific platform telemetry and operational patterns

  • Simplified support model with single vendor escalation and knowledge base

  • Cohesive user experience with consistent interfaces and operational workflows

  • Optimized automation taking advantage of platform-specific capabilities

Cost and Complexity Considerations:

The economic case for single-vendor platforms includes:

  • Lower training overhead with unified operational model

  • Reduced tool licensing requiring only one management platform

  • Simplified troubleshooting with integrated diagnostics and support

  • Faster time-to-value leveraging vendor-provided automation templates

When Orchestration Becomes Necessary

Research identifies the inflection points where vendor platform limitations require orchestration:

Multi-Vendor Reality Triggers:
  • Merger and acquisition activity inherently creating heterogeneous infrastructure

  • Best-of-breed technology selection choosing specialized vendors for specific domains (wireless, data center, WAN, security)

  • Cloud integration requirements necessitating coordination between on-premises and public cloud networking

  • Legacy infrastructure constraints with long refresh cycles creating permanent multi-vendor scenarios

  • Specialized vendor requirements for compliance, performance, or feature needs not met by single vendor

Orchestration Value Inflection Points:

Organizations typically require orchestration when they experience:

  • Manual coordination overhead consuming more than 30% of operational capacity

  • Service delivery delays due to cross-platform dependencies and handoffs

  • Inconsistent service quality from lack of standardized processes across platforms

  • Compliance challenges requiring unified configuration and security policy enforcement

  • Integration proliferation with 5+ separate vendor management platforms requiring coordination

Orchestration ROI Indicators:

Research documents specific return on investment patterns:

  • Average payback period: 6 months for orchestration implementation (Anuta Networks, 2020)

  • Time-to-market reduction: From months to hours for new service deployment

  • Operational efficiency: 834 manual hours saved annually in documented case study (Itential, 2024)

  • Service delivery speed: From days to minutes for network request fulfillment

  • Automation ticket reduction: 1,670+ automated tickets per year in global manufacturing example

Hybrid Strategies: Complementary Approaches

The most successful enterprise strategies combine vendor platform strengths with orchestration capabilities:

Tiered Automation Architecture:
  1. Domain-level automation using vendor-specific platforms (Catalyst Center, CloudVision, Mist) for their specialized capabilities
  2. Cross-domain orchestration using platforms like Itential to coordinate workflows spanning multiple vendors
  3. Business system integration connecting network services to ITSM, IPAM, and application delivery platforms
Strategic Implementation Pattern:
  • Maintain vendor platform investments for AI/ML-driven assurance, zero-touch provisioning, and advanced analytics

  • Deploy orchestration layer for multi-vendor workflows, business process automation, and service standardization

  • Leverage APIs from vendor platforms as automation building blocks within orchestrated workflows

  • Build service catalog abstracting vendor differences behind consistent service interfaces

This complementary approach recognizes that:

“Domain automation provides modest increases in productivity at the individual engineer level within that domain but has minimal impact on the overall business because it fails to incorporate a broad enough set of activities to reduce overall effort and end-to-end process execution times” (Itential, 2024).

Implementation Considerations

Assessment Framework

Organizations evaluating vendor management platforms and orchestration requirements should assess:

Current State Analysis:
  • Vendor diversity inventory: Document all networking vendors in production (switches, routers, firewalls, load balancers, wireless, WAN optimization)

  • Management tool proliferation: Count separate management consoles and authentication systems in use

  • Manual coordination points: Identify workflows requiring handoffs between platform specialists

  • Service delivery timeframes: Measure current end-to-end service provisioning cycles

  • Operational overhead metrics: Quantify time spent on routine maintenance vs. strategic initiatives

Future State Requirements:
  • Merger and acquisition roadmap: Planned acquisitions likely to introduce additional vendor diversity

  • Cloud adoption strategy: Integration requirements with AWS, Azure, or Google Cloud networking services

  • Digital transformation initiatives: Business demands for faster service delivery and self-service capabilities

  • Compliance mandates: Regulatory requirements for unified security policy enforcement

  • Skills and staffing trends: Availability of vendor-specific specialists vs. generalist network engineers

Migration & Integration Strategies

Phased Orchestration Adoption:

Organizations typically implement orchestration in stages:

Phase 1: Assessment and Proof of Value (Months 1-3)
  • Identify high-impact use cases with manual coordination overhead

  • Select pilot workflows spanning 2-3 vendor platforms

  • Implement proof-of-concept with measurable success criteria

  • Document time savings and error reduction

Phase 2: Standardization and Expansion (Months 4-9)
  • Build service catalog with abstracted vendor implementations

  • Develop reusable workflow templates for common operations

  • Expand to additional use cases and vendor domains

  • Integrate with ITSM and business systems

Phase 3: Platform Engineering and Self-Service (Months 10-18)
  • Enable self-service consumption of network services

  • Implement policy-based automation and validation

  • Deploy NetDevOps and CI/CD pipeline integration

  • Achieve infrastructure-as-code operational model

Integration Architecture Patterns:
API-First Integration:
  • Vendor platform APIs as building blocks for orchestrated workflows

  • Standardized data models translating between vendor-specific formats

  • Event-driven automation with webhooks and message queues for system coordination

  • Idempotent operations ensuring safe retry and rollback capabilities

Gradual Migration Approach:
  • Maintain existing vendor platforms for their specialized capabilities

  • Layer orchestration on top rather than replacing domain-specific tools

  • Prove value incrementally with measurable business outcomes per phase

  • Build organizational capability through training and workflow documentation

When Single-Vendor Platforms Require Orchestration

While vendor-native platforms deliver exceptional automation within their ecosystems, 87% of enterprise networks operate as multi-vendor environments due to forces beyond any single organization’s control:

  • Merger and acquisition activity creating immediate heterogeneity

  • Best-of-breed technology selection for competitive advantage

  • Staggered infrastructure refresh cycles (3-15 years across domains)

  • Cloud adoption introducing AWS, Azure, Google Cloud coordination requirements

When multi-vendor coordination overhead exceeds 30% of operational capacity, organizations require orchestration platforms to coordinate workflows across vendor domains.

References

Anuta Networks. (2020). Why multi-vendor network automation should have vast vendor coverage? Retrieved from https://www.anutanetworks.com/why-multi-vendor-network-automation-should-have-vast-vendor-coverage/
Anuta Networks. (2020). Network orchestration and benefits for multi-vendor network. Retrieved from https://www.anutanetworks.com/network-orchestration/
Arista Networks. (2024). Arista EOS CloudVision: Turnkey cloud networking solution. Retrieved from https://www.arista.com/en/products/eos/eos-cloudvision
Arista Networks. (2025). CloudVision: The first decade. Retrieved from https://blogs.arista.com/blog/cloudvision-the-first-decade-2025
Business Research Insights. (2024). Network automation and orchestration market size, share, 2033. Retrieved from https://www.businessresearchinsights.com/market-reports/network-automation-and-orchestration-market-121376
Business Research Insights. (2024). SDN orchestration market size, share, industry trends, 2032. Retrieved from https://www.businessresearchinsights.com/market-reports/sdn-orchestration-market-109427
Cisco Systems. (2024). Cisco Catalyst Center network management. Retrieved from https://www.cisco.com/site/us/en/products/networking/catalyst-center/index.html
Cisco Systems. (2024). Catalyst Center 2.3.7 data sheet. Retrieved from https://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/dna-center/nb-06-dna-center-data-sheet-cte-en.html
Cisco Systems. (2024). Cisco Catalyst Center user guide, Release 2.3.7.x – Provision wireless devices. Retrieved from https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/catalyst-center/2-3-7/user_guide/b_cisco_catalyst_center_user_guide_237/m_provision-wireless-devices.html
Futuriom. (2024). What is the difference between network automation and orchestration? Retrieved from https://www.futuriom.com/articles/news/what-is-the-difference-between-network-automation-and-orchestration/2024/05
Gartner. (Referenced in Futuriom, 2024). Market Guide for network orchestration. Industry analyst report on orchestration adoption challenges.
IEEE. (2014). Network management challenges and trends in multi-layer and multi-vendor settings for carrier-grade networks. Conference paper on operational overhead in heterogeneous environments.
Infinitylabs. (2025). Learn about the automation tools to manage multi-vendor networks. Retrieved from https://www.infinitylabs.in/learn-about-the-automation-tools-to-manage-multi-vendor-networks/
Itential. (2024). Network orchestration for multi-domain infrastructure. Retrieved from https://www.itential.com/solutions/network-orchestration/
Itential. (2024). What’s the difference between network automation & network orchestration? Retrieved from https://www.itential.com/blog/company/automation-strategy/why-orchestration-is-a-critical-component-of-network-automation/
SGRwin. (2024). Top 5 multi-vendor network management challenges. Retrieved from https://www.sgrwin.com/top-5-multi-vendor-network-management-challenges/