I’ve sat across the table from a lot of IT leaders who knew, somewhere in the back of their mind, that they had a vendor lock-in problem. The signs were familiar: a renewal conversation that started with a number that seemed impossible, a request for a competing quote that produced nothing credible because the switching costs were too high, or a technology refresh that ended up as a like-for-like replacement because the alternative would require re-training the entire team and rebuilding the automation stack.
What rarely gets examined is how you got there in the first place — and how to avoid it next time.
Vendor lock-in in enterprise networking is rarely the result of a single bad decision. It accumulates gradually, through a series of individually reasonable choices that collectively eliminate your options. Understanding the mechanism is the first step toward protecting yourself.
How Lock-In Happens
Networking lock-in typically operates across several dimensions simultaneously:
Protocol and feature dependency. The networking industry has a long history of proprietary extensions to otherwise standard protocols. A vendor implements a feature your environment depends on — a specific load-balancing algorithm, a particular VXLAN implementation detail, a proprietary management protocol — and over time, your architecture evolves around that feature. When you go to evaluate alternatives, you discover that the feature either doesn’t exist elsewhere or works differently enough that migration requires significant re-engineering.
Operational tooling. Modern network operations are increasingly automation-driven. If your automation stack — Ansible playbooks, Python scripts, CI/CD pipelines for network configuration — was written against one vendor’s API or CLI syntax, that tooling doesn’t transfer. Migrating vendors means rewriting your automation, which is expensive, time-consuming, and risky. Many organizations underestimate this cost when evaluating alternatives.
Training and certification investment. Your team has spent years developing expertise on a specific platform. That expertise has real value — and losing it is a real cost. Engineers who are deeply proficient on one vendor’s platform will have a meaningful productivity dip when transitioning to another, even when the underlying concepts are the same.
Support contract dependencies. Enterprise networking vendors bundle support in ways that create soft lock-in. If your support contract covers a specific firmware version or feature set, and you’re running configurations that depend on those specifics, moving away from the vendor’s support structure carries operational risk.
Refresh cycle synchronization. Vendors often structure their pricing and product timelines to make their refresh cycles align with your budget cycles. By the time your hardware reaches end-of-life or end-of-support, the path of least resistance is another purchase from the same vendor — particularly when the sales relationship is strong and the alternatives require a longer evaluation cycle.
What It Actually Costs
The most visible cost of lock-in is the renewal conversation. When a vendor knows you have limited alternatives, they negotiate accordingly. Maintenance and support renewals that once seemed reasonable can escalate significantly over multi-year commitments. Software licensing models — particularly as vendors shift toward subscription-based pricing for operating systems and features — create ongoing revenue streams that are much harder to walk away from than a one-time hardware purchase.
The less visible costs are often larger:
Architectural compromise. When you’re locked in, you build around what you have rather than what would be best. I’ve seen environments running unnecessary complexity — hairpinned traffic flows, awkward segmentation designs, compromised redundancy — because the alternative would have required switching vendors. The networking architecture serves the vendor relationship rather than the business.
Missed technology transitions. Vendor lock-in slows your ability to adopt new architectures. If your existing vendor is late to a technology shift — or actively resistant to it because it threatens their product margin — your organization waits. The transition to leaf-spine, the adoption of network automation, the move to cloud-friendly architectures: all of these were delayed in many organizations precisely because of lock-in.
Negotiating position erosion. Each renewal cycle where you don’t seriously evaluate alternatives is a cycle that weakens your negotiating position further. Vendors track this. A customer who has run the same platform for eight years and has never seriously engaged a competitor is a very different negotiation than a customer who completed a competitive evaluation two years ago and kept the results on file.
How to Protect Your Options
The goal isn’t to constantly switch vendors — churn is expensive and disruptive. The goal is to maintain enough genuine optionality that vendors know you can switch, which changes the nature of every commercial conversation.
Design around open standards wherever possible. BGP as the underlay routing protocol, EVPN/VXLAN for the overlay, standard YANG models for configuration, NETCONF/RESTCONF for programmatic access — these are genuinely multi-vendor standards. When you build your architecture on open protocols rather than proprietary extensions, the barrier to migration drops substantially.
Write automation against abstraction layers, not vendor CLIs. Tools like Ansible with vendor-agnostic modules, or network automation frameworks that abstract the underlying device syntax, reduce the cost of migration. If your automation stack requires significant rework every time you change a vendor, you’re accumulating technical debt with each deployment.
Conduct competitive evaluations on a regular cycle — even when you’re satisfied. A proof-of-concept with an alternative vendor every few years serves two purposes: it keeps your team’s market knowledge current, and it signals to your incumbent vendor that you’re a sophisticated buyer. You don’t have to switch to benefit from the evaluation.
Separate the hardware and software conversations. Networking vendors increasingly bundle software features, support, and hardware in ways designed to make the total cost opaque. Request itemized pricing. Understand what you’re paying for software licensing versus hardware versus support. This creates clarity and often reveals negotiating leverage you didn’t know you had.
Engage an independent advisor before major renewals. This is self-serving advice, I’ll acknowledge — but it’s also genuinely valuable. A vendor-neutral advisor who has seen how these negotiations play out across multiple organizations knows where the flex is in vendor pricing, what alternative options exist, and how to structure conversations to your advantage. The cost of advisory support is typically a small fraction of the value recovered in a well-negotiated renewal.
A Note on “Vendor-Neutral” Advice
I want to be direct about something: most of the people who advise enterprise organizations on networking vendor decisions have a financial stake in the outcome. Resellers earn margin. VARs earn rebates. Consultants with preferred partnerships earn referral fees.
At Acton Pacific Strategies, I have no reseller agreements, no OEM partnerships, and no financial relationships with any networking vendor. My income comes entirely from the organizations I advise. That’s a deliberately chosen constraint, because I’ve seen how subtly the incentives distort advice — often without the advisor even being aware of it.
When you’re evaluating vendor lock-in and trying to understand your real options, you want advice that starts from your interests, not from a partner program tier.
Alan Sukiennik is the founder of Acton Pacific Strategies, a Las Vegas-based independent infrastructure advisory firm. He has 30 years of experience in enterprise and service provider networking, including senior engineering roles at Arista Networks, F5 Networks, BlueCat Networks, and Nokia. Reach him at alan@actonpacific.com or schedule a consultation.
