New EMA Research Report Amplifies Need for a Strong Network Visibility Architecture
The ongoing COVID-19 pandemic and continued threat of cyber-attacks has put the IT and security industry on high alert, resulting in many organizations having to push their network infrastructure into the cloud. This adoption to support remote work has created challenges in seeing security threats and maintaining performance. As a way to further explore the industry’s response to current visibility initiatives, EMA released a brand new report today sponsored by Keysight Technologies. The report provides an important look at how IT and security organizations use network visibility architectures to deliver network packets to critical performance and security analysis tools as well as how organizations need to evolve their network visibility architectures as they adopt hybrid, multi-cloud architectures.
Visibility architectures are essential for IT and network security personnel to be able to take a holistic look at an enterprise’s entire network followed by a better understanding of what tools you have, where the network is accessed, and what data feeds into those tools. In line with our focus at www.getneworkvisibility.com, we will explore the various findings from the report including visibility architecture benefits and challenges, requirements from companies for using network packet brokers (NPBs) and how to support hybrid, multi-cloud networks.
Visibility Architecture Benefits and Challenges
We’ve seen firsthand the benefits of having a visibility architecture in place from top global brands. By implementing visibility solutions, IT teams can expose hidden problems and therefore eliminate blind spots, improve efficiency, reduce costs and optimize troubleshooting efforts. The EMA report findings further support these benefits, stating that organizations that use a network visibility architecture will improve IT and security productivity and reduce overall security risk. 25.2% of survey respondents said that using visibility solutions improved capacity management, 22.5% reported optimized cloud migration and 21.9% said it resulted in network and application performance and resiliency. Other opportunities from using a visibility architecture include better cross-team collaboration, reduced compliance risk, and extended life of analysis tools.
As with any IT solutions, there are going to be challenges to adoption and implementation. In the case of visibility architectures, organizations have stated that scalability and complexity (as well as insufficient budget, architectural complexity, and limited cloud visibility) are some of their top concerns. In most cases, the benefits of visibility architecture end up outweighing any potential disadvantages. The first task is to choose a solution that fits your enterprise needs.
Budget concerns are not to be taken lightly but the reality is there are ways to cut costs even when it comes to visibility architectures. Many application and network performance and security tools are charged by their use. Filtering out unnecessary traffic, deduplication and other smart filtering functions can bring that cost down and more than pay for the use of taps and packet brokers, while allowing for a more scalable, future proof approach.
The Architectural Core: Network Packet Brokers
The gold standard in network visibility is the use of packet brokers. The EMA report found that advanced features, such as packet filtering, manipulation, and metadata generation are the top characteristics of a network packet broker that are most important to earning a return on investment in the technology. Secondary characteristics are listed as resilience/reliability with the tertiary priority noted as manageability and automation.
Adding credibility to its findings, the report included a quote from an enterprise systems monitoring engineer with a Fortune 500 healthcare company: “Performance is number one for me. Then it’s ease of upgrades. We think about the longevity and stability of the company, too. I also want to know if their customer support is any good. Packet broker management tools are also very important if you have an enterprise-scale deployment.”
Network packet brokers from Keysight have several advantages over its competitors such as no dropped packets, use of FPGA-based hardware acceleration, ease of use and multiple features that can run concurrently on the same packet broker . More specific benefits include processing at line rate, parallel Zero-loss packet processing (something Gigamon’s CPU based solutions can't provide), patented ZERO-errors fully automated filter compiler and a GUI drag and drop interface that makes configuring your network fast and simple. In addition, NPBs can load balance and optimize the flow of network data to the right tool at the right time.
The report also confirmed the importance of packet brokers when it comes to cybersecurity, citing that the most valued packet manipulation or data generation feature in a packet broker is threat intelligence. In fact, EMA said “organizations that are the most successful with visibility architecture were the most likely to value threat intelligence, suggesting that it’s a best practice to seek this capability from packet broker vendors.”
Supporting Hybrid, Multi-Cloud Visibility
The EMA report confirmed what we already know: packet data is essential to cloud operations, especially for security monitoring and analysis. In fact, nearly 65% of respondents say this data is important for security monitoring and analysis in the cloud.
Newer virtual packet brokers like Keysight’s CloudLens can cost effectively provide private, public, and/or hybrid cloud packet data to tools for analysis. This includes east-west traffic visibility. These advances will allow operational personnel to think of the cloud as just another extension of their physical network and move towards alignment with their security colleagues.
Another standout statistic from the report is that 99% of companies are making at least some attempt to collect packet data in the cloud and supply it to performance and security analysis tools. An infrastructure analyst with a Fortune 500 energy company was quoted as saying within the report, “[Network visibility architecture solutions] can definitely offer value in the cloud, because you need that network traffic when you’re doing end-to-end transactions. Without a packet broker in the cloud, I could deploy a fleet of Linux servers in the cloud running TCPDUMP, but that would be too costly.”
The research from EMA has made it abundantly clear that network visibility architectures are essential to a company’s success. By implementing solutions such as Keysight Technologies’ network packet brokers, your enterprise will be strategically positioned for exceptional network visibility with no traffic loss or dropped packets. Take a look at the entire report from EMA to get a comprehensive download on how enterprises can benefit from a network visibility architecture.
For more information on understanding network visibility and resources on how to implement the tools, check out everything the www.getnetworkvisibility.com community has to offer. You can register for the webinar here.