New EMA Research Report Amplifies Need for a Strong Network Visibility Architecture
The ongoing COVID-19 pandemic and the continued threat of cyber-attacks have put the IT and security industry on high alert, resulting in many organizations having to push their network infrastructure into the cloud. This adoption to support remote work has created challenges in seeing security threats and maintaining performance. As a way to further explore the industry’s response to current visibility initiatives, EMA released a brand new report today sponsored by Keysight Technologies. The report provides an important look at how IT and security organizations use network visibility architectures to deliver network packets to critical performance and security analysis tools as well as how organizations need to evolve their network visibility architectures as they adopt hybrid, multi-cloud architectures.
Visibility architectures are essential for IT and network security personnel to be able to take a holistic look at an enterprise’s entire network followed by a better understanding of what tools you have, where the network is accessed, and what data feeds into those tools. In line with our focus at www.getneworkvisibility.com, we will explore the various findings from the report including visibility architecture benefits and challenges, requirements from companies for using network packet brokers (NPBs), and how to support hybrid, multi-cloud networks.
Visibility Architecture Benefits and Challenges
We’ve seen firsthand the benefits of having a visibility architecture in place from top global brands. By implementing visibility solutions, IT teams can expose hidden problems and therefore eliminate blind spots, improve efficiency, reduce costs and optimize troubleshooting efforts. The EMA report findings further support these benefits, stating that organizations that use a network visibility architecture will improve IT and security products and reduce overall security risk. 25.2% of survey respondents said that using visibility solutions improved capacity management, 22.5% reported optimized cloud migration and 21.9% said it resulted in network and application performance and resiliency. Other opportunities from using a visibility architecture include better cross-team collaboration, reduced compliance risk, and extended life of analysis tools.
As with any IT solution, there are going to be challenges in adoption and implementation. In the case of visibility architectures, organizations have stated that scalability and complexity (as well as insufficient budget, architectural complexity, and limited cloud visibility) are some of their top concerns. In most cases, the benefits of visibility architecture end up outweighing any potential disadvantages. The first task is to choose a solution that fits your enterprise's needs.
Budget concerns are not to be taken lightly but the reality is there are ways to cut costs even when it comes to visibility architectures. Many application and network performance and security tools are charged by their use. Filtering out unnecessary traffic, deduplication and other smart filtering functions can bring that cost down and more than pay for the use of taps and packet brokers while allowing for a more scalable, future-proof approach.
The Architectural Core: Network Packet Brokers
The gold standard in network visibility is the use of packet brokers. The EMA report found that advanced features, such as packet filtering, manipulation, and metadata generation are the top characteristics of a network packet broker that are most important to earning a return on investment in the technology. Secondary characteristics are listed as resilience/reliability with the tertiary priority noted as manageability and automation.
Adding credibility to its findings, the report included a quote from an enterprise system monitoring engineer with a Fortune 500 healthcare company: “Performance is number one for me. Then it’s the ease of upgrades. We think about the longevity and stability of the company, too. I also want to know if their customer support is any good. Packet broker management tools are also very important if you have an enterprise-scale deployment.”
Network packet brokers from Keysight have several advantages over its competitors such as no dropped packets, use of FPGA-based hardware acceleration, ease of use, and multiple features that can run concurrently on the same packet broker. More specific benefits include processing at line rate, parallel Zero-loss packet processing (something Gigamon’s CPU-based solutions can't provide), patented ZERO errors fully automated filter compiler, and a GUI drag and drop interface that makes configuring your network fast and simple. In addition, NPBs can load balance and optimize the flow of network data to the right tool at the right time.
The report also confirmed the importance of packet brokers when it comes to cybersecurity, citing that the most valued packet manipulation or data generation feature in a packet broker is threat intelligence. In fact, EMA said, “organizations that are the most successful with visibility architecture were the most likely to value threat intelligence, suggesting that it’s a best practice to seek this capability from packet broker vendors.”
Supporting Hybrid, Multi-Cloud Visibility
The EMA report confirmed what we already know: packet data is essential to cloud operations, especially for security monitoring and analysis. In fact, nearly 65% of respondents say this data is important for security monitoring and analysis in the cloud.
Newer virtual packet brokers like Keysight’s CloudLens can cost-effectively provide private, public, and/or hybrid cloud packet data to tools for analysis. This includes east-west traffic visibility. These advances will allow operational personnel to think of the cloud as just another extension of their physical network and move towards alignment with their security colleagues.
Another standout statistic from the report is that 99% of companies are making at least some attempt to collect packet data in the cloud and supply it to performance and security analysis tools. An infrastructure analyst with a Fortune 500 energy company was quoted as saying within the report, “[Network visibility architecture solutions] can definitely offer value in the cloud, because you need that network traffic when you’re doing end-to-end transactions. Without a packet broker in the cloud, I could deploy a fleet of Linux servers in the cloud running TCPDUMP, but that would be too costly.”
The research from EMA has made it abundantly clear that network visibility architectures are essential to a company’s success. By implementing solutions such as Keysight Technologies’ network packet brokers, your enterprise will be strategically positioned for exceptional network visibility with no traffic loss or dropped packets. Take a look at the entire report from EMA to get a comprehensive download on how enterprises can benefit from a network visibility architecture.
- +1 Like
- Add to Favorites
Recommend
- Keysight Technologies Acquires Quantum Benchmar, Augmenting Keysight‘s Quantum Portfolio
- Keysight First to Gain GCF Approval of Cases for Validating 5G New Radio mmWave Devices in Standalone Mode
- Keysight‘s O-RAN Test Solutions Enable Xilinx to Accelerate Development of Massive MIMO Radio Reference Design
- Keysight and Transphorm Create Power Supply Reference Design that Lowers Product Costs; Speeds Time to Market
- Keysight Massively Parallel Board Test System Selected by LACROIX in Automotive Printed Circuit Board Manufacturing
- Keysight, TIM and JMA Wireless Join Forces to Showcase O-RAN Technology at Mobile World Congress 2021
- Keysight Delivers New Solution for Benchmarking 5G End-user Quality of Experience in Indoor Environments
- Keysight First to Gain OmniAir Qualified Test Equipment Status, Accelerating C-V2X Device Certification
This document is provided by Sekorm Platform for VIP exclusive service. The copyright is owned by Sekorm. Without authorization, any medias, websites or individual are not allowed to reprint. When authorizing the reprint, the link of www.sekorm.com must be indicated.