Public Cloud, Private Cloud, Hybrid Cloud, any Cloud Visibility
Cloud computing has become the de facto foundation for digital business. As more and more enterprises move critical workloads to private and public clouds, they will face new challenges ensuring security, reliability, and performance of these workloads. If you are responsible for IT security, data center operations, or application performance, make sure you can see what's happening in the cloud.
VISIBILITY CHALLENGES
If you are wondering why cloud visibility is important, consider the following visibility-related concerns that can occur in cloud environments.
1. Security blind spots. Traditional security monitoring relies on intercepting traffic as it flows through physical network devices. In virtualized data centers and private clouds, this model breaks down because many packets move between virtual machines (VMs) or application instances and never cross a physical“wire”where they can be tapped for inspection. Because of these blind spots, virtual systems can be tempting targets for malicious breaches.
2. Tools not seeing all relevant data. The point of visibility is not merely to see cloud data, but to export that data to powerful analytics and reporting tools. Tools that receive only a limited view of traffic will have a harder time analyzing performance issues or resolving latency issues, especially as cloud traffic increases. Without access to data from cloud traffic, valuable clues to performance issues may not be identified, which can delay problem resolution or impact the user experience.
3. Security during data generation. Some organizations may use port mirroring in their virtualization platform to access traffic moving between virtual machines. However, this practice can create security issues in highly regulated environments. Security policies need to be consistently applied, even as application instances move within the cloud environment.
4. Complexity of data collection. With multiple data center and cloud environments, gathering all the relevant data needed by security and monitoring tools becomes complex and time-consuming. Solutions that make it easy to collect traffic from cloud and non-cloud sources can lead to immediate operational savings.
5. Cost of monitoring in across Cloud architecture. The total cost of a cloud architecture will rise with the volume of traffic that needs to be transported back to the data center for monitoring. The ability to filter cloud traffic at its source can minimize backhaul and the workload on your monitoring tools.
CLOUD VISIBILITY USE CASES
Given these issues, better visibility can provide valuable benefits to an organization, particularly in:
Security and compliance: Keeping your defenses strong in the cloud, as you do in the data center, requires end-to-end visibility for adequate monitoring and control. Packets that are not inspected represent unnecessary risk to the organization and can harbor malware or other attacks. Regulatory compliance may also require proof that you have secured data as it moves between virtual instances.
Performance analytics: As with security, analysis is dependent on having the necessary data—before, during, and after cloud migration. Your monitoring tools must receive the right inputs to produce accurate insights and to quickly detect and isolate performance problems.
Troubleshooting: If an application that runs in your virtual data center experiences an unusual slow-down, how will you pinpoint the source of the problem? Packet data combined with application-layer intelligence can help you isolate traffic associated with specific combinations of application, user, device, and geolocation, to reduce your mean-time-to-resolution.
In each of these areas, you need the ability to see all of the traffic moving between virtual resources. Without full visibility to what's happening in your clouds, you increase your risk for data breaches, delays in problem resolution, and loss of productivity or customer satisfaction.
VISIBILITY SOLUTIONS
So, if cloud visibility is essential to security and application performance, what can you do to address the blind spots that naturally occur? Here are a few things to look for:
Virtual Taps - Tapping is the process of accessing virtual or cloud packets in order to send them to security and performance monitoring tools. In traditional environments, a physical tap accesses traffic flowing through a physical network switch. In cloud environments, a virtual tap can be deployed as a virtual instance in the hypervisor to:
• Access all traffic passing between VMs or application instances
• Provide basic (Layer 2-4) filtering of virtual traffic
For maximum flexibility, you should choose virtual taps like those in Keysight CloudLens that support all the leading hypervisors, including OpenStack KVM, VMware ESXi/NSX, and Microsoft Hyper-V.
Virtual Packet Processors - Packet processing is used for more advanced manipulation of packets, to trim the data down to only what is necessary, for maximum tool efficiency. Look for solutions that provide data aggregation, deduplication, and NetFlow generation. Keysight CloudLens packet processing can also do more granular filtering using application intelligence to identify traffic by application, user, device, or geolocation. For private clouds hosted off premises, advanced packet processing can be done by transmitting the cloud data back to the data center. Organizations that already have a physical packet broker deployed, or are new to monitoring cloud traffic, may choose this approach. A more efficient approach can be to perform advanced packet processing right in the cloud using a virtual packet processor. Only Keysight offers this all-cloud solution. With this option, you can send trimmed data directly to cloud-based security or analysis tools, eliminating the need for backhaul to the data center. This can be an attractive option for organizations with extremely high traffic volume.
SUMMARY
Monitor Traffic Across Your Hybrid Cloud with CloudLens Both public and private clouds have their merits. That's why many organizations utilize both. These hybrid cloud implementations maximize versatility; however, many solutions cannot capture packets in both public and private clouds without complex and costly workarounds. Hybrid clouds demand a seamless, stress-free visibility solution. With CloudLens, you can access crucial packet data without headaches. Compatible with most major public and private clouds, its easy-to-use management platform simplifies packet capture and saves valuable time. As you move more workloads to cloud environments, be sure to consider a visibility solution that will let you access and visualize your cloud traffic. Don't let blind spots in your network result in security breaches, application bottlenecks, or dissatisfied users.
- +1 Like
- Add to Favorites
Recommend
- Keysight Technologies Acquires Quantum Benchmar, Augmenting Keysight‘s Quantum Portfolio
- Keysight First to Gain GCF Approval of Cases for Validating 5G New Radio mmWave Devices in Standalone Mode
- Keysight‘s O-RAN Test Solutions Enable Xilinx to Accelerate Development of Massive MIMO Radio Reference Design
- Keysight and Transphorm Create Power Supply Reference Design that Lowers Product Costs; Speeds Time to Market
- Keysight Massively Parallel Board Test System Selected by LACROIX in Automotive Printed Circuit Board Manufacturing
- Keysight, TIM and JMA Wireless Join Forces to Showcase O-RAN Technology at Mobile World Congress 2021
- Keysight Delivers New Solution for Benchmarking 5G End-user Quality of Experience in Indoor Environments
- Keysight First to Gain OmniAir Qualified Test Equipment Status, Accelerating C-V2X Device Certification
This document is provided by Sekorm Platform for VIP exclusive service. The copyright is owned by Sekorm. Without authorization, any medias, websites or individual are not allowed to reprint. When authorizing the reprint, the link of www.sekorm.com must be indicated.