SlideShare a Scribd company logo
1 of 24
Download to read offline
Network Visibility
Architecture for the
Hybrid, Multi-Cloud
Enterprise
Shamus McGillicuddy
Vice President of Research
shamus@enterprisemanagement.com
Twitter: @ShamusEMA
Sponsored by . . .
Watch the On-Demand Webinar
• Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise
On-Demand Webinar:
https://info.enterprisemanagement.com/network-visibility-
architecture-webinar-ss
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
| @ema_research
Featured Speaker
Shamus McGillicuddy is the Vice President of
Research at Enterprise Management Associates
(EMA), where he leads the network infrastructure and
operations practice. He has more than 16 years of
experience in the IT industry. His research focuses on
all aspects of managing enterprise networks,
including network automation, AIOps-driven network
operations, multi-cloud networking, and WAN
transformation.
© 2022 Enterprise ManagementAssociates, Inc. 3
Shamus McGillicuddy
Vice President of Research
Network Infrastructureand Operations
| @ema_research
© 2022 Enterprise ManagementAssociates, Inc. 4
Sponsors
| @ema_research
Agenda
© 2022 Enterprise ManagementAssociates, Inc. 5
Research Goals and
Methodology
1 2 4
3
Network Visibility
Strategies
Visibility
Architecture
Network Visibility
and the Cloud
5
Q&A
Research Goals and
Methodology
| @ema_research
New Market Research on Network Visibility Architecture
© 2022 Enterprise ManagementAssociates, Inc. 7
“It’slike flying an airplane.In good
weather,visual flight rules are fine. When
thestormscome up, you need
instrumentationand instrument flight rules.
Otherwise,you crash. It’s all good until it’s
not,and then you’re in thewilderness.”
Enterprise monitoring systems engineer,
Fortune500 healthcare provider
What is networkvisibility
architecture?
An overlay of traffic mirroring, aggregation, and
distribution solutions that delivers network traffic
data to security and performance analysis tools
Key components
TAPs and SPAN ports
Network packet broker appliances
Software-based probes and packet brokers for
virtual infrastructure
Cloud-based probes and packet brokers and
traffic mirroring services
On the importance of network visibility architecture :
| @ema_research
Goals and Methodology
© 2022 Enterprise ManagementAssociates, Inc. 8
Goals
Identify best practices and emerging requirements for network visibility
architecture in the face of several key drivers, including:
Methodology
Survey of 302 IT and security professionals on their use of network
visibility technology
Ubiquity of virtualization
and east-west traffic in
data centers
Proliferation of hybrid,
multi-cloud
architectures
Increased use of
encryption to hide
malicious traffic
| @ema_research
Job Titles
Qualifiers
Functional Groups
50% IT middle management
24% IT executive
26% Technical staff
25% Technology executive
suite
30% Cybersecurity/IT
security/risk
management
21% Project management/
program management
8% Cloud engineering/
operations
8% Data center operations
7% Network infrastructure
and operations
Direct engagement with network visibility solutions
Network packet brokers installed in a network
Company Size
Region
38% Midsized enterprise – 500 to 2,499 employees
45% Large enterprise – 2,500 to 9,999 employees
17% Very large enterprise – 10,000 or more employees
62% North America 38% Europe
Demographics
© 2022 Enterprise ManagementAssociates, Inc. 9
Top Industries
21% Banking/Finance/
Insurance
13% Healthcare provider/
hospitals
13% Manufacturing
13% Retail
9% Professional/Technical
services not related to IT
6% Construction/
Civil engineering
6% Energy/Utilities
Network Visibility
Strategies
| @ema_research
Strategic Network Visibility Spending
© 2022 Enterprise ManagementAssociates, Inc. 11
Strategic driversof networkvisibility spending
55% Hybrid and/or multi-cloud architecture
49% Zero trust security
46% Application performance optimization
78% of organizations will
increase their spending on
network visibility
architecture solutions over
the next two years
• 23% describe that growth as
significant
• Successful network visibility users
are more likely to expect
significant growth
| @ema_research
Events or issues experienced over the last two years that prompted
organizations to invest in visibilityarchitecture solutions
Reactive Spending
© 2022 Enterprise ManagementAssociates, Inc. 12
Traffic growthis emerging as a
spending imperative
#6 trigger in 2020
#1 trigger today
“Unauthorized access toa network
can lead to so many serious
problems for an organization.If you
have toolsthat require packets,
thosetools will definitelyneed
visibilityintothenetwork.Network
packet brokersare one of those
thingsthat you must havefor full
security.”
Information security engineer,
managed security servicesprovider
| @ema_research
Most important benefits of using a network visibilityarchitecture
Only 34% of organizations are
fully successful withnetwork
visibility architecture
Down from 40% in 2020
Benefits and Challenges
© 2022 Enterprise ManagementAssociates, Inc. 13
Top Challenges
1. Scalability issues 27%
2. Architectural complexity 26%
3. Data quality 23%
4. Skills gaps 19%
5. Budget 19%
6. Limited cloud visibility 17%
Visibility Architecture
| @ema_research
Enterprises are Pulling Back From TAPS, Leaning More on SPAN Ports
© 2022 Enterprise ManagementAssociates, Inc. 15
Percentage of port mirroring accomplished via SPAN ports versus TAPs High percentage of
SPAN port use more
commonin largest
companies
Key benefits of using
TAPs
1. Reduced management
complexity 44%
2. Data quality 37%
3. Reduced hardware
resource utilization 19%
| @ema_research
Virtual Infrastructure
© 2022 Enterprise ManagementAssociates, Inc. 16
98% of organizations mirror traffic from virtual infrastructure
68% Virtual servers
60% Virtual storage
60% Virtual switches/routers
49% Cloud-native platforms – containers, service mesh
Only 34% of organizations
use native traffic mirroring
features of virtual
infrastructure
| @ema_research
Network Packet Broker Requirements
© 2022 Enterprise ManagementAssociates, Inc. 17
Most critical filtering feature:
49% Layer 7 filtering
Platform Requirements
30% Advanced features
28% Resilience/Reliability
22% Manageability
20% Scalability/Performance
Critical packet manipulation
and data generation features
47% Threat intelligence
39% Decryption
31% Metadata generation/NetFlow
29% Packet slicing
| @ema_research
Percentage of the malicious activity hidden within
encrypted traffic, by overall success with network
visibilityarchitectures
Visibility Architecture Enables Inspection of Encrypted Traffic
© 2022 Enterprise ManagementAssociates, Inc. 18
Preferred resource for decryptingTLS/SSL traffic for inspection
“If you’re looking for suspicious traffic, you’ve got to be
able to read into that payload. Otherwise, all you’re left
with is determining the risk based on source and
destination information.”
Infrastructure analyst,
Fortune 500 energy company
27% of malicious activity detected on networks over the last
year was hidden within encrypted traffic
Security and performance
analysis tools (43%) – Less
favored by cybersecurity
Network packet broker 23%
Dedicated decryption
appliance 12%
Packet capture appliance 11%
Application delivery
controller 7%
Network Visibility and
the Cloud
| @ema_research
The Cloud Creates Network Blind Spots
© 2022 Enterprise ManagementAssociates, Inc. 20
45% of organization:
Migrationof applications
to the cloud has created
network blind spots
More common in multi-cloud
companies
Consequences of blind spots
Policy violation 49%
Extend IT service
degradation/downtime 46%
Security breach 45%
Cloud cost overruns 44%
Engineers, architects,and
other technical personnel
are more aware of cloud-
related blind spots than IT
executives and middle
management
| @ema_research
The types of packet data that organizations collect and analyze from
traffic in the public cloud
65%
Packet data is very important to cloud
security monitoring and analysis
54%
Packet data is very important to cloud
performance management
50%
Packet data is very important to cloud
capacity management
Packet Data is Critical to Cloud Operations
© 2022 Enterprise ManagementAssociates, Inc. 21
| @ema_research
Primary method for supplying cloud-related network
packet data to security and performance analysis tools
Most compelling benefits of third-party visibility software
in the cloud
1. Reliability of data collection 54%
2. Administrative security 36%
3. Manageability/Automation 34%
4. Advanced packet filtering and modification features 32%
5. Integration with visibility technology in private infrastructure 30%
Most Organizations Perceive Importance of End-to-End Multi-Cloud Visibility
Architecture
© 2022 Enterprise ManagementAssociates, Inc. 22
Establishing a network visibility architecture that spans
on-premises infrastructure and public cloud
33% of all organizations believe this is very important, 56%
somewhat important
The most successful users of visibility solutions are more likely (50%)
to rate this as very important
| @ema_research
Final Thoughts
© 2022 Enterprise ManagementAssociates, Inc. 23
The cloud is the primary driver of network visibility architecture strategies
Visibility architectures improve IT and security team productivity and reduce
security risk
Too many organizations are leaning on SPAN ports more than TAPs for traffic
mirroring
Too many organizations are decrypting traffic on analysis tools
Network blind spots introduced by the cloud leads to policy violations,
IT service problems, and security breaches
Packet data delivered by an end-to-end, hybrid cloud visibility
architecture can remove those blind spots
| @ema_research
The Network Visibility Architecture Report is Now Available
Learn more and download:
https://bit.ly/3acBtGk
© 2022 Enterprise ManagementAssociates, Inc. 24

More Related Content

Similar to Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise

DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...Enterprise Management Associates
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessEnterprise Management Associates
 
Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud EnterprisesEnterprise Management Associates
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersEnterprise Management Associates
 
NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...
NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...
NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...Enterprise Management Associates
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Enterprise Management Associates
 
The Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldThe Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldEnterprise Management Associates
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...Enterprise Management Associates
 
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...Enterprise Management Associates
 
Achieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network MonitoringAchieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network MonitoringEnterprise Management Associates
 
How LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
How LTE is Enabling Non-Stop Connectivity for SD-WAN DeploymentsHow LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
How LTE is Enabling Non-Stop Connectivity for SD-WAN DeploymentsEnterprise Management Associates
 
Wide-Area Network Transformation: How Enterprises Succeed with Software-Defin...
Wide-Area Network Transformation: How Enterprises Succeed with Software-Defin...Wide-Area Network Transformation: How Enterprises Succeed with Software-Defin...
Wide-Area Network Transformation: How Enterprises Succeed with Software-Defin...Enterprise Management Associates
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise Management Associates
 

Similar to Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise (20)

DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud Enterprises
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet Brokers
 
NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...
NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...
NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
The Cloudification of the Data Center Network
The Cloudification of the Data Center NetworkThe Cloudification of the Data Center Network
The Cloudification of the Data Center Network
 
The Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldThe Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud World
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
 
Achieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network MonitoringAchieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network Monitoring
 
How LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
How LTE is Enabling Non-Stop Connectivity for SD-WAN DeploymentsHow LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
How LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
 
Adapting Performance Visibility to New Technology Trends
Adapting Performance Visibility to New Technology TrendsAdapting Performance Visibility to New Technology Trends
Adapting Performance Visibility to New Technology Trends
 
Wide-Area Network Transformation: How Enterprises Succeed with Software-Defin...
Wide-Area Network Transformation: How Enterprises Succeed with Software-Defin...Wide-Area Network Transformation: How Enterprises Succeed with Software-Defin...
Wide-Area Network Transformation: How Enterprises Succeed with Software-Defin...
 
Big Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and ManagementBig Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and Management
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
 
Network Management Megatrends 2020
Network Management Megatrends 2020Network Management Megatrends 2020
Network Management Megatrends 2020
 

More from Enterprise Management Associates

Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Enterprise Management Associates
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryEnterprise Management Associates
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsEnterprise Management Associates
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...Enterprise Management Associates
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Enterprise Management Associates
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityEnterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesEnterprise Management Associates
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Enterprise Management Associates
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...Enterprise Management Associates
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...Enterprise Management Associates
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceEnterprise Management Associates
 
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Enterprise Management Associates
 

More from Enterprise Management Associates (20)

Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
Automation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOpsAutomation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOps
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
 
Debunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research SlidesDebunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research Slides
 
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise

  • 1. Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise Shamus McGillicuddy Vice President of Research shamus@enterprisemanagement.com Twitter: @ShamusEMA Sponsored by . . .
  • 2. Watch the On-Demand Webinar • Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise On-Demand Webinar: https://info.enterprisemanagement.com/network-visibility- architecture-webinar-ss • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch
  • 3. | @ema_research Featured Speaker Shamus McGillicuddy is the Vice President of Research at Enterprise Management Associates (EMA), where he leads the network infrastructure and operations practice. He has more than 16 years of experience in the IT industry. His research focuses on all aspects of managing enterprise networks, including network automation, AIOps-driven network operations, multi-cloud networking, and WAN transformation. © 2022 Enterprise ManagementAssociates, Inc. 3 Shamus McGillicuddy Vice President of Research Network Infrastructureand Operations
  • 4. | @ema_research © 2022 Enterprise ManagementAssociates, Inc. 4 Sponsors
  • 5. | @ema_research Agenda © 2022 Enterprise ManagementAssociates, Inc. 5 Research Goals and Methodology 1 2 4 3 Network Visibility Strategies Visibility Architecture Network Visibility and the Cloud 5 Q&A
  • 7. | @ema_research New Market Research on Network Visibility Architecture © 2022 Enterprise ManagementAssociates, Inc. 7 “It’slike flying an airplane.In good weather,visual flight rules are fine. When thestormscome up, you need instrumentationand instrument flight rules. Otherwise,you crash. It’s all good until it’s not,and then you’re in thewilderness.” Enterprise monitoring systems engineer, Fortune500 healthcare provider What is networkvisibility architecture? An overlay of traffic mirroring, aggregation, and distribution solutions that delivers network traffic data to security and performance analysis tools Key components TAPs and SPAN ports Network packet broker appliances Software-based probes and packet brokers for virtual infrastructure Cloud-based probes and packet brokers and traffic mirroring services On the importance of network visibility architecture :
  • 8. | @ema_research Goals and Methodology © 2022 Enterprise ManagementAssociates, Inc. 8 Goals Identify best practices and emerging requirements for network visibility architecture in the face of several key drivers, including: Methodology Survey of 302 IT and security professionals on their use of network visibility technology Ubiquity of virtualization and east-west traffic in data centers Proliferation of hybrid, multi-cloud architectures Increased use of encryption to hide malicious traffic
  • 9. | @ema_research Job Titles Qualifiers Functional Groups 50% IT middle management 24% IT executive 26% Technical staff 25% Technology executive suite 30% Cybersecurity/IT security/risk management 21% Project management/ program management 8% Cloud engineering/ operations 8% Data center operations 7% Network infrastructure and operations Direct engagement with network visibility solutions Network packet brokers installed in a network Company Size Region 38% Midsized enterprise – 500 to 2,499 employees 45% Large enterprise – 2,500 to 9,999 employees 17% Very large enterprise – 10,000 or more employees 62% North America 38% Europe Demographics © 2022 Enterprise ManagementAssociates, Inc. 9 Top Industries 21% Banking/Finance/ Insurance 13% Healthcare provider/ hospitals 13% Manufacturing 13% Retail 9% Professional/Technical services not related to IT 6% Construction/ Civil engineering 6% Energy/Utilities
  • 11. | @ema_research Strategic Network Visibility Spending © 2022 Enterprise ManagementAssociates, Inc. 11 Strategic driversof networkvisibility spending 55% Hybrid and/or multi-cloud architecture 49% Zero trust security 46% Application performance optimization 78% of organizations will increase their spending on network visibility architecture solutions over the next two years • 23% describe that growth as significant • Successful network visibility users are more likely to expect significant growth
  • 12. | @ema_research Events or issues experienced over the last two years that prompted organizations to invest in visibilityarchitecture solutions Reactive Spending © 2022 Enterprise ManagementAssociates, Inc. 12 Traffic growthis emerging as a spending imperative #6 trigger in 2020 #1 trigger today “Unauthorized access toa network can lead to so many serious problems for an organization.If you have toolsthat require packets, thosetools will definitelyneed visibilityintothenetwork.Network packet brokersare one of those thingsthat you must havefor full security.” Information security engineer, managed security servicesprovider
  • 13. | @ema_research Most important benefits of using a network visibilityarchitecture Only 34% of organizations are fully successful withnetwork visibility architecture Down from 40% in 2020 Benefits and Challenges © 2022 Enterprise ManagementAssociates, Inc. 13 Top Challenges 1. Scalability issues 27% 2. Architectural complexity 26% 3. Data quality 23% 4. Skills gaps 19% 5. Budget 19% 6. Limited cloud visibility 17%
  • 15. | @ema_research Enterprises are Pulling Back From TAPS, Leaning More on SPAN Ports © 2022 Enterprise ManagementAssociates, Inc. 15 Percentage of port mirroring accomplished via SPAN ports versus TAPs High percentage of SPAN port use more commonin largest companies Key benefits of using TAPs 1. Reduced management complexity 44% 2. Data quality 37% 3. Reduced hardware resource utilization 19%
  • 16. | @ema_research Virtual Infrastructure © 2022 Enterprise ManagementAssociates, Inc. 16 98% of organizations mirror traffic from virtual infrastructure 68% Virtual servers 60% Virtual storage 60% Virtual switches/routers 49% Cloud-native platforms – containers, service mesh Only 34% of organizations use native traffic mirroring features of virtual infrastructure
  • 17. | @ema_research Network Packet Broker Requirements © 2022 Enterprise ManagementAssociates, Inc. 17 Most critical filtering feature: 49% Layer 7 filtering Platform Requirements 30% Advanced features 28% Resilience/Reliability 22% Manageability 20% Scalability/Performance Critical packet manipulation and data generation features 47% Threat intelligence 39% Decryption 31% Metadata generation/NetFlow 29% Packet slicing
  • 18. | @ema_research Percentage of the malicious activity hidden within encrypted traffic, by overall success with network visibilityarchitectures Visibility Architecture Enables Inspection of Encrypted Traffic © 2022 Enterprise ManagementAssociates, Inc. 18 Preferred resource for decryptingTLS/SSL traffic for inspection “If you’re looking for suspicious traffic, you’ve got to be able to read into that payload. Otherwise, all you’re left with is determining the risk based on source and destination information.” Infrastructure analyst, Fortune 500 energy company 27% of malicious activity detected on networks over the last year was hidden within encrypted traffic Security and performance analysis tools (43%) – Less favored by cybersecurity Network packet broker 23% Dedicated decryption appliance 12% Packet capture appliance 11% Application delivery controller 7%
  • 20. | @ema_research The Cloud Creates Network Blind Spots © 2022 Enterprise ManagementAssociates, Inc. 20 45% of organization: Migrationof applications to the cloud has created network blind spots More common in multi-cloud companies Consequences of blind spots Policy violation 49% Extend IT service degradation/downtime 46% Security breach 45% Cloud cost overruns 44% Engineers, architects,and other technical personnel are more aware of cloud- related blind spots than IT executives and middle management
  • 21. | @ema_research The types of packet data that organizations collect and analyze from traffic in the public cloud 65% Packet data is very important to cloud security monitoring and analysis 54% Packet data is very important to cloud performance management 50% Packet data is very important to cloud capacity management Packet Data is Critical to Cloud Operations © 2022 Enterprise ManagementAssociates, Inc. 21
  • 22. | @ema_research Primary method for supplying cloud-related network packet data to security and performance analysis tools Most compelling benefits of third-party visibility software in the cloud 1. Reliability of data collection 54% 2. Administrative security 36% 3. Manageability/Automation 34% 4. Advanced packet filtering and modification features 32% 5. Integration with visibility technology in private infrastructure 30% Most Organizations Perceive Importance of End-to-End Multi-Cloud Visibility Architecture © 2022 Enterprise ManagementAssociates, Inc. 22 Establishing a network visibility architecture that spans on-premises infrastructure and public cloud 33% of all organizations believe this is very important, 56% somewhat important The most successful users of visibility solutions are more likely (50%) to rate this as very important
  • 23. | @ema_research Final Thoughts © 2022 Enterprise ManagementAssociates, Inc. 23 The cloud is the primary driver of network visibility architecture strategies Visibility architectures improve IT and security team productivity and reduce security risk Too many organizations are leaning on SPAN ports more than TAPs for traffic mirroring Too many organizations are decrypting traffic on analysis tools Network blind spots introduced by the cloud leads to policy violations, IT service problems, and security breaches Packet data delivered by an end-to-end, hybrid cloud visibility architecture can remove those blind spots
  • 24. | @ema_research The Network Visibility Architecture Report is Now Available Learn more and download: https://bit.ly/3acBtGk © 2022 Enterprise ManagementAssociates, Inc. 24