SlideShare a Scribd company logo
1 of 33
Download to read offline
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Next-Generation
Network Packet Brokers
Defining the Future of Network Visibility Fabrics
Shamus McGillicuddy
Research Director
Enterprise Management Associates
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Watch the On-Demand Webinar
• Next-Generation Network Packet Brokers: Defining the Future
of Network Visibility Fabrics On-Demand webinar is available
here: https://ema.wistia.com/medias/fvzt3secse
• Check out upcoming webinars from EMA here:
http://www.enterprisemanagement.com/freeResearch
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING3 © 2018 Enterprise Management Associates, Inc.
Featured Speaker
Shamus McGillicuddy
Research Director, EMA
Shamus has more than 12 years of experience in
the IT industry, as an industry analyst and
journalist. At Enterprise Management Associates
(EMA), he is the research director for the network
management practice.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING4 © 2018 Enterprise Management Associates, Inc.
Logistics
An archived version of the event recording will be available at
www.enterprisemanagement.com
• Log questions in the chat panel located on the lower left-
hand corner of your screen
• Questions will be addressed during the QandA session of
the event
QUESTIONS
EVENT RECORDING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Next-Generation
Network Packet Brokers
Defining the Future of Network Visibility Fabrics
Shamus McGillicuddy
Research Director
Enterprise Management Associates
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Sponsors
6 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Agenda
• Definitions, Research Goals, and Methodology
• Network Visibility Fabric Deployments
• Defining the Network Visibility Fabric of the Future
• Using the Fabric
• Benefits and Challenges
7 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Definitions, Research Goals,
and Methodology
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Definitions: What is a Network Visibility Fabric?
• Network Visibility Fabric
• A network that collects and delivers traffic (primarily packets) to IT
operations & security analysis tools
• Includes taps, SPAN ports, software probes, bypass switches, and
network packet brokers
• Network Packet Broker
• AKA network visibility controllers and network monitoring switches
• Core of the fabric
• Aggregates traffic from taps, SPANs, etc.
• Processes the traffic data (filtering, modifying, time stamping, etc.)
• Sends groomed and/or load balanced traffic to individual tools for
analysis
9 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Research Goals
• Identify the current and future state of enterprise network visibility
fabrics—particularly network packet brokers
• Implementation strategies
• Product requirements
• Current use cases
• Emerging solutions for new use cases
• Technical and business challenges
10 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Research Methodology
• Survey 250 enterprise IT professionals who:
• Hold mid- to executive-level positions in enterprise IT and security
organizations
• Possess subject matter expertise
• Have NPBs currently deployed in their infrastructure
• Are directly involved in at least one aspect of the visibility fabric and
NPB lifecycle
 Product evaluators
 Purchasers
 Implementers
 Users
11 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Research Demographics
IT Role
• 37% IT executives
• 63% IT staff and
• middle management
IT Group
• 25% Security
• 75% IT ops/engineering,
etc.
Size of Company
• 50% Midmarket (250 to 2,499
employees)
• 50% Large Enterprise
(2,500+ employees
Annual Revenue
• 37% less than
$100 million
• 63% $100 million
or more
Geography
• 51% North American
• 49% European
19 Industries
• 15% Finance/Banking/Insurance
• 14% Software
• 12% Retail/Wholesale/Distribution
• 11% Application/Cloud Service
Provider
• 8% Manufacturing (non-IT products)
12 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Network Visibility Fabric Deployments
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Enterprises are Gradually Expanding the use of Taps
14 © 2018 Enterprise Management Associates, Inc.
1%
11%
37%
35%
12%
2% 2%
5% 6%
32%
40%
14%
3%
1%
100% Tap 76%-99% Tap 51%-75% Tap 50% Tap/50%
SPAN
51%-75% SPAN 76-99% SPAN 100% SPAN
Mix of Taps vs. SPAN in visibility fabrics, 2013 versus 2018
2018 2013
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Where Network Packet Brokers are Deployed
2%
30%
31%
32%
35%
35%
36%
42%
48%
2%
27%
25%
25%
22%
30%
25%
27%
23%
Other
Campus backbone
DMZ
End of row
Backhaul links
Remote sites
Top of rack
Data center edge (ingress/egress)
Data center core network
Deploying in 12 months Current
• Most popular locations
for NPBs
• Data center core
• Data center edge
• Significant uptick in
remote site deployments
next year
15 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Visibility Fabrics Rarely Monitor 100% of the Network
NetOps Coverage
• Only 5% of enterprises have
100% coverage
• 17% cover between 80%
and 99% of segments
• 39% cover between 60%
and 90%
Security Coverage
• Only 11% of enterprises
have 100% coverage
• 20% cover between 80%
and 99% of segments
• 35% between 60% and 80%
16 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Why not 100% Coverage?
Network Complexity
38%
Compliance Risk
33%
Current Coverage is
Enough
30%
Lack of Budget
27%
Shortage of
Taps/SPANs/NPB
26%
17 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Defining the Network Visibility
Fabric of the Future
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Critical NPB Architectural Features
19 © 2018 Enterprise Management Associates, Inc.
47%
46%
45%
44%
43%
43%
41%
40%
38%
38%
36%
High availability/fault tolerance
Event-triggered automated actions
Onboard data storage
Direct/embedded security controls
RSPAN/remote access
Direct/embedded performance monitoring
Direct/embedded security monitoring
Data-triggered automated actions
NEBS compliance
Clustering
Support for copper and fiber on the same appliance
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Critical Packet Manipulation Features for Network
Operations Monitoring
• Decryption (45%)
• Time stamping (42%)
• Outer (non-encapsulated) layer 2-4 load balancing (41%)
• IPv6 support (40%)
• Inner (encapsulated) layer 2-4 load balancing (40%)
• Outbound layer 2-4 filtering (39%)
• Outbound layer 7 filtering (38%)
• Packet slicing (38%)
• Metadata generation (38%)
20 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Critical Packet Manipulation Features
for Out-of-Band Security
• Intelligent deduplication (e.g., session ID) (44%)
• Metadata generation (44%)
• NetFlow/sFlow/IPFIX generation (43%)
• Outer (non-encapsulated) layer 2-4 load balancing (42%)
• Inbound layer 2-4 filtering (42%)
• IPv6 support (42%)
• Packet slicing (40%)
• Basic packet deduplication (39%)
• Tunneling (38%)
• Outbound layer 7 filtering (38%)
• Time stamping (38%)
21 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Critical Packet Manipulation Features for
Inline Security Monitoring and Controls
• IPv6 support (42%)
• Decryption (41%)
• Inbound layer 7 filtering (40%)
• Outbound layer 7 filtering (40%)
• Basic packet deduplication (40%)
• Inbound layer 2-4 filtering (38%)
• Outbound layer 2-4 filtering (38%)
• Advanced header stripping (e.g., MPLS, GRE) (38%)
22 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Disaggregated Network Packet Brokers
• 29% have deployed “white box”
or “brite box” NPBs
• 56% plan to deploy within 3
years
• Disaggregation challenges
1. Internal skills gap (32%)
2. Commodity hardware lacks
resources for advanced
functionality (26%)
3. Divided support model (22%)
23 © 2018 Enterprise Management Associates, Inc.
45%
40%
34%
29%
26%
Flexible software options
Flexible hardware options
Reduced complexity
Reduced operational expenses
Reduced capital expenses
Why disaggregate?
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Traffic Capture in the Public Cloud
• 37% are collecting traffic data in the public cloud for analysis
• 33% are planning or implementing a solution
• No consensus on how to approach this
• 34% use native traffic capture solutions (e.g., Azure Network Watcher)
• 32% use NPB or tap software implemented via cloud provider
marketplace
• 34% use NPB or tap software installed directly in cloud workload
• What do they capture?
• 55% collected packet header info
• 56% collect full packets
• 57% collect packet metadata
24 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Using the Network Visibility Fabric
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Network and Security Teams Share the Fabric
• EMA recommendation
• Establish processes & best
practices
• Avoid conflicts over packet
access
• Better security posture
 Broader coverage with security
tools
 More use of layer 7 packet
manipulation features
Formal
processes
and best
practices
51%
Ad hoc
39%
Third-party
intermediary
4%
No
collaboration
6%
Nature of NetOps/SecOps
visibility fabric collaboration
26 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Inline Network Packet Broker Usage
• 78% have connected security tools to inline NPBs
• 86% of organizations with formal network and security collaboration
• Applying patches/updates to inline tools
• 43% leverage high-availability architecture
• 34% schedule downtime
• 22% allow traffic to pass through uninspected
27 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tools connected to network packet brokers,
today and in 12 months
55%
50% 50% 50% 47% 46% 44% 44% 40% 39% 38% 38% 37% 36% 36% 34%
28%
12%
17% 17% 15% 18% 16% 19% 17%
18% 22% 21% 20%
17%
24% 23%
20%
27%
Currenlty deployed Deployed in 12 months
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Benefits and Challenges
of Network Visibility Fabrics
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Challenges to Success with Network Visibility Fabrics and
Packet Brokers
30 © 2018 Enterprise Management Associates, Inc.
33%
32%
31%
30%
26%
24%
20%
20%
0%
Architectural complexity
Lack of personnel with visibility fabric skills
Scalability/ease of expansion
Traffic is overwhelming the visibility fabric
Lack of change management control
Limited access to packet flows in the cloud
Insufficient budget
Poor product quality/reliability
Other
Sample Size = 250, Valid Cases = 250, Total Mentions = 543
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Enhanced IT productivity
(38%)
Improved IT collaboration
(37%)
TOP
BENEFITS
IT agility (28%)
Accelerated security incident detection
(26%)
Faster resolution of IT service trouble
(24%)
Improved SLA performance (24%)
Secondary
benefits
31 © 2018 Enterprise Management Associates, Inc.
Most Valuable Benefits of Network Visibility Fabrics
and Packet Brokers
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Conclusion
• Visibility fabrics rarely cover 100% of a network
• Network complexity and compliance risk are chief barriers
• Critical packet broker features vary by use case
• L7 and L2-4 filtering and decryption are critical to inline security
• Decryption, time-stamping, and load balancing are critical to NetOps
• Enterprises have significant interest in disaggregated NPB solutions, but a
skills gap looms
• No consensus on public cloud traffic capture
• Many NetOps and SecOps teams have formalized fabric collaboration
• Visibility fabrics typically boost IT productivity and enhance IT collaboration
32 © 2018 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Q&A
33 © 2018 Enterprise Management Associates, Inc.
Please log your
questions in the
Q&A window

More Related Content

What's hot

Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud EnterprisesEnterprise Management Associates
 
Crowdsourcing Data Governance
Crowdsourcing Data GovernanceCrowdsourcing Data Governance
Crowdsourcing Data GovernancePaul Boal
 
AIOps Your DevOps Co-pilot - PDF for TechGig Webinar
AIOps Your DevOps Co-pilot - PDF for TechGig WebinarAIOps Your DevOps Co-pilot - PDF for TechGig Webinar
AIOps Your DevOps Co-pilot - PDF for TechGig WebinarMarco Coulter
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...Alan McSweeney
 
Industry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsIndustry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsEryk Budi Pratama
 
Infrastructure 2.0 - Network World
Infrastructure 2.0 - Network WorldInfrastructure 2.0 - Network World
Infrastructure 2.0 - Network WorldGlenn Allison
 
MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?Dell EMC World
 
Zinnov Zones for IoT Services 2017
Zinnov Zones for IoT Services 2017Zinnov Zones for IoT Services 2017
Zinnov Zones for IoT Services 2017Zinnov
 
strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1Carol Jackson
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud finalguest50a642f
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?Precisely
 
SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview Cisco Service Provider
 
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
HP Mobility Perspective at the Mobile World Congress 2014 in BarcelonaHP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
HP Mobility Perspective at the Mobile World Congress 2014 in BarcelonaPronq by HP
 
PAETEC Value
PAETEC ValuePAETEC Value
PAETEC Valuezmung76
 
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...Enterprise Management Associates
 
Digital Transformation 101 — How Will It Affect Your Business?
Digital Transformation 101 — How Will It Affect Your Business?Digital Transformation 101 — How Will It Affect Your Business?
Digital Transformation 101 — How Will It Affect Your Business?PECB
 
About graycon
About grayconAbout graycon
About grayconmartyrj
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Upbaselsss
 

What's hot (20)

Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud Enterprises
 
Crowdsourcing Data Governance
Crowdsourcing Data GovernanceCrowdsourcing Data Governance
Crowdsourcing Data Governance
 
AIOps Your DevOps Co-pilot - PDF for TechGig Webinar
AIOps Your DevOps Co-pilot - PDF for TechGig WebinarAIOps Your DevOps Co-pilot - PDF for TechGig Webinar
AIOps Your DevOps Co-pilot - PDF for TechGig Webinar
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
Industry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsIndustry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT Skills
 
Infrastructure 2.0 - Network World
Infrastructure 2.0 - Network WorldInfrastructure 2.0 - Network World
Infrastructure 2.0 - Network World
 
MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?
 
Zinnov Zones for IoT Services 2017
Zinnov Zones for IoT Services 2017Zinnov Zones for IoT Services 2017
Zinnov Zones for IoT Services 2017
 
strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
 
Unlocking the ROI and Long-Term Benefits of SD-WAN
Unlocking the ROI and Long-Term Benefits of SD-WANUnlocking the ROI and Long-Term Benefits of SD-WAN
Unlocking the ROI and Long-Term Benefits of SD-WAN
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?
 
SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview
 
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
HP Mobility Perspective at the Mobile World Congress 2014 in BarcelonaHP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
 
PAETEC Value
PAETEC ValuePAETEC Value
PAETEC Value
 
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Digital Transformation 101 — How Will It Affect Your Business?
Digital Transformation 101 — How Will It Affect Your Business?Digital Transformation 101 — How Will It Affect Your Business?
Digital Transformation 101 — How Will It Affect Your Business?
 
About graycon
About grayconAbout graycon
About graycon
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
 

Similar to Next-Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics

The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...Enterprise Management Associates
 
Multi-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud Strategy
Multi-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud StrategyMulti-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud Strategy
Multi-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud StrategyThousandEyes
 
Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsNetwork Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsEnterprise Management Associates
 
How LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
How LTE is Enabling Non-Stop Connectivity for SD-WAN DeploymentsHow LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
How LTE is Enabling Non-Stop Connectivity for SD-WAN DeploymentsEnterprise Management Associates
 
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...Enterprise Management Associates
 
Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise
Network Visibility Architecture for the Hybrid, Multi-Cloud EnterpriseNetwork Visibility Architecture for the Hybrid, Multi-Cloud Enterprise
Network Visibility Architecture for the Hybrid, Multi-Cloud EnterpriseEnterprise Management Associates
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
Looking Before You Leap into the Cloud: A proactive approach to machine learn...
Looking Before You Leap into the Cloud: A proactive approach to machine learn...Looking Before You Leap into the Cloud: A proactive approach to machine learn...
Looking Before You Leap into the Cloud: A proactive approach to machine learn...Enterprise Management Associates
 
AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...
AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...
AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...Enterprise Management Associates
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...NetworkCollaborators
 
When SAP alone is not enough
When SAP alone is not enoughWhen SAP alone is not enough
When SAP alone is not enoughCloudera, Inc.
 
Making AIOps-Driven Network Performance Management a Reality
Making AIOps-Driven Network Performance Management a RealityMaking AIOps-Driven Network Performance Management a Reality
Making AIOps-Driven Network Performance Management a RealityEnterprise Management Associates
 

Similar to Next-Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics (20)

Network Management Megatrends 2018
Network Management Megatrends 2018Network Management Megatrends 2018
Network Management Megatrends 2018
 
Network Engineering and Operations in a Multi-Cloud World
Network Engineering and Operations in a Multi-Cloud WorldNetwork Engineering and Operations in a Multi-Cloud World
Network Engineering and Operations in a Multi-Cloud World
 
Network Management Megatrends 2020
Network Management Megatrends 2020Network Management Megatrends 2020
Network Management Megatrends 2020
 
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
 
Multi-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud Strategy
Multi-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud StrategyMulti-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud Strategy
Multi-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud Strategy
 
The Cloudification of the Data Center Network
The Cloudification of the Data Center NetworkThe Cloudification of the Data Center Network
The Cloudification of the Data Center Network
 
Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsNetwork Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network Operations
 
How LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
How LTE is Enabling Non-Stop Connectivity for SD-WAN DeploymentsHow LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
How LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
 
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
 
Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise
Network Visibility Architecture for the Hybrid, Multi-Cloud EnterpriseNetwork Visibility Architecture for the Hybrid, Multi-Cloud Enterprise
Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise
 
Adapting Performance Visibility to New Technology Trends
Adapting Performance Visibility to New Technology TrendsAdapting Performance Visibility to New Technology Trends
Adapting Performance Visibility to New Technology Trends
 
Big Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and ManagementBig Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and Management
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Looking Before You Leap into the Cloud: A proactive approach to machine learn...
Looking Before You Leap into the Cloud: A proactive approach to machine learn...Looking Before You Leap into the Cloud: A proactive approach to machine learn...
Looking Before You Leap into the Cloud: A proactive approach to machine learn...
 
AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...
AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...
AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
 
When SAP alone is not enough
When SAP alone is not enoughWhen SAP alone is not enough
When SAP alone is not enough
 
Making AIOps-Driven Network Performance Management a Reality
Making AIOps-Driven Network Performance Management a RealityMaking AIOps-Driven Network Performance Management a Reality
Making AIOps-Driven Network Performance Management a Reality
 
Enterprise Network Automation for 2020 and Beyond
Enterprise Network Automation for 2020 and BeyondEnterprise Network Automation for 2020 and Beyond
Enterprise Network Automation for 2020 and Beyond
 
AI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network ManagementAI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network Management
 

More from Enterprise Management Associates

Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryEnterprise Management Associates
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...Enterprise Management Associates
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsEnterprise Management Associates
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...Enterprise Management Associates
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Enterprise Management Associates
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityEnterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesEnterprise Management Associates
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...Enterprise Management Associates
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Enterprise Management Associates
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Enterprise Management Associates
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Enterprise Management Associates
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessEnterprise Management Associates
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...Enterprise Management Associates
 

More from Enterprise Management Associates (20)

Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
 

Recently uploaded

Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Next-Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics

  • 1. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Next-Generation Network Packet Brokers Defining the Future of Network Visibility Fabrics Shamus McGillicuddy Research Director Enterprise Management Associates
  • 2. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Watch the On-Demand Webinar • Next-Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics On-Demand webinar is available here: https://ema.wistia.com/medias/fvzt3secse • Check out upcoming webinars from EMA here: http://www.enterprisemanagement.com/freeResearch
  • 3. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING3 © 2018 Enterprise Management Associates, Inc. Featured Speaker Shamus McGillicuddy Research Director, EMA Shamus has more than 12 years of experience in the IT industry, as an industry analyst and journalist. At Enterprise Management Associates (EMA), he is the research director for the network management practice.
  • 4. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING4 © 2018 Enterprise Management Associates, Inc. Logistics An archived version of the event recording will be available at www.enterprisemanagement.com • Log questions in the chat panel located on the lower left- hand corner of your screen • Questions will be addressed during the QandA session of the event QUESTIONS EVENT RECORDING
  • 5. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Next-Generation Network Packet Brokers Defining the Future of Network Visibility Fabrics Shamus McGillicuddy Research Director Enterprise Management Associates
  • 6. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Sponsors 6 © 2018 Enterprise Management Associates, Inc.
  • 7. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Agenda • Definitions, Research Goals, and Methodology • Network Visibility Fabric Deployments • Defining the Network Visibility Fabric of the Future • Using the Fabric • Benefits and Challenges 7 © 2018 Enterprise Management Associates, Inc.
  • 8. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Definitions, Research Goals, and Methodology
  • 9. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Definitions: What is a Network Visibility Fabric? • Network Visibility Fabric • A network that collects and delivers traffic (primarily packets) to IT operations & security analysis tools • Includes taps, SPAN ports, software probes, bypass switches, and network packet brokers • Network Packet Broker • AKA network visibility controllers and network monitoring switches • Core of the fabric • Aggregates traffic from taps, SPANs, etc. • Processes the traffic data (filtering, modifying, time stamping, etc.) • Sends groomed and/or load balanced traffic to individual tools for analysis 9 © 2018 Enterprise Management Associates, Inc.
  • 10. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Research Goals • Identify the current and future state of enterprise network visibility fabrics—particularly network packet brokers • Implementation strategies • Product requirements • Current use cases • Emerging solutions for new use cases • Technical and business challenges 10 © 2018 Enterprise Management Associates, Inc.
  • 11. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Research Methodology • Survey 250 enterprise IT professionals who: • Hold mid- to executive-level positions in enterprise IT and security organizations • Possess subject matter expertise • Have NPBs currently deployed in their infrastructure • Are directly involved in at least one aspect of the visibility fabric and NPB lifecycle  Product evaluators  Purchasers  Implementers  Users 11 © 2018 Enterprise Management Associates, Inc.
  • 12. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Research Demographics IT Role • 37% IT executives • 63% IT staff and • middle management IT Group • 25% Security • 75% IT ops/engineering, etc. Size of Company • 50% Midmarket (250 to 2,499 employees) • 50% Large Enterprise (2,500+ employees Annual Revenue • 37% less than $100 million • 63% $100 million or more Geography • 51% North American • 49% European 19 Industries • 15% Finance/Banking/Insurance • 14% Software • 12% Retail/Wholesale/Distribution • 11% Application/Cloud Service Provider • 8% Manufacturing (non-IT products) 12 © 2018 Enterprise Management Associates, Inc.
  • 13. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Network Visibility Fabric Deployments
  • 14. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Enterprises are Gradually Expanding the use of Taps 14 © 2018 Enterprise Management Associates, Inc. 1% 11% 37% 35% 12% 2% 2% 5% 6% 32% 40% 14% 3% 1% 100% Tap 76%-99% Tap 51%-75% Tap 50% Tap/50% SPAN 51%-75% SPAN 76-99% SPAN 100% SPAN Mix of Taps vs. SPAN in visibility fabrics, 2013 versus 2018 2018 2013
  • 15. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Where Network Packet Brokers are Deployed 2% 30% 31% 32% 35% 35% 36% 42% 48% 2% 27% 25% 25% 22% 30% 25% 27% 23% Other Campus backbone DMZ End of row Backhaul links Remote sites Top of rack Data center edge (ingress/egress) Data center core network Deploying in 12 months Current • Most popular locations for NPBs • Data center core • Data center edge • Significant uptick in remote site deployments next year 15 © 2018 Enterprise Management Associates, Inc.
  • 16. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Visibility Fabrics Rarely Monitor 100% of the Network NetOps Coverage • Only 5% of enterprises have 100% coverage • 17% cover between 80% and 99% of segments • 39% cover between 60% and 90% Security Coverage • Only 11% of enterprises have 100% coverage • 20% cover between 80% and 99% of segments • 35% between 60% and 80% 16 © 2018 Enterprise Management Associates, Inc.
  • 17. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Why not 100% Coverage? Network Complexity 38% Compliance Risk 33% Current Coverage is Enough 30% Lack of Budget 27% Shortage of Taps/SPANs/NPB 26% 17 © 2018 Enterprise Management Associates, Inc. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
  • 18. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Defining the Network Visibility Fabric of the Future
  • 19. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Critical NPB Architectural Features 19 © 2018 Enterprise Management Associates, Inc. 47% 46% 45% 44% 43% 43% 41% 40% 38% 38% 36% High availability/fault tolerance Event-triggered automated actions Onboard data storage Direct/embedded security controls RSPAN/remote access Direct/embedded performance monitoring Direct/embedded security monitoring Data-triggered automated actions NEBS compliance Clustering Support for copper and fiber on the same appliance
  • 20. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Critical Packet Manipulation Features for Network Operations Monitoring • Decryption (45%) • Time stamping (42%) • Outer (non-encapsulated) layer 2-4 load balancing (41%) • IPv6 support (40%) • Inner (encapsulated) layer 2-4 load balancing (40%) • Outbound layer 2-4 filtering (39%) • Outbound layer 7 filtering (38%) • Packet slicing (38%) • Metadata generation (38%) 20 © 2018 Enterprise Management Associates, Inc.
  • 21. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Critical Packet Manipulation Features for Out-of-Band Security • Intelligent deduplication (e.g., session ID) (44%) • Metadata generation (44%) • NetFlow/sFlow/IPFIX generation (43%) • Outer (non-encapsulated) layer 2-4 load balancing (42%) • Inbound layer 2-4 filtering (42%) • IPv6 support (42%) • Packet slicing (40%) • Basic packet deduplication (39%) • Tunneling (38%) • Outbound layer 7 filtering (38%) • Time stamping (38%) 21 © 2018 Enterprise Management Associates, Inc.
  • 22. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Critical Packet Manipulation Features for Inline Security Monitoring and Controls • IPv6 support (42%) • Decryption (41%) • Inbound layer 7 filtering (40%) • Outbound layer 7 filtering (40%) • Basic packet deduplication (40%) • Inbound layer 2-4 filtering (38%) • Outbound layer 2-4 filtering (38%) • Advanced header stripping (e.g., MPLS, GRE) (38%) 22 © 2018 Enterprise Management Associates, Inc.
  • 23. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Disaggregated Network Packet Brokers • 29% have deployed “white box” or “brite box” NPBs • 56% plan to deploy within 3 years • Disaggregation challenges 1. Internal skills gap (32%) 2. Commodity hardware lacks resources for advanced functionality (26%) 3. Divided support model (22%) 23 © 2018 Enterprise Management Associates, Inc. 45% 40% 34% 29% 26% Flexible software options Flexible hardware options Reduced complexity Reduced operational expenses Reduced capital expenses Why disaggregate?
  • 24. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Traffic Capture in the Public Cloud • 37% are collecting traffic data in the public cloud for analysis • 33% are planning or implementing a solution • No consensus on how to approach this • 34% use native traffic capture solutions (e.g., Azure Network Watcher) • 32% use NPB or tap software implemented via cloud provider marketplace • 34% use NPB or tap software installed directly in cloud workload • What do they capture? • 55% collected packet header info • 56% collect full packets • 57% collect packet metadata 24 © 2018 Enterprise Management Associates, Inc. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
  • 25. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Using the Network Visibility Fabric
  • 26. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Network and Security Teams Share the Fabric • EMA recommendation • Establish processes & best practices • Avoid conflicts over packet access • Better security posture  Broader coverage with security tools  More use of layer 7 packet manipulation features Formal processes and best practices 51% Ad hoc 39% Third-party intermediary 4% No collaboration 6% Nature of NetOps/SecOps visibility fabric collaboration 26 © 2018 Enterprise Management Associates, Inc.
  • 27. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Inline Network Packet Broker Usage • 78% have connected security tools to inline NPBs • 86% of organizations with formal network and security collaboration • Applying patches/updates to inline tools • 43% leverage high-availability architecture • 34% schedule downtime • 22% allow traffic to pass through uninspected 27 © 2018 Enterprise Management Associates, Inc.
  • 28. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tools connected to network packet brokers, today and in 12 months 55% 50% 50% 50% 47% 46% 44% 44% 40% 39% 38% 38% 37% 36% 36% 34% 28% 12% 17% 17% 15% 18% 16% 19% 17% 18% 22% 21% 20% 17% 24% 23% 20% 27% Currenlty deployed Deployed in 12 months
  • 29. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Benefits and Challenges of Network Visibility Fabrics
  • 30. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Challenges to Success with Network Visibility Fabrics and Packet Brokers 30 © 2018 Enterprise Management Associates, Inc. 33% 32% 31% 30% 26% 24% 20% 20% 0% Architectural complexity Lack of personnel with visibility fabric skills Scalability/ease of expansion Traffic is overwhelming the visibility fabric Lack of change management control Limited access to packet flows in the cloud Insufficient budget Poor product quality/reliability Other Sample Size = 250, Valid Cases = 250, Total Mentions = 543
  • 31. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Enhanced IT productivity (38%) Improved IT collaboration (37%) TOP BENEFITS IT agility (28%) Accelerated security incident detection (26%) Faster resolution of IT service trouble (24%) Improved SLA performance (24%) Secondary benefits 31 © 2018 Enterprise Management Associates, Inc. Most Valuable Benefits of Network Visibility Fabrics and Packet Brokers IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
  • 32. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Conclusion • Visibility fabrics rarely cover 100% of a network • Network complexity and compliance risk are chief barriers • Critical packet broker features vary by use case • L7 and L2-4 filtering and decryption are critical to inline security • Decryption, time-stamping, and load balancing are critical to NetOps • Enterprises have significant interest in disaggregated NPB solutions, but a skills gap looms • No consensus on public cloud traffic capture • Many NetOps and SecOps teams have formalized fabric collaboration • Visibility fabrics typically boost IT productivity and enhance IT collaboration 32 © 2018 Enterprise Management Associates, Inc.
  • 33. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Q&A 33 © 2018 Enterprise Management Associates, Inc. Please log your questions in the Q&A window