SlideShare a Scribd company logo
1 of 32
Download to read offline
| @ema_research
Building a Foundation for
NetSecOps Partnerships
with Network Automation
Shamus McGillicuddy
Vice President of Research
EMA
Kelly Baig
Director of Market Strategy
Blue Planet
John Cavanaugh
CTO
NetCraftsmen
Watch the On-Demand Webinar
• Building a Foundation for NetSecOps Partnerships with Network
Automation On-Demand Webinar:
https://info.enterprisemanagement.com/netsecops-2022-webinar-ws
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
| @ema_research
| @ema_research
Featured Speakers Shamus leads the network infrastructureand operations
practice. He has more than 16 years of experience in the
IT industry.His research focuses on all aspects of
managing enterprise networks,including network
automation, AIOps-driven network operations,multi-cloud
networking,and WAN transformation.
John leads a team of consultantsfocused on designing
and delivering scalable, highly available and secure
infrastructuresolutions to customers across multiple
industry verticalsand technologies. Before joining
NetCraftsmen, John held severalpositions including
ExecutiveDirector and Chief Architect for Global Network
Services at JPMorgan Chase.
Kelly joined the Blue Planet Enterprise (BPE) program in
March 2021 from HPE/Aruba whereshe was responsible
for GTM strategies and execution for services, education,
and NaaS solutions. Prior to HPE, Kelly worked at a variety
of technology companies that included EMC and
Commvault along with running her own GTM agency with
clients that included Avnet,Arrow,and Bell Micro.
© 2022 Enterprise ManagementAssociates, Inc. 3
Shamus McGillicuddy
Vice President of Research
Network Infrastructure and Operations
Kelly Baig
Director of Market Strategy
Blue Planet
John Cavanaugh
CTO
NetCraftsmen
| @ema_research
NetSecOps
Collaboration:
Essential, but Arduous
| @ema_research
| @ema_research
75% of IT Organizations Report Growth in NetSecOps Collaboration
© 2022 Enterprise ManagementAssociates, Inc. 5
Drivers of Collaboration
81% Public cloud adoption/migration
81% Work from home/work from anywhere
81% Data center modernization
79% IoT/Edge computing
75% DevOps
72% WAN transformation (SD-WAN/SASE)
68% Zero trust security
| @ema_research
| @ema_research
NetSecOps parterships serve the
interestsof other IT groups
66.4% ITSM
53.8% IT governance/financial management
53.0% CloudOps
50.5% Data center I&O
41.5% DevOps
The Many Benefits of Successful Collaboration
© 2022 Enterprise ManagementAssociates, Inc. 6
“You will get a final product that is
more secure, better implemented,
and can recover from disaster.”
Network security architect
$2.5 billion software company
Benefits of successful NetSecOps partnerships
| @ema_research
| @ema_research
A Difficult, Unnatural Partnership
© 2022 Enterprise ManagementAssociates, Inc. 7
“[The security team is] too esoteric. They ask,
‘Why is theapplication team puttingthishere
instead of there?’ That ship has already sailed.
We often get thesense that [security] doesn’t
understand what thebusiness is.”
Network architect
$15 billion retailer
“When thenetwork team is building something
and working on a deadline, theysee thesecurity
team as a roadblock tohitting a milestone,
especially if leadership is pushing them torun
thingstightly.”
Network security architect
$2.5 billion software company
Only 39% reported fully successful
NetSecOps partnership
Different perspectives
24% Engineers/Architects/Admins
69% IT Execs
Top challenges to collaboration
28% Data quality/authority issues
25% Cross-team skills gaps
21% Budget issues
20% Architectural complexity
19% Lack of tools/technologies that enable
collaboration
| @ema_research
| @ema_research
Most Critical Areas of Collaboration
© 2022 Enterprise ManagementAssociates, Inc. 8
“Changemanagement is themost important.We’ve trained securityto look at
certain thingseven before it comes to us. If someone requests a change torouting
or firewalls, thefirst person that approvesthat changeis theinfo securityteam.”
Director of global network infrastructure and operations,
$80-billion technology company
Implementing
Technology
Provisioning and
configuring new
infrastructure
Policy implementation
1 2 4
3
Infrastructure
planning & design
Network design
Policy design
Technology
evaluation&
procurement
Research ZTNA, SASE,
multi-cloud
RFPs, budget sharing
Operational
monitoring
NPM, NDR, SIEM
Alerts, escalations,
eventmanagement
More important to
organizations focused
on WFH and zero trust
5
Change
management
Moves,adds, changes
Network change
approvals
44% 37% 33%
36% 23%
| @ema_research
Network Automation
as a NetSecOps
Foundation
| @ema_research
| @ema_research
Nearly 91% of Organizations Believe Network Automation is Important to
NetSecOps Collaboration
© 2022 Enterprise ManagementAssociates, Inc. 10
“Automation givesus consistent
configurations,consistent
controls,and easy rollouts of
changes. .It also allows us, from
a data collection standpoint,to
get better insight intowhat’s
going on in thenetwork.That
consistencyreduces risk.”
Director of network engineering
and operations,
$7 billion healthcareenterprise
Importance of automation tools to facilitating NetSecOps collaboration
Best practice focus
The most successful collaborators are more likely to
rate network automation as very important.
| @ema_research
| @ema_research
Modern Network Automation Solutions Offer a Shared Network Source of Truth
© 2022 Enterprise ManagementAssociates, Inc. 11
A network source of
truth provides visibility
into networkintent
Config data
DDI data (IP space, DNS)
Security Policies
Manually-builtsources of
truth lead to:
65% Operational inefficiency
45% Lack of change visibility
41% Introduction of security
vulnerabilities
35% Performance degradation
NetOps and SecOps can use a
source of truth to…
Enforce security and compliance policies
during moves, adds, and changes
Audit the network
Troubleshoot performance
Investigate security incidents
74% of organizations want automation platforms that gather and store data in a network source of truth
| @ema_research
| @ema_research
© 2022 Enterprise ManagementAssociates, Inc. 12
Tasks That NetOps and SecOps Want to Automate Together
Event
management
Detecting faults,
breaches, escalating
to subject matter
experts
1 2 4
3
Infrastructure
provisioning
Favored by
most successful
collaborators
Incident
response
Higher for members
of security teams
Infrastructure
lifecycle
management
5
Network
design
53% 51% 46%
47% 36%
Self-service networking and security
74% of organizations want to leverage network automation to empower
orchestration of networking and security services for application teams
| @ema_research
| @ema_research
| @ema_research
Relevant Network Automation Solutions
© 2022 Enterprise ManagementAssociates, Inc. 13
Automation tools most useful for collaboration
47%
Network change
and
configuration
management
46%
Security policy
automation
Favored by most
successful
collaborators
42%
Infrastructure as
code platforms
(Ansible,
Terraform)
41%
DDI automation
(DNS, DHSCP,
IPAM)
Favored by
members of
securityteams
| @ema_research
| @ema_research
Finding the Right Network Automation Solutions
© 2022 Enterprise ManagementAssociates, Inc. 14
Top platform requirements
44% Ease of deployment and administration
40% Third-party integrations
38% Ease of use
38% Scalability
Top feature requirements
43% Device lifecycle management
40% Security policy design/implementation/audit
38% Change analysis/modeling
37% Configuration compliance monitoring
34% Change management
Networkassurance capabilities
89% of organizations recognize the importance of
integrated monitoring and troubleshooting capabilities
in automation solutions
• Successful users of network automation are more
likely to rate this as very important
Top use cases
• 58% Monitor security and compliance risk
• 53% Measure application performance and health
• 53% Monitor network device health
| @ema_research
| @ema_research
AI and Machine Learning
© 2022 Enterprise ManagementAssociates, Inc. 15
Do you agree or disagree with the following statement?
AIOps technology can improve collaboration between your
organization’s network team and security team.
How companies use AI/ML capabilities
embeddedin networkautomation
solutions
33% Security and compliance insights
33% Automated network problem remediation
32% Proactive security protection
30% Improve quality of network source of truth
| @ema_research
| @ema_research
Final Thoughts
© 2022 Enterprise ManagementAssociates, Inc. 16
Digital disruptions are forcing NetOps and SecOps to collaborate more
NetSecOps partnerships are difficult to build
Enterprises believe network automation can enable and encourage this
collaboration
This network automation should
• Establish a network source of truth
• Meet the requirements of both teams
• Leverage AIOps technology to provide meaningful insights
Get Healthy. Stay Healthy. RestAssured.™
©2022 NetCraftsmen Confidential
Automation, Orchestration and Service
Chaining
©2022 NetCraftsmen Confidential 18
Most Enterprises
• IT is structured with numerous siloed
functional ‘Towers’:
• Applications Development
• Server/Cloud Infrastructure Team
• Network Team
• Security Team
• Operations
• Each works independent of each
other
• Constructing and delivering a new service or
even a new location with an existing service
requires a Project with a PM to coordinate
the activity between all parties
Most Service Providers
• Structured around Service
Delivery
• Designing a new service takes
significant time and effort
• (Months to years)
• Delivering an existing service to a
new client or location is simple
• Agile Service Delivery has
emerged:
• Driving down efforts for new services
• (weeks to months)
Enterprise Background
©2022 NetCraftsmen Confidential 19
Enterprise
• Delivery of new Services to users
• Done piecemeal by each tower
• Improvements can be significant
• But results:
• Can be less than desired
• Because they are no tied to an end-
to-end service
Service Providers
• Agile Services
• Drove providers towards
• Network and Security Functions in
software
• General Purpose CPE Devices
• Defined as Network Function
Virtualization (NFV)
Automation Use Case
©2022 NetCraftsmen Confidential 20
v
▪ Network Functions are SW-based over well-known HW
▪ Multiple roles over same HW
ORCHESTRATION,AUTOMATION
& REMOTE INSTALL
DPI
BRAS
GGSN/
SGSN
Firewall
CG-NAT
PE Router
VIRTUAL
APPLIANCES
STANDARD
HIGH VOLUME
SERVERS
Virtualised Network Model:
VIRTUAL APPLIANCE APPROACH
v
▪ Network Functions are based on specific HW&SW
▪ One physical node per role
DPI
BRAS
GGSN/SGSN
Session Border
Controller
Firewall CG-NAT
PE Router
Traditional Network Model:
APPLIANCE APPROACH
Service Providers: The NFV Concept
A means to make the network and security more flexible and
simpler by minimising dependence on HW constraints
©2022 NetCraftsmen Confidential 21
Most Enterprises
• Any end-to-end service flow
involves multiple towers
• No one group is responsible for
the full end-to-end picture
• So - improving one or even most
independent element(s) may not
result in any overall improvement
in delivery
Read ”The Phoenix Project”
Failure Case: Security
• Virtualization team at a Fortune 500
• Created a portal for their Developers
• This automated their workflow and was
a hit with the development community
• But simply dumped Network requirements,
Firewall and Other Security requests into an
email queue for their respective towers
• Results?
• Churn in the VMware world created a
situation where LB and FW rules were
orphaned when VMs were removed
• The ‘intended state’ linking workloads to
network and security was not tracked
creating a massive issue
Enterprise: Results
©2022 NetCraftsmen Confidential 22
Service Providers & CSPs
• Chose the NFV route
• Fits the SP/CSP Model
• Simple end-to-end Orchestration
• But Services are simple and
repeatable
Enterprises
• Typically, not sold on the
NFV/Whitebox model, but did
adopt SDN and Cloud
• Services are complex and are
often a hybrid of on-Prem, SaaS
and Cloud
Requires an Orchestration system
that can track end-to-end flows
across all IT towers with NFV like
precision
Enterprise: Service Chaining and Orchestration Use Case
©2022 NetCraftsmen Confidential 23
Enterprise: Call to Action
• Forrester in a 2021 Paper stated:
• Merge Security And Networking, Or Sunset Your Business
• They were driving at the problem created by the Tower-based approach to delivering
services and the requirement to think end-to-end
• This problem happened because the majority of current ITSM systems do not have a
single source of truth, in fact recent Gartner studies provide evidence that Enterprise
CMDBs are rarely complete
• This leads us and the Enterprise community looking for new approaches
and systems to solve the issue
• Solving the issue requires that:
• A system being delivered as code – with schema-based approaches that define intent
and self document
• For organizations that can’t do this themselves - they need an ITSM system that can
Get Healthy. Stay Healthy. RestAssured.™
©2022 NetCraftsmen Confidential
888.804.1717
info@netcraftsmen.com
25
Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary .
Proven in the world’s largest, most sophisticated networks
Intelligent network automation software for mid-tier enterprise NOC teams and MSPs
Global Team of
700+ Specialists
Headquartered in
Hanover, Maryland
200+ Customers
globally, serving industries including:
• Energy and Utilities
• Public Sectorand Education
• Finance and Insurance
• Manufacturing
• Retail
• Healthcare
• Telecommunications
Industry Innovations
• Industry 1st multi-vendor SDN
suite for Service Providers
• Industry 1st orchestration product
for WAN/NFV/Cloud
• Industry 1st integrated portfolio for
Service Lifecycle Automation
26
Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary .
Work-From-
Home
Shift from
Hardware and Office-
Centric Edge
Ethernet
Wifi Firewall
Router
Datacenter
Branches
Cloud
Provider
Public
Private
Shift to
Software Defined
Virtual Network
Functions
SASE
Branches
Cloud
Provider
Public
Private
Migration to
Cloud
SDWAN
SDBRANCH
How are your NOC and SOC teams keeping up?
How Our Customers are Evolving
NOC SOC
NOC and SOC
Team Collaboration
Need network
visibility and control
Leading use-cases adding pressure to NetOps:
M&A; IoT; Compliance; Cloud; Work-from-Home
Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary . 27
Networks are critical
but require automation
to help reduce
complexity and risk
Why
Network
Automation?
Customer and employee satisfaction
depends on reliable network services
An incomplete view of the network
impacts performance and security risk
Automation is key to addressing
modern networking skills gap
28
Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary .
What Sets Blue Planet Apart
Top Platform Requirements
✓ Ease of deployment and administration (44%)
✓ Third-party integrations (40%)
✓ Ease of use (38%)
✓ Scalability (38%)
Top Feature Requirements
✓ Device lifecycle management (43%)
✓ Security policy design/implementation/audit (40%)
✓ Change analysis/modeling (38%)
✓ Configuration compliance monitoring (37%)
✓ Change management (34%)
29
Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary .
Blue Planet Enterprise Automation Suite
Critical capabilities for network automation
Inventory
Visibility
Continuous
Compliance
Maintain device list
down to serial # and
location for proactive
management and
planning
Ensure automated
compliance with
standard network
configurations to avoid
security exposures
Faultand
Performance
Monitoring
Continuously monitor
network for faults and
failures to enable
rapid remediation
Configuration
and Software
Control
Analyze performance
stats to predict
slowdowns,enable
RCA, & avoid outages
ML-based
Anomaly
Detection
Apply proven pre-built
runbooks built by
seasoned admins to
standardize operations
Offered with pay-as-you-grow billing, out-of-box integration with IT apps, SaaS agility and flexibility
30
Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary .
Leader and Fast Mover in GigaOm’s Radar Report for NetDevOps
✓
✓
✓
✓
✓
✓
✓
✓
✓
Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary . 31
Final Thoughts for NOC and SOC Team Collaboration
Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary . 32
Thank you!
Explore the value of
network automation for
your environment
Learn more at www.blueplanet.com

More Related Content

Similar to Building a Foundation for NetSecOps Partnerships with Network Automation

DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...Enterprise Management Associates
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Enterprise Management Associates
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersEnterprise Management Associates
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 
The Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldThe Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldEnterprise Management Associates
 
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...ThousandEyes
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...Enterprise Management Associates
 
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...Enterprise Management Associates
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
Benefits of Operating an On-Premises Infrastructure
Benefits of Operating an On-Premises InfrastructureBenefits of Operating an On-Premises Infrastructure
Benefits of Operating an On-Premises InfrastructureRebekah Rodriguez
 
Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud EnterprisesEnterprise Management Associates
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterAlgoSec
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Enterprise Management Associates
 

Similar to Building a Foundation for NetSecOps Partnerships with Network Automation (20)

Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet Brokers
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
The Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldThe Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud World
 
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
The Cloudification of the Data Center Network
The Cloudification of the Data Center NetworkThe Cloudification of the Data Center Network
The Cloudification of the Data Center Network
 
Benefits of Operating an On-Premises Infrastructure
Benefits of Operating an On-Premises InfrastructureBenefits of Operating an On-Premises Infrastructure
Benefits of Operating an On-Premises Infrastructure
 
Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud Enterprises
 
Enterprise Network Automation for 2020 and Beyond
Enterprise Network Automation for 2020 and BeyondEnterprise Network Automation for 2020 and Beyond
Enterprise Network Automation for 2020 and Beyond
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Adapting Performance Visibility to New Technology Trends
Adapting Performance Visibility to New Technology TrendsAdapting Performance Visibility to New Technology Trends
Adapting Performance Visibility to New Technology Trends
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Network Engineering and Operations in a Multi-Cloud World
Network Engineering and Operations in a Multi-Cloud WorldNetwork Engineering and Operations in a Multi-Cloud World
Network Engineering and Operations in a Multi-Cloud World
 

More from Enterprise Management Associates

Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryEnterprise Management Associates
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsEnterprise Management Associates
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...Enterprise Management Associates
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Enterprise Management Associates
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityEnterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesEnterprise Management Associates
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Enterprise Management Associates
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessEnterprise Management Associates
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...Enterprise Management Associates
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...Enterprise Management Associates
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceEnterprise Management Associates
 
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Enterprise Management Associates
 

More from Enterprise Management Associates (20)

Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
Automation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOpsAutomation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOps
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
 
Debunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research SlidesDebunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research Slides
 
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
 
Modern ITAM in the Digitally-Transformed Enterprise
Modern ITAM in the Digitally-Transformed EnterpriseModern ITAM in the Digitally-Transformed Enterprise
Modern ITAM in the Digitally-Transformed Enterprise
 

Recently uploaded

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Building a Foundation for NetSecOps Partnerships with Network Automation

  • 1. | @ema_research Building a Foundation for NetSecOps Partnerships with Network Automation Shamus McGillicuddy Vice President of Research EMA Kelly Baig Director of Market Strategy Blue Planet John Cavanaugh CTO NetCraftsmen
  • 2. Watch the On-Demand Webinar • Building a Foundation for NetSecOps Partnerships with Network Automation On-Demand Webinar: https://info.enterprisemanagement.com/netsecops-2022-webinar-ws • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch
  • 3. | @ema_research | @ema_research Featured Speakers Shamus leads the network infrastructureand operations practice. He has more than 16 years of experience in the IT industry.His research focuses on all aspects of managing enterprise networks,including network automation, AIOps-driven network operations,multi-cloud networking,and WAN transformation. John leads a team of consultantsfocused on designing and delivering scalable, highly available and secure infrastructuresolutions to customers across multiple industry verticalsand technologies. Before joining NetCraftsmen, John held severalpositions including ExecutiveDirector and Chief Architect for Global Network Services at JPMorgan Chase. Kelly joined the Blue Planet Enterprise (BPE) program in March 2021 from HPE/Aruba whereshe was responsible for GTM strategies and execution for services, education, and NaaS solutions. Prior to HPE, Kelly worked at a variety of technology companies that included EMC and Commvault along with running her own GTM agency with clients that included Avnet,Arrow,and Bell Micro. © 2022 Enterprise ManagementAssociates, Inc. 3 Shamus McGillicuddy Vice President of Research Network Infrastructure and Operations Kelly Baig Director of Market Strategy Blue Planet John Cavanaugh CTO NetCraftsmen
  • 5. | @ema_research | @ema_research 75% of IT Organizations Report Growth in NetSecOps Collaboration © 2022 Enterprise ManagementAssociates, Inc. 5 Drivers of Collaboration 81% Public cloud adoption/migration 81% Work from home/work from anywhere 81% Data center modernization 79% IoT/Edge computing 75% DevOps 72% WAN transformation (SD-WAN/SASE) 68% Zero trust security
  • 6. | @ema_research | @ema_research NetSecOps parterships serve the interestsof other IT groups 66.4% ITSM 53.8% IT governance/financial management 53.0% CloudOps 50.5% Data center I&O 41.5% DevOps The Many Benefits of Successful Collaboration © 2022 Enterprise ManagementAssociates, Inc. 6 “You will get a final product that is more secure, better implemented, and can recover from disaster.” Network security architect $2.5 billion software company Benefits of successful NetSecOps partnerships
  • 7. | @ema_research | @ema_research A Difficult, Unnatural Partnership © 2022 Enterprise ManagementAssociates, Inc. 7 “[The security team is] too esoteric. They ask, ‘Why is theapplication team puttingthishere instead of there?’ That ship has already sailed. We often get thesense that [security] doesn’t understand what thebusiness is.” Network architect $15 billion retailer “When thenetwork team is building something and working on a deadline, theysee thesecurity team as a roadblock tohitting a milestone, especially if leadership is pushing them torun thingstightly.” Network security architect $2.5 billion software company Only 39% reported fully successful NetSecOps partnership Different perspectives 24% Engineers/Architects/Admins 69% IT Execs Top challenges to collaboration 28% Data quality/authority issues 25% Cross-team skills gaps 21% Budget issues 20% Architectural complexity 19% Lack of tools/technologies that enable collaboration
  • 8. | @ema_research | @ema_research Most Critical Areas of Collaboration © 2022 Enterprise ManagementAssociates, Inc. 8 “Changemanagement is themost important.We’ve trained securityto look at certain thingseven before it comes to us. If someone requests a change torouting or firewalls, thefirst person that approvesthat changeis theinfo securityteam.” Director of global network infrastructure and operations, $80-billion technology company Implementing Technology Provisioning and configuring new infrastructure Policy implementation 1 2 4 3 Infrastructure planning & design Network design Policy design Technology evaluation& procurement Research ZTNA, SASE, multi-cloud RFPs, budget sharing Operational monitoring NPM, NDR, SIEM Alerts, escalations, eventmanagement More important to organizations focused on WFH and zero trust 5 Change management Moves,adds, changes Network change approvals 44% 37% 33% 36% 23%
  • 9. | @ema_research Network Automation as a NetSecOps Foundation
  • 10. | @ema_research | @ema_research Nearly 91% of Organizations Believe Network Automation is Important to NetSecOps Collaboration © 2022 Enterprise ManagementAssociates, Inc. 10 “Automation givesus consistent configurations,consistent controls,and easy rollouts of changes. .It also allows us, from a data collection standpoint,to get better insight intowhat’s going on in thenetwork.That consistencyreduces risk.” Director of network engineering and operations, $7 billion healthcareenterprise Importance of automation tools to facilitating NetSecOps collaboration Best practice focus The most successful collaborators are more likely to rate network automation as very important.
  • 11. | @ema_research | @ema_research Modern Network Automation Solutions Offer a Shared Network Source of Truth © 2022 Enterprise ManagementAssociates, Inc. 11 A network source of truth provides visibility into networkintent Config data DDI data (IP space, DNS) Security Policies Manually-builtsources of truth lead to: 65% Operational inefficiency 45% Lack of change visibility 41% Introduction of security vulnerabilities 35% Performance degradation NetOps and SecOps can use a source of truth to… Enforce security and compliance policies during moves, adds, and changes Audit the network Troubleshoot performance Investigate security incidents 74% of organizations want automation platforms that gather and store data in a network source of truth
  • 12. | @ema_research | @ema_research © 2022 Enterprise ManagementAssociates, Inc. 12 Tasks That NetOps and SecOps Want to Automate Together Event management Detecting faults, breaches, escalating to subject matter experts 1 2 4 3 Infrastructure provisioning Favored by most successful collaborators Incident response Higher for members of security teams Infrastructure lifecycle management 5 Network design 53% 51% 46% 47% 36% Self-service networking and security 74% of organizations want to leverage network automation to empower orchestration of networking and security services for application teams | @ema_research
  • 13. | @ema_research | @ema_research Relevant Network Automation Solutions © 2022 Enterprise ManagementAssociates, Inc. 13 Automation tools most useful for collaboration 47% Network change and configuration management 46% Security policy automation Favored by most successful collaborators 42% Infrastructure as code platforms (Ansible, Terraform) 41% DDI automation (DNS, DHSCP, IPAM) Favored by members of securityteams
  • 14. | @ema_research | @ema_research Finding the Right Network Automation Solutions © 2022 Enterprise ManagementAssociates, Inc. 14 Top platform requirements 44% Ease of deployment and administration 40% Third-party integrations 38% Ease of use 38% Scalability Top feature requirements 43% Device lifecycle management 40% Security policy design/implementation/audit 38% Change analysis/modeling 37% Configuration compliance monitoring 34% Change management Networkassurance capabilities 89% of organizations recognize the importance of integrated monitoring and troubleshooting capabilities in automation solutions • Successful users of network automation are more likely to rate this as very important Top use cases • 58% Monitor security and compliance risk • 53% Measure application performance and health • 53% Monitor network device health
  • 15. | @ema_research | @ema_research AI and Machine Learning © 2022 Enterprise ManagementAssociates, Inc. 15 Do you agree or disagree with the following statement? AIOps technology can improve collaboration between your organization’s network team and security team. How companies use AI/ML capabilities embeddedin networkautomation solutions 33% Security and compliance insights 33% Automated network problem remediation 32% Proactive security protection 30% Improve quality of network source of truth
  • 16. | @ema_research | @ema_research Final Thoughts © 2022 Enterprise ManagementAssociates, Inc. 16 Digital disruptions are forcing NetOps and SecOps to collaborate more NetSecOps partnerships are difficult to build Enterprises believe network automation can enable and encourage this collaboration This network automation should • Establish a network source of truth • Meet the requirements of both teams • Leverage AIOps technology to provide meaningful insights
  • 17. Get Healthy. Stay Healthy. RestAssured.™ ©2022 NetCraftsmen Confidential Automation, Orchestration and Service Chaining
  • 18. ©2022 NetCraftsmen Confidential 18 Most Enterprises • IT is structured with numerous siloed functional ‘Towers’: • Applications Development • Server/Cloud Infrastructure Team • Network Team • Security Team • Operations • Each works independent of each other • Constructing and delivering a new service or even a new location with an existing service requires a Project with a PM to coordinate the activity between all parties Most Service Providers • Structured around Service Delivery • Designing a new service takes significant time and effort • (Months to years) • Delivering an existing service to a new client or location is simple • Agile Service Delivery has emerged: • Driving down efforts for new services • (weeks to months) Enterprise Background
  • 19. ©2022 NetCraftsmen Confidential 19 Enterprise • Delivery of new Services to users • Done piecemeal by each tower • Improvements can be significant • But results: • Can be less than desired • Because they are no tied to an end- to-end service Service Providers • Agile Services • Drove providers towards • Network and Security Functions in software • General Purpose CPE Devices • Defined as Network Function Virtualization (NFV) Automation Use Case
  • 20. ©2022 NetCraftsmen Confidential 20 v ▪ Network Functions are SW-based over well-known HW ▪ Multiple roles over same HW ORCHESTRATION,AUTOMATION & REMOTE INSTALL DPI BRAS GGSN/ SGSN Firewall CG-NAT PE Router VIRTUAL APPLIANCES STANDARD HIGH VOLUME SERVERS Virtualised Network Model: VIRTUAL APPLIANCE APPROACH v ▪ Network Functions are based on specific HW&SW ▪ One physical node per role DPI BRAS GGSN/SGSN Session Border Controller Firewall CG-NAT PE Router Traditional Network Model: APPLIANCE APPROACH Service Providers: The NFV Concept A means to make the network and security more flexible and simpler by minimising dependence on HW constraints
  • 21. ©2022 NetCraftsmen Confidential 21 Most Enterprises • Any end-to-end service flow involves multiple towers • No one group is responsible for the full end-to-end picture • So - improving one or even most independent element(s) may not result in any overall improvement in delivery Read ”The Phoenix Project” Failure Case: Security • Virtualization team at a Fortune 500 • Created a portal for their Developers • This automated their workflow and was a hit with the development community • But simply dumped Network requirements, Firewall and Other Security requests into an email queue for their respective towers • Results? • Churn in the VMware world created a situation where LB and FW rules were orphaned when VMs were removed • The ‘intended state’ linking workloads to network and security was not tracked creating a massive issue Enterprise: Results
  • 22. ©2022 NetCraftsmen Confidential 22 Service Providers & CSPs • Chose the NFV route • Fits the SP/CSP Model • Simple end-to-end Orchestration • But Services are simple and repeatable Enterprises • Typically, not sold on the NFV/Whitebox model, but did adopt SDN and Cloud • Services are complex and are often a hybrid of on-Prem, SaaS and Cloud Requires an Orchestration system that can track end-to-end flows across all IT towers with NFV like precision Enterprise: Service Chaining and Orchestration Use Case
  • 23. ©2022 NetCraftsmen Confidential 23 Enterprise: Call to Action • Forrester in a 2021 Paper stated: • Merge Security And Networking, Or Sunset Your Business • They were driving at the problem created by the Tower-based approach to delivering services and the requirement to think end-to-end • This problem happened because the majority of current ITSM systems do not have a single source of truth, in fact recent Gartner studies provide evidence that Enterprise CMDBs are rarely complete • This leads us and the Enterprise community looking for new approaches and systems to solve the issue • Solving the issue requires that: • A system being delivered as code – with schema-based approaches that define intent and self document • For organizations that can’t do this themselves - they need an ITSM system that can
  • 24. Get Healthy. Stay Healthy. RestAssured.™ ©2022 NetCraftsmen Confidential 888.804.1717 info@netcraftsmen.com
  • 25. 25 Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary . Proven in the world’s largest, most sophisticated networks Intelligent network automation software for mid-tier enterprise NOC teams and MSPs Global Team of 700+ Specialists Headquartered in Hanover, Maryland 200+ Customers globally, serving industries including: • Energy and Utilities • Public Sectorand Education • Finance and Insurance • Manufacturing • Retail • Healthcare • Telecommunications Industry Innovations • Industry 1st multi-vendor SDN suite for Service Providers • Industry 1st orchestration product for WAN/NFV/Cloud • Industry 1st integrated portfolio for Service Lifecycle Automation
  • 26. 26 Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary . Work-From- Home Shift from Hardware and Office- Centric Edge Ethernet Wifi Firewall Router Datacenter Branches Cloud Provider Public Private Shift to Software Defined Virtual Network Functions SASE Branches Cloud Provider Public Private Migration to Cloud SDWAN SDBRANCH How are your NOC and SOC teams keeping up? How Our Customers are Evolving NOC SOC NOC and SOC Team Collaboration Need network visibility and control Leading use-cases adding pressure to NetOps: M&A; IoT; Compliance; Cloud; Work-from-Home
  • 27. Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary . 27 Networks are critical but require automation to help reduce complexity and risk Why Network Automation? Customer and employee satisfaction depends on reliable network services An incomplete view of the network impacts performance and security risk Automation is key to addressing modern networking skills gap
  • 28. 28 Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary . What Sets Blue Planet Apart Top Platform Requirements ✓ Ease of deployment and administration (44%) ✓ Third-party integrations (40%) ✓ Ease of use (38%) ✓ Scalability (38%) Top Feature Requirements ✓ Device lifecycle management (43%) ✓ Security policy design/implementation/audit (40%) ✓ Change analysis/modeling (38%) ✓ Configuration compliance monitoring (37%) ✓ Change management (34%)
  • 29. 29 Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary . Blue Planet Enterprise Automation Suite Critical capabilities for network automation Inventory Visibility Continuous Compliance Maintain device list down to serial # and location for proactive management and planning Ensure automated compliance with standard network configurations to avoid security exposures Faultand Performance Monitoring Continuously monitor network for faults and failures to enable rapid remediation Configuration and Software Control Analyze performance stats to predict slowdowns,enable RCA, & avoid outages ML-based Anomaly Detection Apply proven pre-built runbooks built by seasoned admins to standardize operations Offered with pay-as-you-grow billing, out-of-box integration with IT apps, SaaS agility and flexibility
  • 30. 30 Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary . Leader and Fast Mover in GigaOm’s Radar Report for NetDevOps ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
  • 31. Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary . 31 Final Thoughts for NOC and SOC Team Collaboration
  • 32. Copy right © Ciena Corporation 2022. All rights reserv ed. Conf idential & Proprietary . 32 Thank you! Explore the value of network automation for your environment Learn more at www.blueplanet.com