SlideShare a Scribd company logo
NetSecOps
Aligning Networking and
Security Teams to Ensure
Digital Transformation
Shamus McGillicuddy
Vice President of Research
Shamus@enterprisemanagement.com
Watch the On-Demand Webinar
• NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transformation
On-Demand Webinar: https://info.enterprisemanagement.com/netsecops-research-webinar-ws
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
Featured Speaker
Shamus McGillicuddy is the vice president of
research at Enterprise Management Associates
(EMA), where he leads the network infrastructure and
operations practice. He has more than 15 years of
experience in the IT industry. His research focuses on
all aspects of managing enterprise networks,
including network automation, AIOps-driven network
operations, multi-cloud networking, and WAN
transformation.
© 2021 Enterprise Management Associates, Inc. 3
Shamus McGillicuddy
Vice President of Research
Network Infrastructure and Operations
| @ema_research
Sponsors
© 2021 Enterprise Management Associates, Inc. 4
| @ema_research
Agenda
Research
Goals and
Methodology
1 2 3
Drivers of
NetSecOps
Collaboration
Making it
Happen
4
Network Data
5
Network
Monitoring
and
Management
Tools
6
Q&A
© 2021 Enterprise Management Associates, Inc. 5
| @ema_research
Research Goals
and Methodology
NetSecOps Research Goals
© 2021 Enterprise Management Associates, Inc. 7
Why is this collaboration increasing?
What role does network data play?
What network management tools and technologies support this
collaboration?
Are there any roadblocks to these partnerships?
Have IT organizations established best practices?
Over the last few years,
EMA research has found that
network infrastructure &
operations teams have
increased their collaboration
with information security and
cybersecurity teams
| @ema_research
© 2021 Enterprise Management Associates, Inc.
Job Titles
25% IT executives
48% IT middle management
27% Engineers/Architects/Admins
Groups
25% IT executive suite
20% Network engineering/administration
19% InfoSec/Cybersecurity/SecOps
15% IT architecture
14% Network operations
9% Data center operations
16+ Industries
24% IT services/MSPs
19% Retail/Wholesale/Distribution
15% Manufacturing
13% Finance/Banking/Insurance
5% Construction
5% Healthcare/Medical/Pharmaceutical
4% Software
Geography
50% North America 50% Europe
Company Size by Employees
27% Midsized enterprise (1,000 to 2,499)
53% Large enterprise (2,500 to 9,999)
20% Very large enterprise (10,000+)
Research Methodology: Market Survey
© 2021 Enterprise Management Associates, Inc. 8
| @ema_research
Drivers of NetSecOps
Collaboration
75% of IT Organizations Report Growth in NetSecOps Collaboration
© 2021 Enterprise Management Associates, Inc. 10
| @ema_research
Sample Size = 366
Most important areas of collaboration
1. Technology implementation 44%
2. Infrastructure planning & design 37%
3. Technology evaluation & procurement 36%
4. Operational monitoring 33%
5. Change management 23%
6. Troubleshooting/Incident response 18%
Collaboration Drivers
© 2021 Enterprise Management Associates, Inc. 11
| @ema_research
81% Public cloud adoption/migration
81% Work from home/work from anywhere
81% Data center modernization
79% IoT/Edge computing
75% DevOps
72% WAN transformation (SD-WAN/SASE)
68% Zero trust security
“I believe that everyone is responsible for
security. It’s not just the security team’s job
to do security. Network engineers need to
develop security-oriented solutions.”
Director of network engineering and operations
$7 billion healthcare enterprise
The Many Benefits of Successful Collaboration
© 2021 Enterprise Management Associates, Inc. 12
Benefits of successful NetSecOps partnerships
NetSecOps partnerships serve the
interests of other IT groups
• ITSM 66.4%
• IT governance/financial management 53.8%
• CloudOps 53%
• Data center I&O 50.5%
• DevOps 41.5%
“You will get a final product that is
more secure, better implemented,
and can recover from disaster.”
Network security architect
$2.5 billion software company
| @ema_research
Sample Size = 366
Making it Happen
Friends or Foes?
© 2021 Enterprise Management Associates, Inc. 14
| @ema_research
“[The security team is] too esoteric. They ask,
‘Why is the application team putting this
here instead of there?’ That ship has already
sailed. We often get the sense that [security]
doesn’t understand what the business is.”
Network architect
$15 billion retailer
“When the network team is building
something and working on a deadline,
they see the security team as a roadblock
to hitting a milestone, especially if leadership
is pushing them to run things tightly,”
Network security architect
$2.5 billion software company
Only 39% reported fully successful
NetSecOps partnership
• IT execs are most enthusiastic 69%
• Engineers/Architects/Admins are less
enthusiastic 24%
Top challenges to collaboration
• Data quality/authority issues 28%
• Cross-team skills gaps 25%
• Budget issues 21%
• Architectural complexity 20%
• Lack of tools/technologies that enable
collaboration 19%
92% of CIOs/CISOs Have Introduced Policies and Programs to Encourage
NetSecOps Collaboration
© 2021 Enterprise Management Associates, Inc. 15
62% New best practices and processes (e.g., ITIL)
57% Reorganization
53% Budget sharing
51% Training/Certifications
48% Shared tools
Only 36%
of CIO policies and
programs have been
fully successful
| @ema_research
“I’ve been added to committees, and we have quarterly meetings
where global security comes and presents. We come up with priorities
for collaboration based on business priority.”
Director of global networks
$80 billion technology company
Network Data
Security Teams Need to Analyze Network Traffic Drives NetSecOps Collaboration in
83% of Enterprises
© 2021 Enterprise Management Associates, Inc. 17
| @ema_research
“The process of sharing data sometimes works well, and sometimes it
doesn’t work well because the security team doesn’t have a solid
idea of what they’re asking for. They say, ‘Show me data from web
servers.’ And I have to ask, ‘Which web servers? Because we have a
lot.’ Sometimes it’s difficult to communicate with them.”
Network architect
$15 billion retailer
93%
of security teams
need access to
packet metadata
92%
of security teams
need access to full
packet data
Why they need this data
69% Network detection & response/network traffic analysis
58% Incident response
55% Real-time packet payload analysis
42.5% Forensic packet analysis
Unifying Packet Access and Capture
© 2021 Enterprise Management Associates, Inc. 18
Network packet brokers
• 94% are using NPBs to get packet data to analysis tools
• 90% believe NPBs are important to facilitating collaboration
Consolidation of packet capture infrastructure
• 97% of enterprises are consolidating network and security team
packet capture resources
• Primary drivers: Reduced security/compliance risk, fewer data
conflicts
Packets are the
ultimate source of
network truth
• 56% of network teams need
continuous access to all
packets crossing the wire
• 51% of network teams need
the same
| @ema_research
Network Monitoring
and Management
“
Siloed IT Organizations and Vendors Have Work to Do
© 2021 Enterprise Management Associates, Inc. 20
“When you are buying a solution, you aren’t thinking
about the other team’s needs. My criteria is to select
a tool that is network-centric, focused on my needs.
It’s very difficult to have a tool that serves different
needs. There are some tools that can offer it, but
most of the tools have a particular focus in one
direction or another.” Network architect
$100 billion bank
| @ema_research
Network Monitoring and Analysis
© 2021 Enterprise Management Associates, Inc. 21
| @ema_research
76% of IT organizations
have separate traffic
monitoring & analysis
tools for NetOps and
SecOps
82% of SecOps teams
sometimes use the
NetOps team’s
monitoring tools
80% of enterprises are interested in consolidating onto a
shared tool
Barriers to consolidation
• Solutions don’t meet requirements of both teams 38%
• Benefits of sharing unclear 32%
• Budget conflicts 32%
DDI Management
© 2021 Enterprise Management Associates, Inc. 22
| @ema_research
DNS is a potential threat vector
• DDoS
• Spoofing
• Malware
94% of security teams have
started analyzing DNS traffic
IPAM offers security team insight into security domains, network segmentation,
IP addresses
75% of network teams share data from DDI solutions with the security team
• 46% are doing this manually today
• 87% of network teams have integrated or plan to integrate DDI
management tools with the security team’s tools
“[Security doesn’t] seem to care about [DDI]. But they do come
back to us and say, ‘What is this subnet?’ Having access to IPAM
would save them a lot of time. There is no reason why they couldn’t
access it.”
Network architect
$15 billion retailer
Network Automation
© 2021 Enterprise Management Associates, Inc. 23
Automation tools most useful to
collaboration
1. NCCM 47%
2. Security policy automation 46%
3. Infrastructure as code 42%
4. DDI automation 41%
Tasks the two teams want to
automate together
1. Event management 53%
2. Infrastructure provisioning 51%
3. Incident response/troubleshooting 47%
4. Infrastructure lifecycle management 45%
Importance of automation tools to facilitating NetSecOps collaboration
| @ema_research
Sample Size = 366
Final Thoughts
© 2021 Enterprise Management Associates, Inc. 24
| @ema_research
CIOs and CTO are trying to
make this happen
NetOps and SecOps teams
are trying to align
Network teams lean on
network packet brokers,
packet capture appliances,
network traffic monitoring,
DDI management, and
network automation to
enable collaboration
Traffic data (and the security
team’s need to analyze it) is
the center of gravity for this
collaboration
Get the report
https://bit.ly/3m0piiQ
© 2021 Enterprise Management Associates, Inc. 25
| @ema_research

More Related Content

Similar to NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transformation

DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
Enterprise Management Associates
 
The Cloudification of the Data Center Network
The Cloudification of the Data Center NetworkThe Cloudification of the Data Center Network
The Cloudification of the Data Center Network
Enterprise Management Associates
 
AI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network ManagementAI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network Management
Enterprise Management Associates
 
Multi-Cloud Networking: Connecting and Securing the Future
Multi-Cloud Networking: Connecting and Securing the FutureMulti-Cloud Networking: Connecting and Securing the Future
Multi-Cloud Networking: Connecting and Securing the Future
Enterprise Management Associates
 
State of the Network Infographic 2018
State of the Network Infographic 2018State of the Network Infographic 2018
State of the Network Infographic 2018
IDG
 
Big Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and ManagementBig Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and Management
Enterprise Management Associates
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Enterprise Management Associates
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
AlgoSec
 
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Enterprise Management Associates
 
Network Management Megatrends 2018
Network Management Megatrends 2018Network Management Megatrends 2018
Network Management Megatrends 2018
Enterprise Management Associates
 
The Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldThe Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud World
Enterprise Management Associates
 
Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud Enterprises
Enterprise Management Associates
 
Network Management Megatrends 2020
Network Management Megatrends 2020Network Management Megatrends 2020
Network Management Megatrends 2020
Enterprise Management Associates
 
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the CloudThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet Brokers
Enterprise Management Associates
 
Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...
Itential
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
Insight
 
Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?
Riverbed Technology
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
Jorge García
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
Enterprise Management Associates
 

Similar to NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transformation (20)

DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
The Cloudification of the Data Center Network
The Cloudification of the Data Center NetworkThe Cloudification of the Data Center Network
The Cloudification of the Data Center Network
 
AI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network ManagementAI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network Management
 
Multi-Cloud Networking: Connecting and Securing the Future
Multi-Cloud Networking: Connecting and Securing the FutureMulti-Cloud Networking: Connecting and Securing the Future
Multi-Cloud Networking: Connecting and Securing the Future
 
State of the Network Infographic 2018
State of the Network Infographic 2018State of the Network Infographic 2018
State of the Network Infographic 2018
 
Big Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and ManagementBig Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and Management
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
 
Network Management Megatrends 2018
Network Management Megatrends 2018Network Management Megatrends 2018
Network Management Megatrends 2018
 
The Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldThe Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud World
 
Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud Enterprises
 
Network Management Megatrends 2020
Network Management Megatrends 2020Network Management Megatrends 2020
Network Management Megatrends 2020
 
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the CloudThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet Brokers
 
Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
 
Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 

More from Enterprise Management Associates

Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Enterprise Management Associates
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
Enterprise Management Associates
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Enterprise Management Associates
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
Enterprise Management Associates
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Enterprise Management Associates
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Enterprise Management Associates
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
Enterprise Management Associates
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Enterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Enterprise Management Associates
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Enterprise Management Associates
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
Enterprise Management Associates
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
Enterprise Management Associates
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
Enterprise Management Associates
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Enterprise Management Associates
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
Enterprise Management Associates
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
Enterprise Management Associates
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
Enterprise Management Associates
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
Enterprise Management Associates
 
Automation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOpsAutomation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOps
Enterprise Management Associates
 

More from Enterprise Management Associates (20)

Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
Automation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOpsAutomation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOps
 

Recently uploaded

UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transformation

  • 1. NetSecOps Aligning Networking and Security Teams to Ensure Digital Transformation Shamus McGillicuddy Vice President of Research Shamus@enterprisemanagement.com
  • 2. Watch the On-Demand Webinar • NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transformation On-Demand Webinar: https://info.enterprisemanagement.com/netsecops-research-webinar-ws • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch
  • 3. Featured Speaker Shamus McGillicuddy is the vice president of research at Enterprise Management Associates (EMA), where he leads the network infrastructure and operations practice. He has more than 15 years of experience in the IT industry. His research focuses on all aspects of managing enterprise networks, including network automation, AIOps-driven network operations, multi-cloud networking, and WAN transformation. © 2021 Enterprise Management Associates, Inc. 3 Shamus McGillicuddy Vice President of Research Network Infrastructure and Operations | @ema_research
  • 4. Sponsors © 2021 Enterprise Management Associates, Inc. 4 | @ema_research
  • 5. Agenda Research Goals and Methodology 1 2 3 Drivers of NetSecOps Collaboration Making it Happen 4 Network Data 5 Network Monitoring and Management Tools 6 Q&A © 2021 Enterprise Management Associates, Inc. 5 | @ema_research
  • 7. NetSecOps Research Goals © 2021 Enterprise Management Associates, Inc. 7 Why is this collaboration increasing? What role does network data play? What network management tools and technologies support this collaboration? Are there any roadblocks to these partnerships? Have IT organizations established best practices? Over the last few years, EMA research has found that network infrastructure & operations teams have increased their collaboration with information security and cybersecurity teams | @ema_research
  • 8. © 2021 Enterprise Management Associates, Inc. Job Titles 25% IT executives 48% IT middle management 27% Engineers/Architects/Admins Groups 25% IT executive suite 20% Network engineering/administration 19% InfoSec/Cybersecurity/SecOps 15% IT architecture 14% Network operations 9% Data center operations 16+ Industries 24% IT services/MSPs 19% Retail/Wholesale/Distribution 15% Manufacturing 13% Finance/Banking/Insurance 5% Construction 5% Healthcare/Medical/Pharmaceutical 4% Software Geography 50% North America 50% Europe Company Size by Employees 27% Midsized enterprise (1,000 to 2,499) 53% Large enterprise (2,500 to 9,999) 20% Very large enterprise (10,000+) Research Methodology: Market Survey © 2021 Enterprise Management Associates, Inc. 8 | @ema_research
  • 10. 75% of IT Organizations Report Growth in NetSecOps Collaboration © 2021 Enterprise Management Associates, Inc. 10 | @ema_research Sample Size = 366 Most important areas of collaboration 1. Technology implementation 44% 2. Infrastructure planning & design 37% 3. Technology evaluation & procurement 36% 4. Operational monitoring 33% 5. Change management 23% 6. Troubleshooting/Incident response 18%
  • 11. Collaboration Drivers © 2021 Enterprise Management Associates, Inc. 11 | @ema_research 81% Public cloud adoption/migration 81% Work from home/work from anywhere 81% Data center modernization 79% IoT/Edge computing 75% DevOps 72% WAN transformation (SD-WAN/SASE) 68% Zero trust security “I believe that everyone is responsible for security. It’s not just the security team’s job to do security. Network engineers need to develop security-oriented solutions.” Director of network engineering and operations $7 billion healthcare enterprise
  • 12. The Many Benefits of Successful Collaboration © 2021 Enterprise Management Associates, Inc. 12 Benefits of successful NetSecOps partnerships NetSecOps partnerships serve the interests of other IT groups • ITSM 66.4% • IT governance/financial management 53.8% • CloudOps 53% • Data center I&O 50.5% • DevOps 41.5% “You will get a final product that is more secure, better implemented, and can recover from disaster.” Network security architect $2.5 billion software company | @ema_research Sample Size = 366
  • 14. Friends or Foes? © 2021 Enterprise Management Associates, Inc. 14 | @ema_research “[The security team is] too esoteric. They ask, ‘Why is the application team putting this here instead of there?’ That ship has already sailed. We often get the sense that [security] doesn’t understand what the business is.” Network architect $15 billion retailer “When the network team is building something and working on a deadline, they see the security team as a roadblock to hitting a milestone, especially if leadership is pushing them to run things tightly,” Network security architect $2.5 billion software company Only 39% reported fully successful NetSecOps partnership • IT execs are most enthusiastic 69% • Engineers/Architects/Admins are less enthusiastic 24% Top challenges to collaboration • Data quality/authority issues 28% • Cross-team skills gaps 25% • Budget issues 21% • Architectural complexity 20% • Lack of tools/technologies that enable collaboration 19%
  • 15. 92% of CIOs/CISOs Have Introduced Policies and Programs to Encourage NetSecOps Collaboration © 2021 Enterprise Management Associates, Inc. 15 62% New best practices and processes (e.g., ITIL) 57% Reorganization 53% Budget sharing 51% Training/Certifications 48% Shared tools Only 36% of CIO policies and programs have been fully successful | @ema_research “I’ve been added to committees, and we have quarterly meetings where global security comes and presents. We come up with priorities for collaboration based on business priority.” Director of global networks $80 billion technology company
  • 17. Security Teams Need to Analyze Network Traffic Drives NetSecOps Collaboration in 83% of Enterprises © 2021 Enterprise Management Associates, Inc. 17 | @ema_research “The process of sharing data sometimes works well, and sometimes it doesn’t work well because the security team doesn’t have a solid idea of what they’re asking for. They say, ‘Show me data from web servers.’ And I have to ask, ‘Which web servers? Because we have a lot.’ Sometimes it’s difficult to communicate with them.” Network architect $15 billion retailer 93% of security teams need access to packet metadata 92% of security teams need access to full packet data Why they need this data 69% Network detection & response/network traffic analysis 58% Incident response 55% Real-time packet payload analysis 42.5% Forensic packet analysis
  • 18. Unifying Packet Access and Capture © 2021 Enterprise Management Associates, Inc. 18 Network packet brokers • 94% are using NPBs to get packet data to analysis tools • 90% believe NPBs are important to facilitating collaboration Consolidation of packet capture infrastructure • 97% of enterprises are consolidating network and security team packet capture resources • Primary drivers: Reduced security/compliance risk, fewer data conflicts Packets are the ultimate source of network truth • 56% of network teams need continuous access to all packets crossing the wire • 51% of network teams need the same | @ema_research
  • 20. “ Siloed IT Organizations and Vendors Have Work to Do © 2021 Enterprise Management Associates, Inc. 20 “When you are buying a solution, you aren’t thinking about the other team’s needs. My criteria is to select a tool that is network-centric, focused on my needs. It’s very difficult to have a tool that serves different needs. There are some tools that can offer it, but most of the tools have a particular focus in one direction or another.” Network architect $100 billion bank | @ema_research
  • 21. Network Monitoring and Analysis © 2021 Enterprise Management Associates, Inc. 21 | @ema_research 76% of IT organizations have separate traffic monitoring & analysis tools for NetOps and SecOps 82% of SecOps teams sometimes use the NetOps team’s monitoring tools 80% of enterprises are interested in consolidating onto a shared tool Barriers to consolidation • Solutions don’t meet requirements of both teams 38% • Benefits of sharing unclear 32% • Budget conflicts 32%
  • 22. DDI Management © 2021 Enterprise Management Associates, Inc. 22 | @ema_research DNS is a potential threat vector • DDoS • Spoofing • Malware 94% of security teams have started analyzing DNS traffic IPAM offers security team insight into security domains, network segmentation, IP addresses 75% of network teams share data from DDI solutions with the security team • 46% are doing this manually today • 87% of network teams have integrated or plan to integrate DDI management tools with the security team’s tools “[Security doesn’t] seem to care about [DDI]. But they do come back to us and say, ‘What is this subnet?’ Having access to IPAM would save them a lot of time. There is no reason why they couldn’t access it.” Network architect $15 billion retailer
  • 23. Network Automation © 2021 Enterprise Management Associates, Inc. 23 Automation tools most useful to collaboration 1. NCCM 47% 2. Security policy automation 46% 3. Infrastructure as code 42% 4. DDI automation 41% Tasks the two teams want to automate together 1. Event management 53% 2. Infrastructure provisioning 51% 3. Incident response/troubleshooting 47% 4. Infrastructure lifecycle management 45% Importance of automation tools to facilitating NetSecOps collaboration | @ema_research Sample Size = 366
  • 24. Final Thoughts © 2021 Enterprise Management Associates, Inc. 24 | @ema_research CIOs and CTO are trying to make this happen NetOps and SecOps teams are trying to align Network teams lean on network packet brokers, packet capture appliances, network traffic monitoring, DDI management, and network automation to enable collaboration Traffic data (and the security team’s need to analyze it) is the center of gravity for this collaboration
  • 25. Get the report https://bit.ly/3m0piiQ © 2021 Enterprise Management Associates, Inc. 25 | @ema_research