SlideShare a Scribd company logo
Network Monitoring Trends
2014
The evolving use of network
monitoring tools

www.netfort.com
Survey Highlights
• 76% of respondents already use network
monitoring tools.
• Most important feature not provided by existing
tools:
– Ability to break down traffic by application and user

• Reports most often requested by management:
– Information on bandwidth consumption

• 71% respondents think it is a necessity to
associate network activity with usernames and
not just IP addresses.

Slide 2

www.netfort.com
Size of network
How many computers are you responsible for in your network?

Almost half of the respondents
managed networks of between
100 and 1000 computers.

Slide 3

www.netfort.com
Network monitoring tools in place
Do you have any network monitoring tools in place at the moment?

Over three-quarters of the
respondents have network
monitoring tools in place.

Slide 4

www.netfort.com
Network monitoring tools used
Which monitoring tools do you use?

Majority of respondents quoted
more than one tool.

Slide 5

www.netfort.com
Tools used to monitor NetFlow traffic
Do you monitor NetFlow traffic and bandwidth? If Yes, how do you do it?

88% of respondents monitor
NetFlow traffic.

Slide 6

www.netfort.com
Desired NetFlow solution improvements
What improvements would you like to see in NetFlow-based solutions?

Slide 7

www.netfort.com
Features unavailable in current tools
What additional network monitoring features would you like that are unavailable in current tools?

Slide 8

www.netfort.com
Information requested by managers
Are you asked to report to your manager on network information on a regular basis? What
specifically are you asked to report on?

Slide 9

www.netfort.com
Information requested by managers
Are you asked to report to your manager on network information on a regular basis? What
specifically are you asked to report on?

Slide 10

www.netfort.com
Information requested by managers
Are you asked to report to your manager on network information on a regular basis? What
specifically are you asked to report on?

Slide 11

www.netfort.com
Importance of usernames in reports
Do you think associating network activity, including bandwidth, traffic, Internet usage with IP
address and username is a necessity or just nice to have

Slide 12

www.netfort.com
Importance of usernames in reports
Do you think associating network activity, including bandwidth, traffic, Internet usage with IP
address and username is a necessity or just nice to have

Slide 13

www.netfort.com
Use of DPI tools
Do you use any deep packet inspection tools? If yes what do you use?

Most respondents are not using
deep packet inspection tools at
the moment but plan to in future.

Slide 14

www.netfort.com
www. n e t f o r t . c o m

More Related Content

Viewers also liked

Performing Simulation-Based, Real-time Decision Making with Cloud HPC
Performing Simulation-Based, Real-time Decision Making with Cloud HPCPerforming Simulation-Based, Real-time Decision Making with Cloud HPC
Performing Simulation-Based, Real-time Decision Making with Cloud HPC
inside-BigData.com
 
Strategic options for datacenter operations - Nordic market and infrastructure
Strategic options for datacenter operations - Nordic market and infrastructureStrategic options for datacenter operations - Nordic market and infrastructure
Strategic options for datacenter operations - Nordic market and infrastructure
Business Sweden
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
Daniel Vinyar
 
SteelCentral Network Planning and Configuration Management (NPCM)
SteelCentral Network Planning and Configuration Management (NPCM)SteelCentral Network Planning and Configuration Management (NPCM)
SteelCentral Network Planning and Configuration Management (NPCM)
Riverbed Technology
 
Open Source Logging and Monitoring Tools
Open Source Logging and Monitoring ToolsOpen Source Logging and Monitoring Tools
Open Source Logging and Monitoring Tools
Phase2
 
Managing and Monitoring Application Performance
Managing and Monitoring Application PerformanceManaging and Monitoring Application Performance
Managing and Monitoring Application Performance
Sebastian Marek
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
Nafaâ TAYACHI
 
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
IT Brand Pulse
 
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
MuleSoft
 
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...PerformanceVision (previously SecurActive)
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
ManageEngine, Zoho Corporation
 

Viewers also liked (12)

Performing Simulation-Based, Real-time Decision Making with Cloud HPC
Performing Simulation-Based, Real-time Decision Making with Cloud HPCPerforming Simulation-Based, Real-time Decision Making with Cloud HPC
Performing Simulation-Based, Real-time Decision Making with Cloud HPC
 
Strategic options for datacenter operations - Nordic market and infrastructure
Strategic options for datacenter operations - Nordic market and infrastructureStrategic options for datacenter operations - Nordic market and infrastructure
Strategic options for datacenter operations - Nordic market and infrastructure
 
PRTG
PRTGPRTG
PRTG
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
 
SteelCentral Network Planning and Configuration Management (NPCM)
SteelCentral Network Planning and Configuration Management (NPCM)SteelCentral Network Planning and Configuration Management (NPCM)
SteelCentral Network Planning and Configuration Management (NPCM)
 
Open Source Logging and Monitoring Tools
Open Source Logging and Monitoring ToolsOpen Source Logging and Monitoring Tools
Open Source Logging and Monitoring Tools
 
Managing and Monitoring Application Performance
Managing and Monitoring Application PerformanceManaging and Monitoring Application Performance
Managing and Monitoring Application Performance
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
 
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
 
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
 

Similar to Network Monitoring Trends 2014

Term PaperMobile Computing and Social NetworksDue Week 10 and w.docx
Term PaperMobile Computing and Social NetworksDue Week 10 and w.docxTerm PaperMobile Computing and Social NetworksDue Week 10 and w.docx
Term PaperMobile Computing and Social NetworksDue Week 10 and w.docx
mattinsonjanel
 
Network barometer report 2014
Network barometer report 2014Network barometer report 2014
Network barometer report 2014
Mūniū Karanja
 
5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...
Enterprise Management Associates
 
Interview questions for an Android Developer
Interview questions for an Android DeveloperInterview questions for an Android Developer
Interview questions for an Android Developer
Interview Mocha
 
Roland van leusden mobile performance testing rtc 2014 v0.6
Roland van leusden   mobile performance testing  rtc 2014 v0.6Roland van leusden   mobile performance testing  rtc 2014 v0.6
Roland van leusden mobile performance testing rtc 2014 v0.6Romania Testing
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assurance
NetworkCollaborators
 
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud EraAppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
AppNeta
 
Vpn
VpnVpn
Moving To SaaS
Moving To SaaSMoving To SaaS
Moving To SaaS
Alistair Croll
 
AI와 같이 살기 - 남서울대학교 인터브이알
AI와 같이 살기 - 남서울대학교 인터브이알AI와 같이 살기 - 남서울대학교 인터브이알
AI와 같이 살기 - 남서울대학교 인터브이알
HashScraper Inc.
 
Secret Web Performance Metric - DevDayBe
Secret Web Performance Metric - DevDayBeSecret Web Performance Metric - DevDayBe
Secret Web Performance Metric - DevDayBe
Anna Migas
 
MARNEW at IETF 94
MARNEW at IETF 94MARNEW at IETF 94
MARNEW at IETF 94
Natasha Rooney
 
Do you have a website? Do you want to get sued?
Do you have a website?  Do you want to get sued?Do you have a website?  Do you want to get sued?
Do you have a website? Do you want to get sued?
Devin Olson
 
Social network
Social networkSocial network
Social network
aways daahir
 
Design for the 4th dimension: Real-time apps
Design for the 4th dimension: Real-time appsDesign for the 4th dimension: Real-time apps
Design for the 4th dimension: Real-time apps
Arin Sime
 
Project Flogo: Serverless Integration, Powered by Flogo and Lambda
Project Flogo: Serverless Integration, Powered by Flogo and LambdaProject Flogo: Serverless Integration, Powered by Flogo and Lambda
Project Flogo: Serverless Integration, Powered by Flogo and Lambda
Leon Stigter
 
Performance monitoring for remote locations
Performance monitoring for remote locationsPerformance monitoring for remote locations
Performance monitoring for remote locations
AppNeta
 
[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...
[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...
[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...
NITHIN S.S
 
Essay On Hope Is Life In Hindi
Essay On Hope Is Life In HindiEssay On Hope Is Life In Hindi
Essay On Hope Is Life In Hindi
Heidi Prado
 

Similar to Network Monitoring Trends 2014 (20)

Term PaperMobile Computing and Social NetworksDue Week 10 and w.docx
Term PaperMobile Computing and Social NetworksDue Week 10 and w.docxTerm PaperMobile Computing and Social NetworksDue Week 10 and w.docx
Term PaperMobile Computing and Social NetworksDue Week 10 and w.docx
 
Network barometer report 2014
Network barometer report 2014Network barometer report 2014
Network barometer report 2014
 
5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...
 
Interview questions for an Android Developer
Interview questions for an Android DeveloperInterview questions for an Android Developer
Interview questions for an Android Developer
 
Roland van leusden mobile performance testing rtc 2014 v0.6
Roland van leusden   mobile performance testing  rtc 2014 v0.6Roland van leusden   mobile performance testing  rtc 2014 v0.6
Roland van leusden mobile performance testing rtc 2014 v0.6
 
S8746
S8746S8746
S8746
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assurance
 
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud EraAppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
AppNeta: Challenges of Monitoring the Remote Office in the Hybrid-Cloud Era
 
Vpn
VpnVpn
Vpn
 
Moving To SaaS
Moving To SaaSMoving To SaaS
Moving To SaaS
 
AI와 같이 살기 - 남서울대학교 인터브이알
AI와 같이 살기 - 남서울대학교 인터브이알AI와 같이 살기 - 남서울대학교 인터브이알
AI와 같이 살기 - 남서울대학교 인터브이알
 
Secret Web Performance Metric - DevDayBe
Secret Web Performance Metric - DevDayBeSecret Web Performance Metric - DevDayBe
Secret Web Performance Metric - DevDayBe
 
MARNEW at IETF 94
MARNEW at IETF 94MARNEW at IETF 94
MARNEW at IETF 94
 
Do you have a website? Do you want to get sued?
Do you have a website?  Do you want to get sued?Do you have a website?  Do you want to get sued?
Do you have a website? Do you want to get sued?
 
Social network
Social networkSocial network
Social network
 
Design for the 4th dimension: Real-time apps
Design for the 4th dimension: Real-time appsDesign for the 4th dimension: Real-time apps
Design for the 4th dimension: Real-time apps
 
Project Flogo: Serverless Integration, Powered by Flogo and Lambda
Project Flogo: Serverless Integration, Powered by Flogo and LambdaProject Flogo: Serverless Integration, Powered by Flogo and Lambda
Project Flogo: Serverless Integration, Powered by Flogo and Lambda
 
Performance monitoring for remote locations
Performance monitoring for remote locationsPerformance monitoring for remote locations
Performance monitoring for remote locations
 
[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...
[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...
[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...
 
Essay On Hope Is Life In Hindi
Essay On Hope Is Life In HindiEssay On Hope Is Life In Hindi
Essay On Hope Is Life In Hindi
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Network Monitoring Trends 2014

  • 1. Network Monitoring Trends 2014 The evolving use of network monitoring tools www.netfort.com
  • 2. Survey Highlights • 76% of respondents already use network monitoring tools. • Most important feature not provided by existing tools: – Ability to break down traffic by application and user • Reports most often requested by management: – Information on bandwidth consumption • 71% respondents think it is a necessity to associate network activity with usernames and not just IP addresses. Slide 2 www.netfort.com
  • 3. Size of network How many computers are you responsible for in your network? Almost half of the respondents managed networks of between 100 and 1000 computers. Slide 3 www.netfort.com
  • 4. Network monitoring tools in place Do you have any network monitoring tools in place at the moment? Over three-quarters of the respondents have network monitoring tools in place. Slide 4 www.netfort.com
  • 5. Network monitoring tools used Which monitoring tools do you use? Majority of respondents quoted more than one tool. Slide 5 www.netfort.com
  • 6. Tools used to monitor NetFlow traffic Do you monitor NetFlow traffic and bandwidth? If Yes, how do you do it? 88% of respondents monitor NetFlow traffic. Slide 6 www.netfort.com
  • 7. Desired NetFlow solution improvements What improvements would you like to see in NetFlow-based solutions? Slide 7 www.netfort.com
  • 8. Features unavailable in current tools What additional network monitoring features would you like that are unavailable in current tools? Slide 8 www.netfort.com
  • 9. Information requested by managers Are you asked to report to your manager on network information on a regular basis? What specifically are you asked to report on? Slide 9 www.netfort.com
  • 10. Information requested by managers Are you asked to report to your manager on network information on a regular basis? What specifically are you asked to report on? Slide 10 www.netfort.com
  • 11. Information requested by managers Are you asked to report to your manager on network information on a regular basis? What specifically are you asked to report on? Slide 11 www.netfort.com
  • 12. Importance of usernames in reports Do you think associating network activity, including bandwidth, traffic, Internet usage with IP address and username is a necessity or just nice to have Slide 12 www.netfort.com
  • 13. Importance of usernames in reports Do you think associating network activity, including bandwidth, traffic, Internet usage with IP address and username is a necessity or just nice to have Slide 13 www.netfort.com
  • 14. Use of DPI tools Do you use any deep packet inspection tools? If yes what do you use? Most respondents are not using deep packet inspection tools at the moment but plan to in future. Slide 14 www.netfort.com
  • 15. www. n e t f o r t . c o m