Network Visibility
Architecture for the
Hybrid, Multi-Cloud
Enterprise
Shamus McGillicuddy
Vice President of Research
shamus@enterprisemanagement.com
Twitter: @ShamusEMA
Sponsored by . . .
Watch the On-Demand Webinar
• Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise
On-Demand Webinar:
https://info.enterprisemanagement.com/network-visibility-
architecture-webinar-ss
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
| @ema_research
Featured Speaker
Shamus McGillicuddy is the Vice President of
Research at Enterprise Management Associates
(EMA), where he leads the network infrastructure and
operations practice. He has more than 16 years of
experience in the IT industry. His research focuses on
all aspects of managing enterprise networks,
including network automation, AIOps-driven network
operations, multi-cloud networking, and WAN
transformation.
© 2022 Enterprise ManagementAssociates, Inc. 3
Shamus McGillicuddy
Vice President of Research
Network Infrastructureand Operations
| @ema_research
© 2022 Enterprise ManagementAssociates, Inc. 4
Sponsors
| @ema_research
Agenda
© 2022 Enterprise ManagementAssociates, Inc. 5
Research Goals and
Methodology
1 2 4
3
Network Visibility
Strategies
Visibility
Architecture
Network Visibility
and the Cloud
5
Q&A
Research Goals and
Methodology
| @ema_research
New Market Research on Network Visibility Architecture
© 2022 Enterprise ManagementAssociates, Inc. 7
“It’slike flying an airplane.In good
weather,visual flight rules are fine. When
thestormscome up, you need
instrumentationand instrument flight rules.
Otherwise,you crash. It’s all good until it’s
not,and then you’re in thewilderness.”
Enterprise monitoring systems engineer,
Fortune500 healthcare provider
What is networkvisibility
architecture?
An overlay of traffic mirroring, aggregation, and
distribution solutions that delivers network traffic
data to security and performance analysis tools
Key components
TAPs and SPAN ports
Network packet broker appliances
Software-based probes and packet brokers for
virtual infrastructure
Cloud-based probes and packet brokers and
traffic mirroring services
On the importance of network visibility architecture :
| @ema_research
Goals and Methodology
© 2022 Enterprise ManagementAssociates, Inc. 8
Goals
Identify best practices and emerging requirements for network visibility
architecture in the face of several key drivers, including:
Methodology
Survey of 302 IT and security professionals on their use of network
visibility technology
Ubiquity of virtualization
and east-west traffic in
data centers
Proliferation of hybrid,
multi-cloud
architectures
Increased use of
encryption to hide
malicious traffic
| @ema_research
Job Titles
Qualifiers
Functional Groups
50% IT middle management
24% IT executive
26% Technical staff
25% Technology executive
suite
30% Cybersecurity/IT
security/risk
management
21% Project management/
program management
8% Cloud engineering/
operations
8% Data center operations
7% Network infrastructure
and operations
Direct engagement with network visibility solutions
Network packet brokers installed in a network
Company Size
Region
38% Midsized enterprise – 500 to 2,499 employees
45% Large enterprise – 2,500 to 9,999 employees
17% Very large enterprise – 10,000 or more employees
62% North America 38% Europe
Demographics
© 2022 Enterprise ManagementAssociates, Inc. 9
Top Industries
21% Banking/Finance/
Insurance
13% Healthcare provider/
hospitals
13% Manufacturing
13% Retail
9% Professional/Technical
services not related to IT
6% Construction/
Civil engineering
6% Energy/Utilities
Network Visibility
Strategies
| @ema_research
Strategic Network Visibility Spending
© 2022 Enterprise ManagementAssociates, Inc. 11
Strategic driversof networkvisibility spending
55% Hybrid and/or multi-cloud architecture
49% Zero trust security
46% Application performance optimization
78% of organizations will
increase their spending on
network visibility
architecture solutions over
the next two years
• 23% describe that growth as
significant
• Successful network visibility users
are more likely to expect
significant growth
| @ema_research
Events or issues experienced over the last two years that prompted
organizations to invest in visibilityarchitecture solutions
Reactive Spending
© 2022 Enterprise ManagementAssociates, Inc. 12
Traffic growthis emerging as a
spending imperative
#6 trigger in 2020
#1 trigger today
“Unauthorized access toa network
can lead to so many serious
problems for an organization.If you
have toolsthat require packets,
thosetools will definitelyneed
visibilityintothenetwork.Network
packet brokersare one of those
thingsthat you must havefor full
security.”
Information security engineer,
managed security servicesprovider
| @ema_research
Most important benefits of using a network visibilityarchitecture
Only 34% of organizations are
fully successful withnetwork
visibility architecture
Down from 40% in 2020
Benefits and Challenges
© 2022 Enterprise ManagementAssociates, Inc. 13
Top Challenges
1. Scalability issues 27%
2. Architectural complexity 26%
3. Data quality 23%
4. Skills gaps 19%
5. Budget 19%
6. Limited cloud visibility 17%
Visibility Architecture
| @ema_research
Enterprises are Pulling Back From TAPS, Leaning More on SPAN Ports
© 2022 Enterprise ManagementAssociates, Inc. 15
Percentage of port mirroring accomplished via SPAN ports versus TAPs High percentage of
SPAN port use more
commonin largest
companies
Key benefits of using
TAPs
1. Reduced management
complexity 44%
2. Data quality 37%
3. Reduced hardware
resource utilization 19%
| @ema_research
Virtual Infrastructure
© 2022 Enterprise ManagementAssociates, Inc. 16
98% of organizations mirror traffic from virtual infrastructure
68% Virtual servers
60% Virtual storage
60% Virtual switches/routers
49% Cloud-native platforms – containers, service mesh
Only 34% of organizations
use native traffic mirroring
features of virtual
infrastructure
| @ema_research
Network Packet Broker Requirements
© 2022 Enterprise ManagementAssociates, Inc. 17
Most critical filtering feature:
49% Layer 7 filtering
Platform Requirements
30% Advanced features
28% Resilience/Reliability
22% Manageability
20% Scalability/Performance
Critical packet manipulation
and data generation features
47% Threat intelligence
39% Decryption
31% Metadata generation/NetFlow
29% Packet slicing
| @ema_research
Percentage of the malicious activity hidden within
encrypted traffic, by overall success with network
visibilityarchitectures
Visibility Architecture Enables Inspection of Encrypted Traffic
© 2022 Enterprise ManagementAssociates, Inc. 18
Preferred resource for decryptingTLS/SSL traffic for inspection
“If you’re looking for suspicious traffic, you’ve got to be
able to read into that payload. Otherwise, all you’re left
with is determining the risk based on source and
destination information.”
Infrastructure analyst,
Fortune 500 energy company
27% of malicious activity detected on networks over the last
year was hidden within encrypted traffic
Security and performance
analysis tools (43%) – Less
favored by cybersecurity
Network packet broker 23%
Dedicated decryption
appliance 12%
Packet capture appliance 11%
Application delivery
controller 7%
Network Visibility and
the Cloud
| @ema_research
The Cloud Creates Network Blind Spots
© 2022 Enterprise ManagementAssociates, Inc. 20
45% of organization:
Migrationof applications
to the cloud has created
network blind spots
More common in multi-cloud
companies
Consequences of blind spots
Policy violation 49%
Extend IT service
degradation/downtime 46%
Security breach 45%
Cloud cost overruns 44%
Engineers, architects,and
other technical personnel
are more aware of cloud-
related blind spots than IT
executives and middle
management
| @ema_research
The types of packet data that organizations collect and analyze from
traffic in the public cloud
65%
Packet data is very important to cloud
security monitoring and analysis
54%
Packet data is very important to cloud
performance management
50%
Packet data is very important to cloud
capacity management
Packet Data is Critical to Cloud Operations
© 2022 Enterprise ManagementAssociates, Inc. 21
| @ema_research
Primary method for supplying cloud-related network
packet data to security and performance analysis tools
Most compelling benefits of third-party visibility software
in the cloud
1. Reliability of data collection 54%
2. Administrative security 36%
3. Manageability/Automation 34%
4. Advanced packet filtering and modification features 32%
5. Integration with visibility technology in private infrastructure 30%
Most Organizations Perceive Importance of End-to-End Multi-Cloud Visibility
Architecture
© 2022 Enterprise ManagementAssociates, Inc. 22
Establishing a network visibility architecture that spans
on-premises infrastructure and public cloud
33% of all organizations believe this is very important, 56%
somewhat important
The most successful users of visibility solutions are more likely (50%)
to rate this as very important
| @ema_research
Final Thoughts
© 2022 Enterprise ManagementAssociates, Inc. 23
The cloud is the primary driver of network visibility architecture strategies
Visibility architectures improve IT and security team productivity and reduce
security risk
Too many organizations are leaning on SPAN ports more than TAPs for traffic
mirroring
Too many organizations are decrypting traffic on analysis tools
Network blind spots introduced by the cloud leads to policy violations,
IT service problems, and security breaches
Packet data delivered by an end-to-end, hybrid cloud visibility
architecture can remove those blind spots
| @ema_research
The Network Visibility Architecture Report is Now Available
Learn more and download:
https://bit.ly/3acBtGk
© 2022 Enterprise ManagementAssociates, Inc. 24

Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise

  • 1.
    Network Visibility Architecture forthe Hybrid, Multi-Cloud Enterprise Shamus McGillicuddy Vice President of Research shamus@enterprisemanagement.com Twitter: @ShamusEMA Sponsored by . . .
  • 2.
    Watch the On-DemandWebinar • Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise On-Demand Webinar: https://info.enterprisemanagement.com/network-visibility- architecture-webinar-ss • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch
  • 3.
    | @ema_research Featured Speaker ShamusMcGillicuddy is the Vice President of Research at Enterprise Management Associates (EMA), where he leads the network infrastructure and operations practice. He has more than 16 years of experience in the IT industry. His research focuses on all aspects of managing enterprise networks, including network automation, AIOps-driven network operations, multi-cloud networking, and WAN transformation. © 2022 Enterprise ManagementAssociates, Inc. 3 Shamus McGillicuddy Vice President of Research Network Infrastructureand Operations
  • 4.
    | @ema_research © 2022Enterprise ManagementAssociates, Inc. 4 Sponsors
  • 5.
    | @ema_research Agenda © 2022Enterprise ManagementAssociates, Inc. 5 Research Goals and Methodology 1 2 4 3 Network Visibility Strategies Visibility Architecture Network Visibility and the Cloud 5 Q&A
  • 6.
  • 7.
    | @ema_research New MarketResearch on Network Visibility Architecture © 2022 Enterprise ManagementAssociates, Inc. 7 “It’slike flying an airplane.In good weather,visual flight rules are fine. When thestormscome up, you need instrumentationand instrument flight rules. Otherwise,you crash. It’s all good until it’s not,and then you’re in thewilderness.” Enterprise monitoring systems engineer, Fortune500 healthcare provider What is networkvisibility architecture? An overlay of traffic mirroring, aggregation, and distribution solutions that delivers network traffic data to security and performance analysis tools Key components TAPs and SPAN ports Network packet broker appliances Software-based probes and packet brokers for virtual infrastructure Cloud-based probes and packet brokers and traffic mirroring services On the importance of network visibility architecture :
  • 8.
    | @ema_research Goals andMethodology © 2022 Enterprise ManagementAssociates, Inc. 8 Goals Identify best practices and emerging requirements for network visibility architecture in the face of several key drivers, including: Methodology Survey of 302 IT and security professionals on their use of network visibility technology Ubiquity of virtualization and east-west traffic in data centers Proliferation of hybrid, multi-cloud architectures Increased use of encryption to hide malicious traffic
  • 9.
    | @ema_research Job Titles Qualifiers FunctionalGroups 50% IT middle management 24% IT executive 26% Technical staff 25% Technology executive suite 30% Cybersecurity/IT security/risk management 21% Project management/ program management 8% Cloud engineering/ operations 8% Data center operations 7% Network infrastructure and operations Direct engagement with network visibility solutions Network packet brokers installed in a network Company Size Region 38% Midsized enterprise – 500 to 2,499 employees 45% Large enterprise – 2,500 to 9,999 employees 17% Very large enterprise – 10,000 or more employees 62% North America 38% Europe Demographics © 2022 Enterprise ManagementAssociates, Inc. 9 Top Industries 21% Banking/Finance/ Insurance 13% Healthcare provider/ hospitals 13% Manufacturing 13% Retail 9% Professional/Technical services not related to IT 6% Construction/ Civil engineering 6% Energy/Utilities
  • 10.
  • 11.
    | @ema_research Strategic NetworkVisibility Spending © 2022 Enterprise ManagementAssociates, Inc. 11 Strategic driversof networkvisibility spending 55% Hybrid and/or multi-cloud architecture 49% Zero trust security 46% Application performance optimization 78% of organizations will increase their spending on network visibility architecture solutions over the next two years • 23% describe that growth as significant • Successful network visibility users are more likely to expect significant growth
  • 12.
    | @ema_research Events orissues experienced over the last two years that prompted organizations to invest in visibilityarchitecture solutions Reactive Spending © 2022 Enterprise ManagementAssociates, Inc. 12 Traffic growthis emerging as a spending imperative #6 trigger in 2020 #1 trigger today “Unauthorized access toa network can lead to so many serious problems for an organization.If you have toolsthat require packets, thosetools will definitelyneed visibilityintothenetwork.Network packet brokersare one of those thingsthat you must havefor full security.” Information security engineer, managed security servicesprovider
  • 13.
    | @ema_research Most importantbenefits of using a network visibilityarchitecture Only 34% of organizations are fully successful withnetwork visibility architecture Down from 40% in 2020 Benefits and Challenges © 2022 Enterprise ManagementAssociates, Inc. 13 Top Challenges 1. Scalability issues 27% 2. Architectural complexity 26% 3. Data quality 23% 4. Skills gaps 19% 5. Budget 19% 6. Limited cloud visibility 17%
  • 14.
  • 15.
    | @ema_research Enterprises arePulling Back From TAPS, Leaning More on SPAN Ports © 2022 Enterprise ManagementAssociates, Inc. 15 Percentage of port mirroring accomplished via SPAN ports versus TAPs High percentage of SPAN port use more commonin largest companies Key benefits of using TAPs 1. Reduced management complexity 44% 2. Data quality 37% 3. Reduced hardware resource utilization 19%
  • 16.
    | @ema_research Virtual Infrastructure ©2022 Enterprise ManagementAssociates, Inc. 16 98% of organizations mirror traffic from virtual infrastructure 68% Virtual servers 60% Virtual storage 60% Virtual switches/routers 49% Cloud-native platforms – containers, service mesh Only 34% of organizations use native traffic mirroring features of virtual infrastructure
  • 17.
    | @ema_research Network PacketBroker Requirements © 2022 Enterprise ManagementAssociates, Inc. 17 Most critical filtering feature: 49% Layer 7 filtering Platform Requirements 30% Advanced features 28% Resilience/Reliability 22% Manageability 20% Scalability/Performance Critical packet manipulation and data generation features 47% Threat intelligence 39% Decryption 31% Metadata generation/NetFlow 29% Packet slicing
  • 18.
    | @ema_research Percentage ofthe malicious activity hidden within encrypted traffic, by overall success with network visibilityarchitectures Visibility Architecture Enables Inspection of Encrypted Traffic © 2022 Enterprise ManagementAssociates, Inc. 18 Preferred resource for decryptingTLS/SSL traffic for inspection “If you’re looking for suspicious traffic, you’ve got to be able to read into that payload. Otherwise, all you’re left with is determining the risk based on source and destination information.” Infrastructure analyst, Fortune 500 energy company 27% of malicious activity detected on networks over the last year was hidden within encrypted traffic Security and performance analysis tools (43%) – Less favored by cybersecurity Network packet broker 23% Dedicated decryption appliance 12% Packet capture appliance 11% Application delivery controller 7%
  • 19.
  • 20.
    | @ema_research The CloudCreates Network Blind Spots © 2022 Enterprise ManagementAssociates, Inc. 20 45% of organization: Migrationof applications to the cloud has created network blind spots More common in multi-cloud companies Consequences of blind spots Policy violation 49% Extend IT service degradation/downtime 46% Security breach 45% Cloud cost overruns 44% Engineers, architects,and other technical personnel are more aware of cloud- related blind spots than IT executives and middle management
  • 21.
    | @ema_research The typesof packet data that organizations collect and analyze from traffic in the public cloud 65% Packet data is very important to cloud security monitoring and analysis 54% Packet data is very important to cloud performance management 50% Packet data is very important to cloud capacity management Packet Data is Critical to Cloud Operations © 2022 Enterprise ManagementAssociates, Inc. 21
  • 22.
    | @ema_research Primary methodfor supplying cloud-related network packet data to security and performance analysis tools Most compelling benefits of third-party visibility software in the cloud 1. Reliability of data collection 54% 2. Administrative security 36% 3. Manageability/Automation 34% 4. Advanced packet filtering and modification features 32% 5. Integration with visibility technology in private infrastructure 30% Most Organizations Perceive Importance of End-to-End Multi-Cloud Visibility Architecture © 2022 Enterprise ManagementAssociates, Inc. 22 Establishing a network visibility architecture that spans on-premises infrastructure and public cloud 33% of all organizations believe this is very important, 56% somewhat important The most successful users of visibility solutions are more likely (50%) to rate this as very important
  • 23.
    | @ema_research Final Thoughts ©2022 Enterprise ManagementAssociates, Inc. 23 The cloud is the primary driver of network visibility architecture strategies Visibility architectures improve IT and security team productivity and reduce security risk Too many organizations are leaning on SPAN ports more than TAPs for traffic mirroring Too many organizations are decrypting traffic on analysis tools Network blind spots introduced by the cloud leads to policy violations, IT service problems, and security breaches Packet data delivered by an end-to-end, hybrid cloud visibility architecture can remove those blind spots
  • 24.
    | @ema_research The NetworkVisibility Architecture Report is Now Available Learn more and download: https://bit.ly/3acBtGk © 2022 Enterprise ManagementAssociates, Inc. 24