SlideShare a Scribd company logo
Network Monitoring Survey

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

2
Network Monitoring Survey
• Completed in Q3 of 2013
• Provides insight network monitoring and
management trends
• 257 respondents from across a range of
sectors and business sizes

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

3
Summary of results
• 68% of respondents using SNMP traps. 157 out of
157 using SNMPv2
• 88 using *Flow protocols, 81% of those using Cisco
NetFlow
• ¾ of respondents indicated Cisco as preferred
vendor
• 77% of respondents using monitoring for network
stability
• 67% of respondents back-up network configurations

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

4
Summary of results
• 82% of respondents using some form of
network monitoring
• 60% monitoring both core and access layers.
• Immediate alerting of network issues
highlighted as most important function of
monitoring
• 41% not monitoring wi-fi

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

5
Do you currently use traps in your environment?

No
32%

Yes
68%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

6
What version of SNMP are you using?
v1
19%

v3
24%

v2
57%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

7
What *Flow technology are you using?
sFlow
18%

jFlow
10%

Netflow
72%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

8
Do you monitor syslog from your devices?

No
41%

Yes
59%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

9
What is your preferred vendor for your network equipment?
200
180
160
140
120
100
80
60
40
20
0
Cisco

Thursday, 17 October 2013

HP

Juniper

Dell

Brocade

© Opsview Ltd. Commercial in Confidence

Arista
10
Approximately what % of your environment is manufactured by this vendor?
60.00%

50.00%

40.00%

30.00%

20.00%

10.00%

0.00%
0-10

Thursday, 17 October 2013

11-25

26-50

51-75

75+

© Opsview Ltd. Commercial in Confidence

11
What is the main purpose of monitoring your network?
User Misuse
2%
Performance
21%

Stability
77%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

12
Do you backup your network device configurations?

No
33%

Yes
67%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

13
Are you currently using a monitoring tool to monitor your network?
No
18%

Yes
82%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

14
Do you monitor Wi-Fi in your environment?

Yes
41%

No
59%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

15
Please rate the importance of the following functions (1 lowest, 5 highest)

Immediate alerting of network issues

Visualize performance of your network

Historical performance data for trend analysis

Generate reports on network performance

0

Thursday, 17 October 2013

0.5

1

1.5

2

© Opsview Ltd. Commercial in Confidence

2.5

3

3.5

4

4.5

5
16
www.opsview.com

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

17

More Related Content

Similar to Opsview Network Monitoring Survey

Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
Group of company MUK
 
PRTG NETWORK MONITORING
PRTG NETWORK MONITORINGPRTG NETWORK MONITORING
PRTG NETWORK MONITORING
Fanky Christian
 
Secure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An Introduction
Sebastien Gioria
 
Secure Coding for Java - An introduction
Secure Coding for Java - An introductionSecure Coding for Java - An introduction
Secure Coding for Java - An introduction
Sebastien Gioria
 
2013 06-27-securecoding-en - jug pch
2013 06-27-securecoding-en - jug pch2013 06-27-securecoding-en - jug pch
2013 06-27-securecoding-en - jug pchSébastien GIORIA
 
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility Architectures
Enterprise Management Associates
 
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
NetworkCollaborators
 
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
ThousandEyes
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assurance
NetworkCollaborators
 
Using NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application PerformanceUsing NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application Performance
Emulex Corporation
 
NetScout Systems corporate overview
NetScout Systems corporate overviewNetScout Systems corporate overview
NetScout Systems corporate overview
BAKOTECH
 
A Wireless Data Acquisition System for Induction Motors
A Wireless Data Acquisition System for Induction MotorsA Wireless Data Acquisition System for Induction Motors
A Wireless Data Acquisition System for Induction Motors
Nakshatra Jha
 
Applying Big Data Analytics on the Manufacturing Industry
Applying Big Data Analytics on the Manufacturing IndustryApplying Big Data Analytics on the Manufacturing Industry
Applying Big Data Analytics on the Manufacturing Industry
Cantier Systems
 
IoT based attendance system
IoT based attendance systemIoT based attendance system
IoT based attendance system
IRJET Journal
 
DEVNET-1180 Security from the Cloud
DEVNET-1180	Security from the CloudDEVNET-1180	Security from the Cloud
DEVNET-1180 Security from the Cloud
Cisco DevNet
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
Group of company MUK
 
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
Nur Shiqim Chok
 
Impact of network analytics in it ops
Impact of network analytics in it opsImpact of network analytics in it ops
Impact of network analytics in it ops
GAVS Technologies
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
Savvius, Inc
 

Similar to Opsview Network Monitoring Survey (20)

Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
PRTG NETWORK MONITORING
PRTG NETWORK MONITORINGPRTG NETWORK MONITORING
PRTG NETWORK MONITORING
 
Secure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An Introduction
 
Secure Coding for Java - An introduction
Secure Coding for Java - An introductionSecure Coding for Java - An introduction
Secure Coding for Java - An introduction
 
2013 06-27-securecoding-en - jug pch
2013 06-27-securecoding-en - jug pch2013 06-27-securecoding-en - jug pch
2013 06-27-securecoding-en - jug pch
 
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility Architectures
 
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
 
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assurance
 
Using NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application PerformanceUsing NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application Performance
 
NetScout Systems corporate overview
NetScout Systems corporate overviewNetScout Systems corporate overview
NetScout Systems corporate overview
 
A Wireless Data Acquisition System for Induction Motors
A Wireless Data Acquisition System for Induction MotorsA Wireless Data Acquisition System for Induction Motors
A Wireless Data Acquisition System for Induction Motors
 
Applying Big Data Analytics on the Manufacturing Industry
Applying Big Data Analytics on the Manufacturing IndustryApplying Big Data Analytics on the Manufacturing Industry
Applying Big Data Analytics on the Manufacturing Industry
 
IoT based attendance system
IoT based attendance systemIoT based attendance system
IoT based attendance system
 
DEVNET-1180 Security from the Cloud
DEVNET-1180	Security from the CloudDEVNET-1180	Security from the Cloud
DEVNET-1180 Security from the Cloud
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Transpeye Overview V1 (1)
Transpeye Overview V1 (1)Transpeye Overview V1 (1)
Transpeye Overview V1 (1)
 
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
 
Impact of network analytics in it ops
Impact of network analytics in it opsImpact of network analytics in it ops
Impact of network analytics in it ops
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 

More from Opsview

Infographic: Managing Network Technologies and Network Monitoring
Infographic: Managing Network Technologies and Network MonitoringInfographic: Managing Network Technologies and Network Monitoring
Infographic: Managing Network Technologies and Network Monitoring
Opsview
 
Infographic: Opsview Cloud, Virtualization & IaaS Survey
Infographic: Opsview Cloud, Virtualization & IaaS SurveyInfographic: Opsview Cloud, Virtualization & IaaS Survey
Infographic: Opsview Cloud, Virtualization & IaaS Survey
Opsview
 
Monitoring Server Temperature with Opsview
Monitoring Server Temperature with OpsviewMonitoring Server Temperature with Opsview
Monitoring Server Temperature with Opsview
Opsview
 
End to End Monitoring using Nested Keywords
End to End Monitoring using Nested KeywordsEnd to End Monitoring using Nested Keywords
End to End Monitoring using Nested Keywords
Opsview
 
Advanced reporting with Opsview
Advanced reporting with OpsviewAdvanced reporting with Opsview
Advanced reporting with Opsview
Opsview
 
Monitoring Microsoft SQL Server 2008 with Opsview
Monitoring Microsoft SQL Server 2008 with OpsviewMonitoring Microsoft SQL Server 2008 with Opsview
Monitoring Microsoft SQL Server 2008 with Opsview
Opsview
 
Monitoring Oracle Databases with Opsview
Monitoring Oracle Databases with OpsviewMonitoring Oracle Databases with Opsview
Monitoring Oracle Databases with Opsview
Opsview
 
Creating Custom Notifications in Opsview
Creating Custom Notifications in OpsviewCreating Custom Notifications in Opsview
Creating Custom Notifications in Opsview
Opsview
 

More from Opsview (8)

Infographic: Managing Network Technologies and Network Monitoring
Infographic: Managing Network Technologies and Network MonitoringInfographic: Managing Network Technologies and Network Monitoring
Infographic: Managing Network Technologies and Network Monitoring
 
Infographic: Opsview Cloud, Virtualization & IaaS Survey
Infographic: Opsview Cloud, Virtualization & IaaS SurveyInfographic: Opsview Cloud, Virtualization & IaaS Survey
Infographic: Opsview Cloud, Virtualization & IaaS Survey
 
Monitoring Server Temperature with Opsview
Monitoring Server Temperature with OpsviewMonitoring Server Temperature with Opsview
Monitoring Server Temperature with Opsview
 
End to End Monitoring using Nested Keywords
End to End Monitoring using Nested KeywordsEnd to End Monitoring using Nested Keywords
End to End Monitoring using Nested Keywords
 
Advanced reporting with Opsview
Advanced reporting with OpsviewAdvanced reporting with Opsview
Advanced reporting with Opsview
 
Monitoring Microsoft SQL Server 2008 with Opsview
Monitoring Microsoft SQL Server 2008 with OpsviewMonitoring Microsoft SQL Server 2008 with Opsview
Monitoring Microsoft SQL Server 2008 with Opsview
 
Monitoring Oracle Databases with Opsview
Monitoring Oracle Databases with OpsviewMonitoring Oracle Databases with Opsview
Monitoring Oracle Databases with Opsview
 
Creating Custom Notifications in Opsview
Creating Custom Notifications in OpsviewCreating Custom Notifications in Opsview
Creating Custom Notifications in Opsview
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Opsview Network Monitoring Survey

  • 1.
  • 2. Network Monitoring Survey Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 2
  • 3. Network Monitoring Survey • Completed in Q3 of 2013 • Provides insight network monitoring and management trends • 257 respondents from across a range of sectors and business sizes Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 3
  • 4. Summary of results • 68% of respondents using SNMP traps. 157 out of 157 using SNMPv2 • 88 using *Flow protocols, 81% of those using Cisco NetFlow • ¾ of respondents indicated Cisco as preferred vendor • 77% of respondents using monitoring for network stability • 67% of respondents back-up network configurations Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 4
  • 5. Summary of results • 82% of respondents using some form of network monitoring • 60% monitoring both core and access layers. • Immediate alerting of network issues highlighted as most important function of monitoring • 41% not monitoring wi-fi Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 5
  • 6. Do you currently use traps in your environment? No 32% Yes 68% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 6
  • 7. What version of SNMP are you using? v1 19% v3 24% v2 57% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 7
  • 8. What *Flow technology are you using? sFlow 18% jFlow 10% Netflow 72% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 8
  • 9. Do you monitor syslog from your devices? No 41% Yes 59% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 9
  • 10. What is your preferred vendor for your network equipment? 200 180 160 140 120 100 80 60 40 20 0 Cisco Thursday, 17 October 2013 HP Juniper Dell Brocade © Opsview Ltd. Commercial in Confidence Arista 10
  • 11. Approximately what % of your environment is manufactured by this vendor? 60.00% 50.00% 40.00% 30.00% 20.00% 10.00% 0.00% 0-10 Thursday, 17 October 2013 11-25 26-50 51-75 75+ © Opsview Ltd. Commercial in Confidence 11
  • 12. What is the main purpose of monitoring your network? User Misuse 2% Performance 21% Stability 77% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 12
  • 13. Do you backup your network device configurations? No 33% Yes 67% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 13
  • 14. Are you currently using a monitoring tool to monitor your network? No 18% Yes 82% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 14
  • 15. Do you monitor Wi-Fi in your environment? Yes 41% No 59% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 15
  • 16. Please rate the importance of the following functions (1 lowest, 5 highest) Immediate alerting of network issues Visualize performance of your network Historical performance data for trend analysis Generate reports on network performance 0 Thursday, 17 October 2013 0.5 1 1.5 2 © Opsview Ltd. Commercial in Confidence 2.5 3 3.5 4 4.5 5 16
  • 17. www.opsview.com Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 17