2018 Network Performance Management Predictions
January 05, 2018
Share this

Industry experts — from analysts and consultants to users and the top vendors — offer thoughtful, insightful, and often controversial predictions on how Network Performance Management (NPM) and related technologies will evolve and impact business in 2018.

Start with 2018 Application Performance Management Predictions - Part 1

The end to finger-pointing in network outages

2018 will see an evolution of relationships between service providers and their clients as these relationships become increasingly data driven. We will soon see less finger pointing between service providers and corporate IT and network teams when service outages occur. Instead there will be more mutual accountability as clients are able to independently access more forensic data sources associated with an outage and determine exactly what happened and where everything went wrong. This is causing service providers to move beyond simple outage portals to greater transparency with clients. Organizations no longer have to rely on their providers to tell them when there is a problem.
Alex Henthorn-Iwane
VP of Product Marketing, ThousandEyes

Real-time NPM

Truly real-time network performance monitoring (NPM) will become critical to the success of enterprises. In 2018, real-time NPM will break through to become a vital part of network troubleshooting. In the past, NPM solution providers had called their products "real-time" even though their dashboards had delays of several minutes. Those delays are no longer acceptable. We're now moving into an era when real-time has a gap no longer than a few seconds.
Larry Zulch
President, Savvius

APPLICATION AWARE NETWORKS AND NPM

For enterprises, the existing lack of SLA and performance visibility into business-critical applications in use at remote and branch offices will only increase as applications continue their steady march toward SaaS-based turnkey solutions and hybrid or fully public cloud architectures. We're seeing an application evolution. We're also seeing increasingly broad availability of lower cost, high-capacity (but highly variable quality) public Internet connections and corporate-owned MPLS-based (and steadily increasing LTE) networks. This combination of trends will render traditional infrastructure and application-agnostic, metrics-only monitoring techniques near useless.
Matt Stevens
CEO, AppNeta

AI AND ML APPLIED TO NPM

Machine learning and artificial intelligence consistently make the year end lists of predictions of what's going to be hot in the coming year. Yet the focus has primarily been on applications. In 2018, we'll see more machine learning and artificial intelligence applied to network performance management. As software defined and multi cloud networks become the new normal, NPM platforms will need to gather deep analytical insights across these complex environments to proactively support the network engineers and IT operations to deliver optimized application, device and user performance across the network. This will enable the network to continuously learn, spot and address abnormalities in network traffic, and dynamically adjust network policies to account for changes in usage or user behavior. This helps prevent network problems before they occur, resulting in faster responses to incidents, and delivers better online experiences.
Mark Milinkovich
Director of Product Marketing, LiveAction

INTELLIGENT AUTOMATION

Enterprises want to be in complete control, and engineers want to have the ability to customize workflows and processes to best suit their needs. Intent-based automation takes software-defined automation to the next level. Automation gives enterprises the flexibility to customize and predefine internal network workflows. Once users define the pathway, intent-based automation will manipulate the network to enforce policies and deliver the desired outcome.Intent-based automation eliminates the need for manual scaling by automating the process with pre-defined intent. Although it is still in its early stages, it has the potential to play an integral role in software-defined implementations by making automation smarter and more intuitive.
Murali Palanisamy
CTO, AppViewX

In response to the growing adoption of technologies like SDN and NFV orchestration, along with maturation of artificial intelligence and machine learning techniques, we will see a whole new level of automation for Communication Service Providers (CSPs) where the network can begin to anticipate failures or overruns, mitigate risk and preemptively prevent problems before they happen. Recognized as intelligent automation, it will lead to more streamlined and responsive service delivery, which will ultimately lead to better customer satisfaction.
Kevin Wade
Senior Director of Solutions, Ciena's Blue Planet Division

Cloud Baselining

Cloud continues to make enterprise networks and IT systems more efficient and cost-effective. But since cloud migration pushes more traffic across networks and services that are outside the corporate borders, old expectations of network performance don't necessarily hold up. Service level agreements that have stood for years will suddenly find themselves in jeopardy in the cloud era. Network engineers may find themselves in the position of having customer success teams ask them to restore service to a level that never existed nor was possible in the first place on cloud networks. Savvy network teams will spend a lot more time this year baselining both app and underlying network performance levels to define what is the new normal in the cloud era as network traffic navigates more and more dependencies between the origin and destination.
Alex Henthorn-Iwane
VP of Product Marketing, ThousandEyes

CONVERGENCE OF NETWORK AND SECURITY OPERATIONS

Network and Security operations have been converging for several years, and this trend will accelerate in 2018. This will be driven by the fact that each discipline requires similar information about the network, which is based on access to the network traffic and the reported metrics of network and application activity.
Larry Zulch
President, Savvius

THREAT INTELLIGENCE GATEWAYS

Despite spending more than $80B annually on security measures, the past 16 months have seen network outages of unprecedented proportions, with more than 1 billion crucial records lost to data breaches. With billions of IP addresses, how many should have access to the network and its assets? Current approaches filter and manage every part of the traffic, the good, bad and of course the ugly. By managing and filtering everything, the process becomes complicated and overwhelming. What is on the horizon to help with these attacks? Prediction: A new breed of security solutions called Threat Intelligent Gateways will emerge as organizations need to stop the increasing volume of threats. This perimeter protection provides an opportunity for regional carriers, hosting & service providers and CDNs to create more value for their customers. Ultimately, the Threat Intelligence Gateways will deliver better-managed network traffic and provide a powerful dynamic security perimeter that scales with threats from outside sources.
Carolyn Raab
VP of Product Management, Corsa

Share this

The Latest

March 21, 2019

Achieving audit compliance within your IT ecosystem can be an iterative process, and it doesn't have to be compressed into the five days before the audit is due. Following is a four-step process I use to guide clients through the process of preparing for and successfully completing IT audits ...

March 20, 2019

Network performance issues come in all shapes and sizes, and can require vast amounts of time and resources to solve. Here are three examples of painful network performance issues you're likely to encounter this year, and how NPMD solutions can help you overcome them ...

March 19, 2019

"Scale up" versus "scale out" doesn't just apply to hardware investments, it also has an impact on product features. "Scale up" promotes buying the feature set you think you need now, then adding "feature modules" and licenses as you discover additional feature requirements are needed. Often as networks grow in size they also grow in complexity ...

March 18, 2019

Network Packet Brokers play a critical role in gaining visibility into new complex networks. They deliver the packet data and information IT and security teams need to identify problems, recognize security issues, and ensure overall network performance. However, not all Packet Brokers are created equal when it comes to scalability. Simply "scaling up" your network infrastructure at every growth point is a more complex and more expensive endeavor over time. Let's explore three ways the "scale up" approach to infrastructure growth impedes NetOps and security professionals (and the business as a whole) ...

March 15, 2019

Loyal users are the key to your service desk's success. Happy users want to use your services and they recommend your services in the organization. It takes time and effort to exceed user expectations, but doing so means keeping the promises we make to our users and being careful not to do too much without careful consideration for what's best for the organization and users ...

March 14, 2019

What's the difference between user satisfaction and user loyalty? How can you measure whether your users are satisfied and will keep buying from you? How much effort should you make to offer your users the ultimate experience? If you're a service provider, what matters in the end is whether users will keep coming back to you and will stay loyal ...

March 13, 2019

What if I said that a 95% reduction in the amount of IT noise, 99% reduction in ticket volume and 99% L1 resolution rate are not only possible, but that some of the largest, most complex enterprises in the world see these metrics in their environments every day, thanks to Artificial Intelligence (AI) and Machine Learning (ML)? Would you dismiss that as belonging to the realm of science fiction? ...

March 12, 2019
As a consumer, when you order products online, how do you expect them to get delivered? Some key requirements are: the product must arrive on time, well-packed, and ultimately must give you an easy gateway to return it if it is not as per your expectations. All this has been made possible via a single application. But what if this application doesn't function the way you want or cracks down mid-way, or probably leaks off information about you to some potential hackers? Technical uncertainty and digital chaos are the two double-edged swords dangling over this billion-dollar ecommerce market. Can Quality Assurance and Software Testing save application developers from this endless juggle? ...
March 11, 2019

Of those surveyed, 96% of organizations have a digital transformation strategy, with 57% approaching it as an enterprise-wide priority, with a clear emphasis on speed of business, costs, risk, and customer satisfaction, according to IDC’s Aligning IT Strategies and Business Expectations for Digital Transformation Success, sponsored by EasyVista ...

March 08, 2019

One of my ongoing areas of focus is analytics, AIOps, and the intersection with AI and machine learning more broadly. Within this space, sad to say, semantic confusion surrounding just what these terms mean echoes the confusions surrounding ITSM ...