Industry experts — from analysts and consultants to users and the top vendors — offer thoughtful, insightful, and often controversial predictions on how Network Performance Management (NPM) and related technologies will evolve and impact business in 2018.
The end to finger-pointing in network outages
2018 will see an evolution of relationships between service providers and their clients as these relationships become increasingly data driven. We will soon see less finger pointing between service providers and corporate IT and network teams when service outages occur. Instead there will be more mutual accountability as clients are able to independently access more forensic data sources associated with an outage and determine exactly what happened and where everything went wrong. This is causing service providers to move beyond simple outage portals to greater transparency with clients. Organizations no longer have to rely on their providers to tell them when there is a problem.
VP of Product Marketing, ThousandEyes
Truly real-time network performance monitoring (NPM) will become critical to the success of enterprises. In 2018, real-time NPM will break through to become a vital part of network troubleshooting. In the past, NPM solution providers had called their products "real-time" even though their dashboards had delays of several minutes. Those delays are no longer acceptable. We're now moving into an era when real-time has a gap no longer than a few seconds.
APPLICATION AWARE NETWORKS AND NPM
For enterprises, the existing lack of SLA and performance visibility into business-critical applications in use at remote and branch offices will only increase as applications continue their steady march toward SaaS-based turnkey solutions and hybrid or fully public cloud architectures. We're seeing an application evolution. We're also seeing increasingly broad availability of lower cost, high-capacity (but highly variable quality) public Internet connections and corporate-owned MPLS-based (and steadily increasing LTE) networks. This combination of trends will render traditional infrastructure and application-agnostic, metrics-only monitoring techniques near useless.
AI AND ML APPLIED TO NPM
Machine learning and artificial intelligence consistently make the year end lists of predictions of what's going to be hot in the coming year. Yet the focus has primarily been on applications. In 2018, we'll see more machine learning and artificial intelligence applied to network performance management. As software defined and multi cloud networks become the new normal, NPM platforms will need to gather deep analytical insights across these complex environments to proactively support the network engineers and IT operations to deliver optimized application, device and user performance across the network. This will enable the network to continuously learn, spot and address abnormalities in network traffic, and dynamically adjust network policies to account for changes in usage or user behavior. This helps prevent network problems before they occur, resulting in faster responses to incidents, and delivers better online experiences.
Director of Product Marketing, LiveAction
Enterprises want to be in complete control, and engineers want to have the ability to customize workflows and processes to best suit their needs. Intent-based automation takes software-defined automation to the next level. Automation gives enterprises the flexibility to customize and predefine internal network workflows. Once users define the pathway, intent-based automation will manipulate the network to enforce policies and deliver the desired outcome.Intent-based automation eliminates the need for manual scaling by automating the process with pre-defined intent. Although it is still in its early stages, it has the potential to play an integral role in software-defined implementations by making automation smarter and more intuitive.
In response to the growing adoption of technologies like SDN and NFV orchestration, along with maturation of artificial intelligence and machine learning techniques, we will see a whole new level of automation for Communication Service Providers (CSPs) where the network can begin to anticipate failures or overruns, mitigate risk and preemptively prevent problems before they happen. Recognized as intelligent automation, it will lead to more streamlined and responsive service delivery, which will ultimately lead to better customer satisfaction.
Senior Director of Solutions, Ciena's Blue Planet Division
Cloud continues to make enterprise networks and IT systems more efficient and cost-effective. But since cloud migration pushes more traffic across networks and services that are outside the corporate borders, old expectations of network performance don't necessarily hold up. Service level agreements that have stood for years will suddenly find themselves in jeopardy in the cloud era. Network engineers may find themselves in the position of having customer success teams ask them to restore service to a level that never existed nor was possible in the first place on cloud networks. Savvy network teams will spend a lot more time this year baselining both app and underlying network performance levels to define what is the new normal in the cloud era as network traffic navigates more and more dependencies between the origin and destination.
VP of Product Marketing, ThousandEyes
CONVERGENCE OF NETWORK AND SECURITY OPERATIONS
Network and Security operations have been converging for several years, and this trend will accelerate in 2018. This will be driven by the fact that each discipline requires similar information about the network, which is based on access to the network traffic and the reported metrics of network and application activity.
THREAT INTELLIGENCE GATEWAYS
Despite spending more than $80B annually on security measures, the past 16 months have seen network outages of unprecedented proportions, with more than 1 billion crucial records lost to data breaches. With billions of IP addresses, how many should have access to the network and its assets? Current approaches filter and manage every part of the traffic, the good, bad and of course the ugly. By managing and filtering everything, the process becomes complicated and overwhelming. What is on the horizon to help with these attacks? Prediction: A new breed of security solutions called Threat Intelligent Gateways will emerge as organizations need to stop the increasing volume of threats. This perimeter protection provides an opportunity for regional carriers, hosting & service providers and CDNs to create more value for their customers. Ultimately, the Threat Intelligence Gateways will deliver better-managed network traffic and provide a powerful dynamic security perimeter that scales with threats from outside sources.
VP of Product Management, Corsa
IT teams critically require better visibility into the network driven by a number of factors, including tremendous disruption from the COVID-19 pandemic, relentless technological advances, remote working reaching an all-time high and the expanding security threatscape, according to State of the Network 2020, a study conducted by VIAVI Solutions ...
Mobile commerce offers several benefits for retailers. But all this potential can only be fully realized if retailers can manage the associated challenges that mobile commerce introduces. Anyone involved in the development, operation or troubleshooting of a mobile shopping app needs to be aware of the three following technical obstacles and plan accordingly ...
Although cost control/expense management remains top of mind, organizations are realizing the necessity of technology solutions to enable them to steer the business during these turbulent times, according to IDG's CIO Pandemic Business Impact Study ...
The COVID-19 pandemic has compressed six years of modernization projects into 6 months. According to a recent report, IT leaders have accelerated projects aimed at increasing productivity and business agility, improving application performance and end-user experience, and driving additional revenue through existing channels ...
There is no doubt that automation has become the key aspect of modern IT management. The end-user computing market is no exception. With a large and complex technology stack and a huge number of applications, EUC specialists need to handle an ever-increasing number of changes at an ever-increasing rate. Many IT organizations are starting to realize that they can no longer control the flow of changes. It is time to think about how to facilitate change ...
Starting this September, the lifespan of an SSL/TLS certificate has been limited to 398 days, a reduction from the previous maximum certificate lifetime of 825 days. With this change, everyone needs to more carefully monitor SSL certificate expiration and server characteristics ...
Nearly 6 in 10 responding organizations have accelerated their digital transformations due to the COVID-19 pandemic, according to The IBM Institute for Business Value study COVID-19 and the Future of Business ...
Two-thirds (67%) of those surveyed expect the sheer quantity of data to grow nearly five times by 2025, according to a new report from Splunk: The Data Age Is Here. Are You Ready? ...
Gaming introduced the world to a whole new range of experiences through augmented reality (AR) and virtual reality (VR). And consumers are really catching on. To unlock the potential of these platforms, enterprises must ensure massive amounts of data can be transferred quickly and reliably to ensure an acceptable quality of experience. As such, this means that enterprises will need to turn to a 5G infrastructure powered by an adaptive network ...
A distributed, remote workforce is the new business reality. How can businesses keep operations going smoothly and quickly resolve issues when IT staff is in San Jose, employee A is working remotely in Denver at their home and employee B is a salesperson still doing some road traveling? The key is an IT architecture that promotes and supports "self-healing" at the endpoint to take care of issues before they impact employees. The essential element to achieve this is hyper-automation ...