IT Can't Afford to be Static - It's Time to Automate Visibility
November 06, 2015

Ananda Rajagopal
Gigamon

Share this

As any network administrator can tell you, network traffic doesn't stand still. It is constantly changing and increasing in complexity. Networks have fundamentally changed, and the demands put on them by new technology, customers, mobility, and other factors are forcing IT to develop networks that are more agile and dynamic than ever before. While it seems like IT departments are bombarded with new challenges, there are three major trends that are making it difficult to gain visibility into networks: the increased adoption of virtualized infrastructure, enterprise mobility and the rise in encrypted traffic.

Virtualization and associated software-defined networking (SDN) approaches have created tremendous change in the data center, while mobility and encryption have created blind spots in infrastructure that traditional monitoring tools do not recognize. Compounding this problem is the fact that network administrators have been compelled to meet the needs of an organization's cybersecurity initiatives – which requires that they have full visibility into their infrastructure – and it's clear how difficult the problem they are facing is. Simply put, network administrators need to be able to see every packet to guarantee the performance and security of their networks, but the accelerated rate of change, and the complexities that has wrought, have made it nearly impossible.

Since networks and infrastructure are constantly changing, the methods that are used to gain visibility into them cannot afford to be static. When done well, visibility shines light on blind spots, enables detection of anomalous behavior and gives administrators the power to fix network and application issues proactively before they become problems for end users. But, giving administrators the power to be proactive is not enough in today's complex environment. It is no longer enough to simply point to a network bottleneck or send an alert for a spike in bandwidth demand – visibility must be automated so that the information is shared instantly. Manual intervention is a point of failure for network operations and security operations teams, and can be eliminated if the tools we use for visibility are designed to take action.

To automate visibility, we must architect visibility as a critical layer of infrastructure. Once designed in this fashion, an administrator is empowered with the ability to intelligently deliver any portion of network traffic to as many appliances and tools that need to monitor and analyze it. The administrator can use policies to select specific traffic that needs to be delivered to each of these tools. Such an architectural approach to visibility has the additional benefit of abstracting the operational tools needed to secure and manage a network from the specifics of the underlying network. Once such a layer is created, all security and operational tools can get access to critical network traffic from anywhere in the infrastructure. Further, when the intelligence derived from visibility is united with the rest of the network and security infrastructure, it is possible to automate policy management so that the tools can programmatically control the information they receive from the Visibility Fabric. Such automation improves responsiveness and effectiveness, simplifies tasks and establishes a framework for continuous monitoring and analytics of the infrastructure.

Technology will continue to be transformative – in the data center and beyond. No one can afford to sit still in this environment, least of all IT departments. Automating visibility is a critical step in getting control of the dramatic changes affecting infrastructure, and one that should be taken sooner rather than later – the next big challenge is likely right around the corner.

Ananda Rajagopal is VP of Product Management at Gigamon.

Share this

The Latest

January 25, 2022

Most enterprise IT organizations struggle with network and cloud infrastructure configuration management and worry that their networks will fail configuration compliance audits. This issue is amplified as enterprise network engineers continue to take the "if it's not broke, don't fix it" approach to network infrastructure management ...

January 24, 2022

The shift to containers and microservices is a key component of the digital transformation and shift to an all encompassing digital experience that modern customers have grown to expect. But these seismic shifts have also presented a nearly impossible task for IT teams: achieve ceaseless innovation whilst maintaining an ever more complex infrastructure environment, one that tends to produce vast volumes of data. Oh and can you also ensure that these systems are continuously available? ...

January 20, 2022

As part of 2022 APM Predictions list, APMdigest asked industry experts to predict how Digital Transformation will evolve and impact business in 2022 ...

January 19, 2022

As part of APMdigest's list of 2022 predictions, industry experts offer thoughtful and insightful predictions on how Cloud will evolve and impact business in 2022 ...

January 18, 2022

As part of APMdigest's list of 2022 predictions, industry experts offer thoughtful and insightful predictions on how Network Performance Management (NPM) and related technologies will evolve and impact business in 2022 ...

January 13, 2022

Gartner highlighted 6 trends that infrastructure and operations (I&O) leaders must start preparing for in the next 12-18 months ...

January 11, 2022

Technology is now foundational to financial companies' operations with many institutions relying on tech to deliver critical services. As a result, uptime is essential to customer satisfaction and company success, and systems must be subject to continuous monitoring. But modern IT architectures are disparate, complex and interconnected, and the data is too voluminous for the human mind to handle. Enter AIOps ...

January 11, 2022

Having a variety of tools to choose from creates challenges in telemetry data collection. Organizations find themselves managing multiple libraries for logging, metrics, and traces, with each vendor having its own APIs, SDKs, agents, and collectors. An open source, community-driven approach to observability will gain steam in 2022 to remove unnecessary complications by tapping into the latest advancements in observability practice ...

January 10, 2022

These are the trends that will set up your engineers and developers to deliver amazing software that powers amazing digital experiences that fuel your organization's growth in 2022 — and beyond ...

January 06, 2022

In a world where digital services have become a critical part of how we go about our daily lives, the risk of undergoing an outage has become even more significant. Outages can range in severity and impact companies of every size — while outages from larger companies in the social media space or a cloud provider tend to receive a lot of coverage, application downtime from even the most targeted companies can disrupt users' personal and business operations ...