IT Can't Afford to be Static - It's Time to Automate Visibility
November 06, 2015

Ananda Rajagopal
Gigamon

Share this

As any network administrator can tell you, network traffic doesn't stand still. It is constantly changing and increasing in complexity. Networks have fundamentally changed, and the demands put on them by new technology, customers, mobility, and other factors are forcing IT to develop networks that are more agile and dynamic than ever before. While it seems like IT departments are bombarded with new challenges, there are three major trends that are making it difficult to gain visibility into networks: the increased adoption of virtualized infrastructure, enterprise mobility and the rise in encrypted traffic.

Virtualization and associated software-defined networking (SDN) approaches have created tremendous change in the data center, while mobility and encryption have created blind spots in infrastructure that traditional monitoring tools do not recognize. Compounding this problem is the fact that network administrators have been compelled to meet the needs of an organization's cybersecurity initiatives – which requires that they have full visibility into their infrastructure – and it's clear how difficult the problem they are facing is. Simply put, network administrators need to be able to see every packet to guarantee the performance and security of their networks, but the accelerated rate of change, and the complexities that has wrought, have made it nearly impossible.

Since networks and infrastructure are constantly changing, the methods that are used to gain visibility into them cannot afford to be static. When done well, visibility shines light on blind spots, enables detection of anomalous behavior and gives administrators the power to fix network and application issues proactively before they become problems for end users. But, giving administrators the power to be proactive is not enough in today's complex environment. It is no longer enough to simply point to a network bottleneck or send an alert for a spike in bandwidth demand – visibility must be automated so that the information is shared instantly. Manual intervention is a point of failure for network operations and security operations teams, and can be eliminated if the tools we use for visibility are designed to take action.

To automate visibility, we must architect visibility as a critical layer of infrastructure. Once designed in this fashion, an administrator is empowered with the ability to intelligently deliver any portion of network traffic to as many appliances and tools that need to monitor and analyze it. The administrator can use policies to select specific traffic that needs to be delivered to each of these tools. Such an architectural approach to visibility has the additional benefit of abstracting the operational tools needed to secure and manage a network from the specifics of the underlying network. Once such a layer is created, all security and operational tools can get access to critical network traffic from anywhere in the infrastructure. Further, when the intelligence derived from visibility is united with the rest of the network and security infrastructure, it is possible to automate policy management so that the tools can programmatically control the information they receive from the Visibility Fabric. Such automation improves responsiveness and effectiveness, simplifies tasks and establishes a framework for continuous monitoring and analytics of the infrastructure.

Technology will continue to be transformative – in the data center and beyond. No one can afford to sit still in this environment, least of all IT departments. Automating visibility is a critical step in getting control of the dramatic changes affecting infrastructure, and one that should be taken sooner rather than later – the next big challenge is likely right around the corner.

Ananda Rajagopal is VP of Product Management at Gigamon.

Share this

The Latest

May 21, 2019

Findings of the Digital Employee Experience survey from VMware show correlation between enabling employees with a positive digital experience (i.e., device choice/flexibility, seamless access to apps, remote work capabilities) and an organization's competitive position, revenue growth and employee sentiment ...

May 20, 2019

In today's competitive landscape, businesses must have the ability and process in place to face new challenges and find ways to successfully tackle them in a proactive manner. For years, this has been placed on the shoulders of DevOps teams within IT departments. But, as automation takes over manual intervention to increase speed and efficiency, these teams are facing what we know as IT digitization. How has this changed the way companies function over the years, and what do we have to look forward to in the coming years? ...

May 16, 2019

Although the vast majority of IT organizations have implemented a broad variety of systems and tools to modernize, simplify and streamline data center operations, many are still burdened by inefficiencies, security risks and performance gaps in their IT infrastructure as well as the excessive time it takes to manage legacy infrastructure, according to the State of IT Transformation, a report from Datrium ...

May 15, 2019

When it comes to network visibility, there are a lot of discussions about packet broker technology and the various features these solutions provide to network architects and IT managers. Packet brokers allow organizations to aggregate the data required for a variety of monitoring solutions including network performance monitoring and diagnostic (NPMD) platforms and unified threat management (UTM) appliances. But, when it comes to ensuring these solutions provide the insights required by NetOps and security teams, IT can spend an exorbitant amount of time dealing with issues around adds, moves and changes. This can have a dramatic impact on budgets and tool availability. Why does this happen? ...

May 14, 2019

Data may be pouring into enterprises but IT professionals still find most of it stuck in siloed departments and weeks away from being able to drive any valued action. Coupled with the ongoing concerns over security responsiveness, IT teams have to push aside other important performance-oriented data in order to ensure security data, at least, gets prominent attention. A new survey by Ivanti shows the disconnect between enterprise departments struggling to improve operations like automation while being challenged with a siloed structure and a data onslaught ...

May 13, 2019

A subtle, deliberate shift has occurred within the software industry which, at present, only the most innovative organizations have seized upon for competitive advantage. Although primarily driven by Artificial Intelligence (AI), this transformation strikes at the core of the most pervasive IT resources including cloud computing and predictive analytics ...

May 09, 2019

When asked who is mandated with developing and delivering their organization's digital competencies, 51% of respondents say their IT departments have a leadership role. The critical question is whether IT departments are prepared to take on a leadership role in which collaborating with other functions and disseminating knowledge and digital performance data are requirements ...

May 08, 2019

The Economist Intelligence Unit just released a new study commissioned by Riverbed that explores nine digital competencies that help organizations improve their digital performance and, ultimately, achieve their objectives. Here's a brief summary of 7 key research findings you'll find covered in detail in the report ...

May 07, 2019

Today, the overall customer scenario has digitally transformed and practically there is no limitation to the ways in which the target customers can be reached. These opportunities are throwing multiple challenges for brands and enterprises, and one of the prominent ones is to ensure Omni Channel experience for customers ...

May 06, 2019

Most businesses (92 percent of respondents) see the potential value of data and 36 percent are already monetizing their data, according to the Global Data Protection Index from Dell EMC. While this acknowledgement is positive, however, most respondents are struggling to properly protect their data ...