Skip to main content

What is the Benefit of Network Visibility for Compliance?

Keith Bromley

While regulatory compliance is an important activity for medium to large businesses, easy and cost-effective solutions can be difficult to find. Network visibility is an often overlooked, but critically important, activity that can help lower costs and make life easier for IT personnel that are responsible for these regulatory compliance solutions.

Devices like network packet brokers (NPBs) allow you to mask sensitive data, perform packet slicing, implement lawful intercept, and discover rogue IT. Purpose-built compliance solutions can also use data filtered by NPBs to perform activities better, and also allow IT to demonstrate their regulatory compliance in an easy manner.

Here are some example use cases of what you can accomplish when a visibility architecture is combined with performance monitoring tools. An initial activity would be to integrate an NPB with your regulatory compliance strategy.

This will allow you to:

■ Provide masking of sensitive data. This includes data masking for one or more digits so that security and monitoring tools downstream don’t receive clear text data.

Remove the data packet payload with packet trimming. When packet header information is all you need, packet slicing allows you to eliminate the propagation of unnecessary and dangerous data within the payload of the packet.

Perform lawful intercept of data from specified IP addresses and VLANs. This provides an easy way to capture and forward data requested by court orders and government laws (like the Turkish 5651 law that requires logging of financial data).

■ Create regular expression search strings using application intelligence to enable better searches for specific data.

In addition, there are at least two areas where NPBs can help a security architecture to:

Discover rogue IT (unauthorized applications and devices), which helps avoid policy and compliance issues. Unknown applications can be identified so that IT can ascertain how and where those applications are being used.

Enforce IT policies, like detecting off-network storage and unapproved web-based email solutions. This allows IT to identify exfiltration of data which could be a potential security/compliance risk. For instance, a former employee could have stored a file to an off-network data storage and then could retrieve after leaving the company and no one would know about it.

Data from NPBs can also be fed to purpose-built compliance solutions and logging tools to support the demonstration of regulatory and endpoint compliance to auditors. The data being fed to these tools can be either lightly filtered or filtered based upon detailed Layer 2 – 4 and/or Layer 7 parameters. It all depends upon what you need and are looking for.

In the end, any regulatory compliance strategy is only as good as the quality of data that is being fed to the tools. The most important part of your regulatory compliance plan will be the architecture, as this piece will determine what, if any, policies and procedures are being adhered to.

Hot Topics

The Latest

In today’s data and AI driven world, enterprises across industries are utilizing AI to invent new business models, reimagine business and achieve efficiency in operations. However, enterprises may face challenges like flawed or biased AI decisions, sensitive data breaches and rising regulatory risks ...

In MEAN TIME TO INSIGHT Episode 12, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses purchasing new network observability solutions.... 

There's an image problem with mobile app security. While it's critical for highly regulated industries like financial services, it is often overlooked in others. This usually comes down to development priorities, which typically fall into three categories: user experience, app performance, and app security. When dealing with finite resources such as time, shifting priorities, and team skill sets, engineering teams often have to prioritize one over the others. Usually, security is the odd man out ...

Image
Guardsquare

IT outages, caused by poor-quality software updates, are no longer rare incidents but rather frequent occurrences, directly impacting over half of US consumers. According to the 2024 Software Failure Sentiment Report from Harness, many now equate these failures to critical public health crises ...

In just a few months, Google will again head to Washington DC and meet with the government for a two-week remedy trial to cement the fate of what happens to Chrome and its search business in the face of ongoing antitrust court case(s). Or, Google may proactively decide to make changes, putting the power in its hands to outline a suitable remedy. Regardless of the outcome, one thing is sure: there will be far more implications for AI than just a shift in Google's Search business ... 

Image
Chrome

In today's fast-paced digital world, Application Performance Monitoring (APM) is crucial for maintaining the health of an organization's digital ecosystem. However, the complexities of modern IT environments, including distributed architectures, hybrid clouds, and dynamic workloads, present significant challenges ... This blog explores the challenges of implementing application performance monitoring (APM) and offers strategies for overcoming them ...

Service disruptions remain a critical concern for IT and business executives, with 88% of respondents saying they believe another major incident will occur in the next 12 months, according to a study from PagerDuty ...

IT infrastructure (on-premises, cloud, or hybrid) is becoming larger and more complex. IT management tools need data to drive better decision making and more process automation to complement manual intervention by IT staff. That is why smart organizations invest in the systems and strategies needed to make their IT infrastructure more resilient in the event of disruption, and why many are turning to application performance monitoring (APM) in conjunction with high availability (HA) clusters ...

In today's data-driven world, the management of databases has become increasingly complex and critical. The following are findings from Redgate's 2025 The State of the Database Landscape report ...

With the 2027 deadline for SAP S/4HANA migrations fast approaching, organizations are accelerating their transition plans ... For organizations that intend to remain on SAP ECC in the near-term, the focus has shifted to improving operational efficiencies and meeting demands for faster cycle times ...

What is the Benefit of Network Visibility for Compliance?

Keith Bromley

While regulatory compliance is an important activity for medium to large businesses, easy and cost-effective solutions can be difficult to find. Network visibility is an often overlooked, but critically important, activity that can help lower costs and make life easier for IT personnel that are responsible for these regulatory compliance solutions.

Devices like network packet brokers (NPBs) allow you to mask sensitive data, perform packet slicing, implement lawful intercept, and discover rogue IT. Purpose-built compliance solutions can also use data filtered by NPBs to perform activities better, and also allow IT to demonstrate their regulatory compliance in an easy manner.

Here are some example use cases of what you can accomplish when a visibility architecture is combined with performance monitoring tools. An initial activity would be to integrate an NPB with your regulatory compliance strategy.

This will allow you to:

■ Provide masking of sensitive data. This includes data masking for one or more digits so that security and monitoring tools downstream don’t receive clear text data.

Remove the data packet payload with packet trimming. When packet header information is all you need, packet slicing allows you to eliminate the propagation of unnecessary and dangerous data within the payload of the packet.

Perform lawful intercept of data from specified IP addresses and VLANs. This provides an easy way to capture and forward data requested by court orders and government laws (like the Turkish 5651 law that requires logging of financial data).

■ Create regular expression search strings using application intelligence to enable better searches for specific data.

In addition, there are at least two areas where NPBs can help a security architecture to:

Discover rogue IT (unauthorized applications and devices), which helps avoid policy and compliance issues. Unknown applications can be identified so that IT can ascertain how and where those applications are being used.

Enforce IT policies, like detecting off-network storage and unapproved web-based email solutions. This allows IT to identify exfiltration of data which could be a potential security/compliance risk. For instance, a former employee could have stored a file to an off-network data storage and then could retrieve after leaving the company and no one would know about it.

Data from NPBs can also be fed to purpose-built compliance solutions and logging tools to support the demonstration of regulatory and endpoint compliance to auditors. The data being fed to these tools can be either lightly filtered or filtered based upon detailed Layer 2 – 4 and/or Layer 7 parameters. It all depends upon what you need and are looking for.

In the end, any regulatory compliance strategy is only as good as the quality of data that is being fed to the tools. The most important part of your regulatory compliance plan will be the architecture, as this piece will determine what, if any, policies and procedures are being adhered to.

Hot Topics

The Latest

In today’s data and AI driven world, enterprises across industries are utilizing AI to invent new business models, reimagine business and achieve efficiency in operations. However, enterprises may face challenges like flawed or biased AI decisions, sensitive data breaches and rising regulatory risks ...

In MEAN TIME TO INSIGHT Episode 12, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses purchasing new network observability solutions.... 

There's an image problem with mobile app security. While it's critical for highly regulated industries like financial services, it is often overlooked in others. This usually comes down to development priorities, which typically fall into three categories: user experience, app performance, and app security. When dealing with finite resources such as time, shifting priorities, and team skill sets, engineering teams often have to prioritize one over the others. Usually, security is the odd man out ...

Image
Guardsquare

IT outages, caused by poor-quality software updates, are no longer rare incidents but rather frequent occurrences, directly impacting over half of US consumers. According to the 2024 Software Failure Sentiment Report from Harness, many now equate these failures to critical public health crises ...

In just a few months, Google will again head to Washington DC and meet with the government for a two-week remedy trial to cement the fate of what happens to Chrome and its search business in the face of ongoing antitrust court case(s). Or, Google may proactively decide to make changes, putting the power in its hands to outline a suitable remedy. Regardless of the outcome, one thing is sure: there will be far more implications for AI than just a shift in Google's Search business ... 

Image
Chrome

In today's fast-paced digital world, Application Performance Monitoring (APM) is crucial for maintaining the health of an organization's digital ecosystem. However, the complexities of modern IT environments, including distributed architectures, hybrid clouds, and dynamic workloads, present significant challenges ... This blog explores the challenges of implementing application performance monitoring (APM) and offers strategies for overcoming them ...

Service disruptions remain a critical concern for IT and business executives, with 88% of respondents saying they believe another major incident will occur in the next 12 months, according to a study from PagerDuty ...

IT infrastructure (on-premises, cloud, or hybrid) is becoming larger and more complex. IT management tools need data to drive better decision making and more process automation to complement manual intervention by IT staff. That is why smart organizations invest in the systems and strategies needed to make their IT infrastructure more resilient in the event of disruption, and why many are turning to application performance monitoring (APM) in conjunction with high availability (HA) clusters ...

In today's data-driven world, the management of databases has become increasingly complex and critical. The following are findings from Redgate's 2025 The State of the Database Landscape report ...

With the 2027 deadline for SAP S/4HANA migrations fast approaching, organizations are accelerating their transition plans ... For organizations that intend to remain on SAP ECC in the near-term, the focus has shifted to improving operational efficiencies and meeting demands for faster cycle times ...