What is the Benefit of Network Visibility for Compliance?
April 16, 2018

Keith Bromley
Ixia

Share this

While regulatory compliance is an important activity for medium to large businesses, easy and cost-effective solutions can be difficult to find. Network visibility is an often overlooked, but critically important, activity that can help lower costs and make life easier for IT personnel that are responsible for these regulatory compliance solutions.

Devices like network packet brokers (NPBs) allow you to mask sensitive data, perform packet slicing, implement lawful intercept, and discover rogue IT. Purpose-built compliance solutions can also use data filtered by NPBs to perform activities better, and also allow IT to demonstrate their regulatory compliance in an easy manner.

Here are some example use cases of what you can accomplish when a visibility architecture is combined with performance monitoring tools. An initial activity would be to integrate an NPB with your regulatory compliance strategy.

This will allow you to:

■ Provide masking of sensitive data. This includes data masking for one or more digits so that security and monitoring tools downstream don’t receive clear text data.

Remove the data packet payload with packet trimming. When packet header information is all you need, packet slicing allows you to eliminate the propagation of unnecessary and dangerous data within the payload of the packet.

Perform lawful intercept of data from specified IP addresses and VLANs. This provides an easy way to capture and forward data requested by court orders and government laws (like the Turkish 5651 law that requires logging of financial data).

■ Create regular expression search strings using application intelligence to enable better searches for specific data.

In addition, there are at least two areas where NPBs can help a security architecture to:

Discover rogue IT (unauthorized applications and devices), which helps avoid policy and compliance issues. Unknown applications can be identified so that IT can ascertain how and where those applications are being used.

Enforce IT policies, like detecting off-network storage and unapproved web-based email solutions. This allows IT to identify exfiltration of data which could be a potential security/compliance risk. For instance, a former employee could have stored a file to an off-network data storage and then could retrieve after leaving the company and no one would know about it.

Data from NPBs can also be fed to purpose-built compliance solutions and logging tools to support the demonstration of regulatory and endpoint compliance to auditors. The data being fed to these tools can be either lightly filtered or filtered based upon detailed Layer 2 – 4 and/or Layer 7 parameters. It all depends upon what you need and are looking for.

In the end, any regulatory compliance strategy is only as good as the quality of data that is being fed to the tools. The most important part of your regulatory compliance plan will be the architecture, as this piece will determine what, if any, policies and procedures are being adhered to.

Keith Bromley is Senior Manager, Solutions Marketing at Ixia Solutions Group, a Keysight Technologies business
Share this

The Latest

March 27, 2024

Nearly all (99%) globa IT decision makers, regardless of region or industry, recognize generative AI's (GenAI) transformative potential to influence change within their organizations, according to The Elastic Generative AI Report ...

March 27, 2024

Agent-based approaches to real user monitoring (RUM) simply do not work. If you are pitched to install an "agent" in your mobile or web environments, you should run for the hills ...

March 26, 2024

The world is now all about end-users. This paradigm of focusing on the end-user was simply not true a few years ago, as backend metrics generally revolved around uptime, SLAs, latency, and the like. DevOps teams always pitched and presented the metrics they thought were the most correlated to the end-user experience. But let's be blunt: Unless there was an egregious fire, the correlated metrics were super loose or entirely false ...

March 25, 2024

This year, New Relic published the State of Observability for Financial Services and Insurance Report to share insights derived from the 2023 Observability Forecast on the adoption and business value of observability across the financial services industry (FSI) and insurance sectors. Here are seven key takeaways from the report ...

March 22, 2024

In MEAN TIME TO INSIGHT Episode 4 - Part 2, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses artificial intelligence and AIOps ...

March 21, 2024

In the course of EMA research over the last twelve years, the message for IT organizations looking to pursue a forward path in AIOps adoption is overall a strongly positive one. The benefits achieved are growing in diversity and value ...

March 20, 2024

Today, as enterprises transcend into a new era of work, surpassing the revolution, they must shift their focus and strategies to thrive in this environment. Here are five key areas that organizations should prioritize to strengthen their foundation and steer themselves through the ever-changing digital world ...

March 19, 2024

If there's one thing we should tame in today's data-driven marketing landscape, this would be data debt, a silent menace threatening to undermine all the trust you've put in the data-driven decisions that guide your strategies. This blog aims to explore the true costs of data debt in marketing operations, offering four actionable strategies to mitigate them through enhanced marketing observability ...

March 18, 2024

Gartner has highlighted the top trends that will impact technology providers in 2024: Generative AI (GenAI) is dominating the technical and product agenda of nearly every tech provider ...

March 15, 2024

In MEAN TIME TO INSIGHT Episode 4 - Part 1, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses artificial intelligence and network management ...