What is the Benefit of Network Visibility for Compliance?
April 16, 2018

Keith Bromley
Ixia

Share this

While regulatory compliance is an important activity for medium to large businesses, easy and cost-effective solutions can be difficult to find. Network visibility is an often overlooked, but critically important, activity that can help lower costs and make life easier for IT personnel that are responsible for these regulatory compliance solutions.

Devices like network packet brokers (NPBs) allow you to mask sensitive data, perform packet slicing, implement lawful intercept, and discover rogue IT. Purpose-built compliance solutions can also use data filtered by NPBs to perform activities better, and also allow IT to demonstrate their regulatory compliance in an easy manner.

Here are some example use cases of what you can accomplish when a visibility architecture is combined with performance monitoring tools. An initial activity would be to integrate an NPB with your regulatory compliance strategy.

This will allow you to:

■ Provide masking of sensitive data. This includes data masking for one or more digits so that security and monitoring tools downstream don’t receive clear text data.

Remove the data packet payload with packet trimming. When packet header information is all you need, packet slicing allows you to eliminate the propagation of unnecessary and dangerous data within the payload of the packet.

Perform lawful intercept of data from specified IP addresses and VLANs. This provides an easy way to capture and forward data requested by court orders and government laws (like the Turkish 5651 law that requires logging of financial data).

■ Create regular expression search strings using application intelligence to enable better searches for specific data.

In addition, there are at least two areas where NPBs can help a security architecture to:

Discover rogue IT (unauthorized applications and devices), which helps avoid policy and compliance issues. Unknown applications can be identified so that IT can ascertain how and where those applications are being used.

Enforce IT policies, like detecting off-network storage and unapproved web-based email solutions. This allows IT to identify exfiltration of data which could be a potential security/compliance risk. For instance, a former employee could have stored a file to an off-network data storage and then could retrieve after leaving the company and no one would know about it.

Data from NPBs can also be fed to purpose-built compliance solutions and logging tools to support the demonstration of regulatory and endpoint compliance to auditors. The data being fed to these tools can be either lightly filtered or filtered based upon detailed Layer 2 – 4 and/or Layer 7 parameters. It all depends upon what you need and are looking for.

In the end, any regulatory compliance strategy is only as good as the quality of data that is being fed to the tools. The most important part of your regulatory compliance plan will be the architecture, as this piece will determine what, if any, policies and procedures are being adhered to.

Keith Bromley is Senior Manager, Solutions Marketing at Ixia Solutions Group, a Keysight Technologies business
Share this

The Latest

February 14, 2019

Part 3 of our three-part blog series on the shortcomings of traditional APM solutions for monitoring microservices based applications explains how the alerting and troubleshooting capabilities of traditional APM do not address the evolving requirements of monitoring microservices based applications ...

February 13, 2019

In a digital world where the speed of innovation matters, are you anchored down by legacy APM agents? ...

February 12, 2019

In a digital world where customer experience defines your business, is your APM solution doing its job? This may seem like a strange question to open a technical blog on Application Performance Management (APM), but it's not. With customer experience today largely driven by software, we think there's no more important question to ask ...

February 11, 2019

According to the NetEnrich 2019 Cloud Adoption survey, 68% of enterprise IT departments are using public cloud infrastructure today, and 27% of respondents said that doing so is part of their near-term plan ...

February 08, 2019

Organizations and their IT teams are not in sync when pursuing their digital transformation strategies, according to a new report released today by The Economist Intelligence Unit ...

February 07, 2019

Having the right tools and good visibility are critical to understanding what's going on in your network and applications. However, as networks become more complex and hybrid in nature, organizations can no longer afford to be reactive and rely only on portable diagnostic tools. They need real-time, comprehensive visibility ...

February 06, 2019

When building out new services, SaaS providers need to keep in mind a set of best practices and "habits of success," which cover their organization's culture, relationships with third-party providers and customers, and overall strategic decisions and operational know-how. If you're a SaaS application provider, here are five considerations you need to keep in mind ...

February 05, 2019

In the coming weeks, EMA will be gathering data on what we believe is a unique research topic — approaching DevOps initiatives from the perspectives of all key constituents. We're doing this to try to break through some of the "false walls" created by more niche, market-defined insights, or some of our industry hyperbole. Here are some of the directions we're pursuing ...

February 01, 2019

An application on your network is running slow. Before you even understand what the problem is, the network is blamed for the issue. This puts network teams in a dangerous position — guilty until proven innocent. Even when network teams are sure an issue doesn't stem from a network problem, they are still forced to prove it, spending sometimes significant amounts of time going through troubleshooting processes, looking for a problem that doesn't exist ...

January 31, 2019

Tap and SPAN. It's the same thing, right? That answer would be wrong. Some network engineers may not know the difference, but there are definitely clear and distinct differences between these two types of devices. Understanding these differences will help you elevate your game when it comes to network performance monitoring and application performance monitoring ...