How To Understand The Needs Of The Network

Similar documents
Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions

White. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications

White. Paper. Building Next Generation Data Centers. Implications for I/O Strategies. August 2014

Total year-over-year spending change in networking, (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80%

White. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments.

White. Paper. The Converged Network. November, By Bob Laliberte. 2009, Enterprise Strategy Group, Inc. All Rights Reserved

This ESG White Paper was commissioned by Extreme Networks and is distributed under license from ESG.

Economic Value Validation. June

White. Paper. Extracting the Value of Big Data with HP StoreAll Storage and Autonomy. December 2012

Market Update Intelligent Network Packet Brokers

EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst

Getting on the Path to SDN:

Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center

White. Paper. ROI Benefits from Automating Application Delivery Solutions. December 2013

Research Perspectives

A Storage Network Architecture for Highly Dynamic Virtualized and Cloud Computing Environments

Compensating Security Controls for Windows Server 2003 Security

PRODUCTS & TECHNOLOGY

White. Paper. EMC Isilon: A Scalable Storage Platform for Big Data. April 2014

Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters

By Jason Buffington, Senior Analyst, and Monya Keane, Research Analyst

Application Performance Management

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

The Data Center of the Future

Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

White. Paper. Rethinking Endpoint Security. February 2015

Enterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst

Enterprise Big Data, Business Intelligence, and Analytics Trends

2010 Networking Spending Trends Date: February 2010 Author: Jon Oltsik, Principal Analyst

Trends in Private Cloud Infrastructure

ESG Brief. Modern Data Centers: Massive Scale and Complexity. Data Center Networking Discontinuity

Online File Sharing and Collaboration: Deployment Model Trends

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services

The Financial Benefits of Using LiveAction Software for Network QoS

Cisco Prime Network Analysis Module Software 5.1 for WAAS VB

EMC Isilon: Data Lake 2.0

Traffic Visibility Networking (TVN) can Simplify and Scale IT Operations in a Networked World

Virtualized Security: The Next Generation of Consolidation

SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER

Support the Era of the App with End-to-End Network and Application Performance Visibility

RESEARCH REPORT. Abstract. Storage Resource Management Market on the Launch Pad. By Mary Turner and Bob Laliberte With John McKnight and Jennifer Gahm

Application Performance Management: New Challenges Demand a New Approach

Reasons Enterprises. Prefer Juniper Wireless

Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, By Brian Garrett with Tony Palmer

The Challenge. ESG Case Study

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

Riverbed SteelCentral. Product Family Brochure

Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

SaaS with a Face: User Satisfaction in Cloud- based E- mail Management with Mimecast

Direct Scale-out Flash Storage: Data Path Evolution for the Flash Storage Era

Top Five Considerations for Building a Cloud-Ready Network for Distributed Enterprises

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

White. Paper. Evaluating Sync and Share Solutions. Balancing Security, Control, and Productivity. September, 2014

White. Paper. Benefiting from Server Virtualization. Beyond Initial Workload Consolidation. June, 2010

Product Brief. Overview. Analysis

Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242)

Research Report. Abstract: Solid-state Storage Market Trends. November By Bill Lundell and Mark Peters With Jennifer Gahm and John McKnight

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

VMware vcloud Networking and Security Overview

How Cloud Services Benefit from Cloud-Based Delivery. With a Look at Solutions from Akamai

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

HGST Object Storage for a New Generation of IT

INTRODUCTION. Specifically we looked at:

Corporate Online File Sharing and Collaboration Market Trends

Riverbed SteelCentral. Product Family Brochure

The Challenge of Securing and Managing Data While Meeting Compliance

Live traffic feeds are increasingly being used by the modern enterprise to gain visibility for security and operations management

How To Manage A Network With Ccomtechnique

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost

THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT

ADDENDUM 9 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE

This ESG White Paper was commissioned by DH2i and is distributed under license from ESG.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Information-driven Security and RSA Security Analytics and RSA ECAT

The Ultimate Guide to Gaining Control of the WAN

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Research Report. Abstract: Social Enterprise Adoption Trends. June 2012

Citrix: NetScaler and CloudBridge Solutions on AWS

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

WHITE PAPER. Brocade NMS Leveraging SaaS to Improve Application Availability and Proactive Management. By Bob Laliberte.

Closing The Application Performance Visibility Gap Inherent To Citrix Environments

White. Paper. Big Data Advisory Service. September, 2011

Enterprise Strategy Group Getting to the bigger truth. Cisco: ACL Survey. Final Results. Jon Oltsik, Senior Principal Analyst

VMware and the Need for Cyber Supply Chain Security Assurance

Secure Your Mobile Device Access with Cisco BYOD Solutions

Reasons to Choose the Juniper ON Enterprise Network

White. Paper. Optimizing the Virtual Data Center with Data Path Pools. EMC PowerPath/VE. February, 2011

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Enterprise Database Trends in a Big Data World

2015 Data Storage Market Trends

State of Network Security 2014

HOLISTIC PERFORMANCE MANAGEMENT: A FAST-GROWING NECESSITY IN APJ

Performance Management for Enterprise Applications

Hacking Crisis Highlights Crypto Chaos

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

The Convergence of Big Data Processing and Integrated Infrastructure

Transcription:

White Paper The Modern Network Monitoring Mandate By Bob Laliberte, Senior Analyst April 2014 This ESG White Paper was commissioned by Emulex and is distributed under license from ESG.

White Paper: The Modern Network Monitoring Mandate 2 Contents Executive Summary... 3 Modern Networks Increase Complexity and Risk... 3 Challenges Organizations Encounter... 5 Why It s Important to Capture Network Data... 10 The Mandate... 11 The Bigger Truth... 13 All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at 508.482.0188.

White Paper: The Modern Network Monitoring Mandate 3 Executive Summary Enterprise networks are becoming larger and more complex, driven by data center consolidation, the need to virtualize the compute layer, new application architectures, and the shift to 10GbE or higher network infrastructure. As a result of this transformation, it is imperative that organizations have higher levels of visibility and more granular network information in order to manage the network effectively. By embracing network visibility (the ability to collect, store, search, and present network data), enterprises are better equipped to ensure network and application performance, security, and compliance, as well as reduce the time needed to find and fix critical problems. To better understand the needs of the network to support these highly virtualized and dynamic environments, on the behalf of Emulex, ESG surveyed 150 IT professionals currently responsible for evaluating, purchasing, and managing network infrastructure technologies for their organizations. All respondents were currently using some form of network-based monitoring or management tools and were employed at enterprise organizations (defined as organizations with 1,000 employees or more) across multiple industries (including financial, business services, manufacturing, and retail) in North America. 1 Modern Networks Increase Complexity and Risk Most organizations are transforming their IT environments in order to be more responsive to the needs of the business. The ability to rapidly provision new or upgraded applications or deliver IT services in minutes instead of months is becoming the standard. As a result, organizations have implemented a number of initiatives that will help them reach their end goal of a more agile environment. Unfortunately, while some of these initiatives are driving efficiencies in one domain, they are creating more complexity and rapid growth for the network. These initiatives include: Data center consolidation. ESG research has shown this to be a top ten most-cited priority for surveyed organizations over the last five years. 2 Organizations have been actively consolidating data centers to centralize applications, processes, and infrastructure in an effort to reduce costs and drive higher levels of efficiency. As a result, enterprises have fewer, but much larger and more complex data center environments. This means the network environment has to cope with rapid scale and higher levels of complexity. Also, this consolidation of many of the regional data centers into centralized sites requires remote and branch offices to be dependent on WAN links to deliver applications and services. Server virtualization/the use of private cloud. As organizations continued to increase their use of server virtualization technology and take advantage of its dynamic capabilities, networked storage environments were required. Thus, previously standalone servers are now being connected to networked storage. Although many of these network connections are in the data center today, some organizations are bursting to public clouds or between multiple corporately owned data centers. Installing modern applications. Many modern applications are built on multiple tiers and with a modular architecture. They are also becoming applications of engagement instead of applications of record, so performance is critical. While the modular approach accelerates development time, it also means a far greater reliance on the network to handle a large amount of server-to-server or east-west traffic. Also, unified communications applications are driving more video traffic across the network and even to mobile devices. Upgrading to 10GbE networks. In large part due to the initiatives outlined and a general anticipation of more traffic, a significant number of organizations have either transitioned or have begun the transition to 10GbE interfaces. Ten percent of the respondents to the ESG research survey reported they have already 1 All ESG research references and charts in this white paper have been taken from this research survey, unless otherwise noted. 2 Source: ESG Research Report, 2014 IT Spending Intentions Survey, February 2014.

White Paper: The Modern Network Monitoring Mandate 4 transitioned to 10 GbE, with another 69% either actively moving to it or planning to do so (see Figure 1). In many large organizations, the core network may already be moving to 40 GbE. Figure 1. Upgrading to 10GbE Environment Which of the following best represents your organization s server-to-network I/O interface standards? (Percent of respondents, N=150) Our current standard server-to-network I/O interface is 10 GbE, 10% Our current standard server-to-network I/O interface is 1 GbE and we have no plans to move to 10 GbE, 21% Our current standard server-to-network I/O interface is 1 GbE, but we are actively moving to 10 GbE, 25% Our current standard server-to-network I/O interface is 1 GbE, but we are planning to move to 10 GbE, 44% These initiatives have made it much harder for operations teams to effectively monitor, manage, and secure the network environment. Fortunately, most organizations recognize the need to accomplish these tasks and are allocating their budgets accordingly. ESG research in Figure 2 highlights specific spending plans for network infrastructure reported by respondents. 3 Clearly, network security is a top concern for these organizations, followed by network management and upgrades of data center, campus, and wireless networks. However, while allocating budget is a decent start, it doesn t always guarantee success. 3 Source: ESG Research Report, 2014 IT Spending Intentions Survey, February 2014.

White Paper: The Modern Network Monitoring Mandate 5 Figure 2. Network Investments for 2014 We would like to learn a bit more about your specific spending plans for network infrastructure in 2014. In which of the following areas will your organization make the most significant investments over the next 12 months? (Percent of respondents, N=301, five responses accepted) Network security Network management Upgrade core data center network Expand wireless LAN environment Unified communications WAN optimization/acceleration Network data analytics Upgrade campus networks Voice over IP Software-defined network solutions Application delivery controllers Network Packet Brokers Challenges Organizations Encounter As might be expected, these rapidly growing and complex network environments represent significant challenges for organizations. Their sheer size and complexity make it difficult for operations teams to ensure optimal performance and high levels of security. To better understand these challenges, ESG asked respondents to cite their specific network performance and security challenges. As seen in Figure 3, the most-cited performance challenge highlights the problems faced with new multi-tier and modular software architecture. After that, organizations struggle to maintain end-to-end network performance to endpoint devices connecting either via public networks or wide area networks (WAN). These challenges reflect a rapidly changing environment marked by centralized data centers and an increasingly mobile workforce. This extends the boundary of end-to-end management to mobile devices. Other challenges include tuning the network, providing QoS based on traffic or applications, and understanding network latency. 10% 10% 36% 31% 27% 27% 26% 25% 24% 21% 20% 52% 0% 10% 20% 30% 40% 50% 60%

White Paper: The Modern Network Monitoring Mandate 6 Figure 3. Network Performance Challenges With respect to network performance specifically, which of the following performance issues are most challenging to your organization? (Percent of respondents, N=150, three responses accepted) Monitoring/managing network performance between groups of web, application, and database servers in the data center Maintaining acceptable network performance from the data center to endpoint devices accessing the corporate network from public networks 43% 42% Maintaining acceptable network performance from the data center to endpoint devices connected to the WAN 35% Tuning the network to improve network performance 33% Monitoring/prioritizing network traffic types or applications Network was built over time so the architecture is not optimized for high performance 32% 31% Measuring/managing network latency 27% Maintaining acceptable network performance from the data center to endpoint devices connected to the LAN 27% Establishing a baseline of normal network behavior 23% None of the above 3% 0% 10% 20% 30% 40% 50% When it comes to security, organizations highlighted a number of challenges. While a number of other challenges were cited, we have highlighted those that clearly point out the need for network visibility in order to improve security. This includes the struggle to capture network behavior for incident detection, monitoring network flows for anomalous behavior, the ability to capture and analyze logs from network and security devices, and network packets for security analytics or forensics as well as the ability to establish a baseline of normal network behavior.

White Paper: The Modern Network Monitoring Mandate 7 Figure 4. Security Challenges With respect to network security specifically, which of the following security issues are the most challenging to your organization? (Percent of respondents, N=150, multiple responses accepted) Securing virtual servers Capturing and analyzing network behavior for incident detection (i.e. command-and-control traffic, DNS anomalies, network scanning, etc.) Implementing/managing network security zones that require different security controls 38% 37% 40% Managing existing firewall rules 37% Monitoring network flows for anomalous behavior 35% Managing VPN configurations and encryption keys 33% Segmenting the network for security purposes (i.e. VLAN, sub-netting, establishing ACLs, etc.) Capturing and analyzing logs and events from networking and security devices Capturing and analyzing network packets for security analytics/forensics 27% 29% 31% Establishing a baseline of normal network behavior 27% Implementing new firewall rules 26% Monitoring/managing IDS/IPS devices 26% 0% 10% 20% 30% 40% 50% In order to overcome these challenges, organizations are instrumenting and deploying monitoring tools in their environments, but is it enough? Of the organizations ESG surveyed, 72% of them reported that they already have between six and ten tools deployed to monitor the network (see Figure 5).

White Paper: The Modern Network Monitoring Mandate 8 Figure 5. Number of Network-based Management and Monitoring Tools To the best of your knowledge, approximately how many different network-based management and monitoring tools does your organization use to collect data including insight into application performance, information security activities, etc. directly from the network? (Percent of respondents, N=150) 80% 70% 60% 50% 40% 30% 20% 10% 0% 72% 26% 2% 2 3 to 5 6 to 10 Even more telling is the fact that 63% expect that the number of tools they use to monitor their network environment will increase either somewhat or substantially in the near future (see Figure 6). Figure 6. Increase in the Number of Tools Deployed How will your organization s total number of network-based management and monitoring tools that collect data change if at all over the next 36 months? (Percent of respondents, N=150) Decrease somewhat, 5% Increase substantially, 26% Remain about the same, 31% Increase somewhat, 37% Again, these are telltale signs of a rapidly growing network environment. And the need for more information is also continuing to grow. More than two-thirds (69%) of respondents stated that they expected the number of requests to capture network data (not just meta-data but packets) to increase dramatically. Keep in mind that the number of internal departments requesting this information is also increasing. The requests are not just from the network

White Paper: The Modern Network Monitoring Mandate 9 operations team: Respondents to the survey indicated that the network architecture, security, compliance, and IT audit and application teams were also requesting this data. Unfortunately, the ability to fulfill all of these requests is becoming more difficult, especially with organizations upgrading their networks to 10 GbE. Should organizations be concerned? According to the research, 86% of organizations planning to go to 10 GbE are concerned about their traditional monitoring tools and methodologies ability to cope with the increased throughput (see Figure 7). Figure 7. Concern about Dropped Packets with Existing Tools When thinking about your organization s transition to 10 GbE as its standard network I/O interface, are you concerned about any of your organization s network-based management and monitoring tools dropping packets or being unable cope with the increased throughput? (Percent of respondents, N=103) Not at all concerned, 2% Not very concerned, 13% Very concerned, 36% Somewhat concerned, 50% To better understand the impact that this transition could potentially have, organizations that have already standardized on 10 GbE networks were asked about the impact of the move. Figure 8 demonstrates that more than half (54%) of those organizations find that their traditional monitoring tools and methodologies either sometimes or frequently cannot cope with the increased throughput or are dropping packets due to the increased throughput. Organizations actively transitioning or planning to go to 10 GbE networks should learn from those organizations that have gone before them so they don t struggle with the same challenges.

White Paper: The Modern Network Monitoring Mandate 10 Figure 8. Monitoring Tools Having Difficulty with 10 GbE Network Throughput Since transitioning to 10 GbE as its standard network I/O interface, has your organization encountered situations where any of its network-based management and monitoring tools are dropping packets or cannot cope with the increased throughput? Don t know, 7% Yes, frequently, 27% No, 40% Yes, sometimes, 27% Why It s Important to Capture Network Data Despite the challenges faced by organizations with rapidly growing and complex network environments, the ability to capture network data has never been more important. More frequently, organizations are relying on network data (meta-data and packets) to provide insight into network performance or problems, and to deliver increased levels of security. When done correctly, a plethora of information is available for collection and analysis. Organizations also need to think about collection metrics: Does real time mean that a sample is taken every five minutes, or does it involve capturing every packet? The obvious implication is that a problem could come and go outside of a collection window, so an application would be impacted without the collection tool being aware. Having granular information will help to quickly identify and resolve those intermittent or sporadic problems. Having this data accessible could be the difference between identifying a problem immediately and requiring several hours or days to track it down. Historical data can be extremely important as well because the ability to establish baselines and see trends will help to identify areas that need attention before they actually cause a problem. It also enables organizations to review capacity based on seasonality or the end of the week, month, quarter, or year in order to plan appropriately. Organizations can also leverage this data to help optimize the network for specific applications or eliminate bottlenecks. Having both historical and real-time granular data will enable organizations to become more proactive in addressing both intermittent issues and in responding more quickly to major problems. The reality is that major network problems do occur, and the majority of ESG research respondents (64%) indicated that their organization experienced three or more major network incidents per year (see Figure 9). And just over a quarter of the respondents (27%) reported between five and ten major network incidents per year.

White Paper: The Modern Network Monitoring Mandate 11 Figure 9. Major Network Incidents On average, how many major network incidents (i.e., application outages) does your organization have per year? (Percent of respondents, N=150) 25% 20% 15% 10% 5% 0% 9% 5% 16% 22% 0 1 2 3 4 5 6 to 10 More than 10 19% 15% 12% 1% 1% Don t know Each of these outages has consequences for the business. Depending on the length of time required to find and fix the problem, the ramifications of these outages could be disastrous: Not only is there the cost of downtime, which ranges anywhere from tens of thousands to over a million dollars per hour depending on the industry, but organizations also have to consider the residual impact of an extended outage i.e., loss of customer confidence, potential impact to stock price (if public), etc. Plus, without detailed information isolating the root cause, these outages impact efficiency as organizations dedicate resources to find and fix the problem. More than half of the respondents (55%) to ESG s survey indicated that they dedicate four or more staff members to resolving major incidents. The Mandate The perfect storm of increasing network scale, higher levels of complexity, and the requirement to be always on has resulted in network monitoring and capture evolving from a nice to have feature into a corporate mandate. Organizations have to be able to quickly find and fix problems, and the key is the ability to quickly isolate the root cause of network issues so valuable time is not lost. How important is identifying the root cause of network issues? Well, 40% of respondents deemed identifying root cause to be critical to them, while another 49% stated it was very important. With the overwhelming majority of respondents assigning a high level of importance to determining root cause, it is clear that having this capability has moved beyond a nice to have feature and is now a virtual mandate. After realizing the importance of root cause analysis, the next step is understanding how capturing network information can help to accelerate that process. More than three-quarters (79%) of respondents indicated that the network, security, and application operations teams need to access packet-level network traffic in order to successfully identify the root cause of network issues (see Figure 10). In fact, only 3% of respondents indicated they infrequently access network traffic to identify root causes of network issues.

White Paper: The Modern Network Monitoring Mandate 12 Figure 10. Need to Access Packet-level Network Traffic How frequently do network, security, or application operations personnel need to access packet-level traffic data in order to successfully identify the root cause of network issues? (Percent of respondents, N=150) Infrequently, 3% Sometimes, 18% Always, 26% Usually, 53% While every organization has a different network environment and will make the transition to 10 GbE at their own pace, all organizations should be able to ask themselves some fairly basic questions about their monitoring environments, specifically: Is your organization currently monitoring and capturing all network traffic effectively? Can your existing network performance, security, compliance, and application monitoring tools readily access that data? Will current monitoring solutions be able to handle all the network traffic being generated from modern network environments (including 10 GbE, modular or multi-tier applications, end-to-end, etc.), without dropping any data? Are you able to quickly and efficiently identify the root cause for major, minor, and intermittent network problems? Organizations need to ensure they have effective monitoring solutions in place that will enable the transformation to modern network environments. If your answer to any of these questions is not an emphatic yes, then perhaps it is time to create a network monitoring mandate for your organization.

The Bigger Truth White Paper: The Modern Network Monitoring Mandate 13 The truth is that organizations are rapidly transforming their IT environments to better handle the requirements of the businesses they serve. A number of the initiatives driving this transformation, while delivering significant benefits, are also creating new challenges, and specifically new network challenges. In order to retain control, organizations need to implement solutions that enable operations teams to more effectively monitor and manage these complex, modern network environments. It is also important to understand that as the network becomes viewed as a source of valuable information, organizations should anticipate that additional requests will be made to access that data. ESG survey data indicates that the number of different internal operations and audit teams that require access to this information and the number of tools deployed to analyze this data will only continue to grow. As the network transitions from 1GbE to 10 GbE (and eventually up to 40 and 100 GbE), these requirements will only intensify. It will be imperative for organizations to deploy solutions that can handle not only current, but also future needs. Organizations should consider network visibility (the ability to collect, store, search, and present network data) to be a mandate, so they will be better prepared to ensure network performance, security, and compliance, as well as dramatically reduce the time to find and fix critical problems in modern network environments.

20 Asylum Street Milford, MA 01757 Tel: 508.482.0188 Fax: 508.482.0218 www.esg-global.com