sb-as logo
Story image

Virtual environments blurring the edges for network managers

Virtual environments could be creating real headaches for network managers, with network edges in many organisations being stretched and distorted due to increased virtualisation, cloud migration, the Internet of Things (IoT) and mobile devices connecting to the network.

As a result, many network managers are losing sight of where the edges are and what lies beyond them, according to Ixia.

Ixia says this situation is further complicated when IT infrastructures are moved to the cloud in multiple stages.

Budgetary constraints and security and performance concerns mean that enterprises are increasingly implementing hybrid models, with critical workloads sitting outside of the main on-premise and private cloud environments.

“Hybrid environments, and the flow of business data between on-premise applications and clouds, increase complexity and make it harder for IT teams to gain the edge-to-edge network visibility they need to identify and predict outages, spot security breaches and analyse mission-critical application performance issues,” explains Areg Alimian, senior director, solutions marketing, Ixia.

“When they first look into moving critical workloads from on-premise data centres into virtualised, software-defined data centres or public clouds, IT decision-makers need to ask themselves two key questions,” he explains.

“How can we ensure the availability, reliability, and performance of our mission-critical applications; and how do we get relevant critical data to analytics and monitoring tools, regardless of where the applications are?,” he says.

Alimian says obscured visibility into virtualised public or private clouds leads to increased threat exposure and an inability to monitor and troubleshoot critical events.

“Blind spots are a major security issue for businesses and service providers alike,” he adds.

“Verizon notes that blind spots prevent around 75% of businesses from knowing that they have suffered a security breach.”

Ixia suggests that organisations consider six key elements to ensure resilience and security:

1.        Infrastructure and tenant separation. Cloud service providers with virtualised infrastructure host workloads from multiple customers on top of the same virtual fabric. This can increase the potential attack surface and cause compliance issues. Intelligent visibility is needed to serve both the tenant and infrastructure separately, giving organisations visibility into their own workload packet data.

2.        Correct monitoring tools and timing. Every business’s monitoring tools need to access critical application data across virtualised networks and off-site environments. Getting the right data to the right tool, at the right place and right time requires a level of intelligent coupling between security, application analytics tools, and the visibility architecture. Businesses that achieve this can gain higher-level security and access critical data from any virtualised environment or location.

3.        Security. Virtualised data centres are just like other segments of the organisation’s network; they are consistently at risk of attack. Visibility can be a challenge because of the lack of advanced security forensics and analytics tools available for cloud environments. It’s important the security solutions used are able to collect packets in a segmented, secure environment, to avoid compromising the security walls between networks.

4.        Elastic scale. As elasticity is a fundamental characteristic of any hybrid environment, it is important the network monitoring system can also scale as needed, to match the size and demand of the hybrid cloud environment or data centre.  

5.        Performance. In virtualised environments, data can be challenging to monitor, as it never crosses a physical switch or network. If a performance problem emerges with a mission critical application it is important the organisation can pinpoint where the fault is. Visibility tools can help deliver this.

6.        Fault tolerance and reliability. In hybrid environments it is important that no instance in an application is a single point of failure. Cloud service providers don’t do this. Instead, it is up to the application owner. This drives a need for visibility services that provide data access, intelligent and fault tolerant packet processing and distribution that can scale as the service grows.

 “The common theme across these elements is visibility,” says Alimian.

“Businesses need complete access to all data across their networks and clouds, and intelligent processing and distribution of this data to analytics tools,” he explains.

“These two functions can be achieved by deploying a visibility solution to eliminate network and security blind spots.

“With this in place, even if the network is losing its edges, you will not lose sight of what really matters: ensuring business applications are resilient, fast and secure,” Alimian says.

Story image
Zscaler and CrowdStrike release integrations for end-to-end security
This collaboration between the two cloud-native security companies provides joint customers with adaptive, risk-based access control to private applications.More
Story image
ThreatQuotient hits $22.5m in new financing, continues growth streak
“Since we first invested in ThreatQuotient in 2017, their team has continued to prove to the market that there is a critical need for cybersecurity solutions aimed at security operations."More
Story image
Cloud services top threat vector for healthcare industry
"The coronavirus pandemic continues to highlight the unique cybersecurity needs of the healthcare industry, even as it has increased the number of threats these organisations face."More
Story image
Need for greater understanding of data security responsibility as cloud adoption grows - report
Despite the accelerated adoption of cloud services, there was a lack of clarity and confidence regarding the protection and recovery of data stored in public clouds.More
Story image
Claroty discovers vulnerabilities in Ovarro TBox RTUs
The vulnerabilities could enable attackers to break into the systems and run code, crash systems, and meddle with configuration files, amongst other malicious actions.More
Story image
5G network security a US$9 billion dollar opportunity - report
The cloud-native nature of 5G networks will have a disruptive and positive impact on the cybersecurity industry in the next few years, with 5G network security presenting a US$9 billion enterprise market opportunity by 2025.More