<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

What is Driving the Need for Additional Network Monitoring?

September 5, 2019

Enterprise networks are evolving. They face different challenges today than just two or three years ago. Today’s IT teams must find a way to deal with more data, more connected devices, networks distributed over a greater geographic area, and a greater risk of phishing or DDoS attacks, while ensuring that they provide their users with a fast, and reliable service. In order to meet their organization’s business level goals, they must stay at the forefront of technology, adopting trends as they become market ready. As a result, enterprises are increasing the scope of their network monitoring initiatives.

Public and Private Cloud Utilization

Monitoring network infrastructure in third party cloud environments is much more difficult than monitoring in traditional on-prem networks. As enterprises are moving more workloads into public or private clouds, they need to think of what their monitoring and security strategy will be for these new environments. In order to start monitoring traffic, you first need visibility into how these workloads are performing. That visibility can be provided with cloud or virtual TAPs that feed packet level traffic to cloud-based monitoring tools.

Data Center Adoption of 100G

Network speeds of 40G and 100G are no longer a rarity. As data centers have started migrating towards 100G, the question of how to monitor networks at higher speeds arises. Enterprises are looking for network monitoring tools or solutions as their existing tools may not support 100G. This is due to the fact that high speed network traffic comes with additional problems to overcome; packets can have multiple MPLS headers, they may have overlays or underlays, and there is an increased chance of duplicate packets or packets with errors.

How can we monitor these networks if common tools don’t yet support 100G? By using a Network Packet Broker or Advanced Aggregator to perform filtering, aggregation, and load balancing to optimize the performance of existing monitoring tools

Download Now: Network TAPs 101 - The Networking User Guide [Free eBook]



Increase in Cyber Attacks

DDoS attacks are getting more sophisticated and more frequent, posing a greater threat to enterprise networks. While network monitoring tools are not strictly security focused, SecOps teams are starting to rely on their NetOps teams to provide them with more insight into the network. Network monitoring tools can notify teams of unusual traffic patterns, spikes in activity, and other indicators that an investigation needs to take place. 

Growth in Data from Connected Devices

5G, video streaming, connected cars, AI, smart homes, and more. The reasons for exponential growth in data just keeps on growing. Enterprise networks have seen tremendous evolution. There is so much data out there, but getting to it in more distributed networks, and making sense of the data that comes from non-traditional locations is a challenge. 5G is going to introduce even more devices and end points that will require network monitoring tools that can quickly sift through even larger amounts of data than ever before. 

AI and Machine Learning Tools

How can you take advantage of all of the data that’s being produced by the Internet of Things, smart cars, and connected devices? By applying AI and Machine Learning (ML) tools to gather information that’s flowing across your network, automate more of the process, and start acting on the information provided. ML allows you to capture the most useful data as quick as possible so anomalies can be detected and MTTR can be reduced. 

With all of the changes in enterprise networking over the last couple of years, it’s obvious that it’s time for our methods of monitoring and managing these advanced networks to catch up. Enterprises need to think strategically to address their needs today, while also planning for a future that will likely include a combination of on-prem, and cloud resources. 

Looking to add a visibility solution to your next deployment, but not sure where to start? Join us for a brief network Design-IT consultation or demo. No obligation - it’s what we love to do!

Network TAPS 101 Basics for IT Security engineers

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES