Take Your Head Out of the Clouds When It Comes to Safeguarding Your Business

Graham Ahearne, Director of Product Management, shares insights and suggests solutions to the common visibility challenges organizations face as they embrace and adopt cloud, BYOD and data-centric analytics, while data volumes exponentially rise.

Take Your Head Out of the Clouds When It Comes to Safeguarding Your BusinessBy Graham Ahearne    12 July 2016      Thinking

I’m excited to be at Cisco Live! this week where, not surprisingly, one of the themes is how our increasingly hyper-connected world and appetite for data is driving IP traffic volumes exponentially upward. Cisco predicts an almost threefold increase in Global IP traffic over the next 5 years.

Most organizations are contributing to this volume growth with their work on three initiatives: Cloud migration, BYOD, and data-centric analytics. Each of these initiatives benefits overall business agility and efficiency, but each is a significant ongoing project for organizations as they discover and then execute on the best approach for their business.

If we take our heads out of the clouds (so to speak) and focus on the near term, the challenge is how to effectively achieve and maintain visibility across an organization’s service delivery, operational health, and security, as you take on these initiatives. Let me share some of the real-world challenges that we find our clients are facing:

  • “Yes, management team, we are now cloud-enabled (sorta)” - True, some services, workloads, data and infrastructure may have been migrated to the cloud by IT, but certainly the majority have not. This means the reality is a hybrid state and a mesh of physical and virtual nodes on the network—monitoring that hybrid state in a unified way can be very tricky.

  • “Sure, you can use your tablet (or Coffee maker) on the network”- Smart devices of all shapes and sizes are cropping up on the network, and IT teams are struggling to get their arms around them (or ensure agents run on them) as they would with traditional laptops. Increasingly, these smart devices are becoming targeted by cyber criminals as beachheads to launch attacks within organizations. In many cases, it’s fair to say IT cannot even confirm all the devices that are connected to their network at any given time—never mind what they are all up to.

  • “Why is there smoke emanating from our switches?” - It is no trivial challenge to ensure data volumes and data bursts can be interactively explored and managed without drops, lag, or astronomical bills. 40Gpbs and even 100Gbps is increasingly common in the data center and uplinks to cloud services can be overrun with large data transfers which may or may not be intentional.

  • “Yes, I see the flow too, but have no idea what was transferred and by whom” - Flow level visibility is commonplace for many organizations. It is helpful, but we find it often leads to frustration rather than actual answers. It tells you two machines communicated together but doesn’t tell you the nature of the conversation they had, the files they exchanged, or which users initiated that exchange on those machines. A higher definition, more real-time view into activity is needed, especially as a data source for increasingly sophisticated business intelligence analytics.

  • “Well, the good news is we see traffic now; the bad news is it's garbled” - Usage of encrypted traffic continues to ramp up. This is good for obvious reasons, but it also means less visibility into the nature of the traffic for operations teams. Plus, Gartner predicts that, in 2017, “more than half of the network attacks targeting enterprises will use encrypted traffic to bypass controls.”

The conundrum is: how do you empower your operational teams with highly granular visibility into high volume traffic, which gives them the confidence that they are looking at a complete, live picture of what is happening on their increasingly dynamic networks (private, public), and allow that picture to inform sophisticated business intelligence analytics with high definition, high quality data?

Here at Corvil, highly granular, machine-time visibility is our core, proven strength. Corvil performs streaming transformation of raw packet data into wire data by automatically discovering, decrypting, decoding, capturing, and publishing in high-definition. We’re no stranger to high-scale (analysing over 50 petabytes of high definition wire data on a daily basis for our clients) and machine-to-machine interconnection.

Tapping into this experience and expertise, plus incorporating an innovative new architectural design, today, we’re raising the bar further and are excited to launch our new flagship 8400 series appliance; the industry’s first 80Gbps streaming analytics appliance for wire data. For those interested in the numbers, here is a taster of its capabilities:

  • 80Gbps line rate bursts for all packet size profiles
  • 60Gbps sustained L2-L7 streaming analytics for HTTP applications
  • 200 – 300TB of local storage capacity with data compression
  • 2U form factor
  • Horizontal scaling - Further appliances can be easily added to further increase the data rates

Visibility is the foundation of effective security, operational monitoring, and service delivery assurance. If you want to empower yourself and your organization with high definition, machine time visibility, to accelerate your progress toward a truly cloud-enabled, hyper-connected, secure and data-centric organization: check out Corvil in action. We’d love to show you why 10/10 Top Global Banks trust Corvil to safeguard their business in a machine world.

Take Your Head Out of the Clouds When It Comes to Safeguarding Your Business

Graham Ahearne, Director, Product Management, Corvil
Corvil safeguards business in a machine world. We see a future where all businesses trust digital machines to algorithmically conduct transactions on their behalf. For some businesses, this future is now.
@corvilinc

You might also be interested in...