Management BYOD Infrastructure IoT Storage Security Privacy

Current Filter: >>>>>>

PREVIOUS

   Current Article ID:6718

NEXT



Losing network control

Editorial Type: Feature     Date: 05-2016    Views: 2213   










IT teams fear losing control of business transactions, apps and infrastructure. Michael Hack, Senior VP at Ipswitch explores the challenge of controlling IT complexity

With enterprise networks becoming busier than ever before, supporting an abundance of new technologies now represents a significant addition to the IT management burden. And, according to IT pros, that's putting their ability to securely control business transactions, applications and infrastructure, across cloud, virtual and network environments, severely at risk.

Today's IT professionals are struggling to keep up with the fast-paced rate of technological change. According to a recent survey that we undertook, 66 per cent of IT professionals feel that increasing IT complexity is making it more difficult to do their job, especially when it comes to delivering zero downtime.

The digital enterprise is more dependent than ever before on the availability, reliability and performance of mission-critical networks, servers and business applications. This digital transformation has come at a cost for IT teams, which have faced the unending advance of new technologies such as the cloud, BYOD, the Internet of Things, virtualisation, wireless and mobile, all of which require increasingly large amounts of high quality network bandwidth.

While these technological evolutions have benefited enterprise productivity, IT departments now find themselves increasingly weighed down by the challenge of maintaining network availability, and, at the same time, supporting an ever-growing array of device types, operating systems and software applications.

Dealing with apps and mobile devices that threaten to congest business networks is just the start of the challenge. IT teams are also responsible for thwarting hidden threats to network stability like non-sanctioned devices and shadow IT. However time and staff resource pressures mean that IT professionals are struggling to keep tabs on everything they'd like to monitor on their networks.

The lack of common IT management tools across IT teams isn't helping matters, making a holistic view of today's increasingly complex technology stacks difficult to achieve; 44 per cent of IT teams report using three or more tools, with many using between 10 and 20. This means that time is wasted switching between tools to gain an accurate view into application and infrastructure performance.

With all this to consider, improving network monitoring and visibility within budget and headcount constraints can seem daunting - but it's not an impossible task.

AVAILABILITY MONITORING
IT teams should strive to ensure everything they know about their networks is accurate. That means discovering how many laptops, mobile devices, servers and virtual machines the network supports, using the right tools to find the clutter and being clear about network set up. Critical business assets should be identified and categorised as business use, non-business use but allowed, non-business use and not allowed and rogue or unknown with policy guidelines created for each category.

PERFORMANCE MONITORING
Monitoring all applications and users to determine which use the most bandwidth is a must, as is segmenting the network to prevent downtime. High priority assets should be appropriately monitored, with alerts set for critical resources. Initiating unified monitoring across all wired and wireless networks, physical and virtual servers, applications and databases will deliver a single version of the truth that enables better application and network performance, optimisation and troubleshooting.

SECURITY MONITORING
Here the focus, at a minimum, should be on security appliances like firewalls, intrusion prevention systems and web application firewalls, and the use of data collected from these devices to detect breaches and threats. To protect the IT infrastructure from the malware risk posed by BYOD, security controls ideally need to be in place to detect and monitor lateral network movement in real-time.

Network monitoring doesn't have to be a complex task. Teams just need to take a step back and make sure they are adopting the right approach and making the most of the tools on offer. NC

Like this article? Click here to get the Newsletter and Magazine Free!

Email The Editor!         OR         Forward ArticleGo Top


PREVIOUS

                    


NEXT