Deploy Remote Storage Solutions With Confidence
Deploy Remote Storage Solutions With Confidence
Deploy Remote Storage Solutions With Confidence
Sponsored by:
Introduction
Monitoring is an essential practice for operating today’s networks in an efficient and secure manner. Every
organization recognizes this fact and many have made significant investments in monitoring tools and technology,
yet significant challenges are faced in successfully deploying and optimizing their use. ENTERPRISE
MANAGEMENT ASSOCIATES® (EMA™) analysts conducted a research project involving network and
security operations professionals during September 2009 to study the challenges and best practices for optimizing
monitoring. The primary goal was to understand the barriers organizations face in successfully deploying their
monitoring products and practices, and how those issues are being addressed.
PRODUCT BRIEF
-1- ©2009 Enterprise Management Associates
Monitoring Optimization 2010
Trends and Issues Surrounding Network and Security Monitoring
2. Ongoing administration of filters for tuning and to prevent packet loss is a constant challenge, with nearly
half (46%) of respondents indicating they need to change filter configurations on a weekly or more
frequent basis.
3. Filter administration itself is perceived to be difficult by the vast majority (80%), and nearly half (46%)
characterize it as either “very hard” or “nearly impossible.”
4. A lack of command line interfaces (CLI) skills for administering filters on both network and security
teams is cited as an aggravating factor, raising the need for graphical, intuitive alternatives.
About EMA
Founded in 1996, Enterprise Management Associates (EMA) is a leading industry analyst firm that specializes in going “beyond
the surface” to provide deep insight across the full spectrum of IT management technologies. EMA analysts leverage a unique
combination of practical experience, insight into industry best practices, and in-depth knowledge of current and planned vendor
solutions to help its clients achieve their goals. Learn more about EMA research, analysis, and consulting services for enterprise
IT professionals and IT vendors at www.enterprisemanagement.com or follow EMA on Twitter (http://twitter.com/ema_research).
1998.121109
PRODUCT BRIEF
-2- ©2009 Enterprise Management Associates
Monitoring Optimization 2010
Trends and Issues Surrounding Network and Security Monitoring
<250 250-499
20k+ 13% 6%
21%
500-999
4%
10k-20k
13% 1000-1499
9%
1500-5k
5k-10k 17%
17%
Intrusion Detection/Prevention
57.1%
App Performance Monitor 41.9%
VoIP/UC/Triple Play 29.0%
Compliance 26.2%
Data recorder 23.8%
Other 16.7%
0%
20%
40%
60%
80%
Sept 09: n=210
Slide 4 © 2009 Enterprise Management Associates, Inc.
Access Types Deployed: SPAN vs. TAP
SPAN preferred, though a mix is most often used
35.0% 32.1%
30.0%
25.0%
20.6%
20.0% 18.2%
16.4%
15.0%
10.0% 6.7%
4.9%
5.0% 1.2%
0.0%
100% 76-99% 51-75% 50-50 51-75% 75-99% 100%
Tap Tap Tap SPAN SPAN SPAN
Sept 09: n=165
Slide 5 © 2009 Enterprise Management Associates, Inc.
Coverage: Why aren’t 100% of network
segments monitored?
Lack of tools, available access, staff shortage all common
Other 14.3%
0%
20%
40%
60%
Sept 09: n=119
Slide 6 © 2009 Enterprise Management Associates, Inc.
Where Filters are Implemented
Tool and switch filters most common; Tap filters lag adoption
30.0%
27.6%
25.0%
15.0% 14.3%
5.0%
0.0%
In the Tool X X X X
At the Switch X X X
At the Tap X X X
Hourly
Never 6.3%
26.1%
Daily
15.6%
Annually
6.3%
Weekly
24.0%
Monthly
21.9%
Sept 09: n=96
Slide 8 © 2009 Enterprise Management Associates, Inc.
Difficulty with CLI Filter Administration
45% find this a major challenge
No problems -
we've got it Much too
under control difficult - our
staff can't do it
21%
7%
34%
38%
Not bad –
we get by pretty Hard - we have
well with the a couple of
occasional experts on staff,
hiccup but it's a
struggle
Overloaded
and dropping
packets
Operating with
spare capacity 25%
46%
29%
Used just
below
capacity
Sept 09: n=146
Slide 10 © 2009 Enterprise Management Associates, Inc.
Strategy for Monitoring 10Gb Ethernet
Majority need help extending life of 1Gb Tools
Other 4.1%
0%
20%
40%
Sept 09: n=146
60%
Slide 11 © 2009 Enterprise Management Associates, Inc.
Overworked Staff: Time Spent
Troubleshooting Network/Security/Config
Network /App primary focus; security & tools add demand
50.0%
45.0%
40.0%
35.0%
30.0%
25.0%
20.0%
15.0%
10.0%
5.0%
0.0%
Other 15.7%
0%
20%
Sept 09: n=134
40%
Slide 13 © 2009 Enterprise Management Associates, Inc.
Filter Admin: Who is adept at CLI?
Few are fully trained; Network Ops less likely than Security
25.0%
20.0%
15.0%
10.0%
5.0%
0.0%
• “There is big gap right now, due to lack of tools and people trained to do
the analysis to find relevant compliance information from the network.”
HIPAA Security Consultant
• “Many (data center personnel) don’t realize what to use SPAN for or how to
set it up.” HIPAA Security Consultant
• “We’re very resource constrained, and there is such variation in the amount
and type of traffic coming from our customers that we don’t have the tools
or the people to properly baseline normal versus abnormal.” Senior
Network Engineer
• “We want our employees to be broadly knowledgeable – via cross-training
and building a more systemic view” Senior Network Engineer
• “I need staff to be more general and broadly capable, so they can better
collaborate, but they also need to specialize further to keep up with specific
domain technologies”, Network Director
• “We are looking for persistent sources of (security) data. Traffic monitoring
for incident response is usually only done sporadically.” Principal SOC
Consultant
• “There have been a lot of wins for sharing security data with network
operations. Many are not security issues at all, but security monitoring
recognizes things that are broken, and the rule of thumb is that it might be
a compromised system, but it might also be just a bad application
situation.” Principal SOC Consultant
• “Intelligent network taps are awesome – they solve the conflict between
network operations and network security needs, which often create push-
pull relationships.” Principal SOC Consultant
• “There are two SPANs per switch – network and security, and then you are
done. If we need to monitor both inbound and outbound for network
performance, then we give up security access.” Network Performance
Manager
• “We filter in the tools, except for some applications such as DLP, where we
don’t want things like NetBIOS or GLP getting scanned, so we filter those
upstream.” Network Performance Manager
Slide 16 © 2009 Enterprise Management Associates, Inc.