When the current EndaceProbe® Network Recorder product range was introduced more than five years ago, most enterprise networks were only starting to think about upgrading to 10Gb Ethernet (10GbE) speeds. Since then, most IT departments use 10GbE in their core, 1GbE to the desktop and laptop has become standard, and many are organizations are looking to move up to 25GbE, 40GbE or higher speeds. At the time, EndaceProbes were the highest performing and most reliable network packet capture device available, helping our customers migrate their monitoring from 1GbE to 10GbE. In the same way that we enabled that migration, we are now introducing the next generation of network recording products as enterprises incorporate higher network speeds.
By Jeff Brown and Gary Kaiser (Dynatrace)
So what’s going on?
Dynatrace and Endace have announced NetPod™, a fully integrated solution that combines Dynatrace’s Data Center Real-User Monitoring and Endace’s EndaceProbe™ Network Recorder. It is no small thing when two independent companies agree to take their market-leading products and create a new branded offering, so you have to figure there is something valuable going on here.
Seems like security incidents are occurring more often with mild to significant impact on consumers and various organizations, such as Target and Sony.
Referring to the Verizon Data Breach Report year after year confirms that incident response times to such incidents are increasing, rather than decreasing, with root cause identification of the problems not occurring for months after the security incident in many cases. This can cause a pessimistic view among many security teams, however, there are a lot of good things happening in the security space that I want to share with you.
We’ve all heard that the application is now the network. This paradigm shift moved us from the simple port-based definition of applications that was prevalent up until the end of the last decade, to the more awkward reality that applications are much more complex and no longer conformed to such a simple scheme. For network operators, understanding the applications on the networks was paramount and Endace responded to this by incorporating deep packet inspection (DPI) technology into its EndaceProbeTM Network Recorders in 2012.
Significant changes in the structure and use of IT, including such seismic trends as Bring Your Own Device (BYOD), virtualization and cloud computing, have introduced new challenges to IT administrators and staff. Added layers of complexity require new skill sets and knowledge bases as well as tools to effectively run a modern enterprise network. This raises a few questions about how IT teams are coping with the changes.
When you think of the cost of a security breach in your network, the immediate thought is often a dollar amount; for example how much money has the breach caused in lost sales? Consequently, many think that private enterprises are the only ones that are prone to be at risk for attacks on their networks. The fact is public sector, educational institutions and non-profit organisations are just as much at risk and the potential costs are both great and varied.
It seems as if the Sochi Winter Olympics and March Madness happened just yesterday, but the month of June is here, and with it, one of the most highly anticipated sporting events of any four year period. It could be argued that the FIFA World Cup is the most popular sporting event in the world, and with a soccer powerhouse country like Brazil hosting the tournament this year – across 12 venues – sports fans are getting the eye drops ready so they can watch every moment of the action between June 12 and July 13. ESPN will present all 64 matches across three networks (ESPN, ESPN2 and ABC).
In the world of mission-critical networks, the very idea that you may be ‘playing a hunch’ when it comes to investigating a service-affecting issue likely would be met with utter derision. The pressure is to provide confident answers to critical questions; what happened, who was affected and how long will it take to resolve. This can be daunting especially when the air is thick with accusations and the ‘interested parties’ trending towards ‘C-level’ can be insurmountable.
Of course, the truth is that playing educated hunches lies at the very heart of network troubleshooting. It is only after following and discarding a number of possibilities that you can exonerate yourself in what is known as the mean-time-to-innocence.
While at Cisco Live today, I was struck by the traffic patterns on the show floor. Wherever there was a traffic jam, it seemed as though it was caused by a few people walking slower than everyone else, or by a momentary obstruction that halted traffic. Enterprise networks share many of the same attributes (and problems) that show floors do in that respect. The part that makes it worse for enterprise networks (vs. show floors) is that there are mission-critical applications that run on top of these networks. When networks have performance issues (even momentary ones), the impact on these applications can be catastrophic.
There is something both cathartic and caustic whenever the term “ice” is added onto something of cultural and artistic value. Let’s see, you have hip hop artists like Ice-T and Ice Cube who rapped about social injustice and the hardships of poverty. Then you have this generation’s iconoclast, Vanilla Ice (nee’ Robert Matthew Van Winkle) who let us know it was perfectly fine to “play that funky music” when you had a rough day or that humming “Ice Ice Baby” to your newly born child while rocking him to sleep didn’t constitute you as being strange.