Application Networking Trends

Similar documents
SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN

Transform your network and your customer experience. Introducing SD-WAN Concierge

Don t Get Left Behind

THALES DATA THREAT REPORT

Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast

I D C T E C H N O L O G Y S P O T L I G H T

Cloud Computing: Making the Right Choice for Your Organization

Transform your network and your customer experience. Introducing SD-WAN Concierge

SD-WAN 101. November 3 rd 2016 Rob McBride Marketing

RingCentral White Paper UCaaS Connectivity Options in the New Age. White Paper. UCaaS Connectivity Options in the New Age: Best Practices

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes

Software-Defined WAN Does Not Grow on WAN Alone

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

ebook ADVANCED LOAD BALANCING IN THE CLOUD 5 WAYS TO SIMPLIFY THE CHAOS

SD-WAN Solution How to Make the Best Choice for Your Business

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010

Cloud Migration Strategies

Transform your data estate with cloud, data and AI

HOW IT INVESTMENT STRATEGIES HELP AND HINDER GOVERNMENT S ADOPTION OF CLOUD & AI

THE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS

Scaling Large and Multinational Enterprise SD-WAN Deployments

Automation, DevOps, and the Demands of a Multicloud World in the Telecommunications Industry

TREND REPORT. Ethernet, MPLS and SD-WAN: What Decision Makers Really Think

Simplifying the Branch Network

INNOVATIVE SD-WAN TECHNOLOGY

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Deploying Cisco SD-WAN on AWS

Virtualizing Networks:

Faster, Better, and Cheaper? Building the SD-WAN Business Case

Healthcare IT Modernization and the Adoption of Hybrid Cloud

NETWORKING GLOBAL ACCESS ONE SOURCE SERENUS NETWORK SERVICES NEXT GENERATION CLOUD

A Software-Defined WAN is a Business Imperative

Disaster Unpreparedness June 3, 2013

DevOps Agility Demands Advanced Management and Automation

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

The State of SD-WAN Adoption in 2017

Hitachi Enterprise Cloud Container Platform

Architecture Overview

MOVING MISSION IT SERVICES TO THE CLOUD

MPLS SOLUTION How to Make the Best Choice for Your Business

SD-WAN. Bringing Scale, Agility and Robustness to Enterprise Networks

2017 Trends in Datacenter and Critical Infrastructure

Benefits of a SD-WAN Development Ecosystem

TESTING TRENDS IN 2015: A SURVEY OF SOFTWARE PROFESSIONALS

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018

SEVONE DATA APPLIANCE FOR EUE

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016

SEVONE END USER EXPERIENCE

Top Priority for Hybrid IT

Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale

Overcoming Business Challenges in WAN infrastructure

Exam C Foundations of IBM Cloud Reference Architecture V5

MASERGY S MANAGED SD-WAN

Three Key Considerations for Your Public Cloud Infrastructure Strategy

THE STATE OF IT TRANSFORMATION FOR RETAIL

Using Workload Automation to Optimize Hybrid Cloud Estates

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE

Not all SD-WANs are Created Equal

Why Converged Infrastructure?

HyTrust government cloud adoption survey

SD-WAN AND BEYOND: DELIVERING VIRTUAL NETWORK SERVICES

WHY LEGACY SECURITY ARCHITECTURES ARE INADEQUATE IN A MULTI-CLOUD WORLD

EdgeConnectSP The Premier SD-WAN Solution

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Why Converged Infrastructure?

Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access

WHITE PAPER ARUBA SD-BRANCH OVERVIEW

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Service Delivery Platform

Cloud Connections SEE Partner Summit Janos Strausz Product Sales Specialist, DC

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication

SD-WAN Market Overview

Dell EMC Hyper-Converged Infrastructure

Evolution of connectivity in the era of cloud

Benefits of SD-WAN to the Distributed Enterprise

Optimisation drives digital transformation

EY Norwegian Cloud Maturity Survey Current and planned adoption of cloud services

JOURNEY TO CLOUD (J2C) CONSUMING TECHNOLOGY, NOT OWNING IT

THALES DATA THREAT REPORT

Enterprises Look to Open Source to Navigate the IT Modernization Journey

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

Multicloud is the New Normal Cloud enables Digital Transformation (DX), but more clouds bring more challenges

Dynamic WAN Selection

Converged Infrastructure Matures And Proves Its Value

SaaS Providers. ThousandEyes for. Summary

VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket

Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst

Not all SD-WANs are Created Equal: Performance Matters

Cisco SD-WAN. Securely connect any user to any application across any platform, all with a consistent user experience.

New Digital Business Models Driving the Softwarization of the Network

Cloud. Connection. Securing the INSIDESSS. March Keeping the Private in Private Cloud. Riding the Connection Carousel Page 3

Next generation branch with SD-WAN and NFV

ThousandEyes for. Application Delivery White Paper

Cloud Services. Infrastructure-as-a-Service

Cisco Container Platform

Transcription:

HIGHLIGHTS OF ASN SURVEY RESULTS n The Futuriom Applications Specific Networking (ASN) Survey collected detailed feedback from 2 enterprise technology end users on the topic of networking cloud applications. n End users are seeking more robust software-based solutions for networking cloud applications in a secure fashion. 63.5% of users cited issues with VPN performance. n 47.5% cited issues with VPN security. n 75% of VPN users said they are seeking a better solution for cloud networks. n Key features such as Zero Trust architectures and hardware root of trust are desired for cloud networking security. n Application Specific Networking (ASN) is emerging as a viable solution to networking cloud applications. SPONSORED BY

EXECUTIVE SUMMARY The massive shift of applications from on-premises software to hybrid-cloud application environments has posed many challenges to IT and networking managers looking to efficiently and securely connect applications. To gain insight to these challenges, Futuriom surveyed 2 enterprise IT managers in application development, networking, security and DevOps and reached some major conclusions in a new report. The research, based on survey data and primary research with enterprise end users, shows that cloud IT professionals are looking to evolve their approach to networking and securing cloud applications. These new approaches can fill gaps in existing technologies such as Virtual Private Networks (VPNs). VPNs are seen as having significant security and performance drawbacks for use in networking cloud applications. High-level conclusions of our research, based on survey data and primary research with end users, include the following: n 75% of VPN users said they are seeking a better solution for cloud networks. n VPNs are seen as having significant security and performance drawbacks for use in networking cloud applications: 63.5% of users survey cited issues with VPN performance. 47.5% cited issues with VPN security. n Users don t see private lines or MPLS as fully secure networking solutions for cloud applications. Most use an additional security overlay. n SD-WAN may be appropriate for branch connectivity, but the technology is not seen as suited to Industrial IoT devices. 43.5% of users survey said they agree that SD-WAN is not an ideal solution for networking Industrial IoT devices, while only 33.5% disagreed. 23% said they don t know. n The majority of end users are seeking Zero Trust networks and hardware root of trust for network security. 74.5% said they see hardware root-of-trust as a significant security feature. n When asked if Zero Trust network architectures are a significant improvement in networking security, 55.5% agreed this was true, while only 15% disagreed. 29.5% said they don t know. This primary research reflects the fact that cloud-based applications and virtualization has shifted networking needs away from devices and boxes and toward native applications-based networking solutions. The data shows that IT departments are looking for a way to build automated networking functionality directly into applications. WHAT COMES AFTER VPNS One of the important themes addressed by the survey is how IT staff view the use of VPNs in cloud networks and how secure networking is likely to evolve. Users expressed serious concerns about the use of VPNs, especially in use cases such as B2B and Internet of Things (IoT). Data gathered indicates that while many respondents use VPNs for extranets, B2B networks, and connected supply chain, 75% of them are seeking a better solution. 2

Q: True or False: I use VPNs for extranets, B2B or connect supply-chain use cases, but I am seeking a better solution. 15 15 75% 12 9 6 5 25% 3 N: 2 True False This may lead you to ask: What exactly are the problems with VPNs for cloud networks? Futuriom has conducted primary research in addition to the survey results, to gain additional insight. Comments from IT professionals indicate that VPNs often generate network and/or processing overhead as users connect to VPN servers. In some cases, this can generate significant latency and delays for networking resources. Additionally, VPNs introduce management complexity because they typically require their own servers with authentication. Survey backs these issues up. The following chart ranks the issues that are mostly commonly faced when using VPNs for cloud connections. Q: When using VPNs for cloud connections, which issues do you face? Select all that supply 15 127 63.5% 12 9 6 95 47.5% 68 34.% 72 36.% 3 N: 2 15 7.5% Security Performance Management Configuration None of the above Another way to adjust the same question was to ask users to rank which issues they had most frequently. In a ranking hierarchy, performance and security were most often ranked as the top issues. 3

The follow question asked the users surveyed to rank performance issues. Q: Rank the top VPN issues you have faced when using VPNs for cloud connections. (1 = most frequent; 4 = lease frequent) 8 75 7 6 5 4 3 2 1 58 43 3 25 26 27 2 13 13 8 9 8 4 1 Security Performance Management Configuration 2 1 being most frequent and 5 being least frequent: 1 2 3 4 Users also expressed reservations about using traditional VPNs in the Industrial IoT environment. Q: Please select your level of agreement with the following statement: I believe that traditional VPNs are not the best solution for Industrial IoT device connectivity. 12 19 54.5% 1 8 6 4 2 19 9.5% 62 31.% 1 5.% Strongly Agree Agree Disagree Strongly disagree The majority of those surveyed agreed that VPNs are not the best solution in such cases. VIEWS ON MPLS AND SD-WAN It s important to understand the relationship among legacy networks using private circuits such as MPLS, the next-generation architecture known as SD-WAN, VPNs, and additional potential solutions for cloud network. While some respondents believe that MPLS and SD-WAN can be used to network cloud applications, it s clear that there is the desire for additional layers of security and virtualization in applications such as IoT and cloud. 4

The view on using MPLS for cloud applications is split down the middle. 45.5% of the respondents agreed that carrier-delivered MPLS wasn t the right solution for cloud-based networking, while 46% disagreed with that statement. This indicates that conviction is lacking in MPLS and that many IT managers believe additional technology is needed for networking cloud applications. One of the key areas of concern about MPLS is security. This is because MPLS does not have full security baked into the service, and requires additional measures, according to our respondents. 73.5% of the respondents said they run an additional layer of security over MPLS. Q: True or False: I run an additional security layer of VPN encryption over the top of MPLS services to secure applications and data. 15 147 73.5% 12 9 6 53 26.5% 3 True False SEEKING ZERO TRUST NETWORKS AND HARDWARE ROOT OF TRUST End-user research, including survey data and end-user interviews, indicates that more robust networking security features are desired for networking cloud applications. A majority of those surveyed indicated that both Zero Trust network architectures and hardware root of trust offer improvements to network security. Q: I believe Zero Trust network architectures are a significant improvement in network security. 12 111 55.5% 1 8 6 4 3 15.% 59 29.5% 2 True False Don t know 5

Q: True or False: I believe that hardware root of trust is a significant security feature for networking. 15 149 74.5% 12 9 6 3 22 11.% 29 14.5% True False Don t know CONCLUSION: APPLICATION SPECIFIC NETWORKS (ASNS) COULD IMPROVE CLOUD NETWORKING AND SECURITY Futuriom believes that the results of the Application Networking Survey show that IT staff, including networking, applications development, security, and networking professionals, are not satisfied with existing solutions for networking cloud applications, including the use of legacy VPN technology. End users are seeking more flexible, software-based security and networking technologies that are native to the cloud and can be built into applications. This approach is used through the emerging networking technology known as ASNs. ASNs are used to build software-only networks that can connect applications without requiring management of hardware devices, operating systems, or servers. Unlike VPNs, ASNs can be provisioned automatically by the applications in the cloud. This architectural design creates logical networks across the Internet and WAN to connect applications an approach that NetFoundry refers to as AppWANs. These AppWANs are the glue that can securely connect parts of a distributed application, which often includes connecting applications programming interfaces (APIs) and workloads that may run across clouds. An AppWAN can connect an endpoint or resource in the cloud that need to be connected securely and efficiently. It can be used to replace legacy technologies like VPNs and MPLS, which are tied to specific hardware devices but aren t nearly as flexible. The key features of ASNs and AppWANs include: n Secure networking tied to applications, not devices. n n Applications-based networking that is easy to set up and tear down with software. No box management necessary to instantiate a network. n Networking and security features targeted at DevOps and software development staff rather than networking specialists. n Capability to employ a native, Zero Trust security architecture as well as hardware root-of-trust on demand with high performance. 6

n Generally transparent to the end user ASNs are likely to serve to connect distributed applications in SaaS, IaaS, and PaaS environments, whether it s single cloud, hybrid cloud, or multi-cloud environments. BACKGROUND ON THE SURVEY RESPONDENTS AND METHODOLOGY Futuriom used an online survey tool to reach 2 IT staff balanced over applications development, networking, security, and DevOps functions. The survey used screening questions to assure that only the results from IT staff at management level and above were included in the data. The survey also asked the respondents to rank their responsibilities, as shown below. (1 being the higher and 5 being the lowest.) 12 119 1 8 6 4 2 74 38 32 36 2 43 38 51 47 21 41 55 45 41 22 25 57 48 48 22 17 12 24 28 Application Development Networking Security DevOps Other 1 being the higher and 5 being the lowest: 1 2 3 4 5 N: 2 ABOUT THE SPONSOR: NETFOUNDRY NetFoundry is the leader in Application Specific Networking, enabling businesses to instantly connect distributed applications in any cloud, on any device, anywhere with unprecedented simplicity. The NetFoundry platform enables businesses to securely and reliably connect applications without the constraints of VPNs, custom hardware and private circuits. NetFoundry is headquartered in Charlotte, North Carolina, with offices in San Francisco, New York, London, Bangalore and Singapore.