The State of Cloud Monitoring

Similar documents
IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS

Evolution of IT in the Finance Industry. Europe

Cloud Migration Strategies

Why Enterprises Need to Optimize Their Data Centers

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Build Your Zero Trust Security Strategy With Microsegmentation

Digital Transformation Drives Distributed Store Networks To The Breaking Point

Evolve Your Security Operations Strategy To Account For Cloud

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

GLOBAL ENCRYPTION TRENDS STUDY

Toward an Automated Future

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Best Practices in Securing a Multicloud World

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

2018 Report The State of Securing Cloud Workloads

Vulnerability Management Trends In APAC

Top Priority for Hybrid IT

Building a Threat Intelligence Program

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight

Modern Database Architectures Demand Modern Data Security Measures

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes

Maintenance Enforcement Program

Cisco Cloud Application Centric Infrastructure

A C H I E V E B O T H W I T H K E Y S I G H T. Company Profile

` 2017 CloudEndure 1

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Optimisation drives digital transformation

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT

Modern Compute Is The Foundation For Your IT Transformation

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016

Accelerate Your Enterprise Private Cloud Initiative

TREND REPORT. Ethernet, MPLS and SD-WAN: What Decision Makers Really Think

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst

Solution Overview Gigamon Visibility Platform for AWS

Disaster Unpreparedness June 3, 2013

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Business Resiliency Strategies for the Cloud. Summary Results September 2017

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

SD-WAN for Addressing Branch Network Complexity & Security

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

Mastering The Endpoint

WHY MOBILE SECURITY SHOULD BE IN YOUR TOP PRIORITIES

GLOBAL PKI TRENDS STUDY

DDN Annual High Performance Computing Trends Survey Reveals Rising Deployment of Flash Tiers & Private/Hybrid Clouds vs.

THALES DATA THREAT REPORT

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

ForeScout Extended Module for Splunk

Multicloud is the New Normal Cloud enables Digital Transformation (DX), but more clouds bring more challenges

CLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY

2015 VORMETRIC INSIDER THREAT REPORT

Converged Infrastructure Matures And Proves Its Value

June 2017 intel.com schneider-electric.com

The Cost of Denial-of-Services Attacks

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

Ixia ibypass: Avoid 5 Common Security Risks in One Easy Step

TechValidate Survey Report: SaaS Application Trends and Challenges

SIEM Solutions from McAfee

I D C T E C H N O L O G Y S P O T L I G H T

Unlock The Value Of Cloud

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Reducing Cybersecurity Costs & Risk through Automation Technologies

RightScale 2018 State of the Cloud Report DATA TO NAVIGATE YOUR MULTI-CLOUD STRATEGY

Converged Cloud and Digital Transformation: A Strategy for Business Success

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

2016 COOLING THE EDGE SURVEY. Conducted by Vertiv Publication Date: August 30, 2016

Don t Get Left Behind

Enabling the Always-On Enterprise

Practical Guide to Cloud Computing Version 2. Read whitepaper at

THE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS

The Data Explosion. A Guide to Oracle s Data-Management Cloud Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

STATE OF THE NETWORK STUDY

2017 USER SURVEY EXECUTIVE SUMMARY

The communications, media, and entertainment industry and the cloud.

Government IT Modernization and the Adoption of Hybrid Cloud

Tripwire State of Container Security Report

Transformation Through Innovation

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

WHITE PAPER HYBRID CLOUD: FLEXIBLE, SCALABLE, AND COST-EFFICIENT UK: US: HK:

MULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH

Cloud Foundry User Survey

State of Cloud Survey GERMANY FINDINGS

Microsoft Azure Integration and Security. Course Code: AZ-101; Duration: 4 days; Instructorled

IBM Cloud Internet Services: Optimizing security to protect your web applications

Closing the Hybrid Cloud Security Gap with Cavirin

DaaS Market Report Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective

TESTING TRENDS FOR 2018

2018 Edition. Security and Compliance for Office 365

Harness the Power of Your Network

Healthcare IT Modernization and the Adoption of Hybrid Cloud

A Global Look at IT Audit Best Practices

Service Provider Consulting

We make hybrid cloud deliver the business outcomes you require

Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure

Transcription:

REPORT The State of Cloud Monitoring Survey Reveals Visibility is Key to Cloud Security and Performance INTRODUCTION Ixia, a Keysight business, commissioned Dimensional Research to conduct a survey measuring the use of private and public clouds and the challenges associated with cloud operations. The results reveal that companies have very low visibility into their public cloud environments, and the tools and data supplied by cloud providers are insufficient. Lack of visibility has numerous ramifications, from the inability to track network performance to lengthening the time it takes to identify and resolve security threats. EXECUTIVE SUMMARY Eight out of 10 companies increased cloud-based workloads in 2018. The top priority for these cloud users is to increase cloud visibility for greater operational control. Woefully, less than 20% of participants say they have the data they need to monitor public cloud environments accurately. A majority (87%) are concerned this lack of visibility is masking security threats. Nearly half said their lack of visibility has led to application performance issues. Nearly 70% of participants stated that public cloud monitoring is more difficult than monitoring data centers and private clouds. Nearly all of those surveyed (99%) identified a direct link between visibility and business value. The results confirm that comprehensive cloud visibility is key to maintaining cloud security and performance. Page 1

DETAILED FINDINGS Substantial Public Cloud Migration Continues Results show a staggering 84% of companies placed additional workloads in the public cloud in 2018, and 21% reported the increase was significant (Figure 1). Only 13% of companies reported the same level of public cloud usage as the year prior. Just 3% reduced workloads in the public cloud. This data confirms that companies continue to increase their utilization of public cloud environments. Figure 1 How has your company s use of public cloud for production workloads changed over the past 12 months? 84% of Companies Grew their Public Cloud Workloads in 2018 21% 63% 13% 3% Significant increase Moderate increase Unchanged Moderate decrease 0% 20% 40% 60% 80% 100% Companies Want Increased Cloud Visibility With organizations expanding their use of public cloud, 99% of participants indicated that comprehensive cloud visibility has direct value to their organizations (Figure 2). Figure 2 In your opinion, what is the value of having a comprehensive cloud visibility solution? 99% of Companies Indicated Direct Business Value from Comprehensive Cloud Visibility Helps our monitoring solutions identify performance degradation Enables our threat protection solutions to identify malicious traffic by source 60% 59% Allows our security monitoring solution to detect indicators of compromise 57% Allows us to monitor traffic at every link of our network 56% Enables us to load balance monitoring tools 37% Allows us to monitor sessions 32% There is no value in having access to network packets 1% 0% 10% 20% 30% 40% 50% 60% 70% Page 2

The benefit mentioned most frequently was monitoring and ensuring application performance at 60%. Security was also key. Some 59% of respondents noted the value of visibility for threat prevention, and 57% noted the value of identifying indicators of compromise. Respondents also called out the ability to monitor every link in the network (56%), the ability to balance workloads between monitoring tools (37%), and the ability to monitor encrypted sessions (32%). Perhaps the most telling piece of data is that only 1% of IT professionals saw no value in comprehensive cloud visibility. This finding supports the idea that visibility investments are justifiable at a business level. Lack of Visibility Hides Security Threats and Other Issues Insufficient cloud visibility obscures security threats, according to 87% of respondents. In another question (Figure 3), 95% of respondents reported that lack of visibility caused an application or network performance issue. Leading those issues were delays troubleshooting application performance at 48% and delays troubleshooting network performance at 40%. Thirty-eight percent of respondents cited insufficient visibility as a factor in application outages, and 31% said it contributed to network outages. Nearly a third of respondents (31%) indicated they were unable to monitor cloud workload performance. Respondents experienced other significant consequences from a lack of cloud visibility: delays in resolving security alerts (26%), compliance problems (18%), and an inability to prevent security attacks (17%). Figure 3 In the last 12 months, which, if any, of the following issues has your company experienced from a lack of visibility into the PUBLIC or PRIVATE clouds? Nearly half of companies have performance issues from a lack of cloud visibility Delays troubleshooting application performance issues Delays troubleshooting network performance issues An application outage Inability to monitor performance of workloads in the cloud 48% 40% 38% 31% A network outage Inability to test performance prior to cloud deployment Delays resolving security alerts Inability to protect data privacy or adequately document compliance Inability to prevent a security threat or attack We have not experienced any issues from lack of visibility 31% 27% 26% 18% 17% 5% 0% 20% 40% 60% Page 3

The Importance of Monitoring Public Cloud Infrastructure While previous questions focused on visibility into cloud environments, the survey also asked IT professionals how important it is to monitor performance in their public cloud environments. A majority (76%) asserted it was important, with 54% stating it was very important (Figure 4). Utilizing infrastructure-as-a-service and platform-as-a-service relieves an organization of infrastructure deployment and maintenance tasks. However, it does not eliminate the need to watch what takes place on those resources. Figure 4 How important is monitoring the performance of your public cloud infrastructure? 54% state monitoring public cloud infrastructure is very important, with 22% more indicating it is moderately important 54% 22% 7% 17% Very important Moderate importance Neutral Slightly important 0% 20% 40% 60% 80% 100% Packet-Level Visibility Critical for Monitoring Myriad techniques are available for monitoring. However, when asked about the value of packet-level monitoring, 86% of participants stated it was important for network and application performance monitoring. An even larger percentage (93%) stated it was valuable for security monitoring. Page 4

Public Cloud Environments Difficult to Monitor The previous findings confirm that packet information is important for monitoring. However, less than 20% of IT professionals reported that they had complete and timely access to packets in their public clouds. The situation is better for private clouds, where 55% reported adequate access. It is significantly better for traditional on-premises data centers, where 82% had the information they needed (Figure 5). These results indicate that packet access is a particular problem for monitoring security and performance in public cloud environments. Figure 5 In which environment do you have complete and timely access to network packets? On-premises Private Cloud Less than 20% of companies have the data they need to monitor public environments properly 82% 55% Hybrid Cloud Public Cloud 19% 15% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% CONCLUSION As more applications and workloads migrate to the public cloud, organizations must focus on how to deliver an excellent customer experience, document compliance, and maintain security. This research finds that most companies have very low visibility into public cloud environments. Packet access is lacking, and the tools and data from public cloud providers are insufficient. This lack of visibility into public cloud workloads has numerous ramifications. They include the inability to track network performance and deliver against SLAs, as well as lengthening the time it takes to identify and resolve security threats. SURVEY METHODOLOGY Ixia, a Keysight business, commissioned Dimensional Research to conduct this survey in the field in December 2018. A total of 338 participants who operate, secure, develop, deploy, or manage cloud applications or infrastructure took part. Participants were from all five continents. They represented large (41%), medium (45%), and small (14%) organizations across a wide variety of industries. Researchers administered the survey electronically, and respondents received token compensation for their participation. Page 5

ABOUT DIMENSIONAL RESEARCH Dimensional Research provides practical marketing research to help technology companies make their customers more successful. Our researchers are experts in the people, processes, and technology of corporate IT and understand how IT organizations operate. We partner with our clients to deliver actionable information that reduces risks, increases customer satisfaction, and grows the business. For more information, visit www.dimensionalresearch.com. ABOUT KEYSIGHT TECHNOLOGIES Keysight Technologies, Inc. (NYSE: KEYS) is a leading technology company that helps enterprises, service providers, and governments accelerate innovation to connect and secure the world. Keysight s solutions optimize networks and bring electronic products to market faster and at a lower cost with offerings from design simulation, to prototype validation, to manufacturing test, to optimization in networks and cloud environments. Customers span the worldwide communications ecosystem, aerospace and defense, automotive, energy, semiconductor and general electronics end markets. Keysight generated revenues of $3.2B in fiscal year 2017. In April 2017, Keysight acquired Ixia, a leader in network test, visibility, and security. Learn more at: www.ixiacom.com For more information on Ixia products, applications, or services, please contact your local Ixia or Keysight Technologies office. The complete list is available at: www.ixiacom.com/contact/info Page 6 915-9335-01-3091 Rev A I Keysight Technologies, 2019