STATE OF THE NETWORK STUDY

Similar documents
What is SD WAN and should I know or care about it? Ken LaMere Ecessa

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

Toward an Automated Future

MULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH

Mastering The Endpoint

Transform your network and your customer experience. Introducing SD-WAN Concierge

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Validating the Security of the Borderless Infrastructure

Converged Infrastructure Matures And Proves Its Value

TREND REPORT. Ethernet, MPLS and SD-WAN: What Decision Makers Really Think

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

Transform your network and your customer experience. Introducing SD-WAN Concierge

Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure

Reducing Skype for Business Costs via Proactive Management Using management tools cuts SfB operational costs by more than half

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

WHITE PAPER. Applying Software-Defined Security to the Branch Office

Cisco Start. IT solutions designed to propel your business

INFINIT Y TOTAL PROTECTION

A Guide to Closing All Potential VDI Security Gaps

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes

Tripwire State of Container Security Report

2017 Windows 10 Enterprise Impact Survey Windows 10 Enterprise Impact Survey

A Simple Guide to Understanding EDR

Managed Nectar & Sonus SBC Offer: Providing Deep Diagnostics and Real-Time Visibility for Sonus Session Border Controllers

Vulnerability Management Trends In APAC

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

The State of Cloud Monitoring

Preparing your network for the next wave of innovation

2016 COOLING THE EDGE SURVEY. Conducted by Vertiv Publication Date: August 30, 2016

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Planning for the New Network. Ten Trends Rewriting the Rules for Midsized Business

DaaS Market Report Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective

Why Converged Infrastructure?

Efficient Data Center Virtualization Requires All-flash Storage

2017 USER SURVEY EXECUTIVE SUMMARY

2018 Mobile Security Report

State of Cloud Survey GERMANY FINDINGS

The Future of Threat Prevention

DDOS DETECTION AND RESPONSE TRENDS IN THE ENTERPRISE: AN IANS CUSTOM REPORT

Ransomware piercing the anti-virus bubble

DevOps Agility Demands Advanced Management and Automation

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

Converged Security - Protect your Digital Enterprise May 24, Copyright 2016 Vivit Worldwide

THE ACCENTURE CYBER DEFENSE SOLUTION

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

RSA NetWitness Suite Respond in Minutes, Not Months

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

THE ESSENTIAL GUIDE: SELECTING A CLOUD COMMUNICATIONS PROVIDER

Routing Underlay and NFV Automation with DNA Center

Cloud Connect. Gain highly secure, performance-optimized access to third-party public and private cloud providers

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

Planning for Performance Assurance No Longer an Afterthought

WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.

EXECUTIVE OVERVIEW. Storage. Workloads and Key Projects 2018, Quarterly Advisory Report EXECUTIVE OVERVIEW. Storage: Workloads and Key Projects, 2018

Cisco Collaboration Optimization Services: Tune-Up for Peak Performance

ACHIEVING FIFTH GENERATION CYBER SECURITY

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise

THE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS

ForeScout Extended Module for Splunk

The New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC

A NETWORK GUIDE FOR VIDEOCONFERENCING ROLLOUT

2015 VORMETRIC INSIDER THREAT REPORT

trend micro smart Protection suites

Ten things hyperconvergence can do for you

State of SMB IT 1H 2012

The Intersection of Hype & Performance

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

Enabling Hybrid Cloud Transformation

One Release. One Architecture. One OS. High-Performance Networking for the Enterprise with JUNOS Software

2018 State of Infrastructure

GDPR drives compliance to top of security project list for 2018

BETTER Mobile Threat Defense (BMTD)

Building a Resilient Security Posture for Effective Breach Prevention

Dell helps you simplify IT

Video Surveillance Solutions from EMC and Brocade: Scalable and Future-proof

` 2017 CloudEndure 1

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

2014 IT Priorities Mark Schlack Sr. VP, Editorial

Deploying a Next-Generation IPS Infrastructure

SD-WAN: A Simplified Network for Distributed Enterprises

Building a Threat Intelligence Program

THE REAL ROOT CAUSES OF BREACHES. Security and IT Pros at Odds Over AppSec

HOSTED SECURITY SERVICES

Modern Database Architectures Demand Modern Data Security Measures

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Cloud Foundry User Survey

Digital Transformation Drives Distributed Store Networks To The Breaking Point

White. Paper. The Application Deluge and Visibility Imperative. How to Ensure Network Performance for Your Business-critical Applications.

IT Security: Managing a New Reality

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Transcription:

10TH ANNUAL STUDY 2017 1

EXECUTIVE SUMMARY The Tenth Annual State of the Network Global Study focuses a lens on the network team s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a need for potential strategy changes for IT teams. 2

KEY STATISTICS TECHNOLOGY ADOPTION Since 2015, 40 GbE adoption remains steady at 26 percent While 100 GbE adoption jumps from 15 percent to nearly 20 percent in the same time frame Nearly half of respondents plan to deploy 100 GbE within 24 months SECURITY TRENDS 88 percent of respondents are now involved in troubleshooting security-related issues Of those, 80 percent report an increase in the time they spend on security Nearly 3 out of 4 spend up to 10 hours per week on security-related issues APPLICATION AND PERFORMANCE MONITORING Over half expect their organization s bandwidth consumption to grow by up to 50 percent in the next 12 months Determining whether problems are caused by the network, system, or application was the top challenge overall, cited by 52 percent of respondents However, measuring latency and delay issues snagged the top spot for respondents with job title of VP level and above 3

EMERGING TECHNOLOGIES Over 50 percent of organizations will have moved to 100 GbE by the end of 2018. Converged environments created by private cloud and SDN implementations are likely fueling much of the need for larger pipes to run between servers. While 40 GbE had been on the uptick, survey results from 2015, compared to today, show a plateau of this technology at 26 percent adoption with 100 GbE now gaining ground. EMERGING TECHNOLOGY DEPLOYMENTS YES YES, IN 2017 YES, IN 2018 NO 25 GbE 26% 15% 4% 55% 40 GbE 26% 20% 15% 39% 100 GbE 18% 15% 22% 44% Mobile Devices/BYOD 43% 29% 12% 16% Private Cloud 33% 31% 15% 21% Public Cloud 34% 25% 18% 24% Server Virtualization 49% 21% 19% 11% Software-Defined Networks 20% 25% 26% 29% 4

HANDLING SECURITY According to a recent Mandiant report 1, it now takes IT teams a median number of 146 days to identify threats on the network. Given the regular media coverage of high-profile breaches, it is not surprising that security teams seek additional resources to augment defenses and investigate attacks. TIME SPENT ON SECURITY Not only have more network teams spent time managing security issues but the amount of time has also increased over the past year. 88 percent of respondents are now involved in troubleshooting security-related issues, up from 85 percent in 2015 Of those, 80 percent report an increase in the time they spend on security Nearly 3 out of 4 spend up to 10 hours per week on security-related issues WHAT PERCENT OF A 40-HOUR WORK WEEK DO YOU SPEND TROUBLESHOOTING SECURITY-RELATED ISSUES? HAS THE TIME YOU SPEND TROUBLESHOOTING SECURITY INCREASED OVER THE PAST 12 MONTHS? 70% NO 3% YES, BY UP TO 25% YES, BY UP TO 26-50% 20% 30% 12% NONE UP TO 10 HOURS 16% BETWEEN 10-20 HOURS 2% MORE THAN 20 HOURS YES, BY MORE THAN 50% 47% 5 ¹http://investors.fireeye.com/releasedetail.cfm?ReleaseID=957111

NEW THREATS When asked how the nature of security threats have changed in the past year, IT teams have identified a rise in email and browser-based malware attacks (63 percent) and an increase in threat sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks. HOW HAVE THE FOLLOWING SECURITY THREATS TO YOUR ORGANIZATION CHANGED IN THE PAST 12 MONTHS? Increased email and browser malware 63% Increased sophistication of security threats 52% Increased number of distributed denial-of-service attacks (DDOS) Increased attacks on database servers Increased number of ransomware attacks 33% 31% 27% Other 3% 6

KEY INSIGHT Network teams are called upon to help with many facets of network security because: The network team has visibility into all the traffic, understands what s normal behavior, and can make quick policy changes like blocking specific IP addresses Both teams often look at the same anomaly to determine if it s a security or network issue Syslogs were cited by nearly a third of respondents as the primary method for detecting security issues, followed by longterm packet capture and analysis (23 percent) and performance anomalies (16 percent). WHAT MONITORING METHODS DOES YOUR TEAM USE FOR SECURITY INCIDENTS? Syslogs 30% Long-term packet capture and analysis 23% Tracking performance anomalies SNMP 15% 16% NetFlow 10% Other 6% 7

UC ADOPTION AND CHALLENGES Though hardly an emerging technology with over 50 percent adoption, VoIP, and unified communications (UC) in general remains a challenge when it comes to ensuring performance and optimal end-user experience. WHAT UC APPLICATIONS HAS YOUR ORGANIZATION DEPLOYED? (check all that apply) VoIP Videoconferencing Enterprise Instant Messaging Web Collaboration Applications 56% 53% 50% 47% Fax over IP 19% Other 2% WHAT ARE THE KEY CHALLENGES YOU FACE IN MANAGING UC PERFORMANCE OVER THE? (check all that apply) Inability to view into network edge and branch environments Lack visibility into multi-vendor UC environments 42% 41% Inability to assess impact of UC deployments on other applications 40% Lack of visibility into each session for UC technologies 36% Lack visibility into bandwidth utilization 29% 8 Lack visibility into the quality of user experience 15%

APPLICATION AND PERFORMANCE MONITORING Projected bandwidth growth is a clear factor driving the rollout of larger network capacities. The most significant takeaway is that nearly 2 out of 3 expect bandwidth demand for their organizations to grow by up to 50 percent in 2017. INCREASED BANDWIDTH DEMAND According to respondents, more than half predicted that their bandwidth usage could double by the end of 2018, nearly 20 percent by 2017. HOW MUCH DO YOU EXPECT THE BANDWIDTH DEMAND FOR YOUR ORGANIZATION S TO GROW FROM ITS CURRENT LEVELS? No change Up to 50% 51-100% 101-150% 5% 13% 61% 21% 10% 44% 34% 12% 9 IN 2017 IN 2018

CHALLENGES BY TITLE Top application monitoring challenges differed by job title with VP-level and above pointing to measuring latency and delay issues as their number one challenge, versus nearly 2 out of 3 network and systems administrators indicating that determining whether problems are caused by the network, system, or applications is the top challenge. WHAT ARE YOUR MOST COMMON PROBLEMS WHEN TROUBLESHOOTING APPLICATIONS? (check all that apply) Network and Systems Administrators VP Level and Above Determining Whether Problem Caused by Network, System or Apps 33% 65% Measuring Latency and Delay Issues 51% 53% Handling user complaints and errors 21% 49% Monitoring Bandwidth Consumption 41% 44% Tracking Application Bugs and Patches 40% 44% 10

RESEARCH AND METHODOLOGY Study questions were designed based upon interviews with network professionals and IT analysts. Results were compiled from the insights of 1,035 respondents, including network engineers, IT directors, and CIOs from around the world. WHERE ARE YOU LOCATED? North America 86% Europe 6% South America 4% Asia Africa 2% 1% Australia Less than 1% WHAT IS YOUR PRIMARY JOB FUNCTION? For more information about the study s methodology or the results, contact Stephen Brown at steve.brown@ viavisolutions.com. IT Manager/Director Network Administrator/Engineer System Administrator/Engineer CIO/VP of IT 14% 19% 23% 33% 11 IT Consultant 11%

2017 12 2017 Viavi Solutions. All rights reserved. Viavi Solutions and all associated logos are trademarks or registered trademarks of Viavi Solutions. 30186088 900 0417 sotnreport17-wp-ec-ae