Click me
Transcribed

Network Visibility

ixia NETWORK VISIBILITY/TAKING A LOOK AT THE NEXT BIG THING IN IT As organizations roll out more business-critical applications, managing network and application performance becomes increasingly complex and costly. And with today's rising data volume, many monitoring tools are overwhelmed with network traffic while others remain underutilized. In today's perilous world of hackers, compliance requirements, tight money, and the need for more efficiency in the face of rapid data growth, what does complete NETWORK VISIBILITY really mean? Network Visibility Network Monitoring Switch The ability of all monitoring tools to gain accurate, actionable and complete data from all segments of the network to monitor for security and performance. Technology designed to provide complete network visibility to monitoring tools and applications in order to optimize their performance. It resides in the network or data center between SPANS or TAPS and monitoring tools, and ensures that each monitoring tool gets exactly the right data needed for analysis. HOW DOES IT WORK? THE NETWORK MONITORING SWITCH NETWORK MONITORING SWITCH INTERNET NETWORK I PERFORMANCE MONITOR BEFORE: Limited Visibility AFTER: Complete Visibility INTRUSION DETECTION SYSTEM BEFORE: Minimal IT Data Security AFTER: Secure Access to IT Data APP PERFORMANCE MONITOR BEFORE: Underutilized AFTER: Fully utilized NETWORK DATA RECORDER BEFORE: Overloaded AFTER: Filtered/Load Buffered FAR NETWORK ANALYZER BEFORE: Crash Cart Technology AFTER: Access to Entire Network MARKET POTENTIAL: $1B $500M The network visibility market is a $300M market growing toward $1B. $300M 2013 2015 2018 THE NEED: Networks are becoming faster, more complex and more challenging to monitor - and more essential to business and everyday life High-speed mobile connectivity: Driven by ultra-fast 4G LTE mobile broadband, the world is going mobile - and effective network monitoring is critical. 4G 19x more traffic 13,412 petabytes The amount of mobile traffic in 2012 in petabytes (that's 14063501312 gigabytes or more than 250 times the entire written works of mankind, from the beginning of recorded history, in all languages) BIG DATA ANALYTICS Big Data promises quantum gains in productivity and competitive advantage, but without analytics it's useless. IT departments need greater visibility into networks and applications to make it all work. 5200 40 trillion 88% The number of gigabytes in the digital universe by 2020 - that's more than 5200 gigabytes for every man, woman, and child on Earth The percentage of companies that say they currently analyze less than half the metric data they collect every two days "Every two days we create as much information as we did from the dawn of civilization up until 2003." Eric Schmidt, former CEO of Google EMERGING TECHNOLOGY Faster, higher-performance networks and emerging trends such as virtualization, SDN and cloud are the future, but they make monitoring the old-school way next to impossible. 4.3 zettabytes >3 out of 5 The predicted global cloud traffic per year by 2016 - equivalent to the data on more than 1 trillion DVDS More than 3 in 5 large U.S. companies are currently implementing or have already implemented server virtualization. 95% The percentage of service providers planning to deploy 100G Ethernet interfaces within the year to keep up with customers' growing demand for data BYOD Personal devices on enterprise networks can be bandwidth hogs and assumed security risks, increasing the need for active monitoring of the corporate network. 89% 1 out of 4 >10% The percentage of global IT professionals reporting that smartphones or tablets connect to their corporate networks The number of employed U.S. The percentage of organizations that are "fully aware" of all the devices accessing their network adults who have been a victim of malware or hacking on a personal electronic device CYBER-SECURITY RISK Threats against networks are growing in frequency and sophistication, requiring next-generation monitoring 79% $110 billion The percentage of IT security professionals who expect a major cyber terrorism attack within the year The total global direct financial loss due to cybercrime including attacks, malware and phishing in 2012 97% The percentage of IT security professionals who feel network visibility and monitoring is "important" or "extremely important" in preventing damage from malicious attacks "Mobile Devices Will Outnumber People by the End of the Year" Mashable 2013 "Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012" Cisco Systems May 2013 *4G LTE Traffic Expected to Increase 200 Percent This Year" Techno Buffalo. Mar. 2013 "The Digital Universe and Big Data" EMC 2012 "APMdigest Infographic Featured in 2012 Best Big Data and Open Analytics Infographics List" APMdigest Jan. 2013 "Infonetics: Infonetics carrier survey exposes the hope and hype of SDNS" Infonetics Research July 2012 *Cisco Global Cloud Index Forecasts Cloud Traffic to Grow Sixfold by 2016" Cisco Newsroom Oct. 2012 *Survey: Among U.S. Companies Adopting IT Virtualization, 53 Percent Use Sub-Par Protection to Secure Virtual Infrastructure" Kaspersky Lab US Apr. 2012 "Infonetics: Enterprises embracing SDN in the data center" Infonetics Research Oct. 2012 *The Impact of Mobile Devices on Information Security: A Survey of IT Professionals" Dimensional Research Jan. 2012 *The Latest Infographics: Mobile Business Statistics For 2012" Forbes.com May 2012 *BYOD Security is no LOL matter." ESET May 2013 "Bring-Your-Own-Device Creates Bandwidth Burden on Corporate Networks" Blue Coat Systems Jan. 2013 *Norton: Cybercrime cost $110 billion last year" ZDNet Sept. 2012 "Hacktivist attacks grow as governments get in on the action" USA TODAY July 2012

Network Visibility

shared by IXIA on Apr 25
55 views
0 shares
0 comments
As organizations roll out more business-critical applications, managing network andapplication performance becomes increasingly complex and costly. And with today’srising data volume, many monitorin...

Publisher

Ixia

Tags

None.

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size