The business case for network visibility

By Paul BrettCubro Network Visibility
 

Network visibility solutions help organizations to meet their business and IT objectives by improving network performance, security posture, network planning, business continuity, and the ROI of network infrastructure and network tools. Network visibility products typically include network TAPs, Network Packet Brokers, Bypass Switches and Network Probes and the intelligence and advanced capabilities of a network visibility solution is mainly provided by the Network Packet Brokers (NPB).

NPBs are able to remove network traffic blind spots, optimize network traffic, filter network traffic, load balance, and support high speed connections (currently) up to 400Gbps. These capabilities increase the effectiveness of network monitoring, security and analytics network tools, reduce their loading, increase their availability and efficiency, and mitigate disparate network and tool speed and media connections. Network visibility has become fundamental for the successful outcome of contemporary IT initiatives including 5/4/3G service assurance, Digital Transformation, Data Security, Virtualization, Software Defined Networking and high performance, in order to remove the new, incremental network blind spots introduced by these initiatives as well as provide the benefits described above.

Any business case, of course, is dependant on the specifics of the benefits vs costs of a particular use case in a particular environment and organization. However, there are three typical areas of cost and operational benefits for deploying network visibility solutions that are useful to consider:

Reduction of the purchase cost and increase of Return on Investment (ROI) of network monitoring, security and analytics tools.

Most network tools, whether for network monitoring, network security or network analytics, are typically priced or licenced using a pricing structure that includes a capacity or usage amount mechanism. Network Packet Brokers’ ability to optimize copied network traffic by aggregating traffic, filtering out any traffic that is not required for monitoring or analysis, and applying additional optimization techniques such as deduplication or packet slicing, means that the network tool only receives the necessary network traffic when it needs to receive it to be able to carry out its task correctly. The alternative approach without deploying NPBs means that the network tools receive all network traffic all of the time so that the tools required are larger and inefficiently use processor time to analyse irrelevant network traffic. The NPB solution approach, therefore, reduces the loading on the network tool and extends its life span to reduce its initial purchase price and increase its ROI.
For example, in the Cubro Financial Institute case study where Cubro NPBs were deployed to aggregate and filter network traffic for use by network security Intrusion Detection System (IDS) appliances, the purchase price of the combined Cubro/IDS solution was 50% less when compared to an IDS only solution. These savings were achieved because the Cubro NPB reduced the number of ports required for connection to the IDS while continuing to deliver all relevant network traffic for analysis.

Reduce costs while improving IT services by reducing network downtime.

According to Gartner, the global average cost of downtime for businesses and organizations is $5,600 per minute, or over $300K per hour – taking into account the loss of revenue per working hour, the cost of restoring IT services, compensation and legal fees, and the cost of salaries of workers unable to work due to network downtime.

The overall average cost of downtime, of course, is a broad measure, but 98% of organizations confirmed that an hour of network downtime costs them over $100K, 81% of organizations confirmed that an hour of network downtime costs them over $300K, and 33% of organizations confirmed that an hour of network downtime costs them between $1M and $5M. These figures indicate that the larger an organization is the larger the cost and impact of network downtime is to them.

The average price of a network visibility solution to help reduce network downtime by removing network blind spots that can obscure network performance risks is in the range of $100k-$200K for Enterprises and $500k – $1M for Service Providers. As you can see, eliminating a single hour of average network downtime can potentially pay for the network visibility solution and deliver a very fast and high ROI.

Reduce costs while improving IT security by improving network security posture.

The IBM/Ponemon Cost of a Data Breach report for 2021 provides useful insights into the cost and nature of security breaches over the last year having studied 537 real breaches experienced by SMEs and larger enterprises across 17 countries/regions and 17 industries.

The average total cost of a security breach was $4.24M ( a 10% increase from $3.86M in 2020 ). The average cost was determined by including the cost for detection and isolation ( activities that enable an organization to reasonably detect the breach ); lost business ( activities that attempt to minimize the loss of customers, business disruption and revenue losses ); notification ( activities that enable the organization to notify data subjects, data protection regulators, and other third parties ); and post breach response ( activities to help victims of a breach communicate with the organization and redress activities to victims and regulators ). The largest contributor to the average data breach cost was lost business at an average cost of $1.59M.

The costs were further broken down into average cost for a data breach at a large enterprise ( > 10k employees ) was $5.5M, and for an SME ( < 500 employees ) was $2.98M ( up by 27% from $2.35M in 2020 ), with an average cost per stolen record of $161 ( up by 10% from $146 in 2020 ).

Once again, deploying a network visibility solution to remove network blind spots that obscure network security risks and improve network security posture can enjoy a very fast and high ROI by eliminating a single average data breach.

As new ‘blind spot’ generating IT initiatives are deployed and the ongoing risk and cost of network security breaches continues to increase, network visibility solutions have become critical components for networks to successfully support businesses and organizations. Network visibility solutions, such as those from Cubro that provide the best ‘features to price’ ratio in the market, deliver advanced capabilities to help improve network performance, availability and security posture while reducing capex and opex costs and increasing ROI, and are an essential and affordable investment.

Webinar Replay: IOTA and Cybersecurity

Security cameras and alarm systems monitor your buildings, offices, streets, but who monitors your networks?

Watch the replay of the Live Webinar “IOTA and Cybersecurity” where Profitap discussed how IOTA can be the best entry point to monitor your network performance.

IOTA gives detailed network traffic visibility to critical applications and data, allowing you to obtain real-time and historical network traffic without affecting the network performance and security.

During the webinar, they show you how, through a base-level investment, you can start monitoring your network security and how easily you can get access to historical and real-time analysis via custom dashboards.

Speakers:

Mike Pennacchi, John Modlin, Chris Greer, Rick van Werven

Agenda:

  • Intro to the current state of networks and attacks
  • Placement of IOTA
  • Live Demo
  • Zoom in on Dashboards
  • Q&A

 

Satellite group Telesat goes public

Canadian-based global satellite operator Telesat Corporation has become a public company with shares listed on the Nasdaq Global Select Market (NASDAQ) and Toronto Stock Exchange (TSX) under the ticker symbol TSAT, following the closing of a transaction in which Loral Space & Communications’ stockholders and Telesat Canada’s other equity holders exchanged their interests for equity in Telesat’s new public holding structure. Telesat Canada and Loral are now subsidiaries of Telesat Corporation, which remains Canadian-controlled. PSP (Public Sector Pension) Investments and MHR Fund Management control approximately 37% and 36% respectively of the group’s outstanding equity.

A press release declared that the dual-listing is strategically important for driving Telesat’s growth plans including its government-funded Telesat Lightspeed Low Earth Orbit (LEO) satellite network rollout. Telesat Lightspeed will enable fixed broadband, LTE and 5G connectivity in Canada starting in 2024, expected to support faster data services in various regions of the country whilst connecting approximately 40,000 households in remote regions and providing services for business clients in industries such as air transport and shipping.

Thanks to TeleGeography for this industry update.

Ensuring Complete High Availability (HA) Redundancy for Critical Links

Major financial institutions experienced 80% more cyberattacks over the past 12 months, a 13% year-over-year increase, with a 238% surge in cyberattacks against banks during the coronavirus pandemic.1 According to a new analysis by the Federal Reserve Bank of New York, a single cyberattack on one of the top U.S. banks would likely have a major effect on the global financial system.2

The banking industry faces a whole range of risks as they evolve in the interconnected edge enterprise landscape while battling a growing list of software attacks including denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks, man-in-the-middle (MitM) attack, phishing, and spear-phishing attacks, credential stuffing, and ransomware.

While a majority of threats target software vulnerabilities, banks also risk hardware vulnerabilities that could put the organization’s digital infrastructure at risk, from an employee device to a router connected to an unsecured network, through the Internet of Things (IoT) and cloud exploitation.

The core concept for the banking Cyber Security strategy is to safeguard customer assets and their transactions. As breaches lead to damage banks’ standing in the financial market, consequences, and penalties for FDIC non-compliance, monetary losses, and customer confidence.

Challenge

This was the environment when one of the United States’ largest financial corporations, who specialize in Business and Commercial Banking and Financing came to Garland Technology looking to future proof their security deployment with a cost effective, scalable connectivity strategy that provides resilience and redundancy.

This organization’s security strategy involved the use of Intrusion Prevention Systems (IPS) and DDoS protection for all critical links. IPS is a network security tool that examines network traffic flow to detect and prevent vulnerability exploits. A DDoS protection tool specifically blocks denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.

Both security solutions are deployed inline, meaning the tool sits directly in the path of network traffic to actively protect and block potential threats. The company reached out to Garland Technology as a leader in inline security, whose CTO Jerry Dillard invented bypass technology, knowing they needed a scalable connectivity strategy that accounted for inline deployment sensitivities.

Architecting networks with High Availability (HA) or redundant designs, creates added challenges for security and networking teams, in not only effectively deploying and updating tools without creating a single point of failure for each device but how to adjust once an HA has been triggered.

Goal

Ensure all critical links are actively protected using IPS and DDoS technology, incorporating a strategy of resilience, reliability and redundancy so there is no business interruption or downtime, while protecting sensitive data.

Solution

Garland’s engineering team worked with the IT team to design an HA architecture that solved all of their challenges, while providing additional value and functionality, leading them to expand this use case throughout their enterprise.

Our teams worked through questions like, do we have to buy two of everything? What happens if traffic switches from primary to secondary? How are we going to track that data? How do we correlate everything? While working through expectations, urgency and availability of each device.

High Availability

There are two options for incorporating High Availability (HA) solutions, Active/Standby and Active/Active. Active Standby (Or Active/Passive) deploys to a secondary tool, providing failover from primary device to backup appliance. Active/Active deploys to a redundant link, providing failover if either active device fails.

Diagram 1: High Availability (HA) solution for Active/Passive, provides failover from primary device to backup appliance.
Diagram 2: High Availability (HA) Crossfire solution for Active/Active, provides failover if either active device fails.

The EdgeLens® Inline Security Packet Broker transformed their network security capabilities, instead of relying on a single bypass TAP for each device, they were able to not only provide the same reliability and management controls of a bypass, but also managing multiple inline and out-of-band tools from the same device with packet broker functionality, which easily complemented either HA architecture.

For each link deployment the IPS was deemed critical, so each EdgeLens deployed two redundant IPS tools in an active standby scenario, one IPS as the primary or “active” appliance brought inline through the EdgeLens and the secondary IPS or “passive” appliance, which still receive live traffic, but is not considered inline. This provides “Hot Standby” redundancy. In the event the primary appliance goes down and the heartbeats stop being received by the TAP, the secondary appliance will immediately and automatically take over as primary and be brought inline.

Each deployment also incorporated one DDoS protection tool, which was managed by the bypass functionality, providing heartbeat health checks and “inline lifecycle management” which allows you to easily take tools out-of-band for updates, installing patches, maintenance or troubleshooting to optimize and validate before pushing back inline.

Simplified Security Stack

This solution provided an easy, hardware base chaining solution, that allows you to manage multiple inline and out-of-band tools individually, between multiple network segments from the same device, while also providing bypass resilience. If one of the tools in the chain can’t keep up, load balance to the other tools 1:1 or 1:N (one to many) tools.
Diagram 3: The EdgeLens provides the ability to manage both inline and out-of-band tools from one device.

Benefits

  • Provide High Availability [HA] redundancy to inline security tools, ensuring 24/7 availability
  • Reduced risk of unplanned downtime
  • Simplify security stack and reduced network complexity by managing multiple inline tools
  • Provide filtering, aggregation, and load balancing to inline links
  • Distribute traffic before and after an inline tool (WAF, NGFW, or IPS) to out-of-band tools
Interested in adding an High Availability to your deployment? Contact us today!

Why Cybersecurity Relies on Redundancy to Ensure Network Availability

By Chris Bihary

Today, 50% of large enterprises are spending over $1 million annually on cybersecurity. The worldwide information security market is forecast to reach over $170 billion by 2022, as enterprises are making huge investments when it comes to securing mission-critical applications and data-center performance quality.

This result reflects growing breaches across the networking landscape costing on average $3.92 million in 2019 alone, including the cost of networking infrastructure to combat these threats, as well as the impact the company faces through downtime, recovery and reputation.

We’ve talked about the 3 keys to network resiliency being bypass technology, failsafe technology, and network redundancy, as well as understanding your single points of failure. But let’s dig deeper and review what network redundancy is, when it is needed and how to deploy High Availability (HA) solutions in your network.

What Is Network Redundancy?

Enterprise IT operations strategize failure, recovery and business continuity plans that typically include redundancies for critical servers, network segments, security tools and internet connectivity, where a failure would cause significant downtime. In the event of a failure, redundancy allows your network to remain in service by providing alternative data paths or backup equipment.

Network redundancy is introduced to improve reliability and ensure availability. The basic concept that if one device fails, another can automatically take over. With the goal to maximize availability with minimal complexity.

The concept of network redundancy is accomplished through what is referred to as High Availability (HA) deployments. HA network designs incorporate redundant components for critical power, cooling, compute, network, security and storage infrastructure with the goal of eliminating any single point of failure that could compromise the network.

When Is Network Redundancy Needed?

Many companies can minimize their downtime through bypass TAPs. However, for industries that have the highest cost of downtime, unplanned downtime is not an option, including Financial Services, Energy, Telecom, Manufacturing, Retail and Healthcare, where critical services and information must be secure and available 24/7/365. Just last year, 86% of worldwide enterprises reported an average hourly downtime cost of their servers at over $300K, with 15% being over $5M.

Despite the enormous investment in infrastructure and security tools, many IT teams continue to experience database, hardware, and software downtime incidents that can last a few minutes to days, accruing not only these revenue losses but enduring negative customer experiences and having sensitive data compromised. Many times the repercussion of a down security tool like a firewall or Intrusion Prevention Systems (IPS) can lead to additional breaches or security events.

Downtime can happen for a variety of reasons, through cyber attacks, human errors or misconfigurations, understaffed IT departments, power failures and hardware failures. To reduce downtime, it is essential to plan for unexpected events that can bring down the systems. HA systems minimize the impact of these events, and are designed to automatically recover from failures.

Adding Reliability to Your Security Strategy

Inline security tools like IPS, Web Application Firewalls (WAF), and firewalls are typically architected inline, meaning they are sitting directly in the path of critical links. The purpose is to block threats in real-time before they get into the broader network. Unfortunately this introduces potential single point of failure (SPOF) challenges like what happens if the device failed, and how do you properly update or optimize once it is inline?

As a recent EMA [Enterprise Management Associates] report states, “An oversubscribed device can degrade network performance and a device failure can bring down the network. Managing the risk of downtime is a critical consideration when connecting security devices to the network.”

Industry best practice encourages all inline tool availability to be managed by an external bypass TAP. The next step is taking this technology and applying redundancy to critical links ensuring that in the event of a failure to critical links, High availability (HA) bypass deployments are your foundation to cybersecurity redundancy.

Garland offers two scenarios for incorporating High Availability (HA) solutions into your network, Active/Standby and Active/Active. Active Standby (or Active/Passive) deploys to a secondary tool, providing failover from primary device to backup appliance. The Active/Active Crossfire design incorporates a secondary tool, bypass TAP and redundant link, providing the ultimate failover if either active device fails.

Deploying Redundant Inline Security Tools

HA Bypass TAPs can connect two inline tools with a primary / secondary or an active / standby design. These Bypass TAPs sit inline on a single network link and can connect to redundant tools without adding additional complexity or a new point of failure to the network.

In these single link situations, the Bypass TAP will send live traffic from the network to both tools. One tool will be the primary or “active” appliance managed inline with the Bypass TAP. The secondary or “passive” appliance also receives live traffic out-of-band, but will not forward traffic back onto the network. This provides “Hot Standby” redundancy. In the event the primary tool goes down triggering the bypass heartbeats to stop, the secondary tool immediately takes over as primary and is brought inline by the Bypass TAP.

Diagram: HA solution for Active/Passive, provides failover from primary device to backup appliance.

Deploying Inline Security Tools with Redundant Links

In architectural designs where redundant network links are used, a similar bypass TAP design can be incorporated. This time the redundant security tools are cross-connected between the two HA Bypass TAPs. In this Active/Active Crossfire design, each tool and Bypass TAP should be the primary appliance for their respective link, and the redundant for each other, usually resulting in asymmetric routing. If an appliance goes down, the network link’s traffic will fail-over to the secondary link, allowing all the traffic to be seen by the remaining active appliances.

Diagram: HA Crossfire solution for Active/Active, provides failover if either active device fails.

Cybersecurity relies on redundancy to ensure network availability, because for critical links, downtime is not an option. Using Bypass TAPs on inline appliances will not only ensure these tools are constantly protecting the network, but providing functionality to expedite troubleshooting and shorten maintenance windows.

If you are deploying redundant security solutions into your network, Garland has specifically designed HA Bypass TAPs and Inline Security Packet Brokers that not only provide the same reliability and management controls of a standard bypass, but also provide the ability to manage multiple inline and out-of-band tools from the same device with packet broker functionality. This was the case recently when a large financial corporation, who specialize in Business and Commercial Banking and Financing came to Garland Technology looking to future proof their security deployment with a cost effective, scalable connectivity strategy that provides resilience and redundancy.

We achieved this HA solution deploying Garland’s EdgeLens® Inline Security Packet Broker, which transformed their network security capabilities with added functionality, easily complementing the new HA architecture.

Looking to add an HA solution to your security deployment, but not sure where to start? Contact us and we would be happy to help you find your solution.

Free Whitepaper

Learn how to reduce maintenance windows and the risks of unplanned downtime.

Xplornet announces FTTH rollout to 200,000 rural Ontarian premises; launches UCaaS solution

Canada’s Xplornet Communications has announced a plan to deliver affordable fibre-to-the-home (FTTH) internet to 200,000 homes and businesses in rural communities across Ontario. The move forms part of Xplornet’s commitment announced last year to invest CAD500 million (USD399 million) by 2025 in deploying fibre and 5G fixed wireless access to meet the needs of rural Canadians. Xplornet also has FTTH projects underway in the provinces of Quebec, New Brunswick, Alberta, Manitoba, Nova Scotia and Prince Edward Island. In parallel, Xplornet is rolling out Canada’s first rural 5G standalone network in New Brunswick and, over the course of 2022, will expand its 5G network to 250 additional rural communities across Canada. Currently, over 500,000 rural Canadians have access to 50Mbps/10Mbps download/upload speeds from Xplornet with unlimited data on the ‘Xplore 50/10 Unlimited’ service package.

The operator’s B2B division, Xplornet Enterprise Solutions, meanwhile this week announced a new business cloud communications offering. The new voice-first Unified Communications as-a-Service (UCaaS) solution is designed ‘to meet the diverse and changing communications needs of workers in remote, in-office, or hybrid work environments, while also providing frontline workers advanced communication solutions.’ The service incorporates Alianza’s new Cymbus Business Cloud Communications applications supporting mobility and team collaboration, enabling customers to talk, chat, meet, and share across their devices. A press release says that Cymbus desktop and mobile apps provide a seamless interface for accessing calls, voicemails, chat functions, and video collaboration tools, replacing the need to rely on additional applications such as Slack, Zoom or Microsoft Teams. Robbie Zetariuk, VP of the B2B division, declared: ‘Alianza’s new Cymbus Business Cloud Communications is set to position Xplornet Enterprise Solutions as a leader in Canada’s business VoIP solutions market.’

Thanks to TeleGeography for this industry update.

Why Executive Dashboards Improve Operations

Network Visibility Dashboards Save Time

When mired in KPIs and data analysis, it’s easy to forget WHY we have networks but it is important to remember they are the backbone of business that help us deliver services and products. There is a way to rise above the KPI and data debacle – executive dashboards. In this “Benefits of Executive Dashboards – Case Study” from the Tolly Group, see how you can improve time-to-value and time-to-insight.
Networks are mission-critical and more complex than ever. When they are sluggish or fail, business disruption occurs. And that costs money and impacts customer satisfaction. Observer® offers a better way to visibility.
Let us know if we can help you find your solution.