Real-time network visibility

1 May 2018 Infrastructure, Information Security

When it comes to network downtime in any industry, the underlying statistics tell us one thing: it costs money and lots of it.

According to the Ponemon Institute, downtime can cost around an astounding $8 000 per minute, which means an hour-long network outage can cost a business over half a million dollars. A separate IHS report underlines this claim, saying medium and large companies that typically experience five minutes of downtime each month are looking at losses equating to $1 million and $60 million per year, respectively.

Anton Jacobsz
Anton Jacobsz

“Financial impact aside, a sluggish network will also affect IT operations resulting in slow backups and corrupt data as a result of dropped packets,” says Anton Jacobsz, managing director at Networks Unlimited. “In addition, business continuity and system availability can be compromised and all of this can result in critical customer-facing applications being affected, which, in turn, negatively affects your business brand and customer loyalty.”

A white paper titled Real-time Network Visibility from Mellanox, says that the symptoms of a poorly performing network are easy to see – but pinpointing the underlying causes of network issues is never quite as straightforward. It says the size, complexity, speed and dynamic nature of network traffic can make it difficult to identify bottlenecks and other issues.

“As our partner in network visibility, Mellanox’ paper underscores one message we’ve been driving home for quite some time and that is, you can’t manage what you can’t measure,” says Jacobsz. “IT security and analytics are only as good as the data they see, and it is IT’s core challenge to ensure that the infrastructure supporting these tools delivers reliable, fast and secure applications. In order to achieve this, IT needs total visibility into the network at all times.”

Businesses struggling with lethargic networks might want to look at their network on a very granular level, drilling down to switch level, he explains, because it is at switch level that the network build began.

My network for a switch?

Only those operating deep within the IT administration truly understand exactly how choosing the right switch can heighten visibility, but it is vital that people across all levels of the business have at least a broad understanding of their impact, says Jacobsz. “Network telemetry provides the link between the network and business-critical application performance, ensuring visibility into real-time information.”

Businesses using the right Ethernet switches coupled with a solid analytics tool will quickly scale to the next level of visibility and debug-ability across their networks.

“The right switch will offer real-time monitoring using eight smart mirror engines, which enable organisations to move from reactive to proactive mode,” clarifies Jacobsz. “These switches can mirror in real-time with nanosecond granularity in the event of drop occurrences, high latency, ACL flows and even buffer level events.”

They can also enhance debug capability using statistics, triggered watermarks and buffer status snapshots. Using histograms, IT can quickly identify microbursts and will be able to specify absolute limit values both for the data and burst size.

They offer a snapshot of the entire switch buffer’s status, which allows IT managers to quickly determine when another flow is causing starvation to a poorly performing application. Modifying these shared buffer rules can result in immediate performance boosts.

Examples of real-life use cases include low latency trading, where, for example, when executing arbitrage strategies, every millisecond lost could result in hundreds of millions of dollars in lost opportunity. Another example would lie in media streaming where poor bandwidth, delays and microburst glitches will result in a poor quality of customer experience.

“It is IT’s core challenge to ensure that the infrastructure supporting these tools delivers applications that are reliable, fast and secure,” says Jacobsz. “This means total visibility into the network and there are products available today that ensure real-time, fast, accurate over- and underlay, as well as distinct and quick debugging of fabrics to ensure the network is fully covered.”

For more information, contact Chris Coetzee at Networks Unlimited on [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cyber resilience – protect, defend, recover
Infrastructure
The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.

Read more...
Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Top bets for backup and business continuity
Infrastructure
Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Next-gen solar-powered switches
Infrastructure
Duxbury Networking has introduced its range of solar unmanaged switches, which are ideal for any environment requiring reliable Power-over-Ethernet (PoE) capabilities, such as IP phones, cameras, and access points.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...