engage.gigamon.com
Open in
urlscan Pro
2a02:26f0:3100::1735:28d0
Public Scan
Submitted URL: http://mkto-m0027.com/ODkyLVdFUi0wNzgAAAGMOi_nvI_1Iks-oC7yGAPVvA47kW2QFOXW8Hzr7d8VxOSbNDWqfnuZeyyNRrTiil78ECRHDpk=
Effective URL: https://engage.gigamon.com/programs-email-cloudalwayson/analyst-reports/analyst-report-network-visibility-architecture-will...
Submission: On June 08 via manual from US — Scanned from DE
Effective URL: https://engage.gigamon.com/programs-email-cloudalwayson/analyst-reports/analyst-report-network-visibility-architecture-will...
Submission: On June 08 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOM<form class="search-form"><input name="query" class="search-input" type="text" placeholder="Search..." value=""><span class="icon-search"></span></form>
Text Content
ANALYST REPORT: NETWORK VISIBILITY ARCHITECTURE WILL MAKE OR BREAK CLOUD TRANSFORMATION Network Visibility Architecture Will Make or Break Cloud TransformationAugust 2022 EMA White PaperBy Shamus McGillicuddy, Vice President of ResearchPrepared for . 1EMA White Paper | Network Visibility Architecture Will Make or Break Cloud TransformationExecutive SummaryThis white paper, based on new research by EMA, provides insight and guidance to IT and cybersecurity leaders who are adapting their network visibility solutions to a hybrid, multi-cloud future. It identi-fies best practices for ensuring the delivery of network traffic data to performance and security analysis tools. EMA created this paper for Gigamon, a leading vendor in the network visibility industry. Cloud Transformation is Disrupting Network VisibilityThe multi-cloud era is here. Today, 83% of enterprises are multi-cloud, with 27% claiming to use three or more cloud providers.1 This migration of applications to multi-cloud environments intro-duces tremendous complexity that challenges network visibility and undermines IT operations and cybersecurity. EMA research found that the migration of applications to the cloud has introduced blind spots in 45% of enterprises today. Those blind spots become more common as companies establish multi-cloud networks. Only 15% of companies that use one cloud provider have cloud blind spots, but 68% of companies that use three or more cloud providers have these blind spots. This is a three-dimen-sional problem. The blind spots occur between cloud providers, but also between the cloud and on-premises networks. Perhaps most critically, these blind spots occur within individual cloud envi-ronments, where east-west traffic between containers and virtual mahcines is hard to monitor with the observability solutions upon which DevOps teams rely. These disruptions to visibility are a problem for people who are accountable for network perfor-mance and security. While they might not have introduced these blind spots, IT operations and security personnel are responsible for mitigating the issue. As one network engineer with a Fortune 100 consumer goods manufacturer recently told EMA, mitigation isn’t simple. “People always blame the network. If the problem has something to do with the cloud application itself, we’re not good at getting that data. Tools need better visibility into the cloud.” 1Unless otherwise noted, all data cited in this paper was originally published by EMA in the June 2022 research report, “Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise.”The migration of applications to the cloud has introduced blind spots in 45% of enterprises today. . 2EMA White Paper | Network Visibility Architecture Will Make or Break Cloud TransformationThis lost visibility in the cloud presents a major and potentially catastrophic risk to companies. Nearly half of companies that have these blind spots have experienced a security or compliance policy violation. Moreover, 46% experienced extended application outages or performance problems, 45% experienced a security breach, and 44% reported cost overruns with their cloud providers. EMA believes that a network visibility architecture that spans on-premises and cloud infrastructure is essential for addressing the operational challenges introduced by the visibility that is lost in the cloud. A network visibility architecture is an overlay of hardware and software that mirrors, aggregates, opti-mizes, and forwards network traffic data to performance and security analysis tools. EMA research found that enterprises that are the most successful with their network visibility architectures are less likely to experience cloud-driven network blind spots.Adapting Network Visibility Architecture to Hybrid, Multi-Cloud TransformationEMA research found that the majority of companies (56%) identify hybrid and/or multi-cloud archi-tecture as a major driver of investments in network visibility solutions. The rate is even higher among companies that have adopted three or more cloud providers (65%). Not only must they spend on network visibility in the cloud and make sure their observability and security monitoring tools are strengthened with network intelligence, but these companies must also unify that visibility with their existing on-premises network visibility architecture. Fifty percent of the organziations that are most successful with their visibility solutions believe that this unified approach to visibility is very important. By establishing a unified, hybrid cloud visibility architecture, IT and security teams can reduce data conflicts between silos of visibility, unify management of the architecture, and stamp out blind spots that might occur both between cloud environments and within individual cloud envi-ronments (for example, east-west and intercontainer traffic). In fact, enterprises have told EMA that their number-one architecture management requirement of visibility vendors is multi-cloud architecture management. IT organizations want their visibility vendors to provide an end-to-end visibility management framework across public and private infrastructure. The majority of companies (56%) identify hybrid and/or multi-cloud architecture as a major driver of investments in network visibility solutions. 1 / 8 112% Analyst Report: Network Monitoring Market Report 2022 Enabling Visibility and Security in a 5G Hybrid Cloud World Analyst Report: ESG Tech Validation Gigamon Hawk Deep Observability Pipeline MULTI-CLOUD IS COMPLEX ENOUGH. MULTI-COMPLIANCE AND SECURITY? MULTI-CONFUSING. See how organizations are adapting to securing the cloud. READ THE SANS REPORT MULTI-CLOUD IS COMPLEX ENOUGH. MULTI-COMPLIANCE AND SECURITY? MULTI-CONFUSING. We have selected a collection of relevant readings for IT and Security professionals like you on how organizations are adapting to securing the cloud and get more from their efforts and investments. ANALYST REPORT: SANS 2022 CLOUD SECURITY SURVEY Over the past several years, we have seen more and more examples of vulnerabilities in cloud assets, cloud service provider outages, sensitive data disclosure, and breaches involving the use of public cloud environments. Some examples of security issues in the cloud in 2021 include:Amazon Web Services (AWS) experienced a number of significant outages that rendered many websites and online services unavailable. More than three critical outages occurred, leading to well-known sites like Blog Posts & Podcasts Analyst Reports On-Demand Webinars Videos Case Stories 03 Link IDC Blog Series Your Network and Their Cloud | gigamon.com You’re Investing in Cloud Services. Have you taken the right steps to ensure security? 01003 Link Demystify Automated Cloud Visibility with VPC Traffic Mirroring and Gigamon - Gigamon Blog Updated September 30, 2021. AWS is the industry leader in IaaS, with an extensive and worldwide public cloud presence that offers endless scalability, 067 Link Navigating the Cloud Journey | Podcast | Gigamon This podcast series is the perfect destination for cloud practitioners responsible for planning, architecting, implementing, and operating any part of their organization's cloud tech stack. Thank You By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookie Policy Reject All Accept All Cookies Manage Cookie Settings PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Back Button PERFORMANCE COOKIES Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices