Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    How Network Teams Should Adapt to Latest Hacker Threats

    By
    Chris Preimesberger
    -
    May 13, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1How Network Teams Should Adapt to Latest Hacker Threats

      How Network Teams Should Adapt to Latest Hacker Threats

      By Chris Preimesberger

      2Breaches Pushing Network Teams to New Limits

      Breaches Pushing Network Teams to New Limits

      High-profile security breaches are becoming more commonplace, and because of this, 85 percent of respondents said network teams are involved in security. A substantial number of people—about 25 percent—spend more than 10 hours weekly on these issues. As an IT pro, this indicates a renewed need to understand security more holistically, since they’re being pulled into new activities and are engaged in multiple facets of preventative (and reactive) measures.

      3Making Sense of Security

      Making Sense of Security

      Half of respondents indicated that the greatest security challenge is an inability to correlate security and network performance. IT pros need to take advantage of the right network tools to replay events—be they dropped connections, breaches or unexpected bandwidth spikes—and correlate them with network performance stats. This will lead to greater insight into how the problem occurred and help craft stronger protective measures moving forward.

      4Need for Speed

      Need for Speed

      Both 40GB and 100GB adoption have doubled over the past year, and there are no signs of this slowing. Networks are speeding up, and it’s going to be more challenging to capture packets for analysis when they’re blazing across the network and piling up in storage at accelerated rates. But it is crucial to have tools that can still watch the network like a security camera. Packet payloads have all the contextual resources for successful security investigations and are an underutilized resource in security investigations.

      5Bandwidth Use Is Skyrocketing

      Bandwidth Use Is Skyrocketing

      We’ve heard it for years, but it’s still true. Employees are bringing multiple devices into the workplace, and now 4K and 6K video collaboration and the use of private clouds will cause an onslaught of bandwidth demand in enterprises. Respondents agreed that their bandwidth would grow by 50 percent by 2016. As such, IT pros are going to have a lot on their plate. They’re going to need to develop tools and systems for correlating relevant data with security intel to truly understand what’s going on with the network and develop smart insight. That can seem as daunting as finding a four-leaf clover in a meadow.

      6SDN Will Be Mainstream by 2016

      SDN Will Be Mainstream by 2016

      Half of the respondents to the survey said they plan to deploy some form of software-defined networking before the year is over. When you abstract network components and operate in a previously hardware-based environment, new visibility issues can arise. IT pros need to understand virtual environments, how to properly run network diagnostics in them and how to map an infrastructure in them.

      7Network Issues Ruffle C-Suite Feathers, Too

      Network Issues Ruffle C-Suite Feathers, Too

      Nearly three-quarters of respondents noted that they struggle to pinpoint whether network problems originate from the network, the system or the application. As enterprises of all sizes run more of their business in the cloud, the network and its associated issues now start raising eyebrows beyond the walls of the IT department and into board rooms and C-suite decision-making. As such, IT pros need to be able to clearly determine and fix the root of these issues.

      8Expect Big Funding Shifts

      Expect Big Funding Shifts

      A big challenge identified was the shift in funding from network teams to security teams, presumably to cope with the onslaught of ever-increasingly high-profile security attacks. In fact, 22 percent of respondents noted this would be an issue in the coming year. No one wants to become the next Anthem, Home Depot or Sony (for the wrong reasons, of course). As such, network teams, if they’re not already being forced to help with security issues, will have to figure out how to do more with less, which signals that more automation in network architecture is coming.

      9Pointing the Finger

      Pointing the Finger

      As content gets richer and unified communications systems deliver higher-quality feeds, video glitches, buffering and lag all have a greater impact on business productivity and end-user patience. As sensitivities heighten, so too does the need to identify the root of issues on the network. Is it the network itself? The application? Perhaps it’s something the end user is doing on his or her own. A clear majority of respondents said needing to identify the root of IT issues and lack of visibility into user experience are the biggest concerns. Increasing sophistication in this area will be important for successful IT teams.

      10Reaching Across the Aisle

      Reaching Across the Aisle

      As security threats continue to rise and network teams get stretched thin by battling attackers and assessing damage post-event, two things need to happen. First, other departments within IT will need to step in to fill gaps as a result of network teams fighting threats. Second, enterprises will need to automate more of their manual network processes to give network teams more freedom to shift resources.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×