NC1701
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
NETWORKEXPERT<br />
don't provide the entire solution. Specific security analytics solutions fed with log files are now also being deployed to identify<br />
advanced attacks and fraud. These security devices are in stark contrast to the hand cranked analysis of just a few years ago."<br />
There can be little doubt that logs offer a potential gold mine of data, especially for the identification of exploits. With most<br />
devices possessing logging capability, it's simply a matter of turning logging on, forwarding those logs to an aggregator and<br />
normalising them prior to analysis. As well as attack insight, logs can help security and network teams to forensically examine<br />
successful attacks.<br />
In addition to SIEMs and Security Analytics products there are also Big Data Analysis platforms that provide the ability to perform<br />
customised log analysis. Graham explains that, "These are ideal for undertaking very specific analysis, fraud for example, however,<br />
given the complexity of developing algorithms for specific log data, it's out of the question for all but the most capable."<br />
There is so much competition for the mind of the IT and network professional that<br />
even the most committed need to make decisions to knowingly ignore some things<br />
simply to maintain the focus that keeps their organisation working. This reality can<br />
mean that solutions to problems already exist and just need to be recognised.<br />
L is for LTE. 4G or LTE is a common technology for high-speed mobile connectivity in<br />
consumer smartphones and has been largely ignored in the toolbox of Enterprise IT<br />
infrastructure managers. With cost and bandwidth that is competitive with other WAN<br />
connectivity, LTE can provide a failover link, out-of-band management and even become<br />
the principal connectivity solution for remote locations.<br />
Marcio Saito, CTO at Opengear says that, "As the trend to increased geographical<br />
dispersion of networks continues, LTE should be considered."<br />
The number of devices at the edge of the network is multiplying and with increased<br />
adoption of IoT, mobile devices and cloud architectures, connectivity to servers in the<br />
cloud becomes mission-critical. Marcio continues, "Real-time requirements of new<br />
applications demand continuous connectivity at remote sites and branch offices. An<br />
Internet link failure can take a site out of operation and out of business. It's here that LTE<br />
can provide an effective failover link to ensure business continuity.<br />
"In retail store applications, increasing numbers of networked devices are being<br />
deployed to collect extensive data and create a better shopping experience. For<br />
example, advanced signage provides a responsive messaging environment and<br />
traditional POS (Point of Sale) machines are being replaced with cloud-based systems.<br />
In both instances a reliable network connection is necessary for these devices. Without<br />
failover capability the store may be unable to take orders, process payments and check<br />
inventory, impacting both customer satisfaction and revenue."<br />
LTE also provides connectivity in remote locations, Marcio explains. "Take for example<br />
an oil field where equipment is actively monitoring production. Implementing a physical<br />
connection in an inaccessible area can be cost prohibitive if possible at all.<br />
Organisations may be forced to use truck rolls to retrieve data which is tedious, slow<br />
and expensive. In those situations, LTE should be considered as a technology to provide<br />
primary connectivity." NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
JANUARY/FEBRUARY 2017 NETWORKcomputing 15