02.02.2017 Views

NC1701

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NETWORKEXPERT<br />

don't provide the entire solution. Specific security analytics solutions fed with log files are now also being deployed to identify<br />

advanced attacks and fraud. These security devices are in stark contrast to the hand cranked analysis of just a few years ago."<br />

There can be little doubt that logs offer a potential gold mine of data, especially for the identification of exploits. With most<br />

devices possessing logging capability, it's simply a matter of turning logging on, forwarding those logs to an aggregator and<br />

normalising them prior to analysis. As well as attack insight, logs can help security and network teams to forensically examine<br />

successful attacks.<br />

In addition to SIEMs and Security Analytics products there are also Big Data Analysis platforms that provide the ability to perform<br />

customised log analysis. Graham explains that, "These are ideal for undertaking very specific analysis, fraud for example, however,<br />

given the complexity of developing algorithms for specific log data, it's out of the question for all but the most capable."<br />

There is so much competition for the mind of the IT and network professional that<br />

even the most committed need to make decisions to knowingly ignore some things<br />

simply to maintain the focus that keeps their organisation working. This reality can<br />

mean that solutions to problems already exist and just need to be recognised.<br />

L is for LTE. 4G or LTE is a common technology for high-speed mobile connectivity in<br />

consumer smartphones and has been largely ignored in the toolbox of Enterprise IT<br />

infrastructure managers. With cost and bandwidth that is competitive with other WAN<br />

connectivity, LTE can provide a failover link, out-of-band management and even become<br />

the principal connectivity solution for remote locations.<br />

Marcio Saito, CTO at Opengear says that, "As the trend to increased geographical<br />

dispersion of networks continues, LTE should be considered."<br />

The number of devices at the edge of the network is multiplying and with increased<br />

adoption of IoT, mobile devices and cloud architectures, connectivity to servers in the<br />

cloud becomes mission-critical. Marcio continues, "Real-time requirements of new<br />

applications demand continuous connectivity at remote sites and branch offices. An<br />

Internet link failure can take a site out of operation and out of business. It's here that LTE<br />

can provide an effective failover link to ensure business continuity.<br />

"In retail store applications, increasing numbers of networked devices are being<br />

deployed to collect extensive data and create a better shopping experience. For<br />

example, advanced signage provides a responsive messaging environment and<br />

traditional POS (Point of Sale) machines are being replaced with cloud-based systems.<br />

In both instances a reliable network connection is necessary for these devices. Without<br />

failover capability the store may be unable to take orders, process payments and check<br />

inventory, impacting both customer satisfaction and revenue."<br />

LTE also provides connectivity in remote locations, Marcio explains. "Take for example<br />

an oil field where equipment is actively monitoring production. Implementing a physical<br />

connection in an inaccessible area can be cost prohibitive if possible at all.<br />

Organisations may be forced to use truck rolls to retrieve data which is tedious, slow<br />

and expensive. In those situations, LTE should be considered as a technology to provide<br />

primary connectivity." NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

JANUARY/FEBRUARY 2017 NETWORKcomputing 15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!