NC1803
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
NETWORKcomputing<br />
I N F O R M A T I O N A N D C O M M U N I C A T I O N S – N E T W O R K E D www.networkcomputing.co.uk<br />
A GREAT NIGHT FOR NETWORKING<br />
This year's NC Awards winners have arrived!<br />
ENTERPRISING<br />
SOLUTIONS<br />
Tackling the enterprise<br />
architecture challenge<br />
THE AI POWER STRUGGLE<br />
Why the right kind of computing power is an<br />
essential step on your AI journey<br />
IoT SECURITY THAT WORKS<br />
How do we secure the network's<br />
extended attack surface?<br />
MARCH/APRIL 2018 VOL 27 NO 02
helping our customers do great things<br />
we help our customers do great things<br />
IPEXPO<br />
manchester<br />
25-26 April 2018,<br />
Manchester Central<br />
REGISTER FREE<br />
• 95+ World-class speakers<br />
• 100+ Industry leading vendors<br />
• 9 Theatres<br />
• Live Demos<br />
• Everything you need<br />
under ONE roof<br />
CLOUD & IOT<br />
CYBER SECURITY<br />
MANCHESTER<br />
NETWORKS &<br />
INFRASTRUCTURE<br />
DATA & ANALYTICS DEVOPS AI<br />
www.ipexpomanchester.com<br />
SPONSORED BY<br />
helping you do great things
COMMENT<br />
COMMENT<br />
THE BEST NETWORK POSSIBLE<br />
BY RAY SMYTH, EDITOR<br />
We live in an uncertain world: of that there can be no doubt. We are advised<br />
that the current skills shortage in IT and cybersecurity will get worse before it<br />
gets better, and yet I have noted that one response to the shortage is to<br />
increase salaries for some IT staff from that same, limited pool. While this will be welcomed<br />
by the beneficiaries, it's well known that the positive effect of a salary increase<br />
will be short-lived, and it is actually unlikely to prevent employees accepting a role<br />
with an even better salary offered by a competitor. But does any of this contribute to a<br />
better, more operationally aligned, secure networked estate?<br />
I have never held back in encouraging those working in IT and networking to get<br />
more involved in their organisation: involved so that they can spend more time and<br />
resources doing what the organisation really needs and dissuading it from embarking<br />
on a path of networked anarchy, where functional line managers do what they want,<br />
when they want, and connect it to the network - all too often with board approval,<br />
even if tacit.<br />
The essentials of a well-functioning, business-aligned, realistically secure network will<br />
never change. These values should always be paramount and enable the organisation's<br />
objectives, reviewed regularly and refined and adjusted, in order to at least be in<br />
step with organisational changes, and ideally to lead them. When combined with<br />
competent scrutiny and a shared and evolving understanding, the digitally transformed,<br />
digitally driven organisation will naturally attract and retain the best people. It<br />
might even help to create some.<br />
EDITOR: Ray Smyth<br />
(ray.smyth@btc.co.uk)<br />
REVIEWS:<br />
Dave Mitchell<br />
Ray Smyth<br />
SUB EDITOR: Mark Lyward<br />
(netcomputing@btc.co.uk)<br />
PRODUCTION: Abby Penn<br />
(abby.penn@btc.co.uk)<br />
DESIGN: Ian Collis<br />
(ian.collis@btc.co.uk<br />
SALES:<br />
David Bonner<br />
(david.bonner@btc.co.uk)<br />
SUBSCRIPTIONS: Christina Willis<br />
(christina.willis@btc.co.uk)<br />
PUBLISHER: John Jageurs<br />
(john.jageurs@btc.co.uk)<br />
Published by Barrow & Thompkins<br />
Connexion Ltd (BTC)<br />
35 Station Square,<br />
Petts Wood, Kent, BR5 1LZ<br />
Tel: +44 (0)1689 616 000<br />
Fax: +44 (0)1689 82 66 22<br />
SUBSCRIPTIONS:<br />
UK £35/year, £60/two years,<br />
£80/three years;<br />
Europe:<br />
£48/year, £85/two years £127/three years;<br />
ROW:<br />
£62/year, £115/two years, £168/three years;<br />
Subscribers get SPECIAL OFFERS — see subscriptions<br />
advertisement; Single copies of<br />
Network Computing can be bought for £8;<br />
(including postage & packing).<br />
© 2018 Barrow & Thompkins<br />
Connexion Ltd.<br />
All rights reserved.<br />
No part of the magazine may be<br />
reproduced without prior consent, in<br />
writing, from the publisher.<br />
So if you have got this far then why not send this to your CEO, to whom I say: if your<br />
organisation is digitally driven (and that should be all of you) then you must think hard<br />
about how you will truly integrate your IT operations with the organisation you seek to<br />
create. Yes, you will have to pay those you recruit the going rate at the very least, but<br />
this alone will be sufficient to satisfy the emerging breed of organisationally integrated<br />
IT and networking professionals. They should probably want your job and may ultimately<br />
be best suited. It's over to you...<br />
Ray Smyth - Editor, Network Computing.<br />
Ray.Smyth@BTC.CO.UK | https://twitter.com/ItsRay?<br />
GET FUTURE COPIES FREE<br />
BY REGISTERING ONLINE AT<br />
WWW.NETWORKCOMPUTING.CO.UK/REGISTER<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 3
CONTENTS<br />
CONTENTS<br />
M A R C H / A P R I L 2 0 1 8<br />
AI AND YOUR NETWORK.....10<br />
We continue our artificial intelligence focus this<br />
issue with insights on how to begin your AI<br />
journey and the computing power and<br />
capacity required to do so. We also look at<br />
how AI can augment network security, and<br />
consider the next decade of AI development<br />
EDITOR’S COMMENT......................3<br />
The best network possible<br />
COMPANY NEWS............................6<br />
Market Dynamics: making sense of the market<br />
NETWORK NEWS............................7<br />
Moves, adds and changes<br />
VERSION X......................................8<br />
The latest networking news<br />
ARTICLES<br />
THE AI SANITY CHECK..................10<br />
By Professor Peter Cochrane at the University<br />
of Suffolk<br />
THE REINFORCING BENEFITS OF AI..11<br />
By Derek Lin at Exabeam<br />
INTELLIGENCE THAT IS ARTIFICIAL..12<br />
By Ken Gilmour at invinsec<br />
ENTERPRISE ARCHITECTURE...20<br />
Is improvement a bigger goal than<br />
alignment in the enterprise? Terry Blevins at<br />
The Open Group and owner of Enterprise<br />
Wise LLC considers the enterprise<br />
architecture challenge<br />
WHEN STORAGE<br />
BECOMES DATA..................26<br />
Do we need to consider storage media or<br />
should we consider data holistically? Mark<br />
Peters and Scott Sinclair at the Enterprise<br />
Strategy Group share their views<br />
IoT SECURITY THAT WORKS...22<br />
IoT devices extend the attack surface of<br />
networks, but what can be done to combat<br />
this, and how should the risk be<br />
understood? Professor William Webb at<br />
Weightless SIG explains<br />
NETWORK COMPUTING<br />
AWARDS 2018.....................28<br />
The Radisson Blu Edwardian in London was<br />
the venue for this year's Network Computing<br />
Awards. Discover more about the 2018<br />
winners in our special round-up feature<br />
THE AI POWER STRUGGLE.............13<br />
By David Hogan at NVIDIA<br />
PACKET MINING: THE GIFT THAT<br />
KEEPS ON GIVING.......................17<br />
By Cary Wright at Endace<br />
TRUST THAT KNOWS<br />
NO BOUNDS................................18<br />
By Barry Scott at Centrify<br />
NETWORKED AUDIO....................19<br />
By John Ellis at Shure<br />
CONTAINING EXPECTATIONS.......21<br />
By Marco Ceppi at Canonical<br />
SMART CONNECTIVITY<br />
BY DESIGN...................................25<br />
By Oli Barrington at R&M<br />
TRANSPARENT I.T..........................27<br />
By James Cockroft at Coeus Consulting<br />
SHOW PREVIEWS<br />
IP EXPO MANCHESTER.................15<br />
25th-26th April at Manchester Central<br />
UC EXPO LONDON....................16<br />
16th-17th May at ExCel London<br />
PRODUCT REVIEWS<br />
ALTARO VM BACKUP - UNLIMITED<br />
PLUS EDITION...............................14<br />
NETSCOUT AIRCHECK G2...........23<br />
4 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
The first dedicated<br />
Recruitment EXPO<br />
for cyber security<br />
professionals<br />
Thursday 5th April 2018<br />
UWE Conference Centre, Bristol<br />
www.CyberSecurityExpo.co.uk<br />
The Bristol Expo<br />
is FREE to attend<br />
Come and meet the<br />
companies hiring within<br />
Cyber Security.<br />
Find out about<br />
the latest hot jobs<br />
100s of job vacancies<br />
available on the day.<br />
Free entry into<br />
the Security<br />
Cleared EXPO<br />
Industry Partners:
COMPANYNEWS<br />
MARKET DYNAMICS: MAKING SENSE OF THE MARKET<br />
IN A REGULAR LOOK AT RESULTS AND KEY BUSINESS ANNOUNCEMENTS FOR SUPPLIERS INTO THE<br />
NETWORKING AND IT MARKET, NETWORK COMPUTING SUMMARISES THE EDITORS SELECTIONS<br />
It's not just technology that has to<br />
evolve and change: organisations too<br />
must make sure they remain relevant<br />
and in tune with their market. Having<br />
launched the Riverbed Digital<br />
Performance Platform, Riverbed<br />
Technology has also unveiled a new<br />
brand identity, which they say is to<br />
accelerate their strategy to deliver<br />
industry-leading solutions to maximise<br />
digital performance and fuel new growth<br />
opportunities in a $30 billion plus market.<br />
Subbu Iyer, SVP and Chief Marketing<br />
Officer at Riverbed explains, "Digital<br />
business is now mainstream and digital<br />
performance defines business success.<br />
Riverbed has also evolved significantly in<br />
the last few years, with entirely new<br />
offerings that have enabled us to deliver a<br />
modern IT architecture for today's digital<br />
enterprise. The result of these efforts is the<br />
new Riverbed Digital Performance<br />
Platform, which helps maximise<br />
performance across every aspect of a<br />
customer's business, allowing<br />
organisations to fundamentally rethink."<br />
According to IDC, at least 50 per cent of<br />
global GDP will be digitised by 2021,<br />
with growth driven by digitally-enhanced<br />
offerings, operations and relationships.<br />
They expect digital transformation<br />
spending to reach $2.1 trillion in 2021.<br />
Cybersecurity company Webroot has<br />
announced double-digit year-on-year<br />
annual recurring revenue growth for the<br />
second quarter of fiscal 2018. This marks<br />
the sixteenth consecutive quarter of<br />
double-digit, year-on-year revenue<br />
growth. Their business segment grew by<br />
31 per cent, more than 5 times the 6 per<br />
cent growth analyst firm Radicati tracks as<br />
the annual growth rate for business<br />
endpoint security solutions worldwide.<br />
In the consumer segment, Webroot grew<br />
by 4 per cent year-on-year, which<br />
according to Webroot's calculations is 2.6<br />
times the pace of worldwide security<br />
spending in the consumer security<br />
software segment.<br />
Mike Potts, CEO of Webroot said, "[This]<br />
highlights the demand for our solutions as<br />
businesses and consumers face an<br />
increasingly complex landscape of<br />
cybersecurity threats. Our momentum<br />
further validates that Webroot has the<br />
most sophisticated threat intelligence<br />
engine in the industry, integrated with<br />
leading technology partners."<br />
As part of their ongoing strategy to<br />
expand across Canada, eStruxture Data<br />
Centers has acquired Kolotek from Gaz<br />
Métro Plus. This will allow both eStruxture's<br />
and Kolotek's existing customers to take<br />
advantage of multiple physical locations in<br />
the greater Montreal region, improving<br />
multi-site and disaster recovery options<br />
while adding to eStruxture's collective pool<br />
of network providers.<br />
The latest Tech Barometer from Moore<br />
Stephens, the accounting and advisory<br />
firm, has revealed that the average<br />
enterprise value of technology companies<br />
on the Alternative Investment Market<br />
(AIM) has reached £111m. This is a 24.9<br />
per cent increase from 30 June 2017 and<br />
a 50 per cent increase for the full year.<br />
The continued growth in value of these<br />
stocks has resulted in a resurgence of tech<br />
IPOs with seven in the second half of<br />
2017, raising £114m in total. This is a<br />
stark increase to just the one to take place<br />
in the previous half-year.<br />
Dougie Hunter, Director at Moore<br />
Stephens said, "Six months ago we<br />
predicted an increase in IPO activity and<br />
this has certainly been the case. In total,<br />
more than £1.2bn was raised by<br />
technology companies on AIM throughout<br />
2017 - it really is a booming market."<br />
UK headquartered Software Services<br />
Company Clearvision has reported<br />
another year of record growth. Turnover<br />
rose to more than £22m at the end of<br />
2017, from £17.3m, representing a 27<br />
per cent year-on-year increase. Founder<br />
and CEO Gerry Tombs attributes the<br />
phenomenal growth to the continued trend<br />
for digital transformation across all<br />
business types and size, as well as their<br />
innovations and expansion into new areas,<br />
in particular its capability to take teams<br />
and technology to the cloud. The<br />
independently owned business operates<br />
across five locations, with headquarters in<br />
Southampton and employs 90 people. NC<br />
Disclaimer - all information published in this article is based upon fuller submissions provided under general release. Any interested party is urged to verify<br />
any information printed here, prior to using it in any way. Neither Network Computing nor it publishers accepts any responsibility for the accuracy of the<br />
information contained in this article.<br />
6 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
NETWORKNEWS<br />
NETWORK NEWS - MOVES, ADDS AND CHANGES<br />
A REGULAR LOOK AT THE STORIES INVOLVING PEOPLE, COMPANIES AND SOLUTIONS<br />
The threat posed by networked IoT<br />
devices is significant, especially at<br />
this early developmental stage.<br />
Gartner, using survey data from recently<br />
acquired CEB, says that nearly 20 per<br />
cent of organisations observed at least<br />
one IoT-based attack in the past three<br />
years. Much will have to change if this<br />
attack surface is to be defended. To protect<br />
against these threats Gartner forecasts<br />
that worldwide spending on IoT<br />
security will reach $1.5 billion in 2018,<br />
a 28 per cent increase from 2017.<br />
Commenting, Ruggero Contu,<br />
Research Director at Gartner explains<br />
that "Organisations often don't have<br />
control over the source and nature of<br />
the software and hardware being<br />
utilised by smart connected devices. We<br />
expect to see demand for tools and<br />
services aimed at improving discovery<br />
and asset management, software and<br />
hardware security assessment, and penetration<br />
testing. In addition, organisations<br />
will look to increase their understanding<br />
of the implications of externalising<br />
network connectivity."<br />
With the number of IoT devices set to<br />
quadruple by 2024, has anyone considered<br />
the impact that these devices will<br />
have on the network operators? The<br />
huge number of devices and subscribers<br />
accessing the network will have consequences<br />
for operators, says Robin Kent,<br />
Director of European Operations at<br />
Adax. He explains that operators will<br />
need to prioritise traffic, asking "Can<br />
you imagine if the smart grid were to<br />
stop working to prioritise advertising?"<br />
As if to underline the future risk, Robin<br />
explains that, "If you think back 20+<br />
years, this can be likened to the advent<br />
of SMS, whose volume of messages<br />
caused problems for the voice network.<br />
The solution, to offload SMS messages<br />
and reroute them to give the priority to<br />
voice, highlighted a problem that wasn't<br />
anticipated."<br />
A 'wait and see' policy may have its<br />
merits, but not when it comes to digital<br />
transformation - and this is especially<br />
true in the retail sector. Mark Baker,<br />
Field Product Manager at Canonical<br />
says that, "In the digital age, technology<br />
is the differentiator, and ignoring the<br />
importance of innovation is akin to<br />
accepting failure. Those businesses<br />
which do so won't be around in five<br />
years' time."<br />
Continually evolving retail will be<br />
essential in order to compete in a world<br />
where traditional web shop solutions,<br />
which rely on templates, will no longer<br />
offer enough flexibility to consumers<br />
used to shopping with multiple devices.<br />
"The older systems are also difficult or<br />
impossible to adapt for the omni channel<br />
sales and logistics - these are musthaves<br />
for long term sales success and<br />
customer loyalty," says Baker, who concludes,<br />
"In the digital age, technology is<br />
the differentiator and ignoring the<br />
importance of innovation is akin to<br />
accepting failure."<br />
When faced with pressure on all sides,<br />
it is easy for network and IT staff to<br />
become unfamiliar with their network<br />
estate and in turn the nature of the<br />
security breaches taking place, including<br />
acknowledgment that a security<br />
breach could quite feasibly go unnoticed.<br />
This is reinforced from a recent<br />
survey by Balabit: The Unknown<br />
Network Survey.<br />
From the survey, 83 per cent of businesses<br />
agreed that technology can be<br />
effective in preventing breaches, but 73<br />
per cent believed that technology struggles<br />
to keep up with security threats.<br />
Csaba Krasznay, Security Evangelist at<br />
Balabit says, "Security is no longer<br />
about simply keeping the bad guys<br />
out... What's really alarming is that the<br />
majority of businesses know very little<br />
about the nature of the security breaches<br />
that are happening to them. Many<br />
even admit that a security breach could<br />
quite feasibly go unnoticed. That's how<br />
loose a grip we've got on them, or how<br />
little we really understand them. We<br />
know about breaches, sure - but we<br />
really don't know enough." NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 7
PRODUCTNEWS<br />
VERSION X<br />
VERSION X<br />
VERSION X<br />
VERSION X<br />
VER<br />
WITH PRODUCT ANNOUNCEMENTS RANGING FROM THE TRIVIAL TO THE BIZARRE, THE EDITOR<br />
DISTILS THE ESSENCE OF THOSE THAT ARE OF INTEREST TO THE NETWORKING COMMUNITY<br />
Full management visibility of the IT<br />
estate is progressively getting harder,<br />
and the benefits on offer from the use<br />
of virtual infrastructure increase this challenge.<br />
It is with this in mind that<br />
SolarWinds has added new functionality<br />
with a pair of product updates that offer<br />
broader and deeper performance monitoring<br />
capabilities across physical and virtual<br />
infrastructures, particularly in hybrid environments.<br />
The newest version of<br />
SolarWinds Storage Resource Monitor<br />
extends support to a wider range of leading<br />
all-flash arrays, while the latest update to<br />
Server & Application Monitor permits deeper<br />
visibility into interactions between a set<br />
of servers running business applications.<br />
Christoph Pfister, Executive Vice President<br />
of Products at SolarWinds said, "Finding<br />
clarity through the haze of complexity is<br />
vital to successfully keep today's heterogeneous<br />
and distributed IT environments running<br />
smoothly. With support for more leading-edge<br />
storage vendor solutions and<br />
deeper visibility into the connection<br />
between critical infrastructure resources, our<br />
system management updates give IT professionals<br />
more powerful tools to overcome<br />
complexity and optimise performance."<br />
Continuing the theme of growing complexity,<br />
fast effective testing of network<br />
operation is essential to keeping users<br />
working, and it seems there is a trend<br />
among tester providers to do this. The latest,<br />
from IDEAL software, is based on some<br />
free software updates for the SignalTEK NT<br />
network transmission tester, SignalTEK CT<br />
cable transmission tester and the NaviTEK<br />
NT Plus and Pro network trouble shooters.<br />
For significant enhancements, such as<br />
improved wire map and port discovery<br />
information, users can download the free<br />
updates from their website.<br />
There is a lot said about security and as<br />
each breach or compromise is disclosed,<br />
the task seems to get increasingly tougher.<br />
In the midst of this uncertainty there is however<br />
some comfort and hope offered in the<br />
form of encryption, which continues to be a<br />
significant tool for those wanting to protect<br />
their data. Interconnection and data centre<br />
company Equinix has launched its<br />
SmartKey. This global key management<br />
and encryption Software as a Service aims<br />
to simplify data protection across any cloud<br />
or destination. The service leverages their<br />
globally interconnected platform of more<br />
than 190 international Business Exchange<br />
data centres in 48 markets, to securely host<br />
encryption keys separate from, but in close<br />
proximity to, the data located across networks<br />
and hybrid multi-cloud environments.<br />
Commenting, Christina Richmond,<br />
Program Vice President, Worldwide Security<br />
Services, at IDC said, "Digital transformation<br />
efforts by enterprises and service<br />
providers are moving more data and systems<br />
to the cloud, pushing an ever-increasing<br />
amount of sensitive enterprise and customer<br />
data to be stored in multi-tenant,<br />
shared computing and storage environments.<br />
This trend is being driven by data<br />
sovereignty requirements like GDPR, creating<br />
demand for secure data localisation<br />
solutions like key management-as-a-service<br />
offerings, including Equinix SmartKey."<br />
Innovations such as 5g and IoT are<br />
responsible for increasing the complexity of<br />
the networks that they rely on to function.<br />
In response to this, Juniper Networks has<br />
been sharing its vision for simplifying service<br />
delivery in complex metro networks.<br />
Metro Fabric is designed to provide an<br />
adaptive, agile and secure network infrastructure<br />
for simplified service creation and<br />
delivery in the metro. The variety of services<br />
and the number of connected devices supported<br />
across metro networks - the layer of<br />
a service provider's infrastructure most<br />
commonly associated with connecting subscribers<br />
to the internet - has recently<br />
expanded exponentially.<br />
Ethernet business services, popular applications<br />
like Netflix and Skype, IaaS offerings<br />
like Amazon Web Services and a<br />
throng of IoT devices have proliferated,<br />
and this will only continue with emerging<br />
5G rollouts. The result is a complex web of<br />
legacy products, manual processes and<br />
divergent architectures and protocols that<br />
have hindered true innovation and rendered<br />
it difficult for service providers to<br />
keep up with bandwidth demands and cost<br />
constraints, explains Juniper.<br />
Juniper's Metro Fabric, they claim, comprises<br />
the industry's only disaggregated<br />
programmable photonic layer. Service<br />
providers building metro services for<br />
mobile, business, cable, fibre residential<br />
and direct public cloud use cases can now<br />
8 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
PRODUCTNEWS<br />
SION X<br />
leverage a modern service creation platform<br />
to quickly and efficiently deliver new<br />
revenue-generating services. Juniper says it<br />
is now introducing the initial building<br />
blocks of the refreshed metro: two new<br />
ACX Series Routers, as well as a new PTX<br />
Series Packet Transport Router. The company<br />
also intends to continue executing<br />
against its plan to deliver a Self-Driving<br />
Network across its networking portfolio,<br />
including the new Metro Fabric.<br />
Sally Bament, VP at Juniper Networks said,<br />
"In our commitment to engineer simplicity<br />
into all layers of the network, we are excited<br />
to deliver these new capabilities focused on<br />
transforming how service providers modernise<br />
service delivery in the metro. By combining<br />
adaptive and predictive software with<br />
new and existing network infrastructure<br />
offerings, we are evolving our solutions to<br />
enable service providers to deploy a metro<br />
network capable of faster service creation<br />
and time-to-revenue for a new generation<br />
of services and applications, including<br />
emerging 5G and IoT services."<br />
As if to prove that networking technology<br />
and deployment continues to progress and<br />
evolve, Cisco has announced an extension<br />
to its intent-based networking vision, bringing<br />
greater visibility to what they consider to<br />
be the biggest blind spot for IT: the widearea<br />
network (WAN). Made up of disparate<br />
networks outside of the control of IT, the<br />
WAN connects employees to applications,<br />
no matter where those employees might be.<br />
Its fragmented nature means that IT often<br />
has limited ability to specifically determine<br />
problems and get real-time information.<br />
Now, Cisco is helping by providing the<br />
capability to forecast WAN problems before<br />
they happen, while quickly isolating and fixing<br />
issues when they do occur. The rise of<br />
multi-cloud IT environments has exacerbated<br />
the traditional complexity of the WAN and<br />
magnified its challenges. IDC's 2017<br />
Worldwide SD-WAN Survey discovered that<br />
almost 3 out of 10 organisations considered<br />
network outages to be a top WAN concern,<br />
with the same number stating that they need<br />
better visibility and analytics to manage<br />
application and WAN performance.<br />
Building on their recent push toward<br />
intent-based networking, Cisco says it is<br />
driving this network revolution to the WAN<br />
and introducing innovations to provide IT<br />
with the vital visibility and insight into the<br />
WAN that will help keep businesses up and<br />
running. Cisco SD-WAN vAnalytics provides<br />
visibility, forecasting for applications and<br />
bandwidth planning, what-if scenarios and<br />
actionable recommendations. Cisco Meraki<br />
Insight, meanwhile, helps administrators to<br />
optimise the end-user experience by providing<br />
valuable insight into WAN and SaaS<br />
application performance, significantly<br />
reducing the time it takes to isolate and<br />
resolve issues.<br />
Scott Harrell, Senior VP and General<br />
Manager, Enterprise Networking at Cisco<br />
explains, "We have set an ambitious goal<br />
for ourselves of transforming the entire network,<br />
from campus to branch, data centre<br />
to edge. The WAN is a vital part of the network<br />
and is one of the toughest to manage.<br />
As we bring insight into the WAN with<br />
these new innovations, we get closer to<br />
delivering end-to-end intent-based networking<br />
to help our customers eliminate downtime<br />
and save money."<br />
Vikram Makhija, General Manager,<br />
Cloud Business Unit, at Cloudera has been<br />
speaking about what he describes as the<br />
industry's first machine learning and analytics<br />
Platform-as-a-Service built with a<br />
Shared Data Experience (SDX). "Cloudera<br />
Altus with SDX enables businesses to build<br />
and manage multi-function analytics use<br />
cases in the cloud, integrating data engineering,<br />
IoT, customer and operations analytics,<br />
with machine learning," said Makhija.<br />
"We offer a proven solution for businesses<br />
to capitalise on the value of their data,<br />
avoiding the analytics cloud sprawl problem<br />
through the simplicity and scale of our<br />
modern cloud platform for machine learning<br />
and analytics."<br />
Commenting on the Cloudera news, IDC<br />
says that "In 2017 and beyond, IT buyers,<br />
which include the various LOBs considering<br />
investing in big data and analytics and<br />
cognitive computing, would have to consider<br />
more than just a single use case within<br />
their respective business units. Big data<br />
analytics (BDA) has been well established<br />
on the ROIs and relative ease at which<br />
each individual business unit is able to<br />
adopt a BDA solution and rapidly apply it<br />
within their environment. The common<br />
challenge faced is when attempting to<br />
scale or replicate success achieved to more<br />
LOBs or function groups." NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 9
FEATUREAI<br />
THE AI SANITY CHECK<br />
ALL THE BALLYHOO IN THE MEDIA ABOUT<br />
ARTIFICIAL INTELLIGENCE HAS BEEN<br />
FOCUSED ON THE CRUDEST FORMS OF THE<br />
TECHNOLOGY. PETER COCHRANE,<br />
PROFESSOR OF SENTIENT SYSTEMS AT THE<br />
UNIVERSITY OF SUFFOLK, EXPLAINS WHAT<br />
HAPPENS AS WE STEP ONTO THE SECOND<br />
RUN OF THE AI LADDER<br />
All of the commercial AI available<br />
today is the simplest and crudest<br />
manifestation imaginable. At a<br />
fundamental level it does one thing and<br />
only one thing well; pattern recognition in<br />
the form of matching or classification.<br />
Intelligent search, speech, music and face<br />
recognition, cancer cell detection and<br />
identification, abnormal crowd and<br />
business or market behaviours are typical<br />
of the abilities found in today's<br />
applications space.<br />
The numerous techniques used on this<br />
first rung of the AI ladder embrace Neural<br />
Networks; Deep Learning; Heuristics;<br />
Vector Machines; Markov Decisions, et al.<br />
And all are basically advanced<br />
mathematical/probabilistic modelling and<br />
decision making techniques. But despite<br />
their essentially simple basis, they have,<br />
and continue to yield remarkable and<br />
powerful results. It might just be that we<br />
are seeing an 80 per cent of reward for a<br />
mere 20 per cent of effort and<br />
sophistication.<br />
An often posed question asks why it has<br />
taken so very long for AI to deliver on the<br />
promises of 50 years ago. The short<br />
answer is hardware technology density and<br />
complexity. Only in the last 5 years have<br />
we enjoyed computing hardware of<br />
sufficient transistor destiny and processing<br />
power to realise powerful AI at an<br />
affordable price. Exemplified by<br />
comparing the 1985 Cray 2 with the 2012<br />
iPhone 5, we all now have a much<br />
cheaper supercomputer in our pocket!<br />
The list of AI contributions to our<br />
civilisation is already formidable and in<br />
some niche areas AI now far exceeds<br />
human abilities. These include medical<br />
diagnosis; general knowledge; short term<br />
stock trading; wargaming; business<br />
modelling; every computer, board and<br />
card game; document reading and<br />
analysis; cellular and DNA analysis;<br />
autonomous robotics, and so on.<br />
So, what happens next? Very recently,<br />
one particular application lifted a foot<br />
onto the second rung of the AI ladder.<br />
After trying all of the known gaming,<br />
analytic, and predictive approaches to<br />
GO, the AlphaGO team remained<br />
confounded by failure. GO is the most<br />
complex game invented by man and<br />
presents more decision options than the<br />
number of atoms in the universe. And<br />
therein lies the problem - none of the<br />
standard techniques described above can<br />
deal with such complexity, and teaching a<br />
machine the rules and how to play like a<br />
human just results in mediocre humanlike<br />
results.<br />
How did they crack this problem?<br />
AlphaGo was programmed to watch and<br />
learn. After watching game after (human)<br />
game to learn the rules, it then played<br />
over 30 million games against itself.<br />
Having thus become a skilled player, with<br />
more game playing experience than all the<br />
GO Grandmasters that ever lived, it was<br />
ready to do battle against our best<br />
champion. No surprise; it won every game<br />
and AlphaGo is now the world champion.<br />
The next decade is going to see a raft of<br />
new AI entering the arena on this second<br />
rung. They will be will be big<br />
gamechangers in chip, circuit and network<br />
design, autonomous vehicles, surgical<br />
robots, robotics for the workspace and<br />
home, autonomous weapons of war,<br />
intelligent search and find, human intellect<br />
amplification - again, the list is endless.<br />
Just how and why this should be so is<br />
revealed by the nature of Intelligence as<br />
defined here: I ~ log2[1 + AS ( 1 + PM<br />
)], where I = Intelligence, A = Actuator<br />
(output), S= Sensors (input), P =<br />
Processing Power and M = Memory.<br />
Whilst it is possible to have intelligence<br />
without memory or processing power, it is<br />
impossible sans sensors and actuators.<br />
Connection and networking is essential for<br />
true cognition and self-awareness and we<br />
are affording AI this facility through our<br />
networked mobile devices, sensor nets and<br />
IoT. The ultimate outcome will be human<br />
empowerment and intellect amplification,<br />
plus of course, a few surprises in the form<br />
of emergent behaviours… NC<br />
10 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
FEATUREAI<br />
THE REINFORCING BENEFITS OF AI<br />
AI IS NOT A REPLACEMENT FOR TRADITIONAL<br />
NETWORK SECURITY BUT HAS THE POTENTIAL<br />
TO BOLSTER IT. DEREK LIN, CHIEF DATA<br />
SCIENTIST AT EXABEAM EXPLAINS HOW AI-<br />
BASED BEHAVIOUR MONITORING CAN<br />
AUGMENT NETWORK SECURITY USING A MORE<br />
DYNAMIC APPROACH TO THREAT DETECTION<br />
Whichever way you look at it, the<br />
task of keeping networks safe from<br />
security breaches is becoming<br />
harder, perhaps even impossible. The<br />
constantly growing threat landscape,<br />
combined with tighter headcounts and larger<br />
volumes of organisational data makes for a<br />
worrying outlook. Simply put, there aren't<br />
enough people in most IT security teams to<br />
cope with the number of potential threats.<br />
For this reason, many forward-thinking<br />
organisations are turning to technology in<br />
order to find effective solutions to some of<br />
today's most pressing network security issues.<br />
The growing popularity of AI-based<br />
behaviour monitoring is a prime example.<br />
WHAT IS AI-BASED BEHAVIOUR<br />
MONITORING?<br />
AI-based behaviour monitoring harnesses<br />
the power of data analytics and machine<br />
learning to mitigate one of the biggest<br />
network risk factors: the user. Machine<br />
learning algorithms analyse the behaviour<br />
trends of network users over time and<br />
create baselines on a per-user basis.<br />
Benchmarking routine (normal) behaviour<br />
in this way provides the context needed to<br />
establish abnormal user activity which can<br />
be quickly identified and flagged. By<br />
contrast, conventional network monitoring<br />
tools lack this context, increasing the<br />
chances of suspicious behaviour being<br />
missed, or conversely, normal behaviour<br />
being deemed suspicious and creating<br />
false positives.<br />
For example, an HR employee accessing<br />
financial information using the network may<br />
initially appear to be abnormal, but if they<br />
have a history of doing so, as the result of<br />
working with the accounts team on employee<br />
payroll, then this activity could in fact be<br />
normal. Machine learning engines can track<br />
and correlate this in line with established<br />
benchmarks, meaning that a false positive<br />
will not be thrown up each time it occurs.<br />
The concept of benchmarking user<br />
behaviour in this way isn't new, but to do it<br />
manually takes a significant amount of time<br />
and resources, both of which are usually in<br />
short supply for IT security teams. AI-based<br />
systems do it much more efficiently, meaning<br />
security personnel are free to focus their<br />
attention elsewhere. Furthermore, AI-based<br />
systems can adapt to new patterns of user<br />
behaviour and refine acceptable parameters<br />
over time, meaning that real threats are<br />
quickly spotted and false alarms minimised.<br />
AI IS REINFORCEMENT, NOT<br />
REPLACEMENT<br />
While the benefits of AI-based behaviour<br />
monitoring are numerous, it isn't a magical<br />
fit-and-forget solution to resolve user-centric<br />
network security issues. Misleading<br />
marketing from vendors, combined with poor<br />
audience understanding has led to some<br />
organisations getting carried away, thinking<br />
they can cut down their IT teams and entrust<br />
their network security to the new AI<br />
guardians instead. This is folly.<br />
While AI-based solutions can greatly<br />
improve the understanding of user behaviour<br />
across the network, careful management<br />
from skilled security experts remains critical.<br />
Rather than being viewed as a replacement,<br />
AI should instead be seen as a powerful<br />
reinforcement for existing security practices<br />
and personnel, adding intelligence and<br />
helping to reduce wasted time.<br />
An effective AI-based behaviour<br />
monitoring system can consume significant<br />
amounts of data, compile user activities into<br />
timelines, and analyse them against<br />
benchmarked behaviour in a matter of<br />
minutes. This same task would take an<br />
experienced incident response analyst days,<br />
weeks or even months. Freed from this<br />
manual task, the analyst can then spend<br />
more time reviewing the user sessions<br />
created for suspicious behaviour deviations,<br />
or verifying the alerts that the AI system has<br />
triggered, creating a win-win.<br />
The challenges faced by network security<br />
teams are both numerous and difficult.<br />
Adopting technology such as AI-based<br />
behavioural monitoring can significantly<br />
reduce the workload, removing many of the<br />
more time consuming manual tasks that<br />
effective network security requires. However,<br />
it shouldn't be seen as a magical<br />
replacement for skilful IT security personnel,<br />
rather a powerful reinforcement that can<br />
greatly improve any team's operational<br />
effectiveness. NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 11
FEATUREAI<br />
INTELLIGENCE THAT IS<br />
ARTIFICIAL<br />
AI-BASED CYBERSECURITY IS<br />
NOT AN 'INSTALL AND LEAVE'<br />
OPTION. KEN GILMOUR, CTO<br />
AT INVINSEC EXPLAINS WHY<br />
Forget everything you've seen in sci-fi<br />
movies or read in sci-fi books about<br />
Artificial Intelligence. Forget about<br />
all the amazing and scary things AI<br />
promises to do and the jobs it will replace.<br />
AI of any kind has some major and<br />
fundamental flaws.<br />
Firstly it has no common sense. As a<br />
human, you might bake a cake so that<br />
other people can eat it. Humans<br />
understand this as a part of being human,<br />
but AI is unable to rationalise the concept.<br />
Secondly, AI has no understanding of what<br />
it sees. AI doesn't yet know how to solve<br />
crimes. It may recognise a pattern when a<br />
crime is taking place, but is currently<br />
unable to solve a crime that has already<br />
happened. If you are considering an AIbased<br />
cybersecurity deployment for your<br />
organisation, remember these points.<br />
HOW CAN AI LEARN IF THERE IS<br />
NOTHING TO TEACH IT?<br />
Let's consider a simple pattern recognition<br />
example. Say that you sell gadgets online<br />
and you've just installed your new supercool<br />
AI cybersecurity system. Your new<br />
investment uses its brain to automatically<br />
block attacks, meaning that you can relax.<br />
You will probably want your new AI<br />
system to learn about your customers'<br />
browsing habits, and so you decide to<br />
install it months before your biggest<br />
annual event, Black Friday. It's doing<br />
great and learning what's normal and<br />
what isn't. It's looking at simple patterns,<br />
such as multiple failed logins and,<br />
realising that these are brute force<br />
attacks, blocks them accordingly.<br />
GOING LIVE<br />
After several months you are more<br />
confident that you can detect multiple<br />
variations of attacks that previously you<br />
had no signatures for. Confidence is high<br />
that your security AI solution understands<br />
your unique environment, and you're<br />
hopeful that when Black Friday comes,<br />
nothing will take you down.<br />
On the day before, everything is<br />
prepared. At exactly midnight, you're<br />
going to launch some amazing deals that<br />
will create significant revenue for you. At<br />
23:50 you see some attacks. The system<br />
detects them and successfully thwarts the<br />
attackers. At 23:59:59, all of your<br />
customers start refreshing their web page<br />
so they can reload their choices. They<br />
don't need to do that because your<br />
website will automatically update them.<br />
Maybe you expected it, maybe you didn't.<br />
Has your AI seen this before and does it<br />
know what to do?<br />
Your AI thinks it's detecting a DDoS<br />
attack because it sees thousands of IP<br />
addresses competing for the same<br />
resource at the same time and a<br />
significant bandwidth increase. Your AI<br />
security solution blocks prospective<br />
customers and you lose several minutes<br />
trying to switch it off so that customers can<br />
connect and transact. You lose some<br />
customers who gave up after a few<br />
minutes; they're not patient, and they look<br />
for the deals elsewhere.<br />
With no choice, you disable your sole<br />
security mechanism because it's blocking<br />
your customers. The attack you saw at<br />
23:50 was a real attack and now you<br />
can't detect it. The attacker gets in,<br />
hijacks accounts and steals money from<br />
your customers.<br />
WHAT JUST HAPPENED?<br />
This is not an unrealistic scenario. It<br />
becomes obvious that you need humans in<br />
a Security Operations Centre (SOC)<br />
watching the patterns that the AI is<br />
recognising to make common sense of the<br />
problems and understand the scenarios.<br />
You also need other patterns written by<br />
humans to help the AI recognise variations<br />
of those patterns so that you can optimise<br />
the work of the humans and make them<br />
more cost-effective.<br />
AI is not something which can be trusted<br />
on its own. The solution to your security is<br />
defence in depth. AI helps, but do remember<br />
that its intelligence is artificial. NC<br />
12 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
FEATUREAI<br />
THE AI POWER CHALLENGE<br />
COMPUTING POWER OF A SUITABLE TYPE AND CAPACITY IS AN<br />
ESSENTIAL FIRST STEP IN STARTING THE AI JOURNEY. DAVID<br />
HOGAN, SENIOR DIRECTOR ENTERPRISE AT NVIDIA EXPLAINS<br />
Fuelled by GPU (Graphics Processing<br />
Unit) deep learning, we're in the early<br />
stages of a new computing era: AI<br />
computing. We know that early investment<br />
in new technology can provide first mover<br />
advantage, but it's also natural to<br />
approach it with scepticism and caution.<br />
Additionally, figuring out how to get<br />
started with AI can be daunting. So what's<br />
the best way to get your head around AI<br />
and understand what it can do for your<br />
organisation? Consider the following as<br />
you start your journey.<br />
EMBRACE THE NEW AND LEARN<br />
FROM OTHERS<br />
AI was once the stuff of science fiction, but<br />
now autonomous racing cars take to the<br />
track, artificially intelligent chatbots answer<br />
customer queries, and deep learning helps<br />
to find new ways to battle diseases like<br />
cancer. Industries like automotive and<br />
healthcare have been quick to adopt AI<br />
and are already reaping the benefits,<br />
creating new products, services and<br />
solutions. Accordingly, others can learn<br />
from those that have gone before in other<br />
verticals and seize the opportunity to be a<br />
pioneer in their own.<br />
GOOD QUALITY DATA - AND<br />
LOTS OF IT<br />
The success of deep learning systems is<br />
measured by the level of accuracy they<br />
achieve. This requires a huge amount of<br />
training data, as well as sophisticated<br />
neural networks which can learn from<br />
these vast datasets without forgetting<br />
past experience.<br />
Cutting corners on data collection is<br />
unwise. If you want to get the best results,<br />
you need to ensure that your datasets<br />
incorporate high-quality, labelled data.<br />
Implementing a clear workflow is crucial<br />
for enterprises wanting to capture the type<br />
and volume of data that they will need.<br />
HIRE AND RETAIN<br />
The demand for skilled staff far outweighs<br />
supply; it's becoming an increasingly<br />
competitive job market for deep learning<br />
developers. But building the right team is<br />
critical to a successful long-term AI<br />
strategy. Investing in a balanced,<br />
experienced and talented team allows a<br />
business to stand out from the crowd, and<br />
attract still more talent.<br />
To retain talent, you'll also need to<br />
provide them with the right space to grow<br />
and develop, as well as cutting-edge<br />
computing tools to do their work. Your<br />
research team will have to execute<br />
thousands of training jobs as they build<br />
your systems, so ensure they have the<br />
compute power required.<br />
TESTING: CLOUD-BASED DEEP<br />
LEARNING DEVELOPMENT<br />
PLATFORMS<br />
The prospect of investing in and<br />
maintaining deep learning hardware and<br />
software can seem challenging. In the<br />
last six months alone one framework,<br />
TensorFlow, has gone through six<br />
different versions.<br />
You can make life easier by taking<br />
advantage of cloud-based tools that<br />
provide a managed deep learning<br />
environment that scales to your needs.<br />
Amazon Web Services, Microsoft Azure<br />
and Google Cloud all offer cloud-based<br />
GPU instances for deep learning, ideal for<br />
testing and proof of concept projects. The<br />
NVIDIA GPU Cloud (NGC) also simplifies<br />
software tools for GPU deep learning,<br />
providing ready-optimised containers,<br />
frameworks and libraries that are<br />
automatically updated.<br />
SUCCESS REQUIRES FLEXIBILITY<br />
AND STABILITY<br />
Creating a stable platform for developers<br />
in the midst of an extremely dynamic deep<br />
learning ecosystem is crucial. Developing<br />
an end-to-end production pipeline can<br />
help ensure you nurture innovation, while<br />
not losing sight of the aims of the project.<br />
Establishing a baseline performance<br />
model and useful metrics can provide<br />
insights into project performance and<br />
allow for easy comparisons between<br />
models. Testing against these metrics<br />
regularly will make it easier to measure<br />
progress and reveal where improvements<br />
can be made.<br />
Remember that AI algorithms rarely live in<br />
isolation. When deployed as products, they<br />
will have to meet a number of nonfunctional<br />
requirements. If your system is<br />
constrained by power consumption,<br />
latency, memory or something else, then<br />
you will need to understand, control and<br />
react to this requirement from day one. NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 13
PRODUCTREVIEW<br />
Altaro VM Backup -<br />
Unlimited Plus<br />
Edition<br />
PRODUCT REVIEW<br />
PRODUCT<br />
REVIEWPRODUCT RE<br />
Data backup has had a chequered past<br />
and has often been an afterthought. It<br />
is now a critical component of IT<br />
operations, digital transformation, security and<br />
compliance, with a definitive role and<br />
lifecycle. This is embraced and enabled by<br />
Altaro VM Backup version 7.6, available in<br />
four versions. Here we review the fully<br />
featured, Unlimited Plus edition.<br />
We downloaded the installer (less than<br />
150MB) ran install, and were quickly<br />
presented with a guided three-step set-up,<br />
which dealt with licensing, specifying a backup<br />
location and our backup targets. Using the<br />
default settings we had a credible<br />
configuration in less than fifteen minutes.<br />
Complexity of storage estate will naturally<br />
increase this, but it's very intuitive to get things<br />
working and advanced options can be<br />
considered using familiarity, understanding<br />
and evolving requirements.<br />
Five backup locations are offered: Physical<br />
Drive, Network Path (LAN), Cloud (Azure),<br />
Altaro Offsite Server and Drive rotation. How<br />
these are used depends on an organisation's<br />
policy and compliance, but each can be<br />
granularly adjusted to suit. The flexibility<br />
offered allows a Disaster Recovery (DR) site to<br />
be established.<br />
Using the sidebar we explored Advanced<br />
Settings. Application Consistent Backup (ACB),<br />
enabled by default, will truncate transaction logs<br />
and ensure the VM is aware a backup has been<br />
taken. A new feature in this version, Continuous<br />
Data Protection (CDP) can backup as frequently<br />
as every five minutes. It's a feature to use with<br />
caution, and ACB cycles will mostly be less<br />
frequent. It's worth understanding the<br />
connections, because if a backup doesn't<br />
complete in five minutes it will immediately start<br />
the next one, effectively reducing frequency.<br />
Backup Health Monitor runs in the<br />
background, except when CDP is enabled. It<br />
ensures that backups are viable and that any<br />
bad blocks are self-healed. Storage capacity is<br />
always an issue with backup, and Altaro<br />
manage this using standard and custom<br />
Backup Policy options. This is complemented<br />
by GFS (Grandfather, Father, Son) Archiving,<br />
also new to 7.6, forming an essential part of<br />
backup operations.<br />
Managing by exception is aided with optional<br />
failure notifications by email and 7.6<br />
Deduplication ensures that data is stored only<br />
once. Change Block Tracking allows fast<br />
backup by reducing scanning and<br />
incrementally backing up. Volume Snapshot<br />
Service (VSS) can be disabled for non-<br />
Microsoft sources. All remote backups are<br />
encrypted by default and cannot be turned off,<br />
as they can for local backups.<br />
Like all Altaro functions Restore is highly<br />
intuitive, and with a target and location<br />
selected it simply gets on with it, while the<br />
Dashboard keeps you briefed. There is an<br />
option to undertake a test restore and even to<br />
restore a complete VM instance: in this case<br />
there is an option to disable the network to<br />
avoid IP conflict. It is possible to restore a<br />
single file, email or complete Virtual Disk.<br />
Verification and Sandbox Restores can be<br />
scheduled and boot from backup is especially<br />
important when facing a Ransomware attack.<br />
If, for example, you were running CDP and<br />
had an idea when a compromise took place,<br />
you could select an appropriate restore point,<br />
boot, and safely run.<br />
Reports provide Dashboard insight to all<br />
operations. The ingenious Get Help feature<br />
provides Telephone, Email and Chat support<br />
and can generate error reports and even<br />
provide remote support.<br />
It's quite possible that some smaller<br />
organisations may not understand what they<br />
should backup, in which case the default steps<br />
will quickly get them to a secure, defendable<br />
backup status. From here, experience and<br />
backup experiments, combined with easy<br />
creation can produce an extremely tailored,<br />
highly effective data backup and disaster<br />
recovery solution.<br />
With Altaro, VM backup and DR is assured<br />
and no longer a worry or a chore. NC<br />
Product: Altaro VM Backup Unlimited Plus<br />
Edition<br />
Supplier: Altaro Software<br />
Telephone: +44 (0) 203 397 6280<br />
Web site: www.altaro.com<br />
Email: info@altaro.com<br />
Price: £650 per host<br />
14 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
SHOWPREVIEW<br />
IP EXPO<br />
MANCHESTER, 25TH<br />
TO 26TH APRIL<br />
IN NEED OF INSPIRATION,<br />
GUIDANCE OR HELP? CONFUSED<br />
BY CLOUD OPTIONS, NEEDING A<br />
CYBER SECURITY UPGRADE OR<br />
WONDERING HOW TO MAKE AI<br />
WORK FOR YOU? IP EXPO IS<br />
BACK IN MANCHESTER TO HELP<br />
IP EXPO, Europe's largest enterprise IT<br />
event series, returns to Manchester Central<br />
on 25th-26th April. The two day event will<br />
bring together experts and visionaries from<br />
across the technology industry to share their<br />
views on the hottest technology issues of the<br />
moment. The event is organised around six<br />
main themes as follows.<br />
CYBERSECURITY MANCHESTER<br />
With GDPR coming into force 29 days after<br />
IP EXPO Manchester and data breaches<br />
happening daily, IP EXPO Manchester has a<br />
significant focus on cybersecurity for 2018.<br />
Across the event, security gurus, white hat<br />
hackers and legal experts will be delivering<br />
cutting edge advice and insight into security<br />
issues. The opening keynote for the event will<br />
be delivered by former GCHQ Director<br />
Robert Hannigan, who will provide a<br />
reminder for everyone on cyber best practise<br />
and the new threats that organisations face.<br />
Bradley Maule-ffinch, EMEA Portfolio<br />
Director for the IP EXPO Event Series<br />
comments that, "In the era of GDPR we<br />
want visitors at IP EXPO Manchester 2018<br />
to walk away confident so that they can<br />
execute the cybersecurity strategy that is<br />
best suited for their business. To do this,<br />
we're bringing together experts from across<br />
industry and academia to share their vision<br />
and knowledge on cybersecurity in the<br />
year ahead."<br />
DATA & ANALYTICS<br />
Data is the fuel of the modern, digitally<br />
transformed organisation. But if you're still<br />
paddling through data lakes rather than deep<br />
diving for insights, IP EXPO Manchester<br />
keynote speaker Dr Hannah Fry, Lecturer in the<br />
Mathematics of Cities at the Centre for<br />
Advanced Spatial Analysis at UCL, will be able<br />
to give you some inspiration. Her opening<br />
keynote on 26th April, The Joy of Data, will<br />
have you think twice about how you apply<br />
analytics to get the most from your data.<br />
CLOUD & IoT<br />
Cloud and IoT have changed how<br />
organisations operate. At IP EXPO Manchester,<br />
speakers and exhibitors will be delving into the<br />
next evolution of cloud, looking at how to<br />
manage multi-cloud environments, how cloud<br />
improves collaboration and cost efficiency, and<br />
how IoT can operate at scale. Highlight<br />
speakers include Nick Martin, Head of<br />
Google Cloud, Retail & CPG at Google and<br />
Ian Massingham, Worldwide Lead, AWS<br />
Technical & Developer Evangelism at Amazon<br />
Web Services.<br />
ARTIFICIAL INTELLIGENCE<br />
AI is here to stay, but rather than the future<br />
depicted in films like Blade Runner, Deep<br />
Learning, Data Science and AI enterprise<br />
applications are headlining the AI track at IP<br />
EXPO Manchester. Visitors will be able to get<br />
the AI facts straight from the companies and<br />
people at the cutting edge of current AI<br />
development. Highlight speakers include Lorna<br />
Mitchell, Developer Advocate at IBM Watson<br />
Data Platform and Katie Gibbs, Head of<br />
Consulting and Delivery at Heron.<br />
DEVOPS<br />
If you want to make continuous delivery and<br />
agile architecture a reality in your organisation,<br />
then make sure to check out the DevOps track<br />
at IP EXPO Manchester. Speakers such as<br />
Adrian Daniels, Solutions Architect at CHEF,<br />
and Emily Freeman, Developer Advocate at<br />
Kickbox will be educating attendees on<br />
everything you need to know to help create a<br />
high performing DevOps team which forms a<br />
key part of your organisation.<br />
NETWORKS & INFRASTRUCTURE<br />
Networks and infrastructure is the backbone of<br />
modern IT. At IP EXPO Manchester, exhibitors<br />
and speakers, including George Tunnicliffe,<br />
Head of IT Operations at National Theatre<br />
and Tom Arbuthnot, Unified Comms Architect<br />
at Modality Systems, will dig into the solutions<br />
and strategies for building efficient<br />
infrastructure capable of meeting the growing<br />
demands of future technology trends. NC<br />
For further information and to register for<br />
free for IP EXPO Manchester 2018, please<br />
visit: www.ipexpomanchester.com. Get<br />
involved on Twitter using the<br />
#IPEXPOManchester hashtag.<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 15
SHOWPREVIEW<br />
UC EXPO | EXCEL LONDON | 16TH<br />
TO 17TH MAY 2018<br />
SMARTER COLLABORATIVE WORKING IS NOW<br />
THE NORM AS ORGANISATIONS TAKE<br />
ADVANTAGE OF NEW METHODS,<br />
TECHNOLOGY AND BEST PRACTICE. UC EXPO<br />
DIGS INTO COLLABORATION CONUNDRUMS<br />
FOR ITS 2018 EVENT<br />
Smarter collaboration is the backbone<br />
of modern working, but is the school<br />
curriculum doing enough to provide<br />
students with the collaboration skills they<br />
need? Workplace demand for<br />
collaboration skills is high and<br />
organisational leaders must ensure that<br />
they provide the collaboration tools that<br />
their employees need and expect.<br />
"Workplace habits are changing at an<br />
incredible pace. Generational changes<br />
mean that many employees now expect to<br />
have flexible working practices, cool<br />
benefits and the latest technology as<br />
standard. As a result, the demands of<br />
unified communications and collaboration<br />
technology evolves rapidly too," comments<br />
Bradley Maule-ffinch, EMEA Portfolio<br />
Director for UC EXPO. "We're bringing<br />
together the world's leading influencers<br />
and brands to discuss the next evolution in<br />
smarter collaboration technology."<br />
Over two days, presentations, seminars<br />
and panel debates from industry leaders,<br />
and over 100 exhibitors, will provide<br />
attendees with the opportunity to discuss<br />
the most advanced technical solutions<br />
available. This will equip them to address<br />
their communication and collaboration<br />
challenges and develop a plan for their<br />
future, unified capability.<br />
HIGHLIGHT SESSIONS<br />
Kim Wylie, Head of Customer Change and<br />
Transformation at Google Cloud, will<br />
share her insights for building a culture<br />
where knowledge is a shared resource and<br />
employees act like owners. She will also<br />
discuss the psychology of change, why so<br />
many employees struggle to adopt new<br />
technologies and processes, how leaders<br />
can effectively inspire new ways of working<br />
and the role of teamwork and culture in<br />
bringing collaboration to life.<br />
Dave Michels, Principal Analyst at<br />
TalkingPointz will look at what's driving<br />
the adoption of Workstream<br />
Collaboration, why the shift matters, and<br />
key considerations in selecting a strategy.<br />
He will be covering how messagingcentric<br />
solutions for enterprise<br />
communications are filling a gap that<br />
most enterprises didn't realise they had,<br />
bringing with it a new set of vocabulary,<br />
services and providers.<br />
Dr Nicola Millard, Head of Customer<br />
Insights & Futures at BT Global Services<br />
Innovation Team will explore how we can<br />
override our inner Neanderthal when it<br />
comes to virtual working and effectively<br />
collaborate with people we may never<br />
actually meet. She'll also be looking at<br />
questions such as do we need offices<br />
anymore as more business takes place in<br />
digital space? How do we ever turn off in<br />
a world of constant connection? How do<br />
we create common ground for<br />
collaboration as we bring together a<br />
diverse, disparate and dispersed set of<br />
people? Do digital employees need a<br />
different type of digital leadership?<br />
Michael Affronti, VP of Product at Fuze,<br />
will be sharing his view of future<br />
workplaces and how, when, and where<br />
people like to work; what makes work<br />
effective; the role of automation and AI,<br />
and to what extent we are unlocking<br />
human potential.<br />
PANEL DEBATE<br />
Some industry leaders will also be going<br />
head to head with a series of panel<br />
discussions to debate and challenge the<br />
topics of the moment. The panels are set<br />
to cover a range of topics, including the<br />
role of AI in the future of work, the pros<br />
and cons of collaboration tools,<br />
technology and techniques, what the<br />
workforce of the future will look like and<br />
their requirements. There will also be<br />
general discussion on the year ahead,<br />
revealing what the panellists believe could<br />
be game changing.<br />
UC EXPO will also provide attendees<br />
with access to over 100 exhibitors and the<br />
opportunity to get hands-on with the next<br />
wave of collaboration technology in the<br />
future tech demo zone, including cutting<br />
edge interactive whiteboards and<br />
augmented reality headsets. NC<br />
UC EXPO 2018 takes place 16th to 17th<br />
May 2018 at ExCeL London. Registration<br />
is free at www.ucexpo.co.uk and get<br />
involved on Twitter with #UCEXPO.<br />
16 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION<br />
PACKET MINING: THE GIFT THAT<br />
KEEPS ON GIVING<br />
MAKING ASSUMPTIONS WHEN NETWORK<br />
PROBLEMS OCCUR IS NOT A GOOD RESPONSE.<br />
CARY WRIGHT, VP PRODUCT MANAGEMENT AT<br />
ENDACE EXPLAINS WHY IT PAYS TO KEEP AN<br />
OPEN MIND WHEN TROUBLESHOOTING<br />
As IT professionals know all too well,<br />
not all outages and performance<br />
problems are created equal, and<br />
many just cannot be blamed on the<br />
network or Internet Service Providers.<br />
If the network driving your site isn't<br />
optimised or suffers performance<br />
problems then delays and outages can<br />
happen, which can cause huge losses in<br />
revenue. Shopify's global Black Friday<br />
trading results are a great example: with<br />
revenue take running at $130k a minute,<br />
even a short outage can be devastating.<br />
As businesses progress through their<br />
own unique digital transformation, their<br />
network can become their business. This<br />
is a reality that requires some attention,<br />
and here are a few things to consider.<br />
THE DEEPER CAUSE<br />
The fact is that the problem before you<br />
may not be the network or your ISP. All too<br />
often when performance takes a dive it's<br />
easiest to blame the ISP or the network,<br />
but quite often it's deeper than that. For<br />
example, for several months a remote<br />
branch of a leading Asian bank was<br />
experiencing a bank teller application<br />
issue at random intervals throughout the<br />
day, freezing customer transactions for up<br />
to 15 minutes each time.<br />
A packet capture appliance was<br />
deployed on the link into the data centre<br />
to record exactly what was happening.<br />
When the problem reoccurred, the<br />
Operations team was able to go back<br />
and look at the transactions in detail<br />
using the recorded network history.<br />
The packets were getting delivered<br />
correctly and the network layer was<br />
healthy, but the application was taking up<br />
to 15 minutes to respond. It turned out<br />
that a new version of the bank's teller<br />
application had been rolled out a few<br />
months previously, and it had a bug<br />
between the application and the database<br />
that caused the database to occasionally<br />
lockup and stop responding to queries.<br />
CONGESTED TRAFFIC<br />
Poor quality video conferences are also<br />
often blamed on the network, and quite<br />
often the network is actually the source of<br />
the issue, but often for different reasons<br />
than originally thought. For example, if<br />
someone's running a video conference<br />
and the video quality starts to degrade, it<br />
could be down to processes like a<br />
network backup taking place at the same<br />
time: your network may just be congested.<br />
A lot of backups happen over the WAN<br />
link to the cloud service provider. Your<br />
backup traffic should have low priority<br />
compared to your video traffic. If your<br />
video traffic is not getting preferential<br />
treatment, it may be that something has<br />
been set wrong in your backup<br />
application or your IP network and all<br />
services are getting equal treatment.<br />
STORMY PACKETS<br />
Misconfiguration in the network can also<br />
be an issue. It causes lots of garbage<br />
packets to be generated through the<br />
network and a misconfigured network can<br />
cause packet storms. It could be<br />
something as simple as a routing loop<br />
that's accidentally been set up because<br />
someone put a cable in the wrong port<br />
on a switch, sending out messages<br />
thousands of times per second, rather<br />
than once every 20 seconds.<br />
This example of a packet storm, a<br />
bunch of packets that overwhelm the<br />
network, taking up all available<br />
bandwidth, creates a critical situation.<br />
Once the fault occurs, the only thing<br />
businesses can do is dig into packets to<br />
see what is going on and resolve the<br />
responsible misconfiguration.<br />
It is becoming increasingly common for<br />
organisations to deploy dedicated<br />
network recording solutions to reduce the<br />
discovery time surrounding such network<br />
challenges. Having the ability to inspect<br />
packets enables those responsible to<br />
quickly determine if the problem source is<br />
the network itself, or if the problem is<br />
more deeply seated in an application<br />
issue such as overloading,<br />
misconfiguration or a bug. NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 17
SECURITYUPDATE<br />
TRUST THAT KNOWS<br />
NO BOUNDS<br />
BARRY SCOTT, EMEA CTO AT<br />
CENTRIFY SAYS THAT THE<br />
ONLY WAY TO BALANCE<br />
SECURITY AND AGILITY IN<br />
IAAS ENVIRONMENTS IS THE<br />
DETERMINED USE OF ZERO<br />
TRUST<br />
Infrastructure as a Service (IaaS) platforms<br />
offered by the likes of Amazon Web<br />
Services (AWS) support the innovation and<br />
app-driven business models that many<br />
organisations are migrating towards. But in<br />
their race to embrace digital transformation,<br />
some overlook that security in the cloud is a<br />
shared responsibility - the risks of which are<br />
potentially huge.<br />
The answer is Zero Trust security,<br />
delivered by focusing on identity and<br />
embracing the principle of 'never trust,<br />
always verify'. This allows organisations to<br />
manage their IaaS risk and secure their<br />
systems, data and users.<br />
IAAS AT RISK<br />
Estimates suggest that 89 per cent of<br />
organisations have adopted the public<br />
cloud, running 41 per cent of their<br />
workloads there. Yet it's a complex picture,<br />
with hybrid cloud being the preferred<br />
enterprise strategy as IT infrastructure is<br />
spread between multiple providers.<br />
Increased complexity increases threat<br />
opportunities both inside and outside the<br />
organisation. Trusted and untrusted users will<br />
access corporate resources from their own<br />
devices anywhere, anytime and can no<br />
longer be easily separated. Identity sprawl,<br />
silo-based systems, password-based logins<br />
and a spectacular rise in phishing attacks<br />
underlines the risk for IaaS environments.<br />
The stakes couldn't be higher yet the<br />
outcome of poor Identity and Access<br />
management (IAM) is ever present. For<br />
example, the infamous Uber breach when<br />
hackers obtained their AWS credentials. In<br />
fact, static passwords lay at the heart of<br />
many breach incidents. According to<br />
Verizon in its 2017 report, 81 per cent of<br />
hacking-related breaches used stolen<br />
and/or weak passwords.<br />
ZERO TRUST IN ACTION<br />
Given the risks, Zero Trust Security is the<br />
only sure way to secure IaaS systems and<br />
hosted applications. Zero Trust means<br />
verifying users using multi-factor<br />
authentication (MFA), regardless of user<br />
type, or the resource being accessed. Access<br />
decisions must be adaptive and dynamic. By<br />
ditching static passwords, phishing can<br />
virtually be eradicated, making it much<br />
harder for hackers to access cloud systems.<br />
Next you need to verify the device,<br />
meaning that identity-centric preventative<br />
controls must be extended to the endpoint,<br />
so that systems can appraise trust levels and<br />
on-device security and tie these to the user's<br />
identity to create an overall risk score. For<br />
example, a user requesting access on a<br />
device that they use every day establishes a<br />
certain level of trust when compared to that<br />
user logging-in via a shared workstation. As<br />
risk increases, the appropriate controls kick<br />
in, requiring additional factors of<br />
authentication, or restricting access.<br />
Limiting access and privilege is another vital<br />
component of the Zero Trust model, which<br />
must be tightly managed. That's why<br />
restricting access according to the well-worn<br />
principle of least-privilege provides just<br />
enough access inside each application for<br />
users to do their jobs. These applications<br />
often contain large amounts of critical data,<br />
and because they're accessed by more users<br />
within the organisation, they become easy<br />
targets. So the more critical the data, the less<br />
the privilege offered, which requires the<br />
increased use of MFA to ensure identity.<br />
Finally, for Zero Trust to work it must be able<br />
to learn and evolve over time. Platforms that<br />
gather information about the user, endpoint,<br />
application, server and policies are ideal<br />
because they can learn and baseline normal<br />
behaviour and spot unusual activity which<br />
might indicate a breach. Behaviour analytics<br />
are invaluable to administrators and can be<br />
used to ascertain the level of risk in real-time<br />
and provide key insights to determine when<br />
policies should be changed.<br />
The good news is that you don't need to<br />
spend big to extend best practice security to<br />
the cloud. With the right approach and<br />
guiding principles like MFA everywhere,<br />
least privilege and user accountability, your<br />
IaaS environment can be as secure as your<br />
data centre. NC<br />
18 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION<br />
NETWORKED AUDIO<br />
AS BUSINESS SERVICES<br />
CONVERGE ON THE<br />
NETWORK, THOSE INVOLVED<br />
MUST SPEAK THE SAME<br />
LANGUAGE. JOHN ELLIS,<br />
REGIONAL SALES MANAGER AT<br />
SHURE, EXPLAINS HOW TO<br />
APPROACH THE AV/IT<br />
CHALLENGE<br />
Video and audio conferencing has<br />
significantly evolved as it has moved<br />
from hardware to software based<br />
solutions. Google Hangouts and Skype for<br />
Business would both be examples. This<br />
approach offers savings and greater<br />
flexibility for organisations along with user<br />
experiences, which are good - but if the<br />
audio equipment isn't up to the job then it<br />
can all become a bit fraught.<br />
The need for both AV and IT teams to<br />
understand each other and collaborate<br />
effectively has never been so important, but<br />
can they talk the same language, and what<br />
are the challenges of integrating networked<br />
audio with an IT network?<br />
Most IT departments haven't really had to<br />
deal with networked audio until now, but if<br />
their audio service is to work efficiently, a<br />
successful integration will be essential. In<br />
achieving this, one of the biggest<br />
challenges is providing reassurance to the<br />
AV team that everything they require can be<br />
provisioned on the network, and that both<br />
groups can work together effectively.<br />
Network security is a substantial topic for<br />
the network team and it will be one of the<br />
first things that IT departments will want to<br />
address. But because audio operates in<br />
real-time, it needs to be afforded some<br />
network priority. Also, from a project<br />
perspective, when working with networked<br />
audio, a lot of the commissioning has to be<br />
completed onsite, which will always be<br />
more challenging than commissioning<br />
offsite. Typically, AV professionals will find<br />
themselves working with unfamiliar IT<br />
infrastructure, and this requires planning<br />
and disclosure.<br />
The apparently reasonable request for the<br />
definition and detail of the IT infrastructure<br />
may cause the IT department to be<br />
defensive, if only because of security<br />
concerns. With all of this in mind and as<br />
convergence between AV and IT continues,<br />
do we need a new breed of<br />
communications professional servicing<br />
both disciplines?<br />
It has been quite normal for specialists to<br />
focus on their chosen area and all too<br />
often working independently from the IT<br />
team. There is now so much being<br />
deployed across networks that AV<br />
integrators have begun to employ network<br />
architects who can take a holistic view of a<br />
customer's estate and successfully bring all<br />
of the disciplines together.<br />
In addition to the need for AV and IT to be<br />
well versed in each other's work there's also<br />
a need for standardisation - and this is now<br />
starting to happen. Shure has worked with<br />
QSC to deploy a global standard, but the<br />
continuing challenge is to keep deployment<br />
and standards consistent.<br />
IT convergence is not new, and there has<br />
been a growing number of independent<br />
technologies coexisting on the network for<br />
some time, but now these technologies<br />
need to start talking to each other in a<br />
way they haven't previously. As an<br />
industry, we must embrace this and<br />
change our approach.<br />
We are contributing to this by hosting<br />
regular seminars aimed at AV<br />
commissioning engineers, installers, AV<br />
designers and audio engineers. We aim to<br />
offer them a better understanding of the IT<br />
networking standards commonly used in<br />
today's audio transport protocols, along with<br />
practical, hands-on, demonstrations.<br />
The convergence of AV and IT departments<br />
is improving, but there are still probably<br />
more AV people learning about IT than IT<br />
learning about audio. AV manufacturers are<br />
working to produce IT standards-based<br />
equipment which will make it much easier<br />
for AV and IT departments to implement<br />
networked audio and to collaborate well.<br />
AV teams need to understand the<br />
challenges of running audio across the<br />
production network and educate<br />
accordingly. In turn, IT departments must<br />
understand that the AV industry is not<br />
going to be foolish enough to add<br />
products to a network that will compromise<br />
that network's security. NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 19
OPINION<br />
ENTERPRISE ARCHITECTS OR<br />
STRATEGIC ADVISORS?<br />
IS IMPROVEMENT A BIGGER GOAL THAN<br />
ALIGNMENT IN THE ENTERPRISE? TERRY<br />
BLEVINS, A FELLOW OF THE OPEN GROUP AND<br />
OWNER OF ENTERPRISE WISE LLC CONSIDERS<br />
THE ENTERPRISE ARCHITECTURE CHALLENGE<br />
How should Enterprise Architecture<br />
(EA) align with business operations?<br />
When I am asked this I wonder if it is<br />
the right question to start with. I'm not a fan<br />
of the concept of alignment outside of<br />
mechanics: outside of the physical space,<br />
alignment isn't strong enough and is<br />
typically too indirect for impact. Instead, I<br />
prefer to consider how EA can improve<br />
business operations. Besides, if EA efforts<br />
aren't driving business operation<br />
improvements, then perhaps it is time to<br />
reconsider the EA investment.<br />
Given my position is it reasonable to say that<br />
the answer is just an unequivocal yes, with an<br />
imperative to deliver good enterprise<br />
architecture? Well, sort of - but no<br />
architecture is a solution, it is part of a path<br />
towards a desired solution. EA is an essential<br />
element on the journey of driving<br />
transformation or enterprise-level changes.<br />
There is much to do to ensure that EA has the<br />
intended impact, and some of these things<br />
aren't adequately covered by EA methods<br />
alone.<br />
So, what is needed from enterprise architects<br />
beyond the fundamental goal to improve<br />
business operations?<br />
WORK WITH BUSINESS OPERATIONS<br />
AT THEIR TEMPO<br />
In its simplest form, an enterprise comprises<br />
three main areas; operations (business or<br />
mission), management (governance) and<br />
development. Operations are where the<br />
business or mission processes produce the<br />
enterprise's value proposition. Management<br />
provides the governance to see that the<br />
necessary things are done to ensure<br />
continuous delivery, and development is<br />
where improvements are made to people,<br />
process, policy and technology capability, to<br />
enable delivery.<br />
Typically, enterprise architects work in<br />
development. However, there is opportunity<br />
for them to work closely with operations<br />
(similar to the DevOps) to experience and<br />
understand operational issues. The enterprise<br />
architect could also use their extensive<br />
knowledge to solve problems. By working<br />
closely alongside them, they can gather realtime<br />
information about the enterprise that gets<br />
captured in the EA which will ultimately help<br />
solve future issues.<br />
ANSWERS AND GUIDANCE<br />
ON-DEMAND<br />
I have attended countless meetings where an<br />
enterprise architect stands in front of their<br />
leaders and explains the EA model. What<br />
really should be done is to demonstrate the<br />
questions that can be answered and the<br />
insights discovered relating to operations.<br />
More importantly, an enterprise architect<br />
needs to answer operations questions as they<br />
arise. The key is to talk less about architecture<br />
models and provide more operations-focused<br />
guidance. The enterprise architect can thereby<br />
build trust with the real decision-makers.<br />
Without this, they will not make an impact.<br />
ENABLE INFORMATION IN A<br />
SERVICE FASHION<br />
I am a big fan of service orientation. Not<br />
software, but human service orientation. I<br />
believe the best setup for EA organisations<br />
is a service-oriented model which provides<br />
services to the rest of the enterprise. These<br />
types of service would be divided within<br />
operations, management and<br />
development, where each division provides<br />
specific solutions designed to answer<br />
important questions for each division.<br />
These answers usually appear in the form<br />
of information or guidance.<br />
CONNECT THE EA BOXES TO<br />
OPERATION GOALS<br />
We've all seen the boxes-and-lines view of<br />
an EA where the boxes and lines are<br />
connected. To support and improve business<br />
operations, the goal must be to become first<br />
class citizens in the enterprise architecture.<br />
Certain elements of the model are necessary<br />
to deliver those goals: people, process,<br />
policy and technology, as well as computers<br />
and networks. These key elements must be<br />
connected to articulate all the necessary<br />
components of the solution, and those lines<br />
must possess real values that help to<br />
measure contribution towards the goals.<br />
In summary, there are clearly enterprise<br />
architects who are equipped for the task and<br />
these are the ones you'll want to seek out<br />
and leverage for the benefit of your<br />
20 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION<br />
CONTAINING<br />
EXPECTATIONS<br />
BEST PRACTICE IS THE MISSING<br />
PIECE OF THE CONTAINERS<br />
PUZZLE, SAYS MARCO CEPPI OF<br />
CANONICAL. CAN BEST<br />
PRACTICE DRIVE THE INDUSTRY<br />
FROM CHAOS TO ADOPTION?<br />
With its performance, cost efficiency<br />
and scalability benefits, the use of<br />
container technology for running<br />
applications in the cloud is fast becoming a<br />
hot topic in IT. A recent survey reported that 42<br />
per cent of organisations are already using<br />
containers and 451 Research predicts that this<br />
market will be worth $2.7 billion by 2020. The<br />
technology may still be in its relative infancy,<br />
but its many advantages are already<br />
prompting a wide variety of businesses to take<br />
the plunge.<br />
This growth has resulted in an explosion of<br />
start-ups appearing in the market, all focused<br />
on building, managing or providing container<br />
services and adding to the plethora of<br />
container-based solutions already released by<br />
virtually all the major cloud providers and<br />
vendors. However, there are some challenges<br />
that need to be overcome. While this thriving<br />
market has created an abundance of choice<br />
for customers, it has also made it difficult for<br />
businesses to understand exactly what the best<br />
choice is for them.<br />
A disconnect has also emerged between the<br />
interest being shown in containers and its<br />
adoption, with many enterprises hesitating due<br />
to security and implementation concerns.<br />
These are issues that the industry should be<br />
keen to solve.<br />
REMOVING THE RISKS<br />
Despite the promise of containerisation, many<br />
businesses are yet to be fully convinced.<br />
Certain industries, such as financial services,<br />
have been quick to embrace containers, but<br />
CIOs and IT managers in other sectors are<br />
still unsure if the technology is the right<br />
option for them.<br />
This hesitation is to be expected, as any new<br />
technology comes with risk. One way of<br />
calming these fears is for the industry to<br />
establish best practice guidelines that<br />
businesses of all sizes can follow. Currently<br />
missing from the world of containers, this is<br />
primarily because early adopters are<br />
attempting to figure out what best practices<br />
should look like as they go along, all in an<br />
effort to get ahead of their competition.<br />
By collaborating to provide<br />
recommendations for the creation,<br />
deployment and usage of containerised<br />
applications, vendors and customers can<br />
consolidate their experiences and help the<br />
industry to develop, offering adopters'<br />
confidence in their deployments.<br />
A CALL FOR STANDARDISATION<br />
Another way the industry can kick-start<br />
adoption is to foster greater levels of<br />
standardisation. Without common building<br />
blocks for everyone to adhere to,<br />
organisations can't be sure that the technology<br />
they adopt will work as expected. This has the<br />
potential to hinder the progression of<br />
technology, but once the industry agrees on a<br />
certain base standard, it's a different story.<br />
Organisations, once shown a clearer path<br />
along which to travel, can be sure that the<br />
fundamental aspects of the technology -<br />
regardless of their choice of vendor - will work<br />
in the same predictable way.<br />
The world of containers is no exception. By<br />
creating a standard way to build and manage<br />
container technology, all customers can be<br />
assured that their technical expectations will be<br />
met which will leave them free to pick the best<br />
solutions to suit their specific objectives.<br />
Various industry bodies are already in place<br />
to help shape the future of the industry. For<br />
example, the Open Container Initiative (OCI)<br />
which is focused on creating open industry<br />
standards around container formats and<br />
runtime. There's also the Cloud Native<br />
Computing Foundation (CNCF) which boasts<br />
138 members after less than two years of<br />
activity. These include the world's six largest<br />
public cloud providers, and its membership<br />
continues to grow at a significant rate.<br />
These changes will help the world of<br />
containers evolve from chaos to widespread<br />
adoption and realise the promise of a<br />
technology that will undoubtedly play a key<br />
role in the next evolution of IT for many<br />
years to come. NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 21
SECURITYUPDATE<br />
IoT SECURITY THAT<br />
WORKS<br />
IoT DEVICES EXTEND THE<br />
ATTACK SURFACE OF<br />
NETWORKS, BUT WHAT CAN BE<br />
DONE TO COMBAT THIS, AND<br />
HOW SHOULD THE RISK BE<br />
UNDERSTOOD? PROFESSOR<br />
WILLIAM WEBB, CEO OF THE<br />
WEIGHTLESS SIG EXPLAINS<br />
Recently, the IoT has been hit by a number<br />
of security attacks, including denial of<br />
service operations and the hacking of<br />
home networks - home networks that are all<br />
too often used by employees for their<br />
professional use. As the number of connected<br />
devices explodes and their importance<br />
inevitably increases, the effort that hackers put<br />
into breaking systems will only grow, as may<br />
their gains.<br />
Overcoming threats of this sort is businessas-usual<br />
for the conventional Internet, mobile<br />
telephony firms and other IT systems. Defences<br />
comprise two elements: firstly as good a level<br />
of protection as possible using encryption,<br />
authentication and AI analysis, and secondly<br />
the ability to rapidly react to threats that<br />
breach these defences with software updates.<br />
The same approach will be needed to secure<br />
IoT deployments.<br />
The challenge however for IoT is not so much<br />
in knowing how to deliver secure systems in<br />
principle, it is implementing it in practice on<br />
devices with very small amounts of memory<br />
and processing power, connected across<br />
wireless connections with limited capabilities,<br />
and where preserving battery power is<br />
operationally essential.<br />
Unfortunately, many early IoT<br />
implementations have compromised on<br />
security, and this has enabled a growing<br />
number of hacks and breaches. While many<br />
different approaches to security are possible,<br />
it seems likely that the optimal design for IoT<br />
will comprise:<br />
A shared secure key embedded within the<br />
IoT chipset, in much the same way that a<br />
secure key is embedded in cellular SIM<br />
cards. This has proven to be the best way<br />
to deliver authentication and encryption.<br />
An update capability that can broadcast<br />
and allow millions of devices to listen to<br />
and receive a downlink software update.<br />
Without this, sending the update to<br />
individual devices one-at-a-time can take<br />
days or months and consume most of the<br />
available network capacity. This will<br />
result in a massive number of lost data<br />
packets using a non-managed uplink<br />
network protocol.<br />
The ability to update the entire security<br />
suite should algorithms be shown to be<br />
compromised. This is important in IoT,<br />
where some devices can be in the field<br />
for 10 or more years, during which<br />
time security algorithm design will<br />
inevitably evolve.<br />
Enabling a system design of this sort requires<br />
a standards body that can oversee the<br />
allocation and distribution of shared keys and<br />
where the world's best security experts can<br />
provide their input. It requires a radio design<br />
with significant downlink capability, ideally in a<br />
flexible manner, so that the downlink/uplink<br />
ratio can be varied dynamically, providing<br />
more downlink capacity when a broadcast<br />
update is required. And it requires a standard<br />
where best practice security is embedded deep<br />
into all of the layers.<br />
This is exactly what we have achieved. We<br />
employ shared secret keys with mutual EAP-<br />
GPSK authentication with a trusted third party<br />
in a similar manner to the cellular industry and<br />
use best-practice algorithms such as AES-128<br />
from US security bodies. Additionally, we have<br />
a flexible broadcast mode that can deliver<br />
software updates to all devices, or to selected<br />
subsets, such as those belonging to a<br />
particular user group. We can deliver<br />
completely new cypher suites over the air if<br />
needed and traffic analysis within the network.<br />
Using AI and big data analytics we can detect<br />
unusual behaviour such as devices sending<br />
more messages than expected, so that those<br />
devices can be quickly disabled until the<br />
problem is resolved.<br />
Even the most innocuous IoT device can<br />
become the source of a security-breach.<br />
Unlike traditional IT, recalling all devices is<br />
logistically impossible, and would probably be<br />
financially disastrous. Clearly, security is an<br />
area where absolutely no risks can be taken,<br />
and weightless technology embodies the best<br />
possible security principles to address known<br />
and unattended risks. NC<br />
22 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
PRODUCTREVIEW<br />
AirCheck G2 from<br />
NETSCOUT<br />
PRODUCT REVIEW<br />
PRODUCT<br />
REVIEWPRODUCT RE<br />
Evolving from home user self-sufficiency,<br />
Wi-Fi - more accurately Wireless LAN - is<br />
often misperceived as simple, plug and<br />
play technology. But wireless networking is<br />
mission critical, complex and challenging to<br />
support - especially without infrastructure insight.<br />
Driven by convenience, wireless networks are<br />
everywhere, and while most require credentials<br />
for access, they can also adversely impact one<br />
another. Despite the fact that your laptop<br />
confirms internet connectivity and good line<br />
speed, the user experience may be<br />
characterised by slow throughput, intermittent<br />
connectivity, application error and downtime.<br />
Multiple factors can coalesce to create a<br />
fractious wireless experience. Most are easy to<br />
address once they are identified, quantified<br />
and understood. The AirCheck G2 from<br />
NETSCOUT, updated in November 2017, is a<br />
convenient handheld tester that puts the<br />
network technician in firm control.<br />
Powered on, a top-level screen with 7 options<br />
conveniently outlines capability: Networks,<br />
Channels, Access Points, Clients, Interferers,<br />
Auto Test and Ethernet Test. To establish our<br />
base line, we ran Auto Test and were greeted<br />
with an easy to understand assessment of Air<br />
Quality which showed the in-range channels<br />
and any interference. From here we examined<br />
individual Access Points (APs) in great detail<br />
and tested them.<br />
Using the touchscreen we selected Networks<br />
which displayed those available. For each, we<br />
could determine the number of APs, signal and<br />
noise level, connected clients, security, and<br />
when it was last seen.<br />
Selecting the WLAN channel with the greatest<br />
signal strength is rarely the best option. To this<br />
end Channels informs decision-making by<br />
displaying Channel usage, 802.11 and non<br />
802.11 devices, AP's using that channel, and a<br />
visual indication of noise level. Selecting a<br />
Channel provides further insight, including<br />
applications in use, and utilisation over time.<br />
APs, the last physical point of a WLAN, can<br />
only be assessed by understanding signal<br />
strength, noise, and security. Using Access<br />
Points, we examined this and insight included<br />
the BSSID (MAC address), Signal to Noise<br />
Ratio and frequency.<br />
Visualisation throughout is excellent and<br />
everything is colour coded for rapid triage:<br />
green is good, orange potentially a problem<br />
and red requires attention. However far you<br />
drill into detail, the home button on the status<br />
bar does just that, while another icon saves<br />
results to a PDF. A free Link-Live account stores<br />
results and creates timeline profiles.<br />
Clients revealed all in-range associated and<br />
unassociated devices - including another<br />
AirCheck G2! Because the WLAN radio<br />
spectrum is unlicensed, it is heavily congested<br />
with energy from a range of devices or<br />
Interferers. Interferers can be wireless and nonwireless<br />
devices as innocent as a neighbour's<br />
AP, a microwave oven, a forgotten AP, or an AP<br />
covertly installed for illegal network access.<br />
Interferers will list candidate details including<br />
the affected channels, device type (we<br />
observed a microwave oven), average and<br />
peak power, and when its effects were last<br />
seen. It's not possible to eradicate all problem<br />
sources, but the AirCheck G2 provides<br />
everything needed to configure a WLAN<br />
around them.<br />
Whether using a Tablet or a Wi-Fi telephone,<br />
people expect to move around and stay<br />
connected. Using the Roaming test facility it's<br />
possible to understand dynamic network quality<br />
by repeating a PING as you move. This helps<br />
to ensure a seamless network experience.<br />
Throughput is the best way to understand user<br />
experience and the AirCheck G2 can run an<br />
iPerf test. The Kit option provides a small tester<br />
that acts as an iPerf server and a directional<br />
antenna to locate unknown RF sources.<br />
Wireless networking needn't be a dark art,<br />
and with decent insight it is logical and easy to<br />
manage. The capability provided by AirCheck<br />
G2 is as essential to WLAN provision as fuel is<br />
to an engine. Without insight, the best you can<br />
hope for is to coast unguided, downhill… NC<br />
Product: AirCheck G2<br />
Supplier: NETSCOUT<br />
Web site:<br />
http://enterprise.netscout.com/aircheck<br />
Email: kim.kingsbury@netscout.com<br />
Price: £1,848 pounds excluding VAT<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 23
OPINION<br />
SMART CONNECTIVITY<br />
BY DESIGN<br />
CONNECTIVTY REQUIREMENTS<br />
ARE CHANGING BEFORE OUR<br />
EYES. OLI BARRINGTON,<br />
MANAGING DIRECTOR UNITED<br />
KINGDOM & IRELAND AT R&M<br />
EXPLAINS HOW TO BEAR<br />
DOWN ON THE CHALLENGE<br />
According to Cisco, global mobile data<br />
traffic will approach 50 exabytes per<br />
month by 2021. But before we<br />
consider how to ensure that the appropriate<br />
networks are in place, let's understand the<br />
trends driving this bandwidth demand.<br />
Mobile device users expect uninterrupted HD<br />
video and access to cloud-based applications<br />
from any location. 5G will boost demand for<br />
highly reliable connectivity, placing huge<br />
demand on the transfer capacity of cellular<br />
phone antennas. In order to allow providers to<br />
develop and deliver the services that users<br />
want, fibre optic cables to base stations will be<br />
required for backhaul.<br />
Cloud is another vital driver. IDC claims that<br />
half of all global value creation will be<br />
digitised by 2021. The increase of digital<br />
decentralised business and production<br />
processes will further boost data volumes.<br />
Billions of sensors, cameras and other devices<br />
connecting in coming years to support Internet<br />
of Things (IoT) applications will increase data<br />
volumes to allow continuous data analysis.<br />
Edge data centres are used to avoid latency<br />
and ensure local data availability, while cost<br />
benefits, consolidation and cloud requirements<br />
are driving the rise of hyperscale data centres<br />
and advanced (autonomous) mobility solutions<br />
that require networks with blanket availability<br />
and high-performance connectivity. Functions<br />
for smart buildings are also being<br />
incorporated into data networks. This enables<br />
more efficient use of resources, increases<br />
flexibility and helps organisations to realise<br />
sustainability goals.<br />
MAKING IT WORK: ESSENTIAL<br />
CONSIDERATIONS<br />
Connectivity will need to be ubiquitous: LANs,<br />
WLANs or mobile solutions with limited reach<br />
won't suffice. Cabling digitisation has to be a<br />
fundamental component of all planning, from<br />
office buildings, factories and homes, to<br />
transportation systems, public infrastructures<br />
and smart cities. How to determine and<br />
implement a solution and ensure it remains<br />
effective is a challenge.<br />
Ultra-high density cabling and network<br />
infrastructure will be essential to meeting the<br />
challenges brought by the data explosion and<br />
particularly by hyperscale or edge data<br />
centres. This need for higher density is driving<br />
changes to enclosures, cabinets and racks.<br />
Planning must anticipate this imminent<br />
increase and the need for more ports and fibre<br />
optic cables between and within data centres,<br />
as well as at access points.<br />
The next bandwidth evolution might happen<br />
quicker than you think, so looking beyond<br />
today's specifications, you may want to go<br />
further than 10G or 100G and focus on<br />
ensuring connectivity for the next 50 years or<br />
so. Also, it's essential to ensure the availability<br />
of skilled workers, as apps are no substitute for<br />
installers and experts that can care for millions<br />
of ports, antennas, cables and so on.<br />
Automation and documentation will become<br />
a challenge. No human can document and<br />
manage hundreds of thousands of ports and<br />
links without some automation. Complete<br />
automation of infrastructure and asset<br />
management is absolutely critical.<br />
Finally, and to increase the likelihood of<br />
success, you'll need to examine the three<br />
variables involved in achieving higher data<br />
rates - more fibres, more wavelength and<br />
higher modulation - before deciding to invest<br />
in the latest optical connectivity. These need to<br />
be weighed according to requirements.<br />
Balancing cost-effectiveness with performance<br />
in each part of the network is essential.<br />
REALISING A LASTING SOLUTION<br />
Integrating cabling design into building<br />
information systems to evaluate effectiveness<br />
upfront and on an ongoing basis is one<br />
method of realising smart connectivity. Another<br />
tactic would be to try looking at every building<br />
project as a data centre and applying widely<br />
available and understood best practices.<br />
It is vital to choose components that are<br />
robust, reliable and repairable and that<br />
require little maintenance. Include connectivity<br />
engineering as a standard component of<br />
design, building and maintenance plans,<br />
along with structural engineering and electrical<br />
cabling. The processes, evaluations and<br />
maintenance schedules commonly used in<br />
these areas can simply be extended to<br />
structured cabling. NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 25
OPINION<br />
WHEN STORAGE<br />
BECOMES DATA<br />
DO WE NEED TO CONSIDER<br />
STORAGE MEDIA OR SHOULD<br />
WE CONSIDER DATA<br />
HOLISTICALLY? MARK PETERS,<br />
PRACTICE DIRECTOR & SENIOR<br />
ANALYST AND SCOTT SINCLAIR,<br />
SENIOR ANALYST AT THE<br />
ENTERPRISE STRATEGY GROUP,<br />
COMBINE THEIR VIEWS<br />
The terms legacy and emerging when<br />
combined with the word storage can<br />
seem either obvious or innocuous -<br />
perhaps both. They're probably things that<br />
you simply accept as givens or maybe dismiss<br />
as marketing speak. In much the same way,<br />
you might not pay attention to phrases like<br />
'tomorrow's performance today', or 'futureproof<br />
your system'. They are catch-all's that<br />
probably don't get given that much thought.<br />
Indeed, if you were to stop and consider<br />
this topic, you might get stumped, or at least<br />
frustrated, quite quickly. Is the distinction<br />
between the terms legacy storage and<br />
emerging storage simply the age of an<br />
installation, or perhaps the market longevity<br />
of a particular type of device? Maybe legacy<br />
just means any standalone system that<br />
doesn't fit neatly into a cloud, converged or<br />
software-defined world? Perhaps anything<br />
without flash is just old-hat? And how would<br />
we begin to layer the terms meaningfully<br />
upon the real world, given how mixed,<br />
muddled, and granularly-constructed most<br />
data centre, private or public storage<br />
ecosystems are?<br />
The truth is that neither of these distinctions<br />
are the crux of the issue. The distinction<br />
between legacy and emerging storage is not<br />
a given media or a particular system. The<br />
difference is not a particular physical<br />
storage thing, but is about an overall<br />
approach to data.<br />
At the risk of being obvious, storage is part<br />
of infrastructure, which in turn is part of an<br />
overall system, which in turn is designed to<br />
get stuff done. Stuff in this case means, of<br />
course, to provide the data to run<br />
applications, which in turn supports<br />
organisations and their objectives. Stuff<br />
matters. Indeed, the magic and value of<br />
what IT can do is increasingly obvious<br />
across our entire lives. But IT carries this<br />
out, increasingly, out of view, and perhaps<br />
that is how it should be. People and<br />
businesses used to be focused on, and often<br />
consumed by, the minutiae of how IT<br />
outcomes get delivered; these days, we just<br />
want the outcomes.<br />
This is categorically not to say that the<br />
emerging storage approach matters less<br />
than the legacy storage systems did - in<br />
fact it's probably the exact opposite. This<br />
is because achieving the kind of<br />
integrated, automated, app-aware and<br />
self-optimising storage (we really should<br />
start saying data) ecosystem we want, will<br />
demand exceedingly sophisticated<br />
engineering and support.<br />
Whereas the legacy storage arena proudly<br />
paraded its speeds-and-feeds, with new<br />
hardware releases as the cause for<br />
celebration and specialised tools and<br />
people to tweak all the literal and figurative<br />
knobs, the emerging data approach<br />
automatically subsumes whatever hardware<br />
it is given and dynamically and optimally<br />
orchestrates the resources across any given<br />
set of workloads. Moreover, the emerging<br />
approach invariably also wraps in analytics<br />
and security, and these are integral to the<br />
data system, and not applications layered<br />
onto heterogeneous storage systems as an<br />
afterthought.<br />
There's one last important point to make.<br />
The term emerging should not be interpreted<br />
as suggesting that all these new and<br />
desirable storage/data abilities for<br />
contemporary IT are only nascent or<br />
imminent. You can do this today. The term<br />
emerging is simply pointing out that<br />
adoption is only just beginning. The<br />
potential rewards for doing so are significant<br />
in terms of ease, efficiency, TCO, and<br />
security, and as with so much in IT, all it<br />
requires - and we know this is nothing like<br />
as easy to do as it is to write - is to figure out<br />
and focus on what you need to achieve.<br />
Moving from legacy to emerging requires<br />
you to stop thinking of storage as a list of<br />
disparate needs and items, and to start<br />
thinking instead of data, holistically. NC<br />
26 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION<br />
TRANSPARENT I.T.<br />
ENTERPRISES ARE STRUGGLING<br />
TO ADAPT TO DIGITAL WORLD<br />
DYNAMICS. IN AN EVOLVING<br />
ROLE, IT LEADERS MUST<br />
DEMONSTRATE VALUE AND<br />
PROVIDE COST TRANSPARENCY,<br />
EXPLAINS JAMES COCKROFT,<br />
DIRECTOR AT COEUS<br />
CONSULTING<br />
Once upon a time, IT existed to<br />
simply provision robust and<br />
reliable computing resources to the<br />
business. Today, information technology<br />
represents the heart of the enterprise. That's<br />
quite a change.<br />
The process of bringing the IT department's<br />
capabilities to the forefront of the enterprise<br />
requires IT to deliver value to the<br />
organisation, and IT leaders now find<br />
themselves under mounting pressure, not<br />
simply to justify their costs, but to<br />
demonstrate that they are actively<br />
contributing towards business growth. Yet IT<br />
departments are not as efficient at enabling<br />
transformation in the enterprise as they may<br />
believe; rarely do they adapt internal<br />
processes so that they can report<br />
transparently on the IT cost and benefit.<br />
FRONT OF MIND COSTS<br />
If IT is to take a leading role then cost<br />
transparency must be at the forefront of the<br />
CIO's mind, as it forms the very foundations<br />
of the department's relationship with the rest<br />
of the organisation. If the business can't<br />
understand what value IT is contributing,<br />
then there is no way of evaluating how it can<br />
inform business decisions.<br />
In a recent survey we carried out, this very<br />
point was highlighted by separating<br />
enterprises that are fully cost transparent<br />
from those that are partially or not cost<br />
transparent. The report found that these cost<br />
transparency leaders are far more likely to<br />
be trusted by the board as true partners. This<br />
leading group represents just 12 per cent of<br />
respondents, indicating that the<br />
overwhelming majority of IT departments<br />
have some way to go before they are fully<br />
cost transparent.<br />
But why does cost transparency matter?<br />
When compared to their less transparent<br />
counterparts, cost transparency leaders are<br />
twice as likely to be represented at board<br />
level and much more likely to link the<br />
performance of the IT operations and its<br />
employees to recognisable, measureable<br />
and genuine business outcomess.<br />
BOARD IT<br />
So what steps can IT take to win the trust of<br />
the board and provide their departments<br />
with the agility required to succeed in the<br />
digital age? The first step to ensuring<br />
transparency across IT is to align the<br />
department's objectives with those of the<br />
wider business. From the outset, there should<br />
be a clear case for cost transparency which<br />
lays out what exactly needs to be<br />
documented, for example, improved cost<br />
information, benchmarking or improved<br />
pricing. The next step is to prioritise where to<br />
focus first, as cost transparency cannot be<br />
achieved overnight. Should it be<br />
infrastructure, specific projects, or perhaps<br />
business-critical applications? Again, the<br />
priorities should be formulated to align<br />
and support the business' overarching<br />
strategic goals.<br />
A NEW APPROACH<br />
Another consideration for IT leaders<br />
embarking on the cost transparency journey<br />
is to address the structure of their data and<br />
the way that costs flow through the<br />
organisation. Exploiting cost transparency<br />
needs new processes, new behaviours, and<br />
a significant amount of communications and<br />
training. There may even need to be new<br />
roles and capabilities within the<br />
organisation. And with Brexit and GDPR<br />
around the corner, this is an opportune<br />
moment to address these points.<br />
If IT is able to explain its value to the<br />
business, it is more likely to be regarded as<br />
a trusted partner by the rest of the business.<br />
Cost transparency frames discussions<br />
around service, performance and risk. It also<br />
provides the justification for further<br />
investment in IT services. It is therefore a<br />
critical step to building a trusting partnership<br />
within the business. Those organisations that<br />
have built cost transparency are better able<br />
to demonstrate full value to the business,<br />
and this in turn enables the partnership to<br />
develop, with IT viewed increasingly as an<br />
integral part of the business. NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 27
AWARDS2018<br />
SPONSORED BY<br />
A BIG NIGHT FOR NETWORKING<br />
THE 2018 NETWORK COMPUTING AWARDS WINNERS ARE HERE!<br />
The Network Computing Awards ceremony took place in London on 22nd Match. Former<br />
cricketer, Graham Cowdrey, was Master of ceremonies for the night. He was assisted in<br />
presenting the Awards by comedian Patrick Monahan as well as Ray Smyth and Dave<br />
Bonner of Network Computing. All the of results can be seen in the following pages along with<br />
information on the winning product, company, project or individual. Please note, the awardwinning<br />
products will not necessarily be the only solutions or the newest solutions available from<br />
the respective vendors. We recommend that you contact these vendors to learn more.<br />
NETWORK INFRASTRUCTURE PRODUCT OF THE YEAR<br />
WINNER: Dell EMC - N4000 Series<br />
RUNNER UP: Allied Telesis - Secure Enterprise SDN (SES)<br />
The N4000 switch series offers a power-efficient and resilient 10 Gigabit Ethernet (10GbE)<br />
switching solution with support for 40GbE uplinks for advanced Layer 3 distribution for offices<br />
and campus networks.<br />
The N4000 switch series has high-performance capabilities and wire-speed performance<br />
utilizing a non-blocking architecture to easily handle unexpected traffic loads. The N4000 series<br />
includes dual internal hot-swappable 80PLUS-certified power supplies for high availability and<br />
power efficiency. The switches offer simple management and scalability via flexible user port<br />
stacking at 10Gbps or 40Gbps.<br />
28 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
AWARDS2018<br />
DATA CENTRE PRODUCT OF THE YEAR<br />
WINNER: Sudlows - A:LIST<br />
With the increasing reliance on data centre systems to support day to day businesses, Sudlows<br />
knows the importance of the design and build of reliable, resilient and efficient data centres.<br />
The latest offering from Sudlows' Data Centre Testing and Commissioning Team is the<br />
Advanced Load Integrated Systems Test, known as 'A:LIST'.<br />
Designed specifically for testing critical data environments by replicating the power and<br />
heatloads which will be installed, the A:LIST can provide a detailed analysis of your facility. The<br />
multi-award winning A:LIST has the ability to match the planned load closely, providing data<br />
centre operators the peace of mind that their data centres are running efficiently and<br />
effectively.<br />
RUNNER UP: Allied Telesis - X550 10 gig switch<br />
IT OPTIMISATION PRODUCT OF THE YEAR<br />
WINNER: KEMP Technologies - KEMP 360 Central<br />
KEMP 360 Central provides centralised management and control of application delivery assets,<br />
enabling reduced operational overheads and improved application uptime. From a single<br />
interface, KEMP 360 Central provides application owners and network managers with a unified<br />
view of the status and performance of their application delivery infrastructure, enabling rapid<br />
detection of issues and reduced management effort. A single KEMP 360 Central instance can<br />
manage multiple ADC instances across multiple environments including on-premises and cloud.<br />
With support for third party ADCs and integrated cloud load balancers, KEMP 360 Central is<br />
invaluable in hybrid cloud or cloud migration scenarios.<br />
RUNNER UP: F5 Networks - BIG-IP Local Traffic Manager<br />
TESTING / MONITORING PRODUCT OF THE YEAR<br />
WINNER: Netreo - OmniCenter<br />
Netreo's OmniCenter provides single-pane-of-glass dashboard views into the entire IT enterprise.<br />
Infrastructure, telephony, applications, email, virtualisation and cloud services - all on one<br />
beautifully crafted screen, along with powerful incident management functions and automated<br />
reporting. OmniCenter is appliance-based (hardware, virtual or cloud-based) with no clients,<br />
agents, or probes - so implementation is a breeze. We use a simple, consumption-based<br />
subscription model in which all modules, functionality, and support are embedded into one low<br />
fee. No surprises. No terms. No hassles. We make enterprise-class monitoring tools available in<br />
a way that no one else can compete with.<br />
RUNNER UP: iTrinegy - NE ONE Desktop Network Emulator<br />
CLOUD TELEPHONY PRODUCT OF THE YEAR<br />
WINNER: Natterbox - AVS<br />
Natterbox delivers a global Cloud Telephony Platform. Unique as the world's first and only end<br />
to end telephony service to be 100% embedded and managed within the Salesforce platform.<br />
Natterbox empowers businesses to use live CRM data to deliver concise personalised, phone<br />
journeys, with high call quality, around the globe. Natterbox is fully downloadable through the<br />
Salesforce AppExchange including a Cloud PBX, Contact Centre and call recording, offering a<br />
true no hardware, no software cloud based solution.<br />
With Natterbox you can increase efficiency, improve productivity and enhance your overall<br />
customer experience. It's time to prioritise your phone!<br />
www.Natterbox.com.<br />
RUNNER UP: Cisco - Cisco Unified Communications Manager<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 29
AWARDS2018<br />
CRM PRODUCT OF THE YEAR<br />
WINNER: webCRM - webCRM<br />
RUNNER UP: Smarty Software - Smarty CRM<br />
WebCRM is a cloud based, sophisticated CRM system for Small to Medium Enterprises, that is<br />
relatively quick to implement and straightforward to evolve. The system enables managers and<br />
users to more effectively manage leads and activities, opportunities and quotes, orders and a<br />
ticketing system for customer service. The marketing module provides detailed profiling on any<br />
aspect of the system information facilitating highly targeted email marketing. These processes<br />
are supported with an easy to use reporting and dashboard system.<br />
WebCRM can be integrated with a large number of popular systems including Office 365,<br />
Sage, Xero and QuickBooks plus most telephony systems.<br />
STORAGE PRODUCT OF THE YEAR<br />
WINNER: Buffalo EU B.V. - TeraStation TS51210RH<br />
RUNNER UP: Lenovo - Storage DX8200D<br />
BUFFALO's TeraStation 51210RH is a high performance 12-bay network storage solution ideal<br />
for businesses requiring a reliable RAID-based network storage solution for business critical<br />
applications. Increased speed and reliability is achieved with a 10GbE connection and enterprise<br />
class hard drives.<br />
With the powerful Annapurna Labs Alpine AL314 1.7Ghz Quad-Core processor and 8GB of<br />
fast DDR3 ECC memory, TeraStation 51210RH provides exceptional performance during file<br />
transfers and everyday NAS functions. It is available partially-populated with 8 or 16 TB, and<br />
fully-populated with 24, 48 or 96 TB. Partially populated models are ideal for users needing a<br />
small start with less initial investment.<br />
SECURITY PRODUCT OF THE YEAR<br />
WINNER: Rohde and Schwarz CyberSecurity - TrustedGate<br />
RUNNER UP: Arbor Networks - Arbor Cloud<br />
The cloud security solution TrustedGate enables companies to work securely in cloud computing<br />
environments (e.g. Google Drive, Magenta, Box.com) and collaboration tools such as SharePoint<br />
and Office 365. It combines encryption, virtualisation and fragmentation of sensitive documents<br />
for maximum protection of critical information. Users are able to distribute data on multiple<br />
clouds and servers in order to manage governance, risk management and compliance demands<br />
that require data to be protected according to the current state of the art or saved in a given<br />
region (e.g. GDPR). Document-centric encryption and role-based access control ensure that data<br />
is shielded against cyberattacks.<br />
NETWORK MANAGEMENT PRODUCT OF THE YEAR<br />
WINNER: SolarWinds - NPM<br />
RUNNER UP: Allied Telesis - Vista Manager EX<br />
SolarWinds Network Performance Monitor (NPM) is a powerful and affordable network<br />
monitoring software that enables you to quickly detect, diagnose, and resolve network<br />
performance problems and outages.<br />
SolarWinds develops its network management software upon the Orion Platform, which is<br />
highly scalable and unifies data from multiple parts of the stack into an application-centric<br />
view. This powerful platform gives IT departments the flexibility to add modules as their needs<br />
grow, deepening visibility into their environments. It can monitor, visualise, and analyse the<br />
performance of networks, applications, systems, storage, and databases.<br />
30 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
AWARDS2018<br />
SD-WAN VENDOR OF THE YEAR<br />
WINNER: Citrix<br />
Citrix aims to power a world where people, organisations and things are securely connected and<br />
accessible to make the extraordinary possible. We help customers reimagine the future of work by<br />
providing the most comprehensive secure digital workspace that unifies the apps, data and<br />
services people need to be productive, and simplifies IT's ability to adopt and manage complex<br />
cloud environments. Citrix solutions are in use by more than 400,000 organisations including 99<br />
percent of the Fortune 100 and 98 percent of the Fortune 500.<br />
RUNNER UP: Silver Peak<br />
HARDWARE PRODUCT OF THE YEAR<br />
WINNER: Opengear - IM7200<br />
The IM7200 streamlines remote management of network, server and power infrastructure in<br />
data centre and remote environments, ensuring business continuity, secure and reliable access.<br />
Available in range of models offering between 8 and 48 ports, the next generation IM7200<br />
combines Smart OOB out-of-band management with Failover to Cellular and delivers<br />
proactive monitoring and remediation.<br />
RUNNER UP: WatchGuard - Firebox M5600<br />
SOFTWARE PRODUCT OF THE YEAR<br />
WINNER: Natterbox - AVS RUNNER UP: Rohde & Schwarz Cybersecurity - R&S PACE 2<br />
Natterbox AVS offers the complete telephony solution, including Cloud PBX, CTI, Contact Centre<br />
and Call Recording within Salesforce. It enables transparency, flexibility and support, without<br />
needing to escalate to third party telephony suppliers. Natterbox is available worldwide; serviced<br />
by our 8 global data centres, providing quality of service, reliability and reduced complexity.<br />
You can either replace your existing phone system, with one that is 100% embedded in<br />
Salesforce. Or alternatively, integrate and enhance your existing phone system with our OTT<br />
solution, benefitting from the full contact centre integration.<br />
Accelerate productivity, transform customer experience and improve your data integrity - all<br />
within Salesforce.<br />
BENCH TESTED PRODUCT OF THE YEAR<br />
WINNER: NetScout - LinkRunner G2 NetScout – AirCheck G2 RUNNER UP: SolarWinds - NPM 12.1<br />
"We're honoured to have not one but two products distinguished by such an esteemed industry<br />
leader," commented Stefan Pracht, General Manager for Handheld Network Tools, NETSCOUT.<br />
"Both products dramatically improve efficiencies for IT professionals, and we're thrilled that the<br />
benefits they bring have been recognised at this high level."<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 31
AWARDS2018<br />
NETWORK PROJECT OF YEAR<br />
WINNER: Nuffield Health / Silver Peak<br />
- PUBLIC / NOT FOR PROFIT SECTOR<br />
Nuffield Health, a leading not-for-profit healthcare organisation, chose Silver Peak to transition<br />
its legacy MPLS networks to an SD-WAN and embark upon a cloud-first IT strategy. Since the<br />
deployment, Nuffield Health has reduced WAN traffic by up to 75 percent and realised a 4-6x<br />
increase in available bandwidth, enabling its users to use data-critical applications for patient<br />
care and customer needs<br />
NETWORK PROJECT OF THE YEAR - PRIVATE SECTOR<br />
WINNER: iMarket / iTrinegy<br />
iMarket Communications specialises in VoIP TDM over Ethernet trader voice and data solutions<br />
for the financial, banking and energy industries. When a client purchases an iMarket Private Line,<br />
iMarket assumes full responsibility for buying the required links from the carrier.<br />
To minimise its risk, iMarket selected iTrinegy's NE-ONE network emulator to verify, prior to<br />
signing any contract, that its equipment was going to work properly and not be adversely<br />
impacted by any latency or jitter. Testing with NE-ONE confirmed that its devices were well able<br />
to perform in such environments. Since then, the NE-ONE has been used to identify the<br />
tolerance limits of iMarket's systems.<br />
THE RETURN ON INVESTMENT AWARD<br />
WINNER: VoiceSage - Interactive Voice Messaging<br />
RUNNER UP: Natterbox - AVS<br />
VoiceSage is delighted to announce it has won the title of 'Return On Investment' - a win that<br />
marks an unprecedented sixth year of success at the Awards. The fact that VoiceSage's solutions<br />
allow brands to deliver a consistent and rich customer experience and realise tangible business<br />
improvements is believed to be the main factor behind the win.<br />
"Our win this year is especially important to us, as proven customer ROI is testament to the<br />
contribution our solution makes to enabling brands to proactively engage with customers in<br />
ways that are simple, immediate, and offer great choice across channels," commented CEO<br />
James J Kett.<br />
THE CUSTOMER SERVICE AWARD<br />
WINNER: Brookcourt Solutions<br />
RUNNER UP: NBM Technology Solutions<br />
Commenting on thei win, Brookcourt CEO Phil Higgins said "As a true testament of customer<br />
service and value to our clients, Brookcourt are delighted to have won The Customer Service<br />
Award of the Year 2018. Great achievements are nurtured with the cooperation of many<br />
minds with a common vision working toward a common goal. Brookcourt's award winning,<br />
customer centric approach ensures we continuously keep ahead, we are honoured to have<br />
won this award."<br />
32 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
AWARDS2018<br />
NEW PRODUCT OF THE YEAR – HARDWARE CATEGORY<br />
WINNER: Allied Telesis - SwitchBlade x908 Generation 2<br />
The Allied Telesis SBx908 GEN2 is the ideal solution for the modern enterprise network core. This<br />
stackable modular switch also has the capacity to support Smart City and IoT networks. The<br />
SBx908 GEN2 delivers a future-proof network with superior flexibility, coupled with the ability to<br />
stack multiple units.<br />
The high-capacity 2.6 Terabit fabric eliminates bottlenecks, effortlessly streams video and<br />
ensures all traffic in large networks is delivered reliably. Flexible hot-swappable expansion<br />
modules (XEMs) support 10 Gigabit, 40 Gigabitand 100 Gigabit in the future to easily expand<br />
the SBx908 GEN2 to meet network traffic demands, both now and well into the future.<br />
RUNNER UP: Dell EMC - PowerEdge T640<br />
NEW PRODUCT OF THE YEAR – SOFTWARE AND SERVICES CATEGORY<br />
WINNER: Check Point Software Technologies – Check Point Infinity<br />
Check Point Infinity is the first consolidated security across networks, cloud and mobile, providing<br />
the highest level of threat prevention against both known and unknown targeted attacks to keep<br />
you protected now and in the future. Infinity leverages unified threat intelligence and open<br />
interfaces, enabling all environments to stay protected against targeted attacks.<br />
By focusing on prevention rather than detection only, Infinity blocks the most sophisticated<br />
attacks before they occur. Check Point Infinity architecture consolidates management of multiple<br />
security layers, providing superior policy efficiency and enabling to manage security through a<br />
single pane of glass.<br />
RUNNER UP: Natterbox - AVS<br />
THE INSPIRATION AWARD<br />
WINNER: Andy Hirst IEng, MIET, CDCDP, ATD - Technical Director, Sudlows<br />
Andy Hirst IEng, MIET, CDCDP, ATD - Technical Director, Sudlows<br />
With over 25 years' design and management experience in the electrical industry, Andy has been<br />
instrumental in leading the transformation of Sudlows from a £2million data cabling company to<br />
an award winning £48million critical infrastructure provider. Andy is often in demand by both<br />
press and industry conferences to offer his opinion and views on Key critical infrastructure topics.<br />
After initially joining Sudlows to relaunch the electrical division, Andy become a Board Director<br />
and works closely with his fellow directors to define the growth strategy and commercial direction<br />
of the business. Andy's critical contribution has ensured that strategic growth is planned and<br />
controlled with significant investment in sourcing a high standard of engineers and designers in<br />
all disciplines around the data centre environment. Andy is a key figure within the critical<br />
infrastructure industry and has collected several awards for his technical work.<br />
RUNNER UP: Ian Moyse<br />
THE "ONE TO WATCH" COMPANY<br />
WINNER: Endace<br />
Endace provides high performance platforms for network performance and security analytics<br />
tools, providing agile functionality whilst saving both capex and opex and meeting the business<br />
need for long hardware depreciation cycles.<br />
The Endace Fusion Programme brings together best of breed functionality to ensure that<br />
analysts always have access to the tools they need in an ever-changing network and security<br />
landscape. The scalability and interoperability of EndaceProbes simplify incident response<br />
workflows, ensuring that problems are solved quickly and conclusively, the first time they occur.<br />
RUNNER UP: Algosec<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
MARCH/APRIL 2018 NETWORKcomputing 33
AWARDS2018<br />
DISTRIBUTOR OF THE YEAR<br />
WINNER: Nuvias<br />
RUNNER UP: NBM Distribution<br />
Nuvias is a fast-growing high value, solutions-defined EMEA distributor with a portfolio covering<br />
a comprehensive range of IT solutions. The focus is currently on three areas - Cyber Security<br />
(based on the former Wick Hill); Advanced Networking (based on the former Zycko) and Unified<br />
Communications (based on the former SIPHON). In July 2017, Nuvias added Benelux value<br />
added distributor and security specialist DCB to the Group. All four award-winning companies<br />
had previously demonstrated their ability to provide innovative technology solutions from worldclass<br />
vendors, and deliver market growth for vendor partners and customers.<br />
RESELLER OF THE YEAR<br />
WINNER: Q Associates<br />
RUNNER UP: Brookcourt Solutions<br />
As an award-winning platform, data and services specialist, Q Associates are helping<br />
organisations across the commercial and public-sector drive innovation and leverage the best<br />
services and technologies. including:<br />
Expert IT consultation and advisory services<br />
Converged, hyper-converged and cloud-based solutions<br />
Data protection, compliance and information security<br />
Our people make us different. Our technical experts are there to remove your IT complexity,<br />
enable digital transformation and help you meet the changing demands of your business through<br />
a number of IT solutions.<br />
PRODUCT OF THE YEAR<br />
WINNER: Silver Peak - Unity EdgeConnect<br />
RUNNER UP: Netreo - OmniCenter<br />
Silver Peak’s Unity EdgeConnect SD-WAN solution<br />
Delivered in both virtual and physical appliances, the Silver Peak Unity EdgeConnect softwaredefined<br />
WAN (SD-WAN) solution dramatically reduces the cost and complexity of building a<br />
WAN by providing the flexibility to use any combination of transport technologies – including<br />
broadband – to connect users to applications. EdgeConnect is the industry's leading SD-WAN<br />
solution that frees businesses from their dependency on routers. In addition, EdgeConnect is<br />
application-driven, so it automatically learns and adapts to constantly changing network<br />
conditions. Fully compatible with existing WAN infrastructure, EdgeConnect provides a graceful<br />
migration to an SD-WAN and, ultimately, to the thin branch by simplifying the WAN architecture.<br />
COMPANY OF THE YEAR<br />
WINNER: Nuvias<br />
RUNNER UP: Brookcourt Solutions<br />
Nuvias Group is the pan-EMEA, high value distribution business, which is redefining<br />
international, specialist distribution in IT. The company has created a platform to deliver a<br />
consistent, high value, service-led and solution-rich proposition across EMEA. This allows partner<br />
and vendor communities to provide exceptional business support to customers and enables new<br />
standards of channel success. Nuvias currently has three main practice areas - cyber security,<br />
advanced networking and unified communications. Nuvias has 21 regional offices across EMEA,<br />
as well as serving additional countries through those offices. Turnover is around US$ 500 million.<br />
34 NETWORKcomputing MARCH/APRIL 2018 @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
EUROPE’S LARGEST UNIFIED COMMUNICATIONS AND COLLABORATION EVENT<br />
SMARTER COLLABORATION<br />
16 -17 May 2018, ExCeL London<br />
COLLABORATION CLOUD NETWORKS A.I.<br />
SECURITY CUSTOMER<br />
CONTACT<br />
Seamless Communications<br />
Flexible working<br />
True mobility<br />
Easy collaboration<br />
Increased workforce productivity<br />
Smarter collaboration<br />
Register FREE today and save £35<br />
*Visitors not registered by 7pm on Tuesday 15th May 2018 will be charged a fee of £35.<br />
Find out more at www.ucexpo.co.uk<br />
2017<br />
SPONSORS: