14.05.2021 Views

Apr-May-Jun 2021

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NETWORKcomputing<br />

I N F O R M A T I O N A N D C O M M U N I C A T I O N S – N E T W O R K E D www.networkcomputing.co.uk<br />

SAFE TO NETWORK?<br />

Protecting your data in a post-pandemic environment<br />

IoT TO THE RESCUE?<br />

How IoT tech can boost<br />

and support the economy<br />

MONITORING<br />

PROGRESS<br />

Monitoring your network<br />

in the time of COVID-19<br />

THE CUTTING EDGE<br />

Examining the evolution of<br />

edge computing<br />

MAY/JUNE <strong>2021</strong> VOL 30 NO 02


We will be opening nominations soon for the <strong>2021</strong> Awards. Once again, we will be asking you<br />

to tell us which products, companies and individuals have impressed you. Look out for further<br />

announcements from us over the coming weeks.<br />

ATTENTION VENDORS:<br />

There is still time - if you are quick - to ensure that your chosen solutions join the list of<br />

contenders in the BENCH TESTED PRODUCT OF THE YEAR category. You will need to book<br />

them in to be independently reviewed for Network Computing as soon as possible and ensure<br />

that the solution can be made available to a reviewer from that moment.<br />

We also want to hear about impressive work you have done to help your customers so we may<br />

consider it for the NETWORK PROJECT OF THE YEAR.<br />

Finally, there will also be opportunities to be involved as a sponsor.<br />

To discuss any of the above , please contact dave.bonner@btc.co.uk<br />

WWW.NETWORKCOMPUTINGAWARDS.CO.UK


COMMENT<br />

COMMENT<br />

NEW THREATS IN THE PIPELINE<br />

At the time of going to press the US fuel pipeline operated by Colonial Pipeline has been<br />

taken offline due to a ransomware attack by the hacking group DarkSide. The cyberattack<br />

was so significant (Colonial has never taken its entire network offline before) that it<br />

was addressed directly by President Biden, who said that his administration "will be pursuing a<br />

global effort of ransomware attacks by transnational criminals who often use global moneylaundering<br />

networks to carry them out." The pipeline supplies millions of gallons of fuel a day,<br />

and it appears that the hacking group stole around 100 gigabytes of data before encrpyting<br />

Colonial's network. It's still unclear whether any of the ransom has actually been paid, but<br />

DarkSide subsequently posted a press release on their website stating that "Our goal is to make<br />

money, and not creating problems for society." So that's alright then...<br />

Commenting on the attack Andy Norton, European Cyber Risk Officer at Armis said: "These<br />

'Cyber Physical' attacks are a big deal, because they demonstrate just how fragile the provision<br />

of critical services are into society. A few weeks ago a water treatment plant was compromised<br />

leading to the potential for poisoning of the water. Now, 45% of the US oil energy provision has<br />

been switched off to the East coast. Prolonged shortages in critical services lead to civil unrest,<br />

economic pressures, and a general lack of confidence in public administration. What is equally<br />

troubling is the lack of progress critical infrastructure providers seem to be making in being<br />

resilient to these attacks."<br />

For some this attack is another high profile indication of how cybercrime has both flourished<br />

and expanded its attack vectors during the pandemic. "We used to separate cybercrime versus<br />

physical world crime and view the impact differently. Even legislation is more documented for<br />

physical crime, compared to cybercrime where we are now slowly maturing," said Calvin Gan,<br />

Senior Manager with F-Secure's Tactical Defense Unit. "However, if there's one thing the pandemic<br />

has changed, it's the acceleration rate of cybercrime. With convergence of technologies being<br />

connected through the Internet, we now have a concrete view of how cybercrime impact has<br />

spread not only across the Internet but also to the physical world. Attacks such as ransomware<br />

on Critical National Infrastructure is just one example of how cybercrime can affect people<br />

directly or indirectly. With emergency laws needed to be passed to respond to cyber attacks, this<br />

is a clear sign that there is now increased interest by attackers to target these industries."<br />

To this end you'll find a number of articles in this issue that explore how we can best safeguard<br />

our data: from the importance of cloud backups to the value of prioritising data security over<br />

network security, and the ramifications of potential real-world disasters such as the recent fire at<br />

the OVHCloud data centre in Strasbourg. Back in 2017 The Economist famously stated that<br />

"The world's most valuable resource is no longer oil, but data." Is your business prepared for the<br />

threats coming down the pipeline? NC<br />

REVIEWS:<br />

Dave Mitchell<br />

DEPUTY EDITOR: Mark Lyward<br />

(netcomputing@btc.co.uk)<br />

PRODUCTION: Abby Penn<br />

(abby.penn@btc.co.uk)<br />

DESIGN: Ian Collis<br />

(ian.collis@btc.co.uk<br />

SALES:<br />

David Bonner<br />

(david.bonner@btc.co.uk)<br />

Julie Cornish<br />

(julie.cornish@btc.co.uk)<br />

SUBSCRIPTIONS: Christina Willis<br />

(christina.willis@btc.co.uk)<br />

PUBLISHER: John Jageurs<br />

(john.jageurs@btc.co.uk)<br />

Published by Barrow & Thompkins<br />

Connexion Ltd (BTC)<br />

35 Station Square,<br />

Petts Wood, Kent, BR5 1LZ<br />

Tel: +44 (0)1689 616 000<br />

Fax: +44 (0)1689 82 66 22<br />

SUBSCRIPTIONS:<br />

UK £35/year, £60/two years,<br />

£80/three years;<br />

Europe:<br />

£48/year, £85/two years £127/three years;<br />

ROW:<br />

£62/year, £115/two years, £168/three years;<br />

Subscribers get SPECIAL OFFERS — see subscriptions<br />

advertisement; Single copies of<br />

Network Computing can be bought for £8;<br />

(including postage & packing).<br />

© <strong>2021</strong> Barrow & Thompkins<br />

Connexion Ltd.<br />

All rights reserved.<br />

No part of the magazine may be<br />

reproduced without prior consent, in<br />

writing, from the publisher.<br />

GET FUTURE COPIES FREE<br />

BY REGISTERING ONLINE AT<br />

WWW.NETWORKCOMPUTING.CO.UK/REGISTER<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

MAY/JUNE <strong>2021</strong> NETWORKcomputing 03


CONTENTS<br />

CONTENTS<br />

M A Y / J U N E 2 0 2 1<br />

A CRITICAL TEST....................8<br />

The NetAlly LinkSprinter® Pocket Network<br />

Tester has enabled a non-profit healthcare<br />

organisation to provide assured connectivity<br />

into its critical patient bedside monitoring<br />

VLAN for COVID-19 patients<br />

COMMENT.....................................3<br />

New threats in the pipeline<br />

INDUSTRY NEWS.............................6<br />

The latest networking news<br />

ARTICLES<br />

REDEFINING ENTERPRISE<br />

NETWORKS.......................................9<br />

By Alan Hayward at SEH Technology<br />

5G: THE YEAR AHEAD.......................10<br />

By Jeremy Spencer at BT Enterprise<br />

DEVICE MANAGEMENT IN A<br />

CORPORATE ENVIRONMENT...........12<br />

By Nadav Avni at Radix Technology<br />

ENSURING SD-WAN CONVERSION<br />

SUCCESS........................................14<br />

By Sanjay Radia at NETSCOUT<br />

DATA PROTECTION.............16<br />

Our data protection feature considers the<br />

growing importance of cloud backup for SMBs<br />

and the value of prioritising data security over<br />

that of the network. Will our data protection<br />

policies need to adapt post-pandemic?<br />

MONITORING PROGRESS...27<br />

If 2020 taught us anything it's that network<br />

monitoring has become more important than<br />

ever, writes Mark Towler at Progress<br />

EDGE AND IoT........................22<br />

Is Network-as-a-Service set to redefine<br />

edge computing, and how will the growth<br />

of IoT and edge devices impact businesses<br />

moving forward? Read our feature in this<br />

issue to find out<br />

THE CONNECTIVITY<br />

CONUNDRUM......................30<br />

Lee Wade of Exponential-e explains why<br />

connectivity is the final piece in the home<br />

working productivity puzzle<br />

THE CLOUD BACKUP OPPORTUNITY<br />

FOR MSPS.........................................16<br />

By Carl Oliver at Giacom<br />

WHY THE SECURITY INDUSTRY IS<br />

PROTECTING THE WRONG THING...18<br />

By Paul German at Certes Networks<br />

DATA PROTECTION IN A POST-<br />

PANDEMIC ENVIRONMENT............20<br />

By Adam Strange at Titus<br />

NOW’S THE TIME FOR NAAS............22<br />

By Simon Wilson at Aruba UK&I<br />

IoT TO THE RESCUE?......................24<br />

By Nick Sacke at Comms365<br />

CLOSER TO THE EDGE...................26<br />

By Simon Michie at Pulsant<br />

THE VISIBLE BENEFITS OF<br />

AUTOMATION..............................28<br />

By Adrian Rowley at Gigamon<br />

THE DIGITAL TRANSFORMATION<br />

DILEMMA......................................29<br />

By The Workforce Institute at UKG<br />

THE WEAK LINK IN THE CHAIN.......32<br />

By Steph Charbonneau at HelpSystems<br />

IS YOUR DATA FIREPROOF?...........34<br />

By Stephen Young at AssureStor<br />

PRODUCT REVIEW<br />

WHATSUP GOLD <strong>2021</strong>......................15<br />

EXAGRID TIERED BACKUP STORAGE....21<br />

04 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


INDUSTRYNEWS<br />

NEWS NEWS NEWS<br />

NEWS NEWSNEWS<br />

NEWS<br />

NEWS<br />

Palo Alto forms new cybersecurity consulting group<br />

Palo Alto Networks is establishing a new cybersecurity<br />

consulting group to help enterprises respond to emerging<br />

threats as they navigate an increase in costly, crippling<br />

cyberattacks. The newly expanded Unit 42 combines formerly<br />

Crypsis security consultants, who respond to 1,300+ incidents a<br />

year, with the company's veteran Unit 42 threat research team,<br />

which has been fighting emerging cyberthreats since 2014.<br />

Together, they will help organisations tackle the most complex<br />

cyberthreats, from ransomware to state-sponsored espionage.<br />

Wendi Whitmore,<br />

Palo Alto Networks<br />

Since it was founded in 2014, Unit 42 has produced more<br />

than 650 reports and regularly partners with governments<br />

around the globe to fight cybercrime. "Our increasing reliance<br />

on technology has turned cybersecurity into an existential<br />

matter," said Wendi Whitmore, senior vice president of cyber<br />

consulting and threat intelligence at Palo Alto Networks. "We<br />

wake up every day focused on collecting and analysing the<br />

most up-to-date threat intelligence and applying our analysis to<br />

respond to cyberattacks."<br />

Velociraptor adds bite to Rapid7<br />

Rapid7 has acquired Velociraptor, a leading open-source<br />

technology and community used for endpoint monitoring,<br />

digital forensics, and incident response. Velociraptor was<br />

developed for digital forensics and incident response (DFIR)<br />

professionals who need a powerful and efficient way to hunt for<br />

and monitor malicious activities across endpoints.<br />

Velociraptor's community-driven approach allows the collective<br />

wisdom of the DFIR community to be gathered in one place and<br />

made accessible to others. Velociraptor is unique in that it allows<br />

custom detections, collections and analyses capabilities to be<br />

written in queries, rather than code. Those queries can then<br />

easily be shared, strengthening the knowledge of the community<br />

and allowing teams to hunt for new threats more quickly.<br />

Network security issues prolong pandemic downtime<br />

More than a year after the mass shift to remote working, over<br />

half (54%) of organisations are still suffering downtime and<br />

disruption as a result of network security issues, according to new<br />

data from the Neustar International Security Council (NISC).<br />

Surveying security professionals across EMEA and the US, 61% of<br />

respondents reported suffering either significant or moderate<br />

downtime or disruption in the first six months of the pandemic,<br />

caused by employees having to work from home. However the<br />

majority of respondents (89%) agreed that the challenges posed<br />

by the pandemic have strengthened their organisation's network<br />

security against potential future attacks. In addition, 79% believed<br />

that the situation over the last year has triggered an improvement<br />

to their corporate VPNs to make them more secure.<br />

"The challenge with using VPNs to allow approximately 95% of<br />

the workforce to log on remotely is that cybercriminals<br />

understand that the hardening of connectivity from a denial-ofservice<br />

point of view hasn't always been done," Joffe continued.<br />

"A DDoS attack that is encapsulated in a VPN packet will only<br />

be revealed when the packet reaches the VPN server and is<br />

opened up – by then, it's too late. For this reason, VPNs will<br />

continue to be the target of choice, it's down to the organisation<br />

itself to make them as secure as possible."<br />

iTrinegy receives Queen's Award for Enterprise<br />

itrinegy has been honoured with a Queen's Award for<br />

Enterprise for International Trade. Stevenage-based iTrinegy is<br />

one of a few organisations to be recognised with the annual<br />

Queen's Award for Enterprise which is the UK's most prestigious<br />

award for business success and presented by Her Majesty The<br />

Queen on the advice of the Prime Minister. iTrinegy was set up in<br />

2006 and its Software Defined Test Networks (Network<br />

Emulation) technology provides organisations with a way to<br />

create real-world network conditions in which to analyse, predict<br />

and verify application performance before deploying<br />

applications into potentially challenging network environments.<br />

"We are thrilled to have been chosen for this award," said<br />

Graham Wood, Director at iTrinegy. "Although iTrinegy has been<br />

widely recognised for our technical achievements and is the<br />

proud recipient of many awards over the years, we are a<br />

business and can only be successful if our technology is valued<br />

by our customers resulting in sales growth. The Queen's Award<br />

for Enterprise: International Trade <strong>2021</strong> is a fantastic<br />

endorsement for iTrinegy as a successful business as well as a<br />

great technology company."<br />

06 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


INDUSTRYNEWS<br />

Consortium established to test IoT network security<br />

Acisco-led consortium of partners will demonstrate how<br />

artificial intelligence and blockchain can robustly secure<br />

Internet of Things (IoT) networks through i-Trace, a partgovernment<br />

funded, co-innovation project that will serve as a<br />

step forward in the digital transformation of national<br />

infrastructure. Integrated smart infrastructure solutions<br />

company, Costain, has joined the i-Trace consortium to<br />

conduct real-world cybersecurity trials in construction machine<br />

telematics and connected sites sensing and monitoring.<br />

Using real-world data from live Costain project sites, the<br />

project will demonstrate how the unique i-Trace solution brings<br />

together two complementary technologies to secure critical<br />

data. Firstly, using machine learning systems to detect security<br />

threats on IoT devices via the network. Secondly, using<br />

distributed ledger technology (DLT) to guarantee that the data<br />

generated by these IoT devices is tamperproof and immutable,<br />

wherever it is in the network. These technologies will be<br />

deployed across Costain's networks to secure M2M telematics,<br />

connected IoT sensors and monitoring equipment. The<br />

consortium is comprised of experts from Cisco, BT, Senseon,<br />

the Warwick Manufacturing Group (WMG) at the University of<br />

Warwick, and Costain. i-Trace is part-government funded<br />

through Innovate UK and the UKRI's Strategic Priorities Fund.<br />

UK Department for Education loses nearly 200 devices<br />

The Department for Education (DFE) has seen nearly 200<br />

devices including laptops and mobile phones lost or stolen<br />

over the last two years, according to official figures. The data,<br />

which was obtained under a Freedom of Information (FOI) Act<br />

inquiry by the Parliament Street think tank has revealed the<br />

number of lost and stolen gadgets since 2019. Overseen by<br />

Secretary of State for Education Gavin Williamson, the DFE is<br />

responsible for child protection, education, apprenticeships,<br />

and wider skills in England, and has seen remote working surge<br />

due to the Covid-19 pandemic. Of the total 196 devices<br />

reported missing, mobile phones were the most common, with<br />

145 missing in total since 2019, 22 of which were Blackberries.<br />

In <strong>Apr</strong>il 2020 the Department for Education launched a free<br />

online learning platform to help people pick up digital and<br />

cyber skills while in lockdown. The DFE has also dispatched<br />

1.29 million laptops and tablets as part of a scheme to provide<br />

over 1.3 million devices to disadvantaged and vulnerable<br />

children and young people with devices and connectivity to<br />

access remote learning during the 2020/21 academic year.<br />

Edward Blake, Area Vice President, Absolute Software UK&I<br />

comments: "For under-pressure IT teams, managing and<br />

ensuring each and every device is cyber secure and accounted<br />

for is no easy task. Therefore, it is more critical than ever to<br />

have a permanent digital connection to every endpoint, as well<br />

as the ability to lock, freeze or wipe the device if it is at risk of<br />

being compromised. Young people must be able to learn<br />

remotely without risk of cyber attack."<br />

Fluke Networks launches LinkIQ Cable+Network tester<br />

Fluke Networks has launched the LinkIQ Cable+Network<br />

tester, which combines switch diagnostics with state-of-theart<br />

cable measurement technology to enable installers, system<br />

integrators and network support professionals to easily<br />

troubleshoot network cabling and/or connect Power over<br />

Ethernet (PoE) devices to the network. The product provides<br />

simple pass/fail test reports using the company's innovative<br />

LinkWare PC Cable Test Management Software. It can also<br />

verify the performance of switches, including those that provide<br />

Power over Ethernet.<br />

The LinkIQ is based on a single-test approach that<br />

automatically provides the appropriate measurements based on<br />

what is at the other end of the cable. For an open cable, it shows<br />

the length and pairing. If this is terminated with the supplied<br />

remote, the test result shows the maximum data rate the cable<br />

can support – up to 10 Gb/s. However, if the cable is connected<br />

to a switch port, LinkIQ will show the name of the switch plus the<br />

port name, VLAN, speed, and duplex. If PoE is advertised, it will<br />

display the power and class (up to 90 W or Class 8) and then<br />

load the switch to verify the power can be delivered.<br />

The LinkIQ uses LinkWare PC, Fluke Networks' reporting<br />

software, which is the industry's de facto standard reporting<br />

solution. The simplest way to manage report data is with a free<br />

copy of LinkWare. The results from a wide variety of Fluke<br />

products can be stored and accessed, or PDF reports may be<br />

generated using the software.<br />

NEWS NEWSNEWS<br />

NEWS<br />

NEWS NEWS NEWS NEWS NEWS<br />

NEWS<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

MAY/JUNE <strong>2021</strong> NETWORKcomputing 07


CASESTUDY<br />

COVID IMPACTS REQUIRE ACCURATE NETWORK TESTING<br />

THE NETALLY LINKSPRINTER POCKET NETWORK TESTER HAS ENABLED A NON-PROFIT HEALTHCARE<br />

ORGANISATION TO PROVIDE ASSURED CONNECTIVITY INTO ITS CRITICAL PATIENT BEDSIDE MONITORING<br />

VLAN FOR COVID-19 PATIENTS<br />

the critical slot/port and VLAN<br />

configuration<br />

DHCP and DNS network services<br />

Connectivity to user-defined internal or<br />

external resources<br />

WWith the COVID-19 pandemic,<br />

healthcare systems around the world<br />

needed to rapidly expand capacity to<br />

effectively treat a large number of critical care<br />

patients. With this possible exponential growth<br />

in the numbers of patients needing treatment,<br />

this healthcare provider embarked on a plan<br />

to convert standard patient wards in their<br />

hospitals to ICU-level (intensive care unit)<br />

emergency overflow wards.<br />

While many departments rely on bedside<br />

telemetry systems that can utilise Wi-Fi<br />

networks for connectivity, COVID-19 surge<br />

patients require full bedside monitors (and the<br />

respirator systems needed for treatment of<br />

COVID-19) that rely on wired network<br />

connections to meet the standard for ICU-level<br />

care. That link must provide assured<br />

connectivity into the critical patient bedside<br />

monitoring VLAN.<br />

The provider's biomedical device technicians<br />

needed the ability to effectively and quickly<br />

survey the available network connections in the<br />

wards that were being converted. This involved<br />

identifying which switch/slot/port served each<br />

jack in the ward that would be utilised for the<br />

bedside systems, and creating a document of<br />

the current configuration which would be<br />

supplied to their network operations team so<br />

that the proper port reassignment work could<br />

be completed.<br />

The problem was that they had no quick and<br />

easy way to identify the port assignments.<br />

Manual methods, such as utilising a<br />

cumbersome laptop, hand-writing the<br />

information (including the room, wall-plate,<br />

and jack numbers), and collating that data for<br />

the report to the network team was time<br />

consuming and open to error. In the delivery of<br />

patient care, errors are simply unacceptable.<br />

SOLUTION<br />

Their biomed technician team turned to the<br />

NetAlly LinkSprinter® Pocket Network Tester<br />

and the secure Link-Live cloud service. As a<br />

small device, LinkSprinter is easily carried to<br />

and around the wards. One-button<br />

automation ensures that every test is executed<br />

consistently, across the entire team of<br />

technicians, and a comprehensive connectivity<br />

test is completed in less than 10 seconds. This<br />

test returns data about:<br />

Power over Ethernet (PoE) if present<br />

Ethernet link speed and duplex<br />

Connected switch information, including<br />

The technicians can verify the progress of the<br />

testing with the unit's color-coded test icons,<br />

and view detailed test data by connecting their<br />

phone to the embedded Wi-Fi radio. The test<br />

result is annotated with the patient room<br />

number, and jack identification. The<br />

LinkSprinter was able to assess the hospital's<br />

network port configurations quickly and<br />

accurately, automatically uploading results into<br />

the Link-Live Cloud Service.<br />

Best of all, the test results are automatically<br />

uploaded to the secure Link-Live cloud portal,<br />

where centralised job supervisors can easily<br />

see and manage the progress of the testing,<br />

and quickly create accurate documentation for<br />

the change order needed by network<br />

operations. Once the port assignments have<br />

been changed, LinkSprinter provides the team<br />

with a fast way to verify that the port is up,<br />

assigned to the critical VLAN, with connectivity<br />

to essential services.<br />

RESULTS<br />

"With the segmentation of the biomedical<br />

equipment on these special VLANs, we have to<br />

be very precise on connectivity," explains their<br />

Medical Device Integration Manager. "Using<br />

LinkSprinter with the data upload and reporting<br />

in Link-Live eliminates the margin of error,<br />

which is critical in this environment. The time<br />

savings is huge, and the data quality prevents<br />

mistakes - we love it!" NC<br />

For more information on the NetAlly<br />

LinkSprinter® Pocket Tester visit:<br />

www.netally.com/products/linksprinter/<br />

08 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION<br />

REDEFINING ENTERPRISE NETWORKS<br />

IT'S NOW TIME TO TAKE THE LESSONS LEARNT IN THE PANDEMIC<br />

AND LOOK FORWARD TO NEW ENTERPRISE NETWORK TRENDS,<br />

ACCORDING TO ALAN HAYWARD, SALES & MARKETING MANAGER<br />

AT SEH TECHNOLOGY<br />

The coronavirus has changed the way we<br />

work forever. With most employees now<br />

working from home, we have seen the<br />

rise of online workspaces. In this new digital<br />

age, technologies have been vital in improving<br />

communication and collaboration, to ensure<br />

workers can complete their work as effectively<br />

and efficiently as they would have in the office<br />

environment. These include cloud-based<br />

communication and data solutions which<br />

allow businesses to run from anywhere in the<br />

world, with ease.<br />

Many companies have been maximising the<br />

benefits of using cloud-based solutions as they<br />

create secure environments to easily access<br />

and share data, as well as facilitating the tools<br />

needed to communicate with colleagues in<br />

real time. As a result, employees have been<br />

able to better adapt to working remotely using<br />

devices like laptops or desktops at home.<br />

The recent Future Forum Research from<br />

Slack found that out of 4,700 knowledge<br />

workers surveyed, the majority never want to<br />

return to their old ways of working. In fact,<br />

only 12% want to return to full-time office<br />

work and a staggering 72% want their<br />

employers to implement a hybrid remoteoffice<br />

model moving forward. This puts more<br />

pressure on companies to meet the increasing<br />

'work-from-anywhere' expectations, and it's<br />

likely that we will see more businesses<br />

investing in resources to safely simplify and<br />

automate network complexity.<br />

INCREASING SECURITY MEASURES<br />

Many traditional network infrastructures were<br />

not created to support rapidly developing<br />

digital ecosystems, and can no longer provide<br />

the levels of security and control required. With<br />

traffic no longer from one central company<br />

data centre, but multiple cloud-based<br />

locations and virtual workspaces, it has<br />

become increasingly difficult to manage.<br />

Businesses should take a step back to consider<br />

the emerging security risks of working from<br />

home, in terms of systems access, internal<br />

network infrastructures and bandwidth. One of<br />

the easiest ways that organisations can secure<br />

data as it moves from internal systems to<br />

external devices is to deploy a VPN. This<br />

provides an additional layer of security by<br />

hiding the user's IP address and encrypting<br />

data transfers in transit.<br />

It's also important to make sure up-to-date<br />

security protection is installed and active on all<br />

devices used by employees at home and in the<br />

office. This includes virus checkers, firewalls<br />

and device encryption. Businesses may also<br />

consider running an audit on employee<br />

passcodes, to ensure that all are reset and<br />

redefined in line with the company's security<br />

policy. Alphanumeric codes and two-factor<br />

authentication are recommended as this<br />

applies the strongest possible security<br />

protection across all employee devices.<br />

INVESTING IN A REMOTE ACCESS<br />

SOLUTIONS<br />

When employees are working from the<br />

office, it's easy for them to access the<br />

company's network. However, with remote<br />

working becoming a more permanent<br />

solution, employees will continue to require<br />

access to resources from home, meaning<br />

many companies are considering tools that<br />

offer scalability and flexibility as we move<br />

into <strong>2021</strong>.<br />

Dongle servers will easily allow employees to<br />

access their work from home and share USB<br />

dongle devices via the network. Not only can<br />

dongles be used via LAN connections, but also<br />

via VPN, VLAN, and the Internet. This ensures<br />

employees can stay productive whether they<br />

are working from home or in the office. With<br />

an encrypted point-to-point connection<br />

between the user and the dongle server,<br />

businesses can dynamically assign which<br />

employee is authorised to access each dongle,<br />

ensuring everyone can retrieve everything they<br />

need. Users can also request access as soon<br />

as a license becomes available, and once the<br />

software has been used by that individual, it<br />

will be securely relocated to the next in line.<br />

FUTURE OF ENTERPRISE NETWORKS<br />

The COVID-19 pandemic has changed the<br />

way that businesses operate, and its effects will<br />

last for the foreseeable future. At the start of<br />

the coronavirus, many companies were left<br />

grappling to adapt to remote working<br />

environments and unprecedented<br />

circumstances. While the new normal is still on<br />

the horizon, it's time to look to the future and<br />

adjust to new enterprise network trends.<br />

The biggest ongoing challenge will be<br />

facilitating the demand for remote working,<br />

as most employees have now become<br />

accustomed to the flexibility and convenience<br />

that it brings. We can expect to see a rise in<br />

hybrid working, as COVID-19 has clearly<br />

demonstrated that work can happen<br />

anywhere when it's digitised and connected.<br />

Hybrid environments will support flexible<br />

arrangements, replace dedicated offices and<br />

allow resources to be deployed when<br />

necessary. As a result, it's important for<br />

businesses to make sure that they have the<br />

right software and hardware tools available<br />

to support their enterprise networks, in<br />

addition to solid security measures and<br />

remote access capabilities. NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

MAY/JUNE <strong>2021</strong> NETWORKcomputing 09


OPINION<br />

5G: THE YEAR AHEAD<br />

JEREMY SPENCER, GENERAL MANAGER OF CORPORATE<br />

PROPOSITIONS, BT ENTERPRISE, EXPLAINS HOW 5G CAN BETTER<br />

ENABLE THE DIGITAL TRANSFORMATION JOURNEY<br />

For the past decade, 5G, as with many<br />

emerging technologies, has often fallen<br />

into the trap of being seen as more of a<br />

buzzword than a technology with true business<br />

impact. In fact, recent research conducted by<br />

BT highlights that many business leaders are<br />

still unclear on how the technology can be best<br />

leveraged, and importantly, how it can tie into<br />

and support core organisational and<br />

commercial goals. Of the 1,000 UK business<br />

leaders we surveyed, only 11% of respondents<br />

said they are currently using 5G.<br />

But as the rollout of the 5G network continues<br />

across the UK this year, there will be no doubt<br />

that when adopted and implemented in the<br />

right way, 5G will bring enormous and exciting<br />

potential to save time, boost productivity,<br />

unlock innovation and contribute to a<br />

sustainable business future. The main<br />

challenge for businesses over the coming year<br />

will be for leaders to make the link between 5G<br />

adoption and their strategic objectives.<br />

Outside of enterprise, 5G adoption is steadily<br />

on the rise. Recent research from CCS Insight<br />

suggests that by next year, almost two-thirds of<br />

new phones in <strong>2021</strong> will be 5G-enabled. This<br />

is relevant, as it is widespread consumer<br />

acceptance and adoption which will lay the<br />

foundations for the same uptake in an<br />

enterprise setting. Over the past couple of<br />

years, 5G testbeds have been emerging across<br />

the country as businesses across all sectors start<br />

to experiment with the technology to test its<br />

potential and seek an early adopter advantage<br />

over their competitors. This year we can expect<br />

to see this trial and testing phase evolve into<br />

widespread commercial deployment of the<br />

technology, as businesses from all sectors look<br />

to capitalise on the benefits that ultrafast,<br />

uninterrupted connectivity can bring them.<br />

5G IN MANUFACTURING<br />

The work we're doing with the Worcestershire<br />

5G Testbed (W5G) is a fantastic example of<br />

how the technology can be used, and what it<br />

can power. We're working to accelerate the<br />

testbed's vision of smart manufacturing -<br />

delivered through the UK's first live 5G factory<br />

installation. By creating a smart factory where<br />

machines can learn and adapt to changes on<br />

the factory floor as they happen, productivity<br />

will be boosted through instant, autonomous<br />

decisions which will benefit the production line.<br />

The insight gleaned from the W5G will be used<br />

to stimulate innovation across the<br />

manufacturing sector in the region and beyond.<br />

SMART DEVICES TOP THE AGENDA<br />

With the introduction of 5G-enabled smart<br />

devices, such as collision detection sensors,<br />

the emerging technology will provide an<br />

almost immediate benefit to the<br />

manufacturing industry, but other sectors will<br />

be able to learn and benefit from these<br />

testbeds too. As commercial adoption of 5G<br />

increases, retailers can look to leverage the<br />

emerging technology to provide a more<br />

personalised experience for consumers via<br />

mobile applications and potentially even<br />

smart glasses.<br />

Experiential shopping is a major draw for<br />

consumers, particularly as brick-and-mortar<br />

stores find themselves under pressure from<br />

declining footfall amidst Covid-19. Adoption<br />

of 5G-connected smart glasses could one day<br />

offer consumers the ability to view items such<br />

as clothing without having to try them on.<br />

APPLYING 5G TO HEALTHCARE<br />

Once widespread adoption levels have been<br />

reached, 5G is going to revolutionise the<br />

healthcare industry. We are beginning to see this<br />

take place already. Last year, BT demonstrated a<br />

powerful example of how 5G can transform<br />

healthcare and emergency services, with the<br />

UK's first remote-controlled ultrasound scan<br />

over a public 5G network. In practice, this<br />

means that an ultrasound could be performed<br />

by a paramedic inside a moving ambulance.<br />

Remote, real-time diagnostics is a key trend<br />

we can expect to see develop in <strong>2021</strong>, as 5G<br />

adoption increases, and consumers become<br />

more and more familiar and comfortable with<br />

remote interaction, a familiarity that will extend<br />

to critical sectors such as healthcare.<br />

However, there is still much work to be done.<br />

Excluding VOIP, nearly half (48%) of our survey<br />

respondents said they aren't using any of the<br />

emerging technologies we listed - including 5G<br />

- with 38% saying they don't have a plan to<br />

adopt any of them in the next five years. The<br />

healthcare sector is under more pressure than<br />

ever, and technology should play a key role in<br />

making its work more efficient and effective.<br />

CHANGE BEGINS AT THE TOP<br />

<strong>2021</strong> will see 5G shift from a boardroom<br />

buzzword to the subject of a more meaningful<br />

conversation around how it can help achieve<br />

business priorities. Covid-19 has ushered in a<br />

huge wave of digital transformation, as<br />

businesses race to meet rapidly shifting<br />

customer and employee expectations. If<br />

businesses want to keep up with the times, and<br />

continue to deliver value, adoption of emerging<br />

technologies, particularly 5G, will help them on<br />

their journey. NC<br />

10 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


One Platform for<br />

Digital Business<br />

• Process<br />

• Content<br />

• Governance<br />

Modern Architecture<br />

• Developer-friendly<br />

• Open<br />

• Cloud-ready<br />

Faster Time to Value<br />

• Deploy<br />

• Adopt<br />

• Build<br />

Learn more at alfresco.com | Contact us at info@alfresco.com<br />

Alfresco EMEA: +44 (0) 1628 876 500 | Alfresco Americas: +1 888 317 3395<br />

Alfresco Asia Pacific: +61 2 8607 8539


OPINION<br />

OPTIMISING AND SECURING DEVICE<br />

MANAGEMENT IN A CORPORATE<br />

ENVIRONMENT<br />

IS THERE A DEVICE MANAGEMENT SOLUTION POWERFUL<br />

ENOUGH TO SUPPORT YOUR CORPORATE NEEDS? NADAV<br />

AVNI AT RADIX TECHNOLOGY OFFERS A GUIDE<br />

The proliferation of digital devices used<br />

in every organisation has only grown in<br />

the past few years. Digital devices<br />

provide greater flexibility and mobility for<br />

companies, but they also create more of a<br />

burden on IT teams and administrators to<br />

manage it all. Mobile devices have more<br />

capabilities than ever before - and they're<br />

accessing more sensitive and property data,<br />

too. In fact, 42% of enterprises now<br />

consider themselves mobile-first. As more<br />

employees moved to remote work, it<br />

underscored the need for greater security. At<br />

the same time, it made device management<br />

more difficult for IT teams.<br />

Mobile Device Management (MDM) allows<br />

the remote management of every device in<br />

an organisation's fleet from a centralised<br />

platform that's accessible from anywhere. It<br />

gives complete control of devices and<br />

provides a way to manage settings, policies,<br />

and security in one place.<br />

THE IMPORTANCE OF MDM<br />

Nearly three-quarters (74%) of CFOs said<br />

they expect to keep some employees<br />

working from home and shift others to<br />

remote work permanently. The need to<br />

manage devices remotely isn't going away<br />

even when the pandemic is over. Even when<br />

employees are working on-site, they still use<br />

mobile devices.<br />

Smartphones, laptops, tablets, and other<br />

single-use devices all need management.<br />

Workers may be in different locations than<br />

IT administrators. MDM allows efficient<br />

remote management of every device in the<br />

fleet regardless of the administrators' and<br />

employees' location.<br />

Some of the core functions of mobile<br />

device management include:<br />

Managing setting and policies<br />

Monitoring app usage and performance<br />

Updating equipment, software, and<br />

applications<br />

Monitoring health of equipment<br />

Monitoring equipment location, status,<br />

and activity<br />

Remote device control for diagnosis and<br />

troubleshooting<br />

Encryption of email and files<br />

Segregation for work and personal<br />

device use, creating separate and<br />

secured environments for work data.<br />

MORE THAN SECURITY<br />

Most MDM solutions focus mainly on<br />

Enterprise Mobility Management (EMM) and<br />

the security layer. A fully-featured<br />

MDM/EMM system adds another layer that<br />

provides comprehensive device<br />

management. This gives IT administrators<br />

the ability to manage nearly every type of<br />

device running on every major operating<br />

system from one platform.<br />

Flexible solutions can be installed as an<br />

on-premises solution or in the cloud for<br />

reduced latency, redundancy, and end-toend<br />

security with encryption. When you're<br />

running a mobile device management<br />

platform in the cloud, the service provider<br />

automatically applies updates and<br />

patches. Hence, it's one more thing you<br />

won't need to worry about. It also makes it<br />

easier for administrators to access the<br />

platform remotely.<br />

MANAGING COMPLIANCE<br />

Mobile devices increase the possibility of<br />

data breaches or leaks. Besides the<br />

possibility of cyber-attacks, a staggering<br />

number of laptops and smartphones are lost<br />

or stolen. On average, 70 million devices<br />

are lost or stolen annually, with less than<br />

10% ever being recovered. This is an<br />

exceptionally big problem for managing<br />

12 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION<br />

compliance in regulated industries, such as<br />

healthcare, financial, and other businesses.<br />

A robust MDM/EMM software provides<br />

end-to-end security and encryption to protect<br />

data. Devices can be tracked with geofence<br />

and anti-theft filters. If a device leaves an<br />

authorised area, it triggers a warning note to<br />

administrators, who can remotely lock the<br />

device or wipe the data. MDM/EMM apps<br />

with advanced security features also create<br />

snapshots on the fly even while devices are<br />

running to make restoring or recovery from<br />

virus attacks or system crashes easier.<br />

Besides automated data audits, these<br />

functions help organisations comply with<br />

even the most stringent compliance<br />

regulations, including GDPR, the EU's<br />

General Data Privacy Regulations. It also<br />

acts as an essential element in complying<br />

with HIPAA, SOX, FISMA, PCI DSS, and<br />

other regulations.<br />

MORE EFFICIENT DEPLOYMENT<br />

Devices can be deployed in batches with<br />

preset configuration, settings, and corporate<br />

policies. By automating enrollment tasks, the<br />

devices can be up and running in your<br />

environment without user intervention. It all<br />

happens in the background the first time a<br />

device is fired up and connected to a network.<br />

Besides the platform's native and priority<br />

enrollment modules, devices can also be<br />

deployed using a range of platforms. This<br />

provides an extremely friendly out-of-box<br />

experience (OOBE) for employees without<br />

tying up IT teams for hours to configure<br />

new devices.<br />

TOOLS FOR ALL STAKEHOLDERS<br />

Modern MDM/EMM tools also provide<br />

sophisticated reporting tools to all<br />

stakeholders in the organisation. IT teams<br />

can manage the entire device fleet<br />

holistically or drill down to any individual<br />

device. Managers can look at adoption and<br />

usage rates. CFOs can look at the ROI.<br />

Each automated report can be customised to<br />

show what each group of stakeholders needs<br />

to make data-driven business decisions.<br />

TOOLS FOR OEMS AND VENDORS<br />

APIs are usually available for solution<br />

developers. That means the platform can be<br />

embedded in device firmware and integrated<br />

at the factory level for OEMs. System-level<br />

integration is also possible, so mobile device<br />

management software can be pre-installed<br />

and ready to go upon device delivery.<br />

MANAGING USE AND CONTENT<br />

Not every employee needs every functionality<br />

on every device. MDM software allows you<br />

to apply single-app or multi-app kiosk mode.<br />

This creates an encapsulated environment<br />

with access to the functionality and apps you<br />

determine. It creates a consistent look and<br />

feel for devices and control device elements,<br />

such as locking down external ports or<br />

preventing unauthorised interaction of noncompany<br />

installed apps. You can limit<br />

external internet use or enable/disable Wi-Fi<br />

or Bluetooth connections.<br />

DEVICE MANAGEMENT SOLUTION<br />

One of the biggest barriers to continued<br />

remote work is the lack of technology and<br />

infrastructure to allow remote employees to<br />

work productively. Therefore, implementing<br />

a modular and flexible MDM/EMM solution<br />

is key to successfully and efficiently<br />

managing your devices. Look for one that<br />

not only accomplishes the points listed<br />

above but one that also allows<br />

customisation for just about any use case.<br />

Take control of your entire mobile device<br />

fleet and gain the ability to finally manage<br />

nearly every aspect with ease. NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

MAY/JUNE <strong>2021</strong> NETWORKcomputing 13


OPINION<br />

ENSURING SD-WAN CONVERSION SUCCESS<br />

SANJAY RADIA, SALES ENGINEERING MANAGER AT NETSCOUT,<br />

EXPLAINS HOW TO DEPLOY AN SD-WAN WITHOUT INTERRUPTING<br />

BUSINESS CONTINUITY<br />

It has been a year since lockdown<br />

restrictions forced businesses to shift their<br />

entire workforces to remote working<br />

overnight. Some businesses were more<br />

prepared than others, having already enabled<br />

a level of remote working or having expanded<br />

to multiple locations, both of which require<br />

remote-office network changes. However, very<br />

few businesses were prepared for the sheer<br />

scale of the changes and demands that workfrom-home<br />

orders put on the network.<br />

To ensure the continued operation of<br />

businesses, overcoming these challenges and<br />

assuring reliable business service access for<br />

at-home workers became the key theme of<br />

2020. Many businesses opted for softwaredefined<br />

WAN (SD-WAN) solutions as a more<br />

cost effective and performant solution than<br />

traditional hardware-based WAN operations<br />

that were holding them back. However,<br />

although SD-WAN can reduce complexity,<br />

making the transition to SD-WAN is by no<br />

means a simple one.<br />

ASSURING SD-WAN CONVERSION<br />

SUCCESS<br />

A seamless transition to working from home<br />

involves the use and interaction of many<br />

different technologies to keep business<br />

running as usual. These include expanded<br />

virtual private networks (VPN) and virtual<br />

desktop infrastructure (VDI) deployments, as<br />

well as Voice Over IP (VoIP) services. However,<br />

SD-WAN services do not always support these<br />

critical services.<br />

The first step to converting from a<br />

hardware-based WAN to SD-WAN solution<br />

is to identify the solution that will work best<br />

for the requirements of the business. The aim<br />

is generally for this process to be as lighttouch<br />

as possible to ensure a smooth<br />

deployment with minimal hands-on<br />

involvement. With this in mind, it is common<br />

for businesses to look for an SD-WAN<br />

solution that already packages up the<br />

offerings of multiple technology vendors,<br />

such as VoIP services and Virtual Network<br />

Function (VNF) vendor solutions.<br />

However, despite all best intentions and<br />

research, it is possible for issues to arise as IT<br />

teams start to test the solution as part of the<br />

pre-deployment process. For example, the<br />

VoIP technology may not perform reliably over<br />

SD-WAN and the testing might produce false<br />

negatives. As we've all experienced over the<br />

past year, VoIP is critical for businesses to<br />

function remotely, so an issue arising at this<br />

stage could be devastating for a company,<br />

especially considering the time and money<br />

that will have already been invested in the SD-<br />

WAN conversion.<br />

VIRTUAL VISIBILITY TO THE RESCUE<br />

The scenario described above is a worst-case<br />

example, the good news is that this example<br />

was missing the vital component in SD-WAN<br />

conversion: visibility. With visibility this situation<br />

would not have occurred because the<br />

company's IT team would have been able to<br />

troubleshoot and resolve the VoIP over SD-<br />

WAN testing issues.<br />

Virtual visibility can identify the causes of<br />

problems that IT are not able to spot<br />

themselves. For instance, with the above<br />

example, visibility would reveal that the false<br />

negatives occurring during the testing were<br />

related to the IP address being used for the<br />

VoIP scripting data.<br />

Another problem that can arise in the<br />

process of conversion is that the business<br />

applications may be sensitive to data transfer<br />

processes on SD-WAN. This is where unified<br />

communications (UC) analytics can provide<br />

real-time monitoring of the issue and inform<br />

the fine-tuning that the IT team need to make.<br />

Virtual visibility and unified communications<br />

(UC) analytics are vital for troubleshooting<br />

and monitoring the conversion process. With<br />

these tools, IT teams can resolve issues in the<br />

virtual testing environment and fix them before<br />

the roll out process.<br />

Converting to SD-WAN is advisable for the<br />

many businesses adapting to the 'new normal'<br />

as well as ensuring future proofing. But only<br />

virtual visibility and UC analytics will assure<br />

conversion success and delivery of<br />

uninterrupted business services. NC<br />

14 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


PRODUCTREVIEW<br />

Progress Software<br />

WhatsUp Gold <strong>2021</strong><br />

PRODUCT REVIEW<br />

PRODUCT<br />

REVIEWPRODUCT RE<br />

Progress Software's WhatsUp Gold (WUG)<br />

is a great network monitoring choice for<br />

SMBs and enterprises and this latest<br />

version aims to make it even more appealing.<br />

WUG <strong>2021</strong> introduces enhanced log<br />

management and has the ability to collect<br />

Windows Event Logs plus Syslog events and<br />

present all the information in its main web<br />

console for easy analysis.<br />

WhatsUp Gold <strong>2021</strong> integrates tightly with the<br />

Elasticsearch analytics engine and provides<br />

extensive log search, filtering and export<br />

facilities. You can choose what events you want<br />

to collect, link events, conditions or trends with<br />

alerts and actions and create customisable<br />

dashboards in the main console for at-a-glance<br />

log status views.<br />

The simple points-based system employed by<br />

WUG <strong>2021</strong> takes all the guesswork out of<br />

licensing costs. Each device, regardless of the<br />

number of network interfaces, CPUs and so on<br />

is considered one element and costs one point<br />

while each monitored application or log<br />

management source costs ten points.<br />

Two versions are available with the Premium<br />

edition providing core functions such as<br />

discovery, interactive mapping, alerting and<br />

reporting plus cloud, device, network, storage<br />

and wireless monitoring. Optional add-on<br />

modules are available for virtualisation and<br />

application monitoring, network traffic analysis<br />

(NTA) and log management, which are all<br />

included in the Total Plus version.<br />

Installing WUG <strong>2021</strong> on a Windows Server<br />

2019 host was simple and the routine also<br />

loaded SQL Server 2017 Express and IIS. You<br />

don't have to do anything for your first network<br />

discovery as it runs this for on your local IP<br />

subnet and populates its dashboard with all<br />

network devices.<br />

Elasticsearch installation is included in the<br />

initial routine and you can choose the basic<br />

OSS version, which only accepts connections<br />

from the WUG <strong>2021</strong> host. If you want the<br />

version with authentication and encryption, you'll<br />

need to source and install this separately and<br />

point the WUG host at it.<br />

The WhatsUp Gold console is easy to use as it<br />

presents four menu options in its upper ribbon bar.<br />

You can swiftly run discoveries, view all network<br />

devices, pull up a wealth of analysis dashboards<br />

and access all WUG and add-on module settings.<br />

Analysis dashboards are a great feature as you<br />

can create multiple custom views, add columns<br />

and choose what you want to see. Anything<br />

WUG is capable of monitoring can be included<br />

making it easy to create NOC (network<br />

operations center) views for your support teams.<br />

Adding Windows and Syslog log data sources<br />

is a breeze as you choose monitored devices<br />

from the log settings page. For Windows Event<br />

Log sources, you can gather application, system<br />

and security logs and decide whether you want<br />

critical, error and warning levels as well.<br />

WhatsUp Gold's viewer window reveals all the<br />

log action over the selected time period and its<br />

search facility quickly finds a log of interest.<br />

Advanced filters can be used to fine-tune the<br />

information further by applying sets of log type<br />

criteria and you can add alert thresholds to<br />

provide notifications of unusual activity.<br />

Log management isn't the only new feature, as<br />

WUG's inbound REST API performance monitor<br />

has been enhanced with an outbound version<br />

allowing you to send information to WUG from<br />

third-party apps such as Microsoft 365 and<br />

Salesforce. Reporting also gets a boost with the<br />

improved rendering engine notably improving<br />

its appearance, and there's also a new<br />

application performance monitor (APM) profile<br />

for MySQL 8.0.<br />

WhatsUpGold <strong>2021</strong> is a sophisticated network<br />

monitoring solution that delivers an impressive<br />

range of tools integrated seamlessly into a single<br />

console. The simplified licensing schemes make<br />

it very affordable for SMBs, it's scalable enough<br />

for enterprises and the new log management<br />

features add even more versatility. NC<br />

Product: WhatsUp Gold <strong>2021</strong><br />

Supplier: Progress Software Ltd<br />

Tel: +44 (0)1344 360444<br />

Web site: www.whatsupgold.com<br />

Price: Premium - 25 devices from $2,740<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

MAY/JUNE <strong>2021</strong> NETWORKcomputing 15


OPINION<br />

THE CLOUD BACKUP OPPORTUNITY FOR MSPs<br />

CARL OLIVER, PRODUCT MANAGER, GIACOM EXPLAINS WHY<br />

CLOUD BACKUP IS INCREASINGLY IMPORTANT FOR SMBS,<br />

AND WHERE THE OPPORTUNITY LIES FOR MANAGED SERVICE<br />

PROVIDERS<br />

Depending on who you talk to,<br />

digitalisation across the globe has<br />

been accelerated by around five to<br />

eight years because of Covid-19.<br />

Transitioning towards the use of cloud-based<br />

technologies has formed a key component of<br />

this transformation. But, as organisations<br />

shift from using on-premise solutions to the<br />

cloud, many will not have considered that<br />

data - despite being located in the cloud -<br />

still needs to be backed up. This is<br />

particularly true of the SMB market.<br />

The channel, therefore, needs to educate<br />

and support SMB organisations as they<br />

develop and deploy their cloud strategies. But,<br />

it also means that ITCs need to work with their<br />

CSP partners to capitalise on the potential<br />

recurring revenue generating opportunities<br />

that backup provisioning can offer.<br />

ON-PREMISE BACK-UP SOLUTIONS<br />

AREN'T FAIL SAFE<br />

It won't come as a surprise to the IT channel<br />

that protecting data and backing it up is<br />

critical. But, what is the difference between<br />

backing up data on-premise compared with<br />

cloud backup solutions?<br />

As you can imagine, an on-premises backup<br />

solution stores data securely on officebased<br />

hard drives. In principle, this is a<br />

feasible option, but what if a natural disaster<br />

occurs such as a pandemic, flood or fire?<br />

Accessing data becomes problematic and<br />

depending on the situation, data could be<br />

lost forever. A case in point is this last year,<br />

as pandemic work-from-home restrictions<br />

prevented many people from working in<br />

offices, making the idea of accessing office<br />

technology and IT backups difficult. So,<br />

many businesses turned to the cloud for<br />

support. Which, rightly, highlighted the need<br />

for cloud data security.<br />

HOW SECURE IS DATA WHEN<br />

STORED IN THE CLOUD?<br />

There's a common misconception that, just<br />

because you shift your applications and<br />

workloads into the cloud, all of your data is<br />

completely secure. While the cloud offers<br />

many benefits, including the availability of<br />

data, it doesn't entirely protect organisations<br />

from data loss or corruption alone.<br />

For instance, a recent study by SkyKick<br />

found that 32 percent of companies using<br />

cloud had experienced data loss in the cloud<br />

across numerous threats. It points out that 64<br />

percent of this data loss was accidental and<br />

that 20 percent was down to malicious<br />

intent. Worse yet, the average cost of this<br />

data loss without a backup solution in place<br />

equates to almost $4,000 - not counting the<br />

potential reputational damage and fines<br />

from regulators. So, while cloud has enabled<br />

businesses to evolve and thrive, especially<br />

through the current pandemic, it's clear that<br />

data stored in the cloud still needs to be<br />

backed up via a dedicated method.<br />

This is why it is important for organisations<br />

to factor cloud backup solutions into their<br />

long-term cloud and data protection<br />

strategies. They are crucial and help address<br />

this growing risk of data loss that takes<br />

place, be that through accidental or<br />

malicious means.<br />

ADVANTAGES OF CLOUD BACKUP<br />

SOLUTIONS<br />

Using cloud backup solutions offers<br />

organisations a host of benefits too. Many<br />

modern backup tools include enhanced<br />

security features and the ability to scale<br />

backups as required. They also generally<br />

offer quicker recovery times if and when<br />

backed up data is needed. Further, better<br />

security protocols, encryption, software<br />

patches and updates mean that there are<br />

more effective security options for ITCs to<br />

provide to their end user customers in the<br />

cloud too.<br />

16 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION<br />

Moreover, by using the cloud,<br />

organisations can scale more easily too.<br />

They have the option and capability to move<br />

their data efficiently and quickly across the<br />

world. However, as with all technology there<br />

are security risks to consider, which ITCs<br />

need to advise clients on.<br />

This is where the relationship between CSP<br />

and ITC is important. Modern and effective<br />

CSPs work with their ITCs to support them<br />

with cloud deployment consultancy and<br />

execution to customers. This usually<br />

includes providing collaborative insights<br />

about managing data privacy, security and<br />

infrastructure maintenance. Equally, this is<br />

an area where the SMB market requires<br />

more support - since 37 percent of SMBs,<br />

according to Forrester, are not adopting<br />

cloud due to security concerns.<br />

SUPPORTING SMBs WITH CLOUD<br />

BACKUP IN A COVID WORLD<br />

Through the pandemic, many organisations<br />

turned to remote working to maintain<br />

productivity. Many of these applications are<br />

cloud-based; and for some, this meant that<br />

their IT estate had to evolve. There was an<br />

explosion in the use of collaboration<br />

technologies across the world, and this is<br />

set to continue. Research from the Cloud<br />

Industry Forum indicates that 88 percent of<br />

organisations expect their adoption of<br />

cloud services to increase in the next 12<br />

months.<br />

This trend towards cloud application<br />

adoption amplifies the need to move away<br />

from depending on on-premise backups<br />

towards relying on cloud backup solutions<br />

instead. Further, since technology operates<br />

in an 'always on' state of play, businesses<br />

can't afford to wait for someone to<br />

physically attend an on-premise site to<br />

perform maintenance, especially during a<br />

pandemic.<br />

Aside from this, it is crucial to note that<br />

during any crisis malevolent actors will seek<br />

to cause mayhem and exploit vulnerable<br />

situations. For instance, according to the<br />

Office of National Statistics cybercrime<br />

greatly increased during the last year -<br />

added to that, not a week goes by either<br />

without hearing about a high-profile<br />

cybersecurity incident. For instance,<br />

recently, North Korean hackers attacked<br />

Pfizer and Serco experienced a cyber-attack<br />

related to NHS Test and Trace.<br />

Clearly, Covid-19 has created the perfect<br />

situation for cybercriminals to exploit. With<br />

many IT teams stretched - either by work at<br />

home restrictions, cloud/digital<br />

transformation projects or cyber-attacks -<br />

they have their work cut out for them. The<br />

pressure they face is unprecedented, and<br />

emphasises the importance of putting in<br />

place robust data recovery and business<br />

continuity strategies to support their<br />

businesses. Evidently, there is a significant<br />

opportunity for the channel to step in and<br />

provide advisory and execution support and<br />

services to SMB customers.<br />

CONCLUSION<br />

Even though cloud solves many problems<br />

for organisations, it does come with data<br />

protection challenges. One answer to this<br />

problem involves using dedicated cloud<br />

backup solutions to protect data. The other<br />

answer lies in market education about how<br />

best to secure cloud applications and data.<br />

Within this scenario, CSPs and ITCs must<br />

work together to educate the market -<br />

especially SMBs - about how to secure and<br />

back up data effectively. By doing this, ITCs<br />

can take advantage of their CSP partner's<br />

knowledge - positioning themselves as trusted<br />

advisors to clients - and also take advantage<br />

of the available lucrative recurring revenue<br />

generating opportunity. NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

MAY/JUNE <strong>2021</strong> NETWORKcomputing 17


FEATUREDATA PROTECTION<br />

THREE REASONS WHY THE SECURITY INDUSTRY IS PROTECTING THE<br />

WRONG THING<br />

WHY IS IT THAT THE SECURITY INDUSTRY TALKS ABOUT NETWORK SECURITY, BUT NOT DATA<br />

BREACHES? IT'S CLEAR THAT SOMETHING NEEDS TO CHANGE, AND ACCORDING TO PAUL GERMAN,<br />

CEO, CERTES NETWORKS, THE CHANGE IS SIMPLE<br />

For too long now, organisations have<br />

been focusing on protecting their<br />

network, when in fact they should<br />

have been protecting their data. Paul<br />

outlines three reasons why the security<br />

industry has been protecting the wrong<br />

thing and what they can do to secure their<br />

data as we move into <strong>2021</strong>.<br />

REASON ONE: THEY'RE CALLED<br />

DATA BREACHES, NOT NETWORK<br />

BREACHES, FOR A REASON<br />

Looking back on some of the biggest data<br />

breaches the world has ever seen, it's clear<br />

that cyber hackers always seem to be one<br />

step ahead of organisations that seemingly<br />

have sufficient protection and technology<br />

in place. From the Adobe data breach way<br />

back in 2013 that resulted in 153 million<br />

user records stolen, to the Equifax data<br />

breach in 2017 that exposed the data of<br />

147.9 million consumers, the lengthy<br />

Marriott International data breach that<br />

compromised the data from 500 million<br />

customers over four years, to the recent<br />

SolarWinds data breach at the end of<br />

2020, over time it's looked like no<br />

organisation is exempt from the<br />

devastating consequences of a cyber hack.<br />

When these breaches hit the media<br />

headlines, they're called 'data breaches',<br />

18 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


FEATUREDATA PROTECTION<br />

yet the default approach to data security<br />

for all these organisations has been<br />

focused on protecting the network - to little<br />

effect. In many cases, these data breaches<br />

have seen malicious actors infiltrate the<br />

organisation's network, sometimes for long<br />

periods of time, and then have their pick of<br />

the data that's left unprotected right in front<br />

of them.<br />

So what's the rationale behind<br />

maintaining this flawed approach to data<br />

protection? The fact is that current<br />

approaches mean it is simply not possible<br />

to implement the level of security that<br />

sensitive data demands while it is in transit<br />

without compromising network<br />

performance. Facing an either/or decision,<br />

companies have blindly followed the same<br />

old path of attempting to secure the<br />

network perimeter, and hoping that they<br />

won't suffer the same fate as so many<br />

before them.<br />

However, consider separating data<br />

security from the network through an<br />

encryption-based information assurance<br />

overlay. By doing so organisations can<br />

seamlessly ensure that even when<br />

malicious actors enter the network, the<br />

data will still be unattainable and<br />

unreadable, keeping the integrity,<br />

authentication and confidentiality of the<br />

data intact without impacting overall<br />

performance of the underlying<br />

infrastructure.<br />

REASON TWO: REGULATIONS AND<br />

COMPLIANCE REVOLVE AROUND<br />

DATA<br />

Back in 2018, GDPR caused many<br />

headaches for businesses across the world.<br />

There are numerous data regulations<br />

businesses must adhere to, but GDPR in<br />

particular highlighted how important it is<br />

for organisations to protect their sensitive<br />

data. In the case of GDPR, organisations<br />

are not fined based on a network breach;<br />

in fact, if a cyber hacker were to enter an<br />

organisation's network but not compromise<br />

any data, the organisation wouldn't actually<br />

be in breach of the regulation at all.<br />

GDPR, alongside many other regulations<br />

such as HIPAA, CCPA, CJIS or PCI-DSS, is<br />

concerned with protecting data, whether it's<br />

financial data, healthcare data or law<br />

enforcement data. The point is: it all<br />

revolves around data, but the way in which<br />

data needs to be protected will depend on<br />

business intent. With new regulations<br />

constantly coming into play and<br />

compliance another huge concern for<br />

organisations as we continue into <strong>2021</strong>,<br />

protecting data has never been more<br />

important, but by developing an intentbased<br />

policy, organisations can ensure<br />

their data is being treated and secured in a<br />

way that will meet business goals and<br />

deliver provable and measurable<br />

outcomes, rather than with a one-size-fitsall<br />

approach.<br />

REASON THREE: NETWORK<br />

BREACHES ARE INEVITABLE, BUT<br />

DATA BREACHES ARE NOT<br />

Data has become extremely valuable<br />

across all business sectors and the increase<br />

in digitisation means that there is now<br />

more data available to waiting malicious<br />

actors. From credit card information to<br />

highly sensitive data held about law<br />

enforcement cases and crime scenes, to<br />

data such as passport numbers and social<br />

ID numbers in the US, organisations are<br />

responsible for keeping this data safe for<br />

their customers, but many are falling short<br />

of this duty.<br />

With the high price tag that data now has,<br />

doing everything possible to keep data<br />

secure seems like an obvious task for every<br />

CISO and IT Manager to prioritise, yet the<br />

constant stream of data breaches shows<br />

this isn't the case.<br />

But what can organisations do to keep this<br />

data safe? To start with, a change in<br />

mindset is needed to truly put data at the<br />

forefront of all cybersecurity decisions and<br />

investments. Essential questions a CISO<br />

must ask include: Will this solution protect<br />

my data as it travels throughout the<br />

network? Will this technology enable data<br />

to be kept safe, even if hackers are able to<br />

infiltrate the network? Will this strategy<br />

ensure the business is compliant with<br />

regulations regarding data security, and that<br />

if a network breach does occur, the business<br />

won't risk facing any fines? The answer to<br />

these questions must be yes in order for any<br />

CISO to trust that their data is safe and that<br />

their IT security policy is effective.<br />

Furthermore, with such a vast volume of<br />

data to protect, real-time monitoring of the<br />

organisation's information assurance<br />

posture is essential in order to react to an<br />

issue, and remediate it, at lightning speed.<br />

With real-time, contextual meta-data, any<br />

non-compliant traffic flows or policy<br />

changes can be quickly detected on a<br />

continuous basis to ensure the security<br />

posture is not affected, so that even if an<br />

inevitable network breach occurs, a data<br />

breach does not follow in its wake.<br />

TRUSTING INFORMATION<br />

ASSURANCE<br />

An information assurance approach that<br />

removes the misdirected focus on<br />

protecting an organisation's network and<br />

instead looks at protecting data, is the only<br />

way that the security industry can move<br />

away from the damaging data breaches of<br />

the past. There really is no reason for these<br />

data breaches to continue hitting the<br />

media headlines; the technology needed to<br />

keep data secure is ready and waiting for<br />

the industry to take advantage of.<br />

In the same way that no one would leave<br />

their finest jewellery on display in the<br />

kitchen window, or leave their passport<br />

out for the postman to see, organisations<br />

must safeguard their most valuable asset<br />

and protect themselves and their<br />

reputation from suffering the same fate as<br />

all those other organisations that have not<br />

protected their data. NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

MAY/JUNE <strong>2021</strong> NETWORKcomputing 19


FEATUREDATA PROTECTION<br />

DATA PROTECTION IN A POST-PANDEMIC<br />

ENVIRONMENT<br />

ADAM STRANGE, A DATA CLASSIFICATION SPECIALIST AT TITUS,<br />

IDENTIFIES THE KEY PROCESSES AND TECHNOLOGIES BUSINESS<br />

MUST ADOPT IN THE WAKE OF COVID-19<br />

The rapid rise in remote working under<br />

COVID-19 delivered far-reaching<br />

changes in how we do business, with<br />

significant implications for CISOs, Compliance<br />

and Data Governance Officers. With<br />

accessibility, bandwidth, data volumes and<br />

usage demands surging under the pandemic,<br />

the challenge to keep data safe, whilst<br />

facilitating access and usability for multiple<br />

external user groups, became a core concern<br />

for data leaders. Now, as data from multiple<br />

and often external sources continues to grow in<br />

volume, issues around data management,<br />

control and protection are a priority concern<br />

for business.<br />

The forward-thinking companies, with<br />

technology development strategies already in<br />

place, were able to quickly adapt under the<br />

pandemic and act on the clear business<br />

opportunity to "reinvent" data protection and<br />

flexible user access. But the organisations that<br />

maintained a fixed mindset on data protection<br />

are today finding it more difficult to recover and<br />

harder to provide their users with the tools<br />

required to do their jobs safely.<br />

SUPPORTING REMOTE WORKING<br />

With the expectation that post-pandemic<br />

remote working will almost double from prepandemic<br />

levels, maintaining a centrally driven<br />

robust data governance strategy that prioritises<br />

data security and regulatory requirements<br />

whilst ensuring appropriate and safe access to<br />

information, whenever and wherever needed,<br />

is a must. Businesses must recognise the data<br />

protection lessons learnt and move beyond<br />

short-term security compromises to a futureproofed<br />

data governance protocol that is<br />

technology and user-centric. As a starting<br />

point, data protection must adapt to the new<br />

workplace environment. It is likely that in the<br />

post-pandemic environment, employees will<br />

split their working hours between home and<br />

office permanently. So organisations must<br />

look at the impact of high-volume remote<br />

working and what this means to their existing<br />

security controls.<br />

A reinforcement of corporate policies around<br />

data creation and linked protection facilities,<br />

such as Data Loss Prevention (DLP) technology,<br />

will be critical to facilitate large remote<br />

workforces, to reduce accidental failings and<br />

to ensure that data transfer is confined to<br />

authorised recipients only. By identifying the<br />

true value and protection requirements of<br />

data, organisations will be able to make<br />

intelligent decisions on how to safely handle it.<br />

All data must be classified so it can be<br />

managed and handled appropriately, with<br />

robust classification facilities.<br />

AUTOMATING DATA CLASSIFICATION<br />

Businesses that adapt best to the post-pandemic<br />

era will use automation, data-driven digital<br />

access technologies and cloud to effect<br />

improved operations and efficiencies. All<br />

organisations will need to focus on the resultsdriven<br />

benefits that new and extended working<br />

practices can provide and enabling safe user<br />

and data access must be at the heart of these<br />

strategies. Automation will help improve<br />

processing efficiency and reduce the burden on<br />

frontline security and data management staff. To<br />

drive integration and automation as quickly as<br />

possible, data classification tools will not only<br />

help organisations to protect their data by<br />

applying appropriate security labels but will also<br />

help educate users to understand how to treat<br />

different types of data with different levels of<br />

classification and sensitivity.<br />

ESTABLISH A DATA SECURITY CULTURE<br />

Businesses must apply and enforce PII data<br />

protection rules to safeguard personal data.<br />

Data leaders must be able to identify it,<br />

classify its sensitivity and level of threat were it<br />

to be lost in any way, apply acceptable usage<br />

policies and appropriate levels of protection.<br />

Establishing a PII culture must be gradual and<br />

based on buy-in and defined responsibilities<br />

that are recognised and accepted from the<br />

top down.<br />

Given employees play such a vital role in<br />

ensuring that business maintains a strong data<br />

privacy posture, the ability to work with<br />

stakeholders and users to understand data<br />

protection requirements and policies is key.<br />

Security and data protection education must be<br />

conducted company-wide and must exist at a<br />

level that is workable and sustainable. Regular<br />

security awareness training and a companywide<br />

inclusive security culture within the firm will<br />

ensure that data security becomes a part of<br />

everyday working practice, embedded into all<br />

actions and the very heart of the business.<br />

A robust data protection protocol is critical<br />

for all organisations, and will particularly be<br />

the case as we move beyond COVID-19.<br />

Delivering optimal operational efficiencies,<br />

data management and data classification<br />

provision under post-pandemic budget<br />

constraints will be an ongoing business-critical<br />

challenge. Data leaders must be selective and<br />

identify the combination of technologies,<br />

processes and people investments that will<br />

deliver the greatest security controls to meet<br />

new productivity targets, to extend and support<br />

remote-working strategies and to adequately<br />

support the ever-increasing volumes of data,<br />

now and into the future. NC<br />

20 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


PRODUCTREVIEW<br />

ExaGrid Tiered<br />

Backup Storage -<br />

Retention Time-Lock<br />

for Ransomware<br />

Recovery<br />

PRODUCT REVIEW<br />

PRODUCT<br />

REVIEWPRODUCT RE<br />

Ransomware attacks are proving to be<br />

extremely profitable for hackers, and<br />

organisations that think their backups<br />

provide sufficient protection could be in for a<br />

nasty surprise. These attacks are constantly<br />

evolving and the latest threats specifically<br />

target backup applications with the aim of<br />

deleting all backups before the primary<br />

storage encryption process is triggered.<br />

ExaGrid's Tiered Backup Storage offers a<br />

unique approach that protects backups from<br />

ransomware and provides fast recovery services<br />

in the event of an attack. Included with all<br />

ExaGrid EX appliances, the Retention Time-<br />

Lock feature takes advantage of their two-tier<br />

architecture to place an air gap between the<br />

network-facing tier and non-network-facing tier.<br />

ExaGrid's Tiered Backup Storage uses<br />

patented Landing Zone and Adaptive<br />

Deduplication features to provide fast<br />

backups and restores without the<br />

performance impact of data deduplication<br />

from which traditional data reduction<br />

solutions suffer. It's highly scalable as a site<br />

supports up to 32 EX appliances (a 2.7PB full<br />

backup) and each is a complete system with<br />

its own storage, CPU, memory and<br />

networking, so compute power and network<br />

bandwidth increase in step with capacity.<br />

Data received from the backup application is<br />

written directly to a disk cache in<br />

undeduplicated format. As backups complete,<br />

the data in the Landing Zone is 'tiered' and<br />

written to a separate long-term retention<br />

repository where it is compressed and<br />

deduplicated.<br />

ExaGrid's Retention Time-Lock feature comes<br />

into play by delaying delete requests to the<br />

deduplicated long-term retention data in the<br />

offline repository. Delete requests will be<br />

carried out in the repository, but only once the<br />

time-lock period has expired, so that there is<br />

no impact on the desired long-term retention<br />

in the repository. It's more cost-effective than<br />

solutions that use additional hardware as it<br />

only requires about 10% of an existing storage<br />

repository to be allocated to it. The Retention<br />

Time-Lock period defaults to 10 days but can<br />

be as long as 30 days, and this delayed<br />

delete setting is separate from the system's<br />

backup retention policy that can be any<br />

number of days, weeks, months or years.<br />

ExaGrid's scale-out sites are managed from a<br />

central console which provides colour-coded<br />

status views of site capacities and free space<br />

plus Landing Zone and retention repository<br />

utilisation. To configure a site Retention Time-<br />

Lock period you simply click on its icon in the<br />

main dashboard and enter the value in days.<br />

Even the Retention Time-Lock setting is<br />

protected as changes to this must be verified<br />

by a user with the ExaGrid Security Officer<br />

role. Any attempts to change it result in a<br />

request being sent to this user where it appears<br />

in their console awaiting approval.<br />

If an attack is detected, the ExaGrid system<br />

issues warnings and allows administrators to<br />

respond immediately by suspending all further<br />

share access and taking them offline. And if<br />

the attack does succeed in encrypting data,<br />

ExaGrid has immutable data objects that are<br />

not modified or overwritten so all previous<br />

retention does not change.<br />

It's a simple process to recover from a<br />

ransomware attack as you browse the<br />

retention repository for the latest unencrypted<br />

backup. Selecting a date and time enables all<br />

previous backups from that period and<br />

initiating a recovery makes the selected pointin-time<br />

backup available to the application for<br />

subsequent restoration.<br />

Ransomware threats are becoming more<br />

devious, but ExaGrid's Tiered Backup Storage<br />

and its innovative Retention Time-Lock feature<br />

deliver essential protection with a secure, airgapped<br />

retention repository, delayed deletes<br />

and immutable data objects. It ensures critical<br />

backups are safe from malicious deletion and<br />

even if an attack does succeed in encrypting<br />

primary data, ExaGrid's highly efficient<br />

recovery services will have you up and running<br />

in no time. NC<br />

Product: Retention Time-Lock for<br />

Ransomware Recovery<br />

Supplier: ExaGrid<br />

Web site: www.exagrid.com<br />

Tel: +44 (0) 1189 497 051<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

MAY/JUNE <strong>2021</strong> NETWORKcomputing 21


FEATUREEDGE<br />

NOW'S THE TIME FOR NAAS<br />

NETWORK-AS-A-SERVICE (NAAS) IS POISED TO RESHAPE<br />

EXPERIENCES AT THE EDGE, ACCORDING TO SIMON WILSON,<br />

CTO AT ARUBA UK&I<br />

Flexible consumption services for storage<br />

and compute power seem to be<br />

mainstream today, with customers taking<br />

"as a Service" approaches more often than not -<br />

and it's easy to see why. Even prior to the<br />

COVID-19 pandemic, organisations were<br />

pushed to address fluctuating markets and<br />

economic uncertainty.<br />

CAPEX planning has long been known to<br />

leave organisations with long product lifecycles<br />

and an inability to pivot quickly, locking<br />

businesses into costly spending patterns and<br />

damaging their capacity to meet today's shifting<br />

business dynamics. Enter OPEX, the<br />

subscription approach that brings flexibility and<br />

fluidity to operating expenses and on-demand<br />

payments, underscoring business agility.<br />

While flexible financing is one of the core<br />

reasons for the uptake in as-a-service models,<br />

there are a number of other factors deemed as,<br />

if not more, important than cost alone. We now<br />

see that NaaS is gaining traction, with the latest<br />

IDC 'IT Procurement Trends and Consumption<br />

Models' Survey, reporting that flexible<br />

consumption models for enterprise networking<br />

software and hardware continue to gain favour<br />

in the market.<br />

LEVERAGING IT STAFF TO SPEND MORE<br />

TIME ON WHAT MATTERS<br />

Within IDC's report, the desire to reduce IT staff<br />

workloads came out as one of the top factors<br />

driving as-a-service deployments - this is<br />

particularly relevant for networks. More<br />

frequently than not, IT teams find their days<br />

filled with requests to address network<br />

problems. Resources, time and expenses are<br />

focused on troubleshooting, finding the root<br />

cause, and remediating the latest network event<br />

or breach, leaving IT teams unable to focus on<br />

more critical and strategic tasks.<br />

The rollout of subscription offerings across key<br />

departments, including deployment and<br />

decommissioning, means that IT staff can spend<br />

more time on complex, value-adding tasks for<br />

the business. This means truly optimising staff<br />

with the right tools to improve business and<br />

drive new outcomes.<br />

Network-as-a-Service includes data analytics,<br />

expanded telemetry, artificial intelligence and<br />

automation, which come together to deliver<br />

critical efficiency gains in network operations.<br />

With network management increasingly<br />

complex in the new age of remote working,<br />

replacing manual interventions with advanced<br />

automation and analytics also provides<br />

increased visibility from a security perspective<br />

from usage through to bandwidth.<br />

HAVING AN EXTRA PAIR OF EYES ON<br />

SECURITY ISSUES<br />

As the pandemic has pushed networks to<br />

support remote workforces over the past year,<br />

increased security remains a top priority for<br />

businesses. With NaaS, most providers can rely<br />

on the security of the entire voice and data<br />

network so that all transactions, applications,<br />

and data are kept safe and secure. The number<br />

of IoT devices in particular are growing at an<br />

exponential rate, especially during this new<br />

working paradigm. Control and visibility issues<br />

are heightening risks and leaving networks more<br />

vulnerable than ever to potential breaches. But if<br />

IT staff are spending their time troubleshooting,<br />

they won't be able to protect their network<br />

properly and detect threats in real-time.<br />

NaaS deployment can provide an extra pair of<br />

hands for IT staff by running the most up-todate<br />

versions of security software and ensuring<br />

that hotfixes are installed as soon as they<br />

become available. For small businesses in<br />

particular, the ability to scale up and down as<br />

needed, depending on networking capacity, has<br />

been helpful as business needs have changed.<br />

MEETING EXPECTATIONS AT THE EDGE<br />

As organisations increase their reliance on<br />

cloud services, they have also needed their<br />

networks to extend beyond the perimeter of the<br />

office walls. Networks must now embrace the<br />

Edge - the place where data is created,<br />

captured, stored, and processed.<br />

Businesses that are able to connect to the<br />

Edge efficiently and securely, and leverage the<br />

data they collect, will be well positioned for the<br />

future. Research even shows that 72% of global<br />

IT leaders are actively using Edge technologies<br />

to deliver new outcomes. Those with more<br />

mature Edge deployments are even increasing<br />

their business value from that data. Coupled<br />

with the expansion of the enterprise network that<br />

accompanies Edge activity, strain legacy<br />

network operations and management, NaaS<br />

presents an opportunity for businesses to<br />

outsource the day-to-day management of the<br />

network and gain access to the most advanced<br />

hardware and software technology.<br />

We can expect NaaS to be a critical enabling<br />

platform for extending enterprise networks to the<br />

Edge in the coming months and years. This<br />

business model is increasingly being<br />

championed for its flexible approach and the<br />

subscription service is becoming highly<br />

recognised for a wealth of reasons.<br />

Organisations are waking up to the impact<br />

that NaaS deployment can have on IT staff<br />

workloads, its ability to stabilise security<br />

concerns, and unlock the true potential of Edge<br />

technologies - now and in the future. NC<br />

22 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


NETWORKcomputing<br />

We introduced the Network Computing "Masterclass" into the magazine a few years back. A<br />

Masterclass series in the magazine run for at least a year. Some have successfully run for longer. This<br />

concept enables us, with the help of a an expert vendor, to cover a subject area in a far more<br />

detailed way than could ever be covered in a single article. We feel that the Masterclasses we have<br />

carried have done a valuable job in guiding readers through many of the issues that they need to be<br />

aware of - issues that are perhaps not being talked about elsewhere. Vendor branding appears on<br />

the Masterclass page to distinguish a Masterclass article from the many "one-off" articles that we<br />

carry in Network Computing.<br />

We have identified a number of key subject areas which we feel would benefit from a Masterclass.<br />

These are:<br />

Network Testing and Monitoring<br />

Cabling and cable management<br />

Network access control<br />

Powering a Network<br />

The transition to unified comms<br />

Desktop virtualisation<br />

Traffic management<br />

Using a Data Centre<br />

Advantages and challenges of relying on an increasingly mobile workforce<br />

Cloud security<br />

Education and training<br />

If any of these subject areas are to be covered in a Masterclass we will be<br />

seeking a Partner to work with. A Masterclass Partner will ideally be a vendor<br />

with a track record of expertise in the particular area. Are you a vendor<br />

who could help us in launching a Masterclass covering one of the subjects<br />

listed above ? Alternatively, could you recommend an organisation who<br />

could help us ? Your suggestions will be very welcome.<br />

Please contact david.bonner@btc.co.uk


FEATUREIOT<br />

IoT TO THE RESCUE?<br />

NICK SACKE, HEAD OF IoT AND PRODUCTS AT<br />

COMMS365 DISCUSSES HOW IoT TECHNOLOGIES<br />

AND THE USE OF DATA CAN BOOST AND SUPPORT<br />

INDUSTRIES AND THE WIDER ECONOMY<br />

With the UK going into its first<br />

financial recession since 2009 as a<br />

consequence of COVID-19, many<br />

businesses are struggling to stay alive in the<br />

current business climate. The economy has<br />

shrunk by 20.4% compared with the first three<br />

months of 2020 following months of<br />

businesses being forced to stay shut,<br />

furloughed workforces and a reduction in<br />

consumer expenditure. Additional restrictions<br />

in place at the time of writing are ratcheting<br />

up the financial pressure on multiple<br />

industries, with the prospect of a 'double-dip'<br />

recession an increasing prospect.<br />

Without the right technology and continuity<br />

processes in place, many organisations were<br />

unable to adapt their models quickly enough<br />

to survive when they needed to. Now it's a<br />

wake-up call to get the right solutions<br />

implemented to ride the waves of any future<br />

economic storms that come their way.<br />

COVID-19 has accelerated the need to work<br />

collaboratively and stay connected to protect<br />

both society and the economy.<br />

BIG DATA ANALYTICS AND IoT<br />

With the increase in the volume of data that is<br />

being produced, identifying, analysing and<br />

using the useful information that is scattered<br />

around an organisation is a key business<br />

challenge, but also an opportunity. This can<br />

be addressed by the optimal use of data,<br />

deploying innovative IoT technologies<br />

including sensors, and targeted insights from<br />

'Big Data' analytics systems.<br />

Key information (data) is vital to ensuring<br />

businesses have 24/7 insight across their<br />

operations so that pinch points and potential<br />

problems can be identified and remedied<br />

almost in real-time. A good example of this is<br />

in the freight and cargo industry, where realtime<br />

monitoring of consignments using<br />

sensors can be analysed and used by<br />

operations executives to identify problems in<br />

the flow of goods, so that service level<br />

agreement can be met, and 'just in time'<br />

economic models can be reinforced.<br />

IoT, smart sensors and connected<br />

technologies are starting to play a key role in<br />

providing valuable data for effective decision<br />

making across all industries. Improving<br />

products and processes through data<br />

collection and analysis is now necessary for<br />

companies to future-proof their businesses in<br />

a highly volatile global market and identify<br />

additional revenue streams or alternative<br />

routes to market to soften the blow from any<br />

economic fallout. The more data we gather,<br />

the more centralised and secure organisations<br />

can become to limit the potentially devastating<br />

impact of future pandemics.<br />

DATA IN HEALTHCARE<br />

As part of the fight against the pandemic, the<br />

healthcare industry had to quickly adapt and<br />

digitally transform in order to continue the<br />

provision of healthcare services to patients<br />

across the world. Moreover, to understand the<br />

nature of the virus and curb its spread, the<br />

NHS was required to streamline the way it<br />

used data in order to make informed<br />

decisions. One element of this approach was<br />

the development of the NHS' data platform to<br />

provide national organisations with secure,<br />

reliable and timely data. By storing masses of<br />

information about those infected with COVID-<br />

19, this data can be effectively used for<br />

spotting trends, case identification, allocating<br />

resources and implementing national<br />

lockdowns in areas with rising cases.<br />

COVID-SAFE TECHNOLOGIES<br />

Elements that have had a significant impact<br />

on the economy are the need for social<br />

distancing measures, restrictions in gatherings<br />

and other safety elements that have had to be<br />

implemented. Particularly for industries such<br />

24 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


FEATUREIOT<br />

as manufacturing, retail and logistics, with<br />

less staff able to be present within the same<br />

environment, organisations faced significant<br />

challenges to meet demand. But this is where<br />

IoT technology is playing a vital role,<br />

especially once businesses start preparing for<br />

employees to return to their original work<br />

environments.<br />

The use of IoT technology can support<br />

additional sanitisation measures and the<br />

automation of shared touchpoints needed to<br />

limit cross-contamination. For example,<br />

detecting sanitiser bottle fill levels, monitoring<br />

the distance between people via infrared<br />

beams, alerting when social distancing<br />

thresholds are crossed, and analysing<br />

movement around working spaces with<br />

thermal imaging camera systems. By<br />

deploying innovative technologies such as<br />

these, businesses can still operate safely and<br />

more productively while generating revenue<br />

to remain operational and ultimately, boost<br />

the economy.<br />

GREEN AGENDA<br />

Sustainable supply chains can help to futureproof<br />

businesses and provide long-term<br />

resilience for organisations during challenging<br />

times. By taking a circular economy approach,<br />

which is an economic system which keeps<br />

resources in use for as long as possible,<br />

extracts the maximum value from them whilst<br />

in use, then recover and regenerate products<br />

and materials at the end of each service life<br />

(Wrap), organisations can reduce waste,<br />

extract the most value and obtain cost savings<br />

by optimising their use of resources.<br />

Advanced digital technologies can help to<br />

unlock the benefits from the circularity of<br />

resources. Through the collection and<br />

analysis of data, digital technology such as<br />

intelligent, interconnected devices, have the<br />

potential to identify challenges, outline the key<br />

areas of waste of resources and inform more<br />

effective decision-making on how to address<br />

these issues as they occur. By capitalising on<br />

innovation which will underpin sustained<br />

growth, businesses can benefit from a rise of<br />

new economic opportunities, such as<br />

substantial savings, mitigation of supply risks<br />

and long-term resilience of the economy,<br />

while ensuring that assets are used to their<br />

maximum potential and value.<br />

Moreover, particularly in a manufacturing<br />

environment, by having visual insight into the<br />

location and the condition and availability of<br />

each asset, this overview is of value to<br />

businesses to enhance their productivity<br />

through factors such as predictive<br />

maintenance. Overall, this helps to make<br />

products and services more effective and<br />

efficient, while reducing costs and waste in the<br />

supply chain. Initiatives supporting a circular<br />

economy offers businesses a more resilient<br />

and sustainable future, potentially creating<br />

over 500,000 more jobs and saving EU<br />

businesses 8% of their annual turnover.<br />

5G AND CONNECTIVITY<br />

Parts of our global critical infrastructure<br />

remain siloed, unconnected or with varying<br />

connectivity quality. In a pandemic when<br />

social distancing measures are in place, and<br />

workforces are remote, it's vital for businesses<br />

to have a robust, high-quality Internet<br />

connection and IoT connected devices on-site<br />

in factories, warehouses, construction sites,<br />

power plants, transport grids, hospitals,<br />

schools, government buildings and utility<br />

distribution networks. This will provide visibility<br />

on-site and remote access as required,<br />

resulting in reducing the need for engineers<br />

and IT teams to make unnecessary and<br />

potentially risky site visits.<br />

The deployment of 5G will help to increase<br />

network capacity and data flow; supporting<br />

connections of one million devices per<br />

square kilometre. By supercharging the<br />

potential of IoT with new 5G networks,<br />

connected buildings, vehicles, transport<br />

infrastructure and healthcare devices could<br />

all benefit from the value this enhanced<br />

connectivity will bring.<br />

For example, 5G could help to revolutionise<br />

traffic and congestion management, in turn,<br />

reducing delays and allowing quicker access<br />

for emergency services. Smart buildings are<br />

the future, and post-COVID-19, can help to<br />

boost the economy by reducing the costs of<br />

running the public sector estate, such as the<br />

introduction of smart lighting and optimising<br />

the use of air conditioning.<br />

Optimisation of facilities management will<br />

be especially important now that the<br />

population is set to be a nation of remote<br />

workers for the foreseeable future - heating<br />

and cooling entire buildings is now<br />

unnecessary. Building managers should be<br />

able to rely on intuitive technology to heat<br />

and light only those areas that are in use to<br />

save money and help support environmental<br />

initiatives in the process. Ventilation is now<br />

acknowledged to be a critical factor in<br />

preventing the spread of viruses such as<br />

COVID-19 in buildings. The monitoring of<br />

indoor environmental conditions and<br />

ventilation systems will be another tool in the<br />

new facilities management service portfolio.<br />

CONCLUSION<br />

If businesses were to embrace innovative<br />

technology and use the data they collect and<br />

store in the right way, the 'new normal' post-<br />

COVID-19 may be a smoother transition for<br />

many, while preparing them for any future<br />

unprecedented crisis. The opportunity to<br />

deploy innovative sensor-based technologies<br />

and data analytics services has given a<br />

growing number of start-ups and small<br />

businesses entry to enterprise and government<br />

supply chains, and lucrative contracts to aid<br />

the collection and optimal use of data.<br />

By leveraging the most value from their data<br />

and resources, as well as the management<br />

and more efficient use of resources to meet<br />

green agenda objectives, organisations can<br />

help to keep their running costs low, which is<br />

particularly important during uncertain times<br />

with reduced services and furloughed staff.<br />

This preparation, in turn, will help businesses<br />

to ride the waves of uncertainty and keep<br />

them trading to ultimately boost the economy<br />

in both the short and long-term. NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

MAY/JUNE <strong>2021</strong> NETWORKcomputing 25


OPINION<br />

CLOSER TO THE EDGE<br />

SIMON MICHIE, CTO, PULSANT OFFERS A GUIDE TO THE ROLE<br />

OF EDGE AND IoT IN MODERN DATA CENTRES<br />

Reflective of the exponential growth of<br />

data is the 200% increase from 2016<br />

of connected IoT devices that are<br />

predicted to become active this year. As IoT<br />

devices enter more industries such as<br />

agriculture, healthcare, IT and critical<br />

services, it’s imperative for businesses to<br />

harness these technologies to make more<br />

informed data decisions. The challenge<br />

though is how it is used and analysed for<br />

real-time decision making.<br />

The answer to this for many is connection to<br />

the digital edge, but this raises the question of<br />

the role that edge computing and IoT plays in<br />

the data centre and colocation space. With<br />

this in mind, there are a number of aspects for<br />

you to consider:<br />

The uptake of IoT – IoT has been heavily<br />

verticalised in recent years and centered<br />

around healthcare, retail and manufacturing. It<br />

is however now starting to benefit other sectors<br />

such as health and safety initiatives, including<br />

track-and-trace and smart building technology.<br />

The increasing maturity of 5G – While 5G<br />

brings great promise as its rollout across the<br />

UK continues, there is still not widespread<br />

coverage to fully support this advancement.<br />

The adoption of data analytics – In much the<br />

same way as IoT, data analytics represents<br />

tremendous potential. However, mirroring the<br />

uptake and optimisation of IoT, the opportunity<br />

around analytics is still largely limited to<br />

verticalised applications<br />

The viability of regional colocation for the<br />

edge – Mobilising location-specific edge<br />

instances and the ability to spin-up the<br />

required communications hinges on<br />

strategically placed regional data centre<br />

locations and mitigating the cost and<br />

performance restrictions of public cloud.<br />

The expansion of customer data lakes – The<br />

maturation of customer data lakes curated<br />

outside of cloud boundaries with the potential<br />

to support edge applications before wider<br />

consolidated cloud publishing.<br />

The location of edge requirements – Edge<br />

positioning, both in terms of its physical<br />

location and architecture, has a high<br />

economic weighting in this model.<br />

THE RELATIONSHIP BETWEEN THE<br />

DATA CENTRE AND THE EDGE<br />

The role that edge computing plays in data<br />

centre operations closely depends on the<br />

above elements in order to capture, transfer,<br />

process, store and manage data. As it stands<br />

in the industry, interaction between many of<br />

these factors is taking place, but consistent<br />

integration between them is needed to<br />

establish a business case for an edge instance<br />

for IoT.<br />

When analysing the location of edge<br />

requirements, it's increasingly the case that the<br />

edge could be anything from a plane to a<br />

temporary site. For data centre providers, it's<br />

imperative to think beyond infrastructure<br />

change and deploy facilities closer to the<br />

customer instance, enabling business users to<br />

benefit from lower latency.<br />

While extension of remote services is likely<br />

with managed service providers, the<br />

economics of location, latency and capacity<br />

are vital for data centre providers. In many<br />

cases, it is hoped that the infrastructure<br />

footprint of the colocation provider will be<br />

sufficient, but this doesn't form the foundation<br />

of a sustainable edge colocation business<br />

model. This requires an effective, responsive<br />

and economic mobilisation of<br />

communications, which will be time-bound in<br />

many instances.<br />

LOOKING FORWARD<br />

Without doubt, the expansion of IoT and edge<br />

devices will continue to have an impact on<br />

businesses moving forward. The role that it<br />

plays in the data centre and colocation market<br />

however is defined largely on the interplay<br />

between a number of elements that will shape<br />

the industry moving forward. From gradual<br />

adoption of 5G technologies to changing<br />

colocation models, the coming years will dictate<br />

whether IoT and resulting data lakes will truly<br />

transform the data centre as we know it. NC<br />

26 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION<br />

MONITORING YOUR NETWORK IN THE TIME OF COVID-19<br />

BY MARK TOWLER, SENIOR PRODUCT MARKETING MANAGER, PROGRESS<br />

If 2020 taught us anything, it's that network<br />

monitoring is more important than ever.<br />

While there's always been the background<br />

awareness that network outages are expensive<br />

and the business can't run without a functioning<br />

network, the onslaught of COVID-19 brought<br />

that awareness firmly to the forefront.<br />

First off, everyone went home and network<br />

administrators had to cope - almost literally<br />

overnight - with supporting a remote workforce<br />

with the network they had. The VPN and the<br />

firewall systems suddenly became even more<br />

urgently critical resources than they'd been a<br />

week ago. For a few weeks administrators<br />

struggled to adapt, to support more remote<br />

workers than normal and to shore up systems<br />

that were suddenly under strain. Those with<br />

comprehensive network monitoring systems<br />

found this far easier to do than those without.<br />

However, once this task was complete there<br />

came months of adapting to the new reality.<br />

Workers literally could not work if they couldn't<br />

access the network. They couldn't just move to<br />

a different office, or an unused conference<br />

room or the cafeteria if they had network<br />

problems. They couldn't just walk down to the<br />

IT department to get a loaner laptop if their<br />

own stopped working. They couldn't even run<br />

down to the nearest coffee shop or library to<br />

use free WiFi. On top of all of this, every single<br />

employee was now consuming massive<br />

amounts of bandwidth for videoconferencing.<br />

Those smart enough to buy stock in Zoom<br />

were rewarded, but the network admins<br />

responsible for providing the stable<br />

connections that made it work found it a<br />

challenge. Again, those with a comprehensive<br />

network monitoring solution had an easier<br />

time of it. In fact, one of the key questions<br />

answered by network monitoring<br />

is, "Where is all my<br />

bandwidth going?"<br />

As a result, the<br />

organisations<br />

that adapted<br />

to the new<br />

COVID<br />

normal<br />

(and<br />

not<br />

all of them did) are now dealing with a world<br />

where the health of their network has become<br />

more important than ever. When an employee<br />

can't connect in order to do any work all day,<br />

the cost of network downtime escalates<br />

dramatically. As a result, we're seeing changes<br />

in the priorities of network monitoring<br />

customers. Solutions that simply monitor status<br />

and report upon it are no longer adequate;<br />

network administrators need to be alerted<br />

before network issues start to impact end-users<br />

so they can fix them.<br />

In addition, network monitoring systems that<br />

can apply 'self-healing' actions are becoming<br />

far more popular since they can automate<br />

responses to common issues. For example, if<br />

your network monitoring solution can<br />

automatically allocate more bandwidth to a<br />

server when traffic levels exceed 85%, that can<br />

mean the difference between an emergency<br />

midnight phone call and a minor notification<br />

the next day.<br />

Finally, the ongoing trend towards systems<br />

integration is reaching a tipping point. It's now<br />

easier than ever to integrate physical, virtual<br />

and cloud resources with any business system -<br />

and the advantages of doing so are legion.<br />

The network monitoring industry is keeping<br />

pace with a shift towards open APIs that allow<br />

easy integration and automation. Not only<br />

should your solution monitor these diverse<br />

environments, it should be able to feed<br />

monitoring data to any system that can use it.<br />

Similarly, other systems should be able to<br />

provide information to the network monitoring<br />

system so it can use that data to make<br />

changes to either the network itself, or how it<br />

monitors the network.<br />

Your organisation has become more agile and<br />

adaptable in the face of our new reality; your<br />

network monitoring system will need to do the<br />

same. NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

MAY/JUNE <strong>2021</strong> NETWORKcomputing 27


OPINION<br />

THE VISIBLE BENEFITS OF AUTOMATION<br />

ADRIAN ROWLEY, SENIOR DIRECTOR EMEA, GIGAMON ON WHY<br />

NETWORK AUTOMATION AND VISIBILITY ARE KEY FOR DIGITAL<br />

TRANSFORMATION<br />

Just over a year ago, business leaders<br />

across the UK were forced to make tough<br />

decisions surrounding how to enable and<br />

secure their workforce in the mass shift to<br />

remote working. For some, the IT<br />

infrastructure was already in place to make<br />

the transition smooth, but 12 months of<br />

home working has stretched it to its limits. For<br />

others, with little digitisation to support them,<br />

quick responses were taken in a patchwork<br />

fashion, and the solution often became an<br />

acceleration towards hybrid cloud<br />

infrastructures.<br />

With such fast and dramatic changes,<br />

security risks increased, and network<br />

performance often suffered. What's more,<br />

visibility into data-in-motion became<br />

clouded, as networks were clogged up with<br />

an abundance of traffic from personal and<br />

unsecured devices, while the rapid growth in<br />

hybrid infrastructure created dangerous blind<br />

spots. Now, with fluid workforces set to stay,<br />

it is essential that businesses find ways to<br />

regain control over their increasingly<br />

complex networks.<br />

EMBRACE AUTOMATION<br />

Data volumes are growing far beyond the<br />

capacity for human analysis. Not only does<br />

5G have a role to play in this deluge of data,<br />

but the vast amounts of new traffic from<br />

personal devices will also have a detrimental<br />

effect on a business' network efficiency.<br />

Network automation is one way to solve this<br />

issue, and according to a recent survey, 97%<br />

of IT leaders agree that process automation is<br />

an essential part of digital transformation.<br />

However, what and how we automate has<br />

changed dramatically across the last ten years.<br />

Today, automating delivery of data to service<br />

triage and performance management tools is<br />

a simple process, despite its complexity in the<br />

past. Automating data intelligence has also<br />

become more popular for organisations<br />

looking for ways to free up their workforce,<br />

find potential bottlenecks in their infrastructure<br />

and mitigate the impact of cyberattacks.<br />

Ultimately, automation allows data-in-motion<br />

to be transformed into valuable insights that<br />

will improve processes and support the<br />

overstretched workforce, without the need for<br />

human intervention.<br />

INVEST IN PEOPLE AND ADJUST<br />

YOUR STRATEGY<br />

In a year where we have all been siloed and<br />

separated, working collaboratively is often no<br />

longer possible without technology as the<br />

enabler. However, this technology will not<br />

function efficiently without an experienced and<br />

skilled workforce behind it. While network<br />

automation supports IT teams as they struggle<br />

with the digital skills gap, organisations must<br />

ensure they have an expert team working<br />

alongside smart automation. With this<br />

combination, ROI becomes more measurable,<br />

and business processes begin to improve.<br />

The last 12 months have also demonstrated<br />

to many IT teams and C-suite leaders that<br />

organisations not only need to be willing to<br />

adjust their technology and infrastructure, but<br />

also change their policies and work processes.<br />

To meet the demand for a mass-shift to home<br />

working, many businesses had to change their<br />

approach, or risk losing staff and clients - it<br />

was a case of innovate or fail. The fluid<br />

workforce is looking set to stay, meaning<br />

companies must prioritise agility and be<br />

prepared to adapt their strategies, especially<br />

their cybersecurity defence systems, based on<br />

the current changeable climate.<br />

ALWAYS PRIORITISE VISIBILITY<br />

Regardless of whether visibility is needed to<br />

embrace automation or to bolster<br />

cybersecurity, establishing a clear view across<br />

a network is essential to regain control over<br />

data-in-motion and push forward with digital<br />

transformation initiatives. NetOps teams must<br />

be able to see into all on-premise, public,<br />

private and hybrid cloud infrastructure. No<br />

traffic - even encrypted data - should be out of<br />

view. To make this visibility possible, businesses<br />

should ensure they take a holistic approach to<br />

managing their IT infrastructure, monitoring all<br />

their technology assets as if through a single<br />

pane of glass. The level visibility will allow for<br />

more insights into network traffic that can<br />

improve business processes and ease the<br />

pressure on IT teams.<br />

NetOps teams are still facing the need to do<br />

more with less, as digital transformation<br />

initiatives continue but budgets remain tight.<br />

Network automation has therefore become a<br />

viable and valuable option for IT experts, and<br />

by ensuring that visibility is prioritised, these<br />

automation solutions can flourish. Business<br />

leaders must now understand that choosing<br />

whether or not to automate processes will<br />

significantly impact business success - or lack<br />

of - in the future. NC<br />

28 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION<br />

THE DIGITAL TRANSFORMATION DILEMMA<br />

U.K. EMPLOYEES WANT PANDEMIC-ERA TECH TO STAY, ACCORDING<br />

TO NEW RESEARCH FROM THE WORKFORCE INSTITUTE AT UKG<br />

As the U.K. prepares to return to normal<br />

in the coming months and industries<br />

reopen, research from The Workforce<br />

Institute at UKG reveals that as a result of the<br />

COVID-19 pandemic, 87% of U.K. workers<br />

have been propelled into the future of work<br />

by accelerating their digital transformation<br />

projects. Furthermore, 86% are enjoying the<br />

benefits of these new technologies, and 38%<br />

are fearful that their organisation will go back<br />

to the "old way" of doing things postpandemic.<br />

The global research commissioned by The<br />

Workforce Institute at UKG and conducted by<br />

Workplace Intelligence dissects the feelings of<br />

nearly 4,000 employees and business leaders<br />

across 11 countries to understand what digital<br />

transformation initiatives took place during the<br />

COVID-19 pandemic, how leaders and<br />

employees felt about these new technologies,<br />

and what they hope to see in the postpandemic<br />

world of work.<br />

ACCELERATED DIGITAL<br />

TRANSFORMATION<br />

The vast majority (87%) of U.K. decision<br />

makers said that digital transformation<br />

projects were sped up as a result of the<br />

pandemic. When asked to what degree they<br />

felt the pandemic accelerated these projects,<br />

75% said between 1 to 3 years!<br />

This is evidenced by more than three<br />

quarters (76%) of employees saying that they<br />

used at least one new technology or<br />

application during the crisis. Of those new<br />

technologies, more than a third (36%) started<br />

using mobile applications to complete some<br />

work activities and nearly a quarter (24%)<br />

were empowered to leverage more selfservice<br />

solutions.<br />

Reflecting on their preparation, leaders are<br />

varied on<br />

the actions<br />

they took during<br />

the crisis, with 34%<br />

accelerating a critical<br />

technology deployment, 30%<br />

deciding to replace a software vendor, and<br />

29% saying that they "found" budget to pursue<br />

a technology improvement that was previously<br />

thought to be too expensive or unnecessary.<br />

EMPLOYEES WELCOMED NEW<br />

TECHNOLOGIES<br />

These new technology implementations were<br />

well received, with 86% of U.K. employees<br />

giving their organisation a passing grade (A,<br />

B, or C) for its use or deployment of new<br />

technology during the COVID-19 pandemic<br />

to help them do their job more safely,<br />

efficiently, or from an alternative location.<br />

However, almost half (44%) of all U.K.<br />

workers regardless of level said that their<br />

company's pandemic response would have<br />

been smoother if they had implemented<br />

modern technologies as part of their standard<br />

strategy instead of waiting for the crisis to<br />

occur. And 42% feel that their organisation<br />

was slow to embrace new technologies prior<br />

to the pandemic.<br />

Looking to the future, employees hope to<br />

keep these technologies in their arsenal to<br />

better perform in their roles, as 60% hope<br />

their organisation keeps many of the<br />

technology and policy changes that were<br />

implemented during the COVID-19<br />

pandemic response. However, 38% believe<br />

their organisation will roll back the changes,<br />

going back to the "old way" of doing things.<br />

MODERN TECHNOLOGIES SHOW<br />

BENEFITS, DESPITE ROADBLOCKS<br />

Despite fear of rolling back technological<br />

improvements, U.K. workers remain optimistic<br />

about<br />

potential<br />

business benefits,<br />

with about half or<br />

more hoping their<br />

company's digital<br />

transformation efforts:<br />

create a better customer<br />

experience (54%);<br />

create a better employee experience<br />

(51%); and<br />

improve decision making (44%).<br />

Though they see barriers to these benefits,<br />

with more than one third feeling that their<br />

companies main challenge to selecting or<br />

implementing new technologies is:<br />

budget restraints (40%);<br />

security and privacy concerns (34%); and<br />

culture change and employee adoption<br />

(35%).<br />

"COVID-19 turned the world of work<br />

upside down and clearly forced the digital<br />

transformation hand in a very short period of<br />

time," said Peter Harte, group VP, EMEA,<br />

UKG. "Some organisations were simply<br />

trying to survive - and still are - but others<br />

have been thriving. One year later,<br />

organisations are seeing the fruits of their<br />

digital transformation labour.<br />

"It's now imperative to have a technology<br />

roadmap to aid them in thriving throughout<br />

the remainder of <strong>2021</strong> and into the future,<br />

to keep pace with developments to not only<br />

protect their bottom line, but also meet the<br />

needs of their people and customers." NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

MAY/JUNE <strong>2021</strong> NETWORKcomputing 29


OPINION<br />

THE CONNECTIVITY CONUNDRUM<br />

LEE WADE, CEO OF EXPONENTIAL-E EXPLAINS WHY CONNECTIVITY IS THE FINAL PIECE IN THE HOME<br />

WORKING PRODUCTIVITY PUZZLE<br />

In our new world of work, lots of attention<br />

has been paid to how we connect<br />

individual employees and their homes to<br />

office networks. Why? So businesses can<br />

protect their bottom line. According to The<br />

World Economic Forum's Future of Jobs<br />

Report 2020, most business leaders believe<br />

their employees are less productive when out<br />

of the office. In fact, it says that 78% of<br />

business leaders think hybrid and homeworking<br />

will have a negative impact on<br />

employees' productivity.<br />

Understandably it's difficult to determine<br />

exactly how productive or efficient staff are at<br />

completing tasks when working from home.<br />

It's something that varies massively from one<br />

business to another, with the quality of<br />

technology provision a key determining factor.<br />

Whether business leaders like it or not, one<br />

thing is clear - hybrid working is here to stay.<br />

MAKING HOME WORKING WORK<br />

And it can't be all bad. If home working<br />

wasn't conducive to people doing their jobs,<br />

some of the world's most recognisable firms,<br />

including Spotify, Twitter and Microsoft<br />

wouldn't have committed to letting their<br />

employees work from home permanently<br />

should they choose to.<br />

Companies all around the world are<br />

considering following their lead, or at least<br />

guaranteeing the right to work from home for<br />

large portions of the week in employment<br />

contracts and workplace policies. But it's one<br />

thing to promise staff the benefit and another<br />

thing entirely to provide them with a set-up<br />

that ensures they are equally productive when<br />

working from home.<br />

That's where the need for constant<br />

connectivity comes in. Home networks need<br />

to provide an equal performance to that of<br />

company offices to make the current trend a<br />

consolidated reality. It's an achievable vision,<br />

and one that major firms such as Spotify<br />

begun to realise, thanks to their investment in<br />

best-in-class tech infrastructure.<br />

But for many firms, this vision remains a pipe<br />

30 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION<br />

dream. Most of them still have network<br />

architecture, capacity and security policies in<br />

place that were designed and implemented to<br />

only serve a small number of remote workers<br />

on a 'management approval' basis, and<br />

prioritise the needs and demands travelling<br />

for business, rather than facilitate genuinely<br />

'flexible' working.<br />

These inadequate policies are either<br />

creating or exacerbating three common<br />

obstacles that are affecting staff's ability to<br />

work effectively when logging in from home:<br />

1. Bandwidth barriers<br />

With so many people at home all at the same<br />

time, competing over Wi-Fi bandwidth, lots of<br />

connections are crumbling under the heavy<br />

load. How many times have you been on a<br />

call where your camera has frozen or a bad<br />

connection has kicked you out?<br />

It's up to employers, not employees, to<br />

remedy this issue. Various software-defined<br />

networking solutions are available that<br />

automatically divide up, prioritise and<br />

distribute the bandwidth coming into homes<br />

and direct it to where it's needed, so<br />

employees' meetings run smoothly and aren't<br />

interrupted by their kids watching Disney+, or<br />

other family members listening in to the latest<br />

tunes via Alexa.<br />

2. Security concerns<br />

Home networks are inherently insecure, and<br />

often unprotected by firewalls. Cyber<br />

attackers can break into home networks easily<br />

- even through IP-enabled devices, like your<br />

fridge or your kettle - and once inside, tunnel<br />

and break into their employer's corporate<br />

network. Who knew making a cup of tea<br />

could be so damaging?<br />

Businesses need a solution that<br />

automatically extends corporate-level security<br />

into each employee's home, making all<br />

offices - whether at home or on-site - equally<br />

secure, and truly delivering peace of mind as<br />

a service. Tools like SD-WAN help deliver this<br />

by integrating on-premise level security, and<br />

zero-trust access control, so employees'<br />

homes - and all connected items within them<br />

- become a secure extension of the corporate<br />

or office networks. And yes, that does even<br />

include the games consoles that kids have<br />

been using when they were meant to be<br />

doing school-work.<br />

3. The constant connectivity conundrum<br />

Most companies' HR policies are closely<br />

linked with pastoral staff care, and health and<br />

wellbeing. And for good reason. Staff need to<br />

be given the tools and support needed to<br />

maintain their physical and mental wellbeing.<br />

No one should complain about being given<br />

occasional free drinks, yoga sessions, or<br />

subscriptions to mindfulness apps.<br />

But looking after employees is now about<br />

more than wellbeing perks. HR policies need<br />

to evolve to based on our new reality of home<br />

working, and incorporate constant<br />

connectivity as a key pillar. Having a<br />

productive home working environment is now<br />

critical to the wellbeing of every member of<br />

staff, as well as their livelihood. Because<br />

without it, not only might their client<br />

relationships, performance and the company's<br />

revenues be affected, but their home life<br />

could also suffer. Poor connectivity could even<br />

threaten employees' own sources of income if<br />

they can't do their work properly. Employers<br />

therefore need to make sure connectivity is a<br />

key HR priority, and their networks allow staff<br />

to not only fulfil, but surpass the expectations<br />

of their roles.<br />

It's a no-brainer to invest in a network that<br />

takes the office to your employees, and gives<br />

them the ingredients to succeed, in order to<br />

make a long-term success of home working.<br />

Regardless of when restrictions end,<br />

employees now expect and demand that their<br />

employers provide them with tech<br />

infrastructure that ensures they're productive,<br />

wherever they are working from. Employers<br />

need to wake up and prepare for it. Now.<br />

Otherwise, they might find they no longer<br />

have a workforce to return to the office, when<br />

the time is right. NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

MAY/JUNE <strong>2021</strong> NETWORKcomputing 31


SECURITYUPDATE<br />

THE WEAK LINK IN THE CHAIN<br />

SECTOR ORGANISATIONS NEED TO ADOPT A ZERO-<br />

COMPROMISE APPROACH TO CYBERSECURITY ACCORDING<br />

TO STEPH CHARBONNEAU, SENIOR DIRECTOR OF PRODUCT<br />

STRATEGY, HELPSYSTEMS<br />

No organisation is immune from the<br />

risk of supply chain cyber-attacks and<br />

data breaches, but those with<br />

especially large and complex supplier<br />

ecosystems are much more vulnerable. This is<br />

particularly true of public sector organisations<br />

and even more so in the light of the<br />

challenges, these organisations have faced<br />

during the last 12 months as a result of the<br />

pandemic. As society has adjusted to the<br />

ongoing COVID-19 environment, public<br />

sector entities have had no option but to<br />

provide the majority of their services online.<br />

Whether it is local government, social<br />

services, law enforcement or emergency<br />

services, organisations across all disciplines<br />

that depended on in-person processes have<br />

been forced to pivot to digital alternatives at<br />

an uncomfortable speed.<br />

In the space of a year, society has<br />

transformed beyond recognition, and digitalfirst<br />

is now an imperative. However, not only<br />

do public sector organisations handle a<br />

wealth of sensitive personally identifiable<br />

information (PII) which makes them a target,<br />

but they typically have large, complex<br />

supplier ecosystems and, in the rush to pivot<br />

to deliver online services that have<br />

traditionally been human activated, this has<br />

left a window of opportunity for hackers.<br />

INCREASED THREAT CAUSED BY AN<br />

EXPANDED ATTACK SURFACE<br />

Likewise, the extended attack surface as a<br />

result of the new remote workforce is also<br />

creating opportunities for cybercriminals.<br />

Although the public sector has made great<br />

advances in cybersecurity over the past four<br />

or five years, in <strong>May</strong> 2020 we undertook<br />

research with public sector cybersecurity<br />

workers - and the findings from this were<br />

concerning.<br />

In general, we found a widespread lack of<br />

awareness around cybersecurity, with almost<br />

half of respondents having either not heard<br />

of, or not knowing what ransomware is.<br />

Outdated operating systems are a common<br />

point of entry for cybercriminals, and our<br />

research found that 11% of public sector<br />

employees were still using Windows 7 - which<br />

has not been supported by Microsoft since<br />

January 2020.<br />

This all makes very clear the requirement for<br />

training and best practice guidance for public<br />

sector employees, especially when dealing<br />

with the extended ecosystem of suppliers and<br />

parties that are deemed a trusted source. If<br />

an employee can at least recognise a<br />

malicious email, then they will be far less<br />

likely to click on a link or open a file or<br />

image containing ransomware.<br />

This is particularly important in the new work<br />

environment we now find ourselves in, as a<br />

distributed workforce lacks the usual corporate<br />

cybersecurity defences and is perhaps even<br />

more vulnerable when juggling work with<br />

home-schooling and other distractions.<br />

THE MOVE TO MICROSOFT 365<br />

Additionally, COVID-19 has accelerated the<br />

trend to digitisation, and one such digital<br />

transformation trend particularly common in<br />

public sector organisations is the move to<br />

Microsoft 365. The effectiveness of this<br />

collaboration suite is undeniable, with many<br />

public sector organisations benefitting from its<br />

cloud-based capabilities. But in the rush for<br />

cost-effective deployments, are organisations<br />

missing out on vital security for emails, for<br />

example, because the level they've bought<br />

into does not provide adequate protection for<br />

sensitive data or cyber-attacks?<br />

32 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


SECURITYUPDATE<br />

To avoid the risk of a data breach, public<br />

sector organisations need to fully secure their<br />

business communication channels to ensure<br />

that sensitive information is only shared<br />

between authorised parties and detect when<br />

malware exists in messages, documents, or<br />

image-based files. And while Microsoft 365<br />

offers various levels of email security, it does<br />

not deliver the deep content inspection<br />

required to automatically detect and remove<br />

sensitive information (such as PII data or<br />

payment card information), especially within<br />

screenshots or scanned documents. Even with<br />

sandboxing, protection against ransomware is<br />

limited because the malware threats designed<br />

to evade these systems can be hidden within<br />

documents or image-based files.<br />

It is all too easy to see an email from a trusted<br />

supplier or partner and assume that it is safe to<br />

open, therefore, only a zero-compromise<br />

approach will provide the level of protection<br />

needed in today's multi-vector environment.<br />

HOW TO NEUTRALISE SUPPLY<br />

CHAIN THREATS<br />

Public sector organisations need layered<br />

security defences to neutralise any threats<br />

coming from a supplier. It is essential that<br />

organisations are adequately protected from<br />

incoming malware, embedded Advanced<br />

Persistent Threats, or any other threat that<br />

could pose a risk to the business. At<br />

HelpSystems, we offer a Secure Email<br />

Gateway which works in conjunction with<br />

Microsoft 365, giving public sector<br />

organisations the missing element required for<br />

a robust, comprehensive security posture, one<br />

that takes into consideration the threat posed<br />

by the extended supplier ecosystem.<br />

Data classification tools are also critical to<br />

ensure that sensitive data is appropriately<br />

treated, stored, and disposed of during its<br />

lifetime in accordance with its importance to<br />

the organisation. Through appropriate<br />

classification, using visual labelling and<br />

metadata application to emails and<br />

documents, this protects the organisation from<br />

the risk of sensitive data being exposed to<br />

unauthorised organisations further down the<br />

line through the supply chain.<br />

Likewise, data that isn't properly encrypted in<br />

transit can be at risk of compromise, so<br />

public sector organisations should use a<br />

secure and compliant mechanism for<br />

transferring data within the supply chain to<br />

reduce risks. Here Managed File Transfer<br />

(MFT) software can facilitate the automated<br />

sharing of data with suppliers and provide a<br />

central platform for information exchanges<br />

and other file transfer protections.<br />

AN UNPRECEDENTED YEAR<br />

At the start of this year, the IT Governance<br />

blog logged 134 security incidents in<br />

December, which accounted for more than<br />

148 million breached records. According to IT<br />

Governance, this brings the total for 2020 to<br />

more than 20 billion breached data records,<br />

and unfortunately, public sector organisations<br />

were in the top three industries most<br />

commonly breached.<br />

Most of these breaches are not sophisticated<br />

attacks but are a result of either ransomware<br />

or internal human error, therefore it is<br />

imperative that public sector organisations<br />

have the right technologies, policies, and<br />

training programs in place. NC<br />

If you are interested in finding out more<br />

about protecting your supply chain you can<br />

download the HelpSystems eGuide<br />

"Managing Cybersecurity Risk in the Supply<br />

Chain" at: https://bit.ly/3dTC0fe<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

MAY/JUNE <strong>2021</strong> NETWORKcomputing 33


FEATUREDATA PROTECTION<br />

LESSONS FROM A DATA CENTRE FIRE<br />

FOLLOWING THE FIRE AT OVHCLOUD'S DATA CENTRE IN<br />

STRASBOURG IN MARCH, STEPHEN YOUNG, DIRECTOR<br />

ASSURESTOR, OFFERS HIS TAKE ON THE KEY LEARNINGS FROM<br />

THE INCIDENT<br />

Earlier this year, the fire at the OVHCloud<br />

data centre caused widespread<br />

disruption and data loss for customers<br />

with servers hosted at the site. Many<br />

companies may have permanently lost data,<br />

impacting their business, a number of which<br />

appear to have been hosting their own<br />

physical servers or virtual private servers.<br />

Some of these customers believed that data<br />

centres were so safe and secure that a disaster<br />

like this was impossible, but that in the event<br />

there was an issue, their data was being<br />

backed up as part of the service. Others were<br />

carrying out some form of backup or<br />

replication to servers in the same data centre.<br />

What this means is that a complete loss of<br />

services can still happen regardless of where<br />

you are hosted and that responsibility for<br />

ensuring you can recover systems and data<br />

quickly falls to the customer.<br />

There's still a belief amongst users of data<br />

centres, cloud and SaaS providers, that their<br />

data is secure, is backed up, and will come<br />

back online quickly in the event of a disaster.<br />

But many providers may only provide a<br />

'reasonable endeavours' service to retrieve lost<br />

data - and it's not always prominent in the Ts &<br />

Cs. For this reason it's vital to know exactly<br />

what's being provided.<br />

Without their own disaster recovery (DR)<br />

provisions, users of physical servers don't even<br />

need their data centre to be destroyed by fire<br />

to lose their data; server failure on its own<br />

could have caused this disruption and loss, or<br />

even some form of malware could<br />

compromise their service.<br />

For many, a simple solution of off-site<br />

replication or backup to a cloud service, such<br />

as disaster recovery-as-a-service (DRaaS) or<br />

backup-as-a-service (BaaS) provided from<br />

another data centre, can minimise downtime<br />

and prevent data loss. The fact that their<br />

systems and data are being duplicated<br />

elsewhere provides assurance in knowing it's<br />

recoverable.<br />

Until data centre providers offer backups as<br />

standard to customers, consider taking these<br />

six steps:<br />

1. Consider what you deem to be a disaster.<br />

Some are satisfied knowing their data can<br />

be recovered from backup, even if it takes<br />

hours or days. Others cannot afford any<br />

downtime and need systems back online<br />

within minutes, even seconds.<br />

2. Having servers and critical data within a<br />

data centre environment does not mean<br />

your systems are impervious to downtime<br />

or data loss. A data centre brings<br />

heightened levels of security and resilience,<br />

but it's still a building that can be affected<br />

by fire, flood and cyber-attacks.<br />

3. Whatever solution you decide on to<br />

protect your data, ensure it's<br />

geographically diverse. A DR solution with<br />

an RPO (Recovery Point Objective) of<br />

seconds and RTO (Recovery Time<br />

Objective) of minutes is compromised if it's<br />

in the same data centre or a second<br />

location close by.<br />

4. Big-name SaaS platforms, such as<br />

Microsoft 365 and Google Workspace,<br />

typically include some level of backup<br />

protection. But many of these 'backup<br />

features' are designed with the SaaS<br />

provider in mind and may not meet your<br />

needs. Watch out for ambiguous SLAs and<br />

missing features, such as granular<br />

recovery and flexible retention - critical for<br />

a good backup platform.<br />

5. Ensure you have the knowledge and time<br />

to research the right DR solution for your<br />

requirements and build in tests regularly.<br />

While you can do this using internal<br />

resource, you get specialised expertise<br />

using a DRaaS or external partner to<br />

deliver data protection/recovery.<br />

6. Many systems cannot be fully tested<br />

replicating a true disaster scenario due to<br />

the disruption it causes. By securing your<br />

data recovery/backup services via DRaaS<br />

or an external partner, you're likely to have<br />

inherent DR testing as part of the service<br />

with the ability to emulate a complete<br />

service outage without disruption.<br />

Finally, do not assume your systems are<br />

protected, that your data cannot be lost, and<br />

your organisation can survive downtime with<br />

little or no business impact. An outage or loss<br />

of data can have a huge impact, not only in<br />

our ability to perform tasks, but also on the<br />

bottom line. NC<br />

34 NETWORKcomputing MAY/JUNE <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!