Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
NETWORKcomputing<br />
I N F O R M A T I O N A N D C O M M U N I C A T I O N S – N E T W O R K E D www.networkcomputing.co.uk<br />
IoT AT THE EDGE<br />
What will edge computing mean<br />
for the Internet of Things?<br />
HYBRID WORKING<br />
The genie is out of the<br />
botttle - so what next?<br />
NEW PATHWAYS<br />
Why the times are<br />
changing for tech training<br />
CONNECTING WITH<br />
QUALITY<br />
Draytek discuss solutions for<br />
our new network landscape<br />
AUGUST/SEPTEMBER <strong>2021</strong> VOL 30 NO 03
COMMENT<br />
COMMENT<br />
A NEW KIND OF BROADBAND STREAMING<br />
There's been very little need for a hosepipe ban in the UK this summer and now it seems<br />
that the country's water system is on the verge of being used in an altogether more innovative<br />
way. In <strong>Aug</strong>ust the UK Government announced a three-year project to accelerate<br />
the rollout of broadband and mobile signal in rural areas by feeding fibre cables through the<br />
country's network of water pipes. Four million pounds is being made available for cuttingedge<br />
innovators to trial the scheme. The government sees the project as potentially offering "a<br />
quicker and more cost-effective way of connecting fibre optic cables to homes, businesses<br />
and mobile masts, without the disruption caused by digging up roads and land. Civil works,<br />
in particular installing new ducts and poles, can make up as much as four fifths of the costs<br />
to industry of building new gigabit-capable broadband networks."<br />
Digital Infrastructure Minister Matt Warman said "We are calling on Britain's brilliant innovators<br />
to help us use this infrastructure to serve a dual purpose of serving up not just fresh and<br />
clean water but also lightning-fast digital connectivity." The Fibre in Water project will also test<br />
solutions to water leakage by putting connected sensors in the pipes, enabling water companies<br />
to identify and repair a leak more quickly and accurately. It's not the sort of network<br />
patching we typically feature in the magazine but it's welcome news all the same.<br />
While welcoming the news of the Fibre in Water project, Dahwood Ahmed, Regional<br />
Director UK&I at Extreme Networks observed that there's still a significant distance to cover<br />
when it comes to the UK's connectivity gap. "Feeding cables through the country's water pipes<br />
is a smart, efficient and creative approach, but to fully close the connectivity gap, the problem<br />
needs to be addressed with more than one solution," according to Dahwood. "One already<br />
proven option is the adoption of AltNets, also known as alternative networks. These providers<br />
create their own networks to offer last mile connectivity without relying on the UK's existing<br />
copper network. To close the UK connectivity gap once and for all, the government and technology<br />
innovators need to work together. Only then will citizens and businesses in the UK<br />
enjoy infinitely distributed high-speed connectivity, wherever they may be located."<br />
And speaking of innovations, voting has now opened to determine the winners of this year's<br />
Network Computing Awards. After having to forgo our traditional awards evening last year in<br />
favour of a virtual event we're delighted to be returning to a central London venue on<br />
October 14th for the <strong>2021</strong> awards. To cast your votes and for more information on how you<br />
can attend the awards night please visit: www.networkcomputingawards.co.uk. NC<br />
REVIEWS:<br />
Dave Mitchell<br />
DEPUTY EDITOR: Mark Lyward<br />
(netcomputing@btc.co.uk)<br />
PRODUCTION: Abby Penn<br />
(abby.penn@btc.co.uk)<br />
DESIGN: Ian Collis<br />
(ian.collis@btc.co.uk<br />
SALES:<br />
David Bonner<br />
(david.bonner@btc.co.uk)<br />
<strong>Jul</strong>ie Cornish<br />
(julie.cornish@btc.co.uk)<br />
SUBSCRIPTIONS: Christina Willis<br />
(christina.willis@btc.co.uk)<br />
PUBLISHER: John Jageurs<br />
(john.jageurs@btc.co.uk)<br />
Published by Barrow & Thompkins<br />
Connexion Ltd (BTC)<br />
35 Station Square,<br />
Petts Wood, Kent, BR5 1LZ<br />
Tel: +44 (0)1689 616 000<br />
Fax: +44 (0)1689 82 66 22<br />
SUBSCRIPTIONS:<br />
UK £35/year, £60/two years,<br />
£80/three years;<br />
Europe:<br />
£48/year, £85/two years £127/three years;<br />
ROW:<br />
£62/year, £115/two years, £168/three years;<br />
Subscribers get SPECIAL OFFERS — see subscriptions<br />
advertisement; Single copies of<br />
Network Computing can be bought for £8;<br />
(including postage & packing).<br />
© <strong>2021</strong> Barrow & Thompkins<br />
Connexion Ltd.<br />
All rights reserved.<br />
No part of the magazine may be<br />
reproduced without prior consent, in<br />
writing, from the publisher.<br />
GET FUTURE COPIES FREE<br />
BY REGISTERING ONLINE AT<br />
WWW.NETWORKCOMPUTING.CO.UK/REGISTER<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 03
CONTENTS<br />
CONTENTS<br />
A U G U S T / S E P T E M B E R 2 0 2 1<br />
INTERVIEW: DRAYTEK.............8<br />
We spoke to Alex Shuker, CTO at DrayTek,<br />
about the changing landscape for the networking<br />
industry, the impact of home-working<br />
and the upcoming switch-off of traditional<br />
telephony services<br />
COMMENT.....................................3<br />
A new kind of broadband streaming<br />
INDUSTRY NEWS.............................6<br />
The latest networking news<br />
ARTICLES<br />
THE VALUE OF SSL CERTIFICATES FOR<br />
ONLINE BUSINESSES.......................14<br />
By Ben Haskey at LCN.com<br />
MAKING THE MOVE TO SD-WAN.....18<br />
By Oliver Wallington at Wireless Logic<br />
I.T. IS THE NEW VIP..........................24<br />
By Andrea Babbs at VIPRE<br />
HYBRID WORKING..............12<br />
Herbert Lörch at M-Files considers whether<br />
there's now any point in returning to regular<br />
on-premises work if you can also work<br />
remotely in the cloud<br />
IoT AT THE EDGE................20<br />
Peter Ruffley at Zizo explains what edge<br />
computing will mean for the Internet of<br />
Things, and offers advice on where to start<br />
when investing in IoT<br />
LEADING THE FIELD................16<br />
Norvado relies on NetAlly's EtherScope®<br />
nXG Network Analyzer to conduct complete<br />
and accurate remote assessments, reducing<br />
the time and cost of field operations<br />
TECH TRAINING.....................26<br />
A "new normal" is coming in Tech - and we<br />
need to make sure it's truly different this time,<br />
according to Graham Hunter at CompTIA<br />
SECURING DISPERSED NETWORKS IN<br />
THE ERA OF HYBRID WORKING........29<br />
By Rodney Joffe at Neustar<br />
DON’T LET YOUR DATA LAKES DECAY<br />
INTO DATA SWAMPS........................30<br />
By Grace Liu at Seagate Technology<br />
TO CODE OR NOT TO CODE?.......32<br />
Could no-code be the answer to the digital<br />
skills shortage?<br />
MORE POWER TO YOU...................33<br />
Moxa offers a guide to optimising power<br />
consumption through remote monitoring<br />
WHY SD-WAN?................................34<br />
By Amy Hood at DrayTek<br />
PRODUCT REVIEW<br />
FLUKE LINKIQ CABLE+NETWORK<br />
TESTER............................................10<br />
DRAYTEK VIGORAP 1060C................15<br />
KEMP FLOWMON COLLECTOR..........22<br />
DRAYTEK VIGOR 2927LOC...............28<br />
04 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
INDUSTRY NEWS<br />
NEWS NEWSNEWS<br />
NEWS<br />
NEWS NEWS NEWS<br />
NEWS NEWS NEWS<br />
Extreme Networks to acquire Ipanema<br />
Extreme Networks has announced its intent to acquire a newly<br />
created entity called Ipanematech SAS ("Ipanema"), the SD-<br />
WAN division of Infovista. The acquisition will expand Extreme's<br />
ExtremeCloud portfolio, offering new cloud-managed SD-WAN<br />
and security solutions required to power the Infinite Enterprise.<br />
Ipanema's solution automatically and dynamically adjusts<br />
application traffic flows based on real-time network conditions,<br />
providing increased performance and improved quality of<br />
experience, even under diverse conditions across various types<br />
of cloud-managed WAN connectivity. Extreme plans to<br />
leverage these capabilities to establish an infinitely distributed<br />
and secure solution within the ExtremeCloud portfolio –<br />
progressing the company's position as one of the world's most<br />
advanced cloud platforms.<br />
Private 5G Network-as-a-Service platform from NTT<br />
NTT has launched its Private 5G platform (P5G), the first<br />
globally available private LTE/5G Network-as-a-Service<br />
platform. NTT P5G leverages design thinking principles to<br />
integrate security, control and privacy by design, providing<br />
performance and cost benefits with a clear ROI. Running on a<br />
cloud-native architecture, the platform can be delivered via<br />
cloud, on-premises, or at the edge. The platform is preintegrated<br />
with leading network and software partners, allowing<br />
enterprises to secure, scale and segment their network flexibly.<br />
With patent-pending MicroSlicing technology, NTT P5G allows<br />
mission-critical apps to leverage the advantages of private 5G.<br />
"Global enterprises are looking for a single private 5G solution<br />
to deploy across multiple countries. They need one truly private<br />
network, one point of accountability, one management platform,<br />
and one solution partner that eliminates all the major friction<br />
points across the entire global footprint of the enterprise," said<br />
Shahid Ahmed, NTT Ltd. EVP New Ventures and Innovation.<br />
"Our NTT P5G offering supports many of the CXO requirements<br />
today, and we will continue to invest in P5G as enterprise<br />
adoption evolves."<br />
Dataquest Group signs security deal with Acronis<br />
Dataquest Group has signed a deal with cybersecurity<br />
solutions providers Acronis. Dataquest provides a<br />
comprehensive range of technology services, ranging from<br />
managed print to Cloud solutions and is recognised as one of<br />
the UK’s fastest growing hybrid Cloud solutions providers.<br />
Chris Baker, Cloud Business Development Manager at<br />
Dataquest, commented: "Acronis delivers an integrated suite of<br />
data protection solutions, including backup, disaster recovery and<br />
storage, together with file sync and share, which will serve our<br />
clients well in these challenging times. To face the challenge<br />
presented by increasing security threats, Dataquest was seeking a<br />
simplified product that offered our clients the best protection,<br />
from a single, easy to manage source. Acronis and its range of<br />
innovative products was the ideal choice for partner."<br />
Chris Baker, Dataquest<br />
Common use-cases for Acronis Cyber Protect, in addition to<br />
normal backup and recovery, include auto-response to emerging<br />
threats, real-time (CDP) protection of important documents, zeroday<br />
malware and ransomware protection and recovery, together<br />
with compliance and forensic analysis.<br />
The Spectra Current I.T. podcast launched<br />
Spectra Logic has launched its new podcast series, The<br />
Spectra Current. The podcast series features conversations<br />
with IT industry experts, thought leaders, customers and Spectra<br />
Logic executives who review the latest trends in data storage,<br />
data management, emerging technologies, cybersecurity and<br />
digital transformation at large. Conversations centre around<br />
data centre experiences, business methodologies, corporate<br />
culture, industry insights and lighthearted banter on successes,<br />
failures and personal and professional recommendations.<br />
Hosted by Betsy Doughty, vice president of corporate<br />
marketing for Spectra Logic, the podcast will provide new<br />
episodes bimonthly. "We're excited to launch The Spectra<br />
Current to provide personal and professional experiences and<br />
chats around how organisations are modernising their IT<br />
architectures, corporate cultures and even their teams," said<br />
Betsy Doughty. "We've lined up a variety of remarkable guests<br />
who have agreed to share their unique stories and individual<br />
insights with our listeners." For more on Spectra Current visit:<br />
https://bit.ly/3AGNMCh<br />
06 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
INDUSTRY NEWS<br />
Comparitech counts the cost of annual cybercrime<br />
Anew report from Comparitech has discovered that global<br />
cybercrime is still severely underreported by police and<br />
government entities, with the true monetary value remaining<br />
largely unknown. Comparitech's researchers examined the top<br />
100 countries by GDP, looking at the cybercrime reports<br />
available and the figures and categories involved. They found<br />
figures for 67 countries but only 15 reports of the monetary<br />
values involved. According to their estimates 71.1 million fall<br />
victim to cybercrimes globally each year (this equates to nearly<br />
900 victims per 100,000 people) with the average victim loss<br />
amounting to $4,476 per crime. This amounts to victims losing<br />
$318 billion to cybercrime annually. The countries with the<br />
biggest losses are:<br />
United States: 5.28 million victims losing $28 billion<br />
Brazil: 5.8 million victims losing over $26 billion<br />
United Kingdom: 4.88 million victims losing $17.4 billion<br />
Russia: 3.4 million losing over $15.2 billion<br />
Javvad Malik, security awareness advocate at KnowBe4<br />
commented "These numbers are not surprising, but still are<br />
concerning. Cybercrime continues to be big business for<br />
criminals and with more services being digitally connected, it<br />
makes it even easier to make off with big gains. It's easy to<br />
create a tech service or to digitise existing services, however,<br />
security needs to be built in from the beginning to ensure that<br />
there are no vulnerabilities. This also includes educating users of<br />
products as to what kind of threats they can expect to face and<br />
how to report any suspicious activity. Without educating users to<br />
identify and report criminal activity, we won't be able to stem the<br />
flow of cybercrime."<br />
Using darknet intelligence to protect edge computing<br />
DataQube Global Ltd, developer of a 5G-ready edge data<br />
centre system, has teamed up with cyber intelligence and<br />
MSSP provider, KryptoKloud Ltd to safeguard its invaluable edge<br />
computing assets against cybercrime. The collaboration assures<br />
heightened protection for the DataQube units by delivering<br />
around the clock detection and response monitoring capabilities<br />
that can be managed locally or centrally via an intuitive interface.<br />
By incorporating KryptoKloud's security monitoring tools (which<br />
leverage darknet intelligence) into DataQube's core infrastructure,<br />
all data communication is dynamically monitored 24x7 to<br />
proactively identify possible security breaches. If malicious activity<br />
is detected an alert is triggered, together with a comprehensive<br />
escalation process for damage limitation and control.<br />
New WiFi 6 Standalone Access Points from NETGEAR<br />
NETGEAR has released the WAX202 and WAX206 desktop<br />
WiFi 6 Access Points, expanding the Business Essentials line<br />
of powerful, easy-to-deploy, and affordable business networking<br />
products. The WAX202 and WAX206 provide home office<br />
workers, micro businesses, and students with a cost-effective,<br />
standalone solution to typical wireless networking challenges.<br />
"The new WAX202, WAX206 and NETGEAR's Business<br />
Essentials family of products, make it possible for small<br />
businesses and working professionals to deploy a very reliable,<br />
high-performance, secure, and easy-to-manage standalone WiFi<br />
networks in their work and home environments at affordable<br />
price points," said Doug Cheung, Senior Product Line Manager,<br />
Wireless at NETGEAR.<br />
Neos Networks completes full fibre network for Perth<br />
Neos Networks has announced the completion of its DCMS<br />
funded Local Full Fibre Network project in Perth, Scotland,<br />
ahead of schedule. The fibre network connecting three key<br />
Council data centres and 31 public buildings and community<br />
establishments within Perth was completed two months ahead of<br />
the scheduled completion date at the end of <strong>Sep</strong>tember.<br />
Spanning 19.5km, the new end-to-end full fibre network covers<br />
city centre locations, including educational institutions, council<br />
buildings, leisure centres and sheltered housing, as well as key<br />
public buildings such as Perth fire station and the CCTV<br />
monitoring centre. It stretches out to the west of the city, close to<br />
the new 3,000-home Perth West housing development.<br />
Perth and Kinross Council awarded Neos Networks the major<br />
gigabit-capable connectivity project in November 2020, with the<br />
goal of facilitating next generation technologies such as 5G and<br />
IoT. Forming part of Wave 3 of the Department for Digital,<br />
Culture, Media and Sport (DCMS) Local Full Fibre Network<br />
programme, the project received £1m of funding from UK<br />
Government and was supported by Council and Building Digital<br />
UK (BD-UK) officials from procurement through to completion.<br />
NEWS NEWSNEWS<br />
NEWS<br />
NEWS NEWS NEWS NEWS NEWS<br />
NEWS<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 07
INTERVIEW: DRAYTEK<br />
CONNECTING WITH QUALITY<br />
NETWORK COMPUTING SPOKE TO ALEX SHUKER, CTO AT<br />
DRAYTEK UK, ABOUT THE CHANGING LANDSCAPE FOR THE<br />
NETWORKING INDUSTRY, THE IMPACT OF HOME-WORKING<br />
AND THE UPCOMING SWITCH-OFF OF TRADITIONAL<br />
TELEPHONY SERVICES<br />
Network Computing: DrayTek has<br />
been going for almost 25 years -<br />
how has the industry changed over<br />
that time? Is networking these days more<br />
about management and monitoring tools -<br />
perhaps via the cloud - more than specific<br />
hardware offerings?<br />
Alex Shuker: The focus for DrayTek has<br />
always been around providing solutions to<br />
the issues and challenges that businesses -<br />
and individuals - face. That is at the root of<br />
most of our product offerings - we champion<br />
solutions for business connectivity. From our<br />
point of view the focus has always been on<br />
providing the right router, access point or<br />
switch at the right time, but also crucially the<br />
additional services around that product. A<br />
lot of our core users are businesses who are<br />
installing networks for other organisations,<br />
and they bring their expertise in how to get<br />
that network working optimally, allowing<br />
those end users to focus instead on what<br />
they do well.<br />
A significant development for us is our<br />
central cloud-based management system.<br />
Customers can use it to connect to devices,<br />
and we enable them then to offer a service<br />
monitoring and managing those devices.<br />
This helps our customers to build the right<br />
service package for their clients around our<br />
management offering. Managed Service<br />
Providers may be offering a cloud service,<br />
but at some point in the process there is still<br />
that physical connection - and that's where<br />
DrayTek fits in, providing that equipment<br />
and supporting services. In that sense I<br />
guess we still have that hardware aspect at<br />
our core.<br />
A lot of what we supply could be<br />
described as 'commoditised' to an extent -<br />
once you have that physical connection, a<br />
large part of the job is done, if you like.<br />
But we also have a unique focus on<br />
configuration flexibility, quality and<br />
reliability, and that is an area where we<br />
stand out in the market.<br />
NC: How important is it for a company like<br />
DrayTek to be seen as a solution provider<br />
as opposed to just a hardware vendor trying<br />
to shift boxes?<br />
AS: The ideal story for us, obviously, is when<br />
someone puts in a DrayTek router or access<br />
point or switch, and they don't have to ever<br />
think about it ever again, and they can<br />
forget it's there. But increasingly nowadays<br />
people are offering services based on<br />
knowing how your network is performing,<br />
improving visibility of exactly what is being<br />
used - so we're seeing a migration more<br />
toward the SD-WAN side of things, toward<br />
application awareness. That's why it's so<br />
important for us to have this central<br />
management platform that offers the<br />
analytics and insight into the network, via<br />
an intuitive and user-friendly dashboard.<br />
08 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
INTERVIEW: DRAYTEK<br />
This means that MSPs and IT companies<br />
can see exactly what kind of traffic is on<br />
their networks, but also - as people are now<br />
consuming a lot more cloud services - it<br />
allows them to see not just that the<br />
connection is there and working, but how<br />
well it is working. If we're talking about a<br />
business's CRM system or their ordering<br />
system or their phone system, you simply<br />
can't have any latency or packet loss<br />
because that means you'll end up with a<br />
client on the other end of the phone who<br />
can't hear you, or experiencing long delays<br />
trying to navigate through screens. So the<br />
demand increasingly is for the ability to look<br />
at the quality of a connection, and to move<br />
seamlessly across to a different connection<br />
if necessary.<br />
We can easily show users not just that a<br />
connection is up or down, but also if it goes<br />
below a specific quality measure that they<br />
have set. As users increasingly demand that<br />
better service quality as well as visibility and<br />
awareness of exactly what's going on within<br />
their networks, that is what really drives us<br />
forward as a company in terms of the features<br />
and functionality we offer to the market.<br />
NC: The pandemic has obviously changed<br />
the way large numbers of us do our<br />
everyday work: what effect has the growth in<br />
home-working had on the roles of network<br />
managers, and by extension on companies<br />
like DrayTek?<br />
AS: People who are fairly tech-literate will<br />
already be aware of the need for backup<br />
strategies such as mobile broadband in<br />
case of a bulldozer up the street cutting off<br />
your broadband connection, so that core<br />
set of users already know what they can do<br />
if a connection goes down. But since the<br />
Covid crisis there is a whole set of users<br />
who have been put into that environment<br />
and are only just beginning to appreciate<br />
how integral those connections are to them<br />
being able to do their jobs properly. As a<br />
result we've seen a lot of people showing<br />
interest in backup and failover solutions for<br />
their home broadband.<br />
That shift has also helped people move<br />
towards awareness of the need for failover,<br />
for the ability to automatically go from one<br />
connection to another without the user<br />
having to actually change anything. If this all<br />
happens in one box, it will fail over<br />
automatically, fail back, and report in, so<br />
the company proactively knows that a<br />
particular element has gone down. If it's<br />
working well of course, the user site<br />
shouldn't even notice, but you need to know<br />
so you can maintain the service at its best:<br />
that reporting aspect is absolutely vital, even<br />
if it is happening 'behind the scenes' as far<br />
as the user is concerned.<br />
Covid has brought with it new and different<br />
types of stresses and demands - for example,<br />
previously there would have been large<br />
numbers of workers in say Accounts who'd<br />
never need to work outside the office, but<br />
now suddenly the number of VPN users was<br />
expanding to cover almost the entire<br />
workforce. So we have had lots of calls<br />
about that aspect of performance, about<br />
how many concurrent users they can have on<br />
the VPN. And I'm glad to say that we had a<br />
lot of very relieved customers, as we<br />
explained that it was generally just a matter<br />
of creating more profiles rather than having<br />
to buy a new tool. As time has gone on, that<br />
kind of thing has become a core part of<br />
customers' purchasing decisions: can they<br />
add on remote users in increasing numbers,<br />
can they kit-out home users with a router<br />
than includes all the failover functionality<br />
rather than having to rely on their home<br />
broadband connection.<br />
We're seeing a shift, I believe, from a<br />
largely reactive stance - "This is the situation<br />
we find ourselves in, what do we have to do<br />
to adapt and keep going?" - to a more<br />
forward-planning approach as businesses try<br />
to balance out the benefits and drawbacks of<br />
a workforce that looks to expect much more<br />
flexibility going forward.<br />
NC: The analogue telephony service is<br />
scheduled to be switched off in 2025, which<br />
is not that far away now - is it something your<br />
partners and/or end users are prepared for?<br />
AS: It's a conversation we've been having<br />
with MSPs for some time - they will be<br />
offering a complete package of broadband,<br />
phone line and more, and in the past they<br />
would be purchasing the telephone line and<br />
internet connection from Openreach, to be<br />
delivered on the same line. When the 'stopsell'<br />
happens, MSPs will have to think about<br />
how they will offer phone services.<br />
Obviously in some ways the goalposts have<br />
moved - again in large part due to Covid - as<br />
services like Teams and Zoom have become<br />
more core to how many organisations<br />
communicate. Nonetheless most businesses<br />
will still have a need for some kind of phone<br />
system, so there is some debate going on<br />
about how best to deliver that.<br />
One approach is to ensure that the router<br />
itself offers a good enough connection for<br />
voice, and have failover and ways of<br />
monitoring the service to make sure that the<br />
quality is up to scratch. One specific feature<br />
of our Vigor-ACS 3 SD-WAN is the ability to<br />
monitor the MOS (Mean Opinion Score) of<br />
the connection, so if that value drops below<br />
say 3.5 out of 5, then you are alerted that<br />
the quality of that connection isn't good<br />
enough for voice any more, and it needs to<br />
failover to a different connection.<br />
DrayTek also offers products with built-in<br />
phone ports, so the router connects to an<br />
analogue phone, and then to a SIP service,<br />
so that can be used just as a standard phone<br />
or to replace legacy systems. In the longer<br />
term of course everyone will move to IP<br />
solutions for voice, but for people with<br />
existing legacy systems they may have<br />
elements - analogue based PBX, or<br />
doorphones, for example - that they can't<br />
easily migrate across, where they need a<br />
phone port to plug into. We're working hard<br />
to ensure we have solutions that our partners<br />
want to recommend to their users, whatever<br />
their requirements. NC<br />
www.draytek.co.uk<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 09
PRODUCTREVIEW<br />
Fluke Networks<br />
LinkIQ<br />
Cable+Network<br />
Tester<br />
PRODUCT REVIEW<br />
PRODUCT<br />
REVIEWPRODUCT RE<br />
Network engineers never leave<br />
home without their cable tester as<br />
it's an essential tool for certifying<br />
new network installations or solving cable<br />
connection issues - and Fluke Networks is<br />
about to make their lives even easier. The<br />
LinkIQ Cable+Network Tester is quite<br />
unique as it's the first handheld device to<br />
combine cable testing with switch and<br />
Power over Ethernet (PoE) diagnostics.<br />
The LinkIQ packs a remarkable range of<br />
features into a compact chassis as it's<br />
capable of verifying up to 10-Gigabit<br />
cabling performance. It can automatically<br />
detect and run diagnostics on switches to<br />
provide information such as its name,<br />
data rate, port number plus VLAN and if<br />
PoE is being advertised, and it will load<br />
test up to 90W Class 8.<br />
Cable diagnostics are outstanding as the<br />
LinkIQ uses radio frequency (RF) tests to<br />
ascertain physical cable quality and the<br />
IEEE 802.3 standards it can support.<br />
These range from 10Base-T to 10GBase-T<br />
and a key feature is its ability to check if a<br />
cable run is qualified for the multi-Gigabit<br />
2.5GBase-T and 5GBase-T standards.<br />
We found the LinkIQ incredibly easy to<br />
use as it offers full automation and runs<br />
the most appropriate set of tests based on<br />
what it finds at the other end of the cable.<br />
Connect an open-ended cable and it'll tell<br />
you the length and pairing, while<br />
plugging in the Remote ID RJ-45 dongle<br />
at the far end of the run allows it to<br />
conduct a full validation test to determine<br />
all supported speeds.<br />
The industrial-quality touchscreen LCD<br />
panel makes light work of general<br />
operations and automated tests are<br />
started with a single tap. For cable tests, it<br />
provides a clear wire map diagram while<br />
below is a chart showing all the speeds<br />
the cable can support.<br />
We have some legacy cabling in the lab<br />
and after plugging the remote ID device<br />
into our rack's patch panel, it was<br />
reassuring to know that it was all capable<br />
of supporting up to 5GBase-T and that<br />
every cable run was in tip-top shape.<br />
Swapping the LinkIQ over to our 10GbE<br />
infrastructure confirmed it was all<br />
validated for 10GBase-T operations.<br />
Bringing our switches into the equation<br />
produced even more valuable<br />
information. For our standard Gigabit<br />
and 10GbE switches, the LinkIQ reported<br />
back on the device name, VLAN, all<br />
advertised speeds and full duplex<br />
capabilities.<br />
With the LinkIQ connected to a multi-<br />
Gigabit PoE++ switch, the test<br />
determined that it could support dual<br />
power signatures, which wire pairs were<br />
providing power and its hardware power<br />
class. There's a lot more as it revealed the<br />
watts provided, the minimum required<br />
volts to meet the 802.3bt standard plus<br />
the measured voltage under load.<br />
Results can be saved locally and the<br />
LinkIQ has room to store up to 1,000<br />
tests. Connect it to a PC using the<br />
supplied USB cable and you can upload<br />
all your results to the free LinkWare PC<br />
software, which supports every test device<br />
Fluke has produced for the past 20 years.<br />
After running a wide range of cable,<br />
switch and PoE tests, we uploaded our<br />
results to a PC running LinkWare and<br />
organised them into various databases<br />
and projects for easier access. It's a great<br />
tool for enhanced customer services as<br />
complete projects and individual test<br />
results can be exported to professionalquality<br />
PDFs to confirm the work has been<br />
carried out to the required standards.<br />
The LinkIQ impressed us during testing<br />
as this handheld device's smart<br />
combination of cable, switch and PoE<br />
diagnostics makes it supremely versatile.<br />
The automated tests make it incredibly<br />
easy to use, it can present a wealth of<br />
essential information and the LinkWare<br />
software provides classy project<br />
management and reporting tools.NC<br />
Product: LinkIQ Cable+Network Tester<br />
Supplier: Fluke Networks<br />
Web site: www.flukenetworks.com<br />
Tel: +44 (0)207 942 0721<br />
Price: From £1,520 exc VAT<br />
10 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
Your nominations have determined the finalists. We now ask for your help again.<br />
Please cast your votes to decide the ultimate winners at:<br />
WWW.NETWORKCOMPUTINGAWARDS.CO.UK<br />
ATTENTION VENDORS, DISTRIBUTORS AND RESELLERS:<br />
Are you or any of your channel partners in contention for an award? Make sure you book your<br />
places at the awards ceremony which will take place on 14th October.<br />
Contact Dave Bonner on 01689 616000 or dave.bonner@btc.co.uk<br />
The Awards are sponsored by :
OPINION: HYBRID WORKING<br />
THE GENIE IS OUT OF THE BOTTLE -<br />
AND NEEDS GUIDANCE<br />
WHAT'S THE POINT IN RETURNING TO REGULAR ON-PREMISES<br />
WORK IF YOU CAN ALSO WORK REMOTELY IN THE CLOUD?<br />
BY HERBERT LÖRCH, REGIONAL VICE PRESIDENT, WESTERN<br />
EUROPE, M-FILES<br />
Proactively or reactively, many organisations<br />
have experienced a tremendous digital<br />
transformation in the past few months.<br />
Within a few days or weeks of the global<br />
pandemic starting, most employees have found<br />
themselves switching to remote work. Working<br />
from outside the office is the new normal. For<br />
many organisations, platforms such as<br />
Microsoft Office 365 or Google G Suite have<br />
been the means of choice. They are, without<br />
question, ideally suited to bring together<br />
distributed teams and enable collaborative work<br />
on documents and processes.<br />
Of course, not everything has gone<br />
smoothly, and many employees in IT<br />
departments and at service providers have<br />
had to work under incredible pressure, but on<br />
the whole, most companies were surprised at<br />
how quickly they have been able to adapt. In<br />
retrospect, the Corona pandemic might be<br />
seen as the necessary shock and catalyst for<br />
fast digitisation.<br />
Since then, many employees have felt<br />
inspired by new possibilities and have eagerly<br />
used the wide range of features and apps<br />
offered in Microsoft Teams as an example.<br />
What's the point in returning to regular onpremises<br />
work if you can also work remotely in<br />
the cloud? Why not use the vast array of new<br />
cloud apps instead of waiting for tedious IT<br />
projects? This genie is out of the bottle, and<br />
that's a good thing. Diversity enriches,<br />
flexibility makes agile - and the new role of IT<br />
is not to get the genie back in the bottle but<br />
to control it in such a way that maximum<br />
benefit and security is achieved.<br />
FIRST THE PARTY AND NOW THE<br />
HANGOVER<br />
But as with every great party, the first ones to<br />
it can be left with the biggest hangover. As<br />
flexible, modern, and user-friendly as the new<br />
cloud wizards are, they often offer little in the<br />
way of information governance and<br />
compliance - at least out of the box.<br />
This can be quickly explained using<br />
Microsoft Teams as an example. Teams is<br />
ideally suited for quick coordination and<br />
easy collaboration. However, it is a<br />
nightmare for the management of files and<br />
documents: with every new team created, an<br />
isolated SharePoint site with one directory per<br />
channel is created in the background to hold<br />
the files. Since changes - such as the<br />
renaming of channels - are not consistently<br />
propagated throughout, these structures<br />
inevitably diverge. Inconsistencies and<br />
duplicates are therefore pre-programmed.<br />
Not to mention that countless individual<br />
SharePoint sites with their own default rights<br />
and user structures can cause major issues in<br />
themselves regarding Governance, Risk &<br />
Compliance (GRC).<br />
Uniform rules for retention periods and<br />
archiving, audit trails with complete proof of<br />
access and changes, and automatic content<br />
classification are also missing. Of course,<br />
Microsoft also offers mechanisms here that<br />
would allow at least a rudimentary form of<br />
control. But they require a consistently planned<br />
procedure with clearly defined structures, rules,<br />
and roles - something which there was simply<br />
no time for at the peak of the lockdown.<br />
What has been described here for Microsoft<br />
Teams applies in a similar way to other<br />
popular new cloud services such as Microsoft<br />
OneDrive, Google G Suite, Google Drive,<br />
Dropbox etc. All these new platforms now<br />
enrich the already existing mix of storage in file<br />
systems, archives or DMS/ECM and ERP, CRM<br />
and SCM applications. In the new normality,<br />
the number of potential storage locations has<br />
suddenly multiplied massively. Control and<br />
GRC will certainly not become easier. If data<br />
protection and IT security officers were able to<br />
look the other way at the beginning of the<br />
crisis or, in case of doubt, weigh up in favour<br />
of maintaining business operations, they will<br />
clearly not be able to accept this as a<br />
permanent state of affairs.<br />
SOMEONE HAS TO CLEAN UP<br />
Things will not be able to remain as they are -<br />
but cleaning up is not very popular, and who<br />
wants to clean up when, even unintentionally,<br />
12 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: HYBRID WORKING<br />
new chaos is constantly being created? The<br />
solution is intelligent content services, which<br />
take over this task automatically or, even<br />
better, ensure in the background that no mess<br />
is created in the first place or that it can be<br />
ignored. To do this, they have to have two<br />
essential capabilities: flexibility in terms of the<br />
platforms used and artificial intelligence as the<br />
basis for automation.<br />
Within our M-Files platform, for example, it<br />
makes no difference whether a file is stored in<br />
the file system, in SharePoint, Dropbox or in<br />
our own repository, since there are standard<br />
connectors for each of these platforms. M-Files<br />
can use AI to automatically analyse the<br />
contents of the file, classify it and enrich it with<br />
metadata. For example, if M-Files determines<br />
that the information is confidential, it can<br />
transfer the file to its own repository and<br />
restrict access. Documents that must be<br />
retained can be archived accordingly.<br />
Duplicates are reliably recognised during<br />
storage and the user is notified accordingly.<br />
Versioning and check-in/check-out are also<br />
possible where the original storage does not<br />
provide for this.<br />
Figuratively speaking, M-Files cleans up after<br />
the party without the participants needing to<br />
do anything. This means that users can use a<br />
wide range of storage locations, from the<br />
familiar file system to new cloud services, and<br />
the Content Services ensure uniform handling<br />
of the files and documents stored there. Users<br />
can use the file as they wish via the cloud<br />
services, for example, even if it is located onpremises,<br />
and IT retains transparent control<br />
over the information assets.<br />
CONTEXT CREATES ADDED VALUE<br />
But intelligent content services can do much<br />
more. They are the key to truly intelligent<br />
information management. Any information<br />
becomes more valuable if it can be used in<br />
the right context. A project contract in itself is<br />
interesting, but it becomes much more<br />
valuable when it is linked to contextual<br />
information about the project content, the<br />
project team, the customer or similar projects.<br />
This is precisely what intelligent content<br />
services do automatically. Using AI techniques<br />
such as content analytics and natural<br />
language understanding, the content of<br />
documents is unlocked, and a context is<br />
created in the form of classification and links<br />
to other information.<br />
Due to the cross-platform approach, this<br />
context can also extend beyond system<br />
boundaries. For example, the sales<br />
department can work with Salesforce and the<br />
project team with Microsoft Teams and<br />
automatically exchange information. M-Files<br />
recognises a quote in Salesforce as such,<br />
assigns it to the correct project, and can offer<br />
it to teams as contextual information.<br />
Conversely, the project status report from<br />
SharePoint can be integrated into Salesforce,<br />
for example. All of this is mainly done<br />
automatically without any programming by<br />
universal mechanisms. Modern content<br />
services can be seamlessly embedded in a<br />
wide range of applications and cloud services<br />
and offer the user context, metadata and even<br />
comprehensive processes and workflows -<br />
without the users having to leave their<br />
favoured work environments.<br />
A UNIFIED ENVIRONMENT<br />
The automated production of context is like<br />
the super glue that holds all information<br />
together, even if it is distributed over many<br />
different systems. In this way, intelligent content<br />
services enable users to maintain an overview<br />
and recognise context in the brave new world<br />
of cloud services.<br />
The enormous impact of the corona crisis on<br />
digitisation must now be directed into the right<br />
channels. Freed from system constraints, users<br />
can access the cloud services that enable them<br />
to do their jobs in the best way possible. In the<br />
background, intelligent cloud services ensure<br />
that uniform rules for handling information are<br />
observed concerning governance, information<br />
security and compliance. The opportunity is<br />
there, let's make something of it. NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 13
OPINION: SSL CERTIFICATES<br />
THE VALUE OF SSL CERTIFICATES FOR ONLINE<br />
BUSINESSES<br />
SSL CERTIFICATES SHOULD PLAY A KEY ROLE IN ANY ONLINE<br />
SECURITY STRATEGY, ACCORDING TO BEN HASKEY, SECURITY<br />
AND COMPLIANCE MANAGER AT LCN.COM<br />
Research suggests almost a third of<br />
businesses that experience a<br />
cybersecurity breach will lose revenue<br />
as a result. So, it pays to take a proactive<br />
approach to securing confidential business<br />
data. Creating a secure online experience<br />
doesn't just protect against lost revenue,<br />
though. Successful businesses will also reap<br />
the rewards in brand reputability, consumer<br />
trust and avoidance of further financial losses<br />
through downtime or reactive repairs.<br />
SSL certificates should play a key role in any<br />
online security strategy. Here, we look at the<br />
benefits, not only in security but also in user<br />
experience and marketing performance.<br />
WHAT IS AN SSL CERTIFICATE?<br />
An SSL certificate is a confirmation that a<br />
website is protected by Secure Socket Layer<br />
(SSL) technology. It is designed to create safe<br />
online interactions by encrypting the<br />
connection between the user and the website<br />
host. This secure connection means any data<br />
can only be decrypted by either the website<br />
host or the user - so, ecommerce websites<br />
can safely accept payments, for example.<br />
However, if a hacker attempts to breach the<br />
website and steal confidential data, they'll<br />
only be able to access an encrypted key.<br />
There are different levels of validation in SSL<br />
certificates, providing an increasing scale of<br />
detail when it comes to security checks:<br />
Extended Validation SSL certificates (EV SSL)<br />
demand the most comprehensive<br />
background checks, including standard<br />
validity checks on the domain owner, plus<br />
additional audits to confirm the applicant has<br />
the authority to issue the certificate.<br />
Organisation Validated SSL (OV SSL)<br />
certificates require similar validity and<br />
background checks but on a lesser scale,<br />
while Domain Validated SSL (DV SSL)<br />
certificates check the validity of the domain<br />
owner, but without any further background<br />
checks. Website hosts will choose their SSL<br />
certificates based on the website's purpose,<br />
traffic and the scale of data it receives. For<br />
example, large ecommerce sites should invest<br />
in the most comprehensive checks, while<br />
personal blogs may just require a DV SSL<br />
certificate.<br />
THE BUSINESS BENEFITS<br />
Research suggest that three-quarters of online<br />
consumers would switch suppliers after just a<br />
single poor brand experience. So, businesses<br />
have an obligation to provide protection<br />
without compromising on the user experience.<br />
SSL technology gives consumers the<br />
confidence to enter payment details or<br />
complete data forms without the risk of data<br />
theft or fraud - providing the quick and<br />
effortless experience modern consumers<br />
demand. And for businesses, the benefits go<br />
further than just the prospect of improved<br />
brand trust and repeat custom. The website<br />
host is also protected against potential data<br />
breaches, so hackers are unable to access<br />
confidential information like passwords and<br />
website details.<br />
This prevents malicious activity and also<br />
saves businesses on the costs of downtime and<br />
repairs from the reactive security measures<br />
needed to recover from a breach. Plus, it helps<br />
businesses avoid the hidden costs of breaches,<br />
too, like the operational disruption that sees<br />
employees' time spent on intensive recovery<br />
tasks instead of their normal role.<br />
AN EFFECTIVE MARKETING TOOL<br />
As search engines strive to provide the best<br />
possible experience for users, it means a push<br />
towards the priority of secure and trustworthy<br />
websites in their rankings. The likes of<br />
Google are now favouring websites with SSL<br />
certificates, leaving unsecured websites at risk<br />
of missing out on a significant chunk of the<br />
93 percent of internet traffic that comes<br />
directly from search engines.<br />
For those still able to attract traffic, their users<br />
will be greeted with warning messages from<br />
the browser, that the site is unsafe. Plus, the<br />
website will display the outdated 'HTTP' prefix,<br />
instead of the trusted 'HTTPS'. The reality for<br />
those without SSL certificates will be decreased<br />
visibility and traffic and soaring bounce rates.<br />
So, secure technologies represent a costeffective<br />
solution when it comes to mitigating<br />
this impact. However, SSL certificates should<br />
simply mark the first step in a wider<br />
commitment to cybersecurity and user safety.<br />
To reap the rewards, businesses must build<br />
trust and authority among users by displaying<br />
'proof'. This may include links and logos for<br />
review profiles like TrustPilot or testimonial<br />
and case study pages. Additional visual<br />
cues, like client logos and accreditations<br />
such as award wins also provide instant<br />
validation for users. NC<br />
14 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
PRODUCT REVIEW<br />
Draytek VigorAP<br />
1060C<br />
PRODUCT REVIEW<br />
PRODUCT<br />
REVIEWPRODUCT RE<br />
The move to Wi-Fi 6 for businesses is<br />
gathering momentum and DrayTek steps<br />
into the arena with the VigorAP 1060C -<br />
its most powerful wireless access point (AP) to<br />
date. It stands out from the crowd as this 11ax<br />
AP combines an impressively high<br />
performance with three operational modes<br />
plus four management methods - and delivers<br />
it all at a price SMBs will love.<br />
The VigorAP 1060C is an AX3600 dualband<br />
AP delivering speeds of up to<br />
2,400Mbits/sec on its 5GHz radio and<br />
1,200Mbits/sec on the 2.4GHz radio. It's<br />
smarter than many other Wi-Fi 6 APs as it<br />
has a third radio dedicated to RF analytics<br />
and enhanced security as it uses it to detect<br />
rogue APs.<br />
As a standalone AP, it has a lot to offer as it's<br />
easily managed from a fully-featured web<br />
interface and presents up to eight SSIDs on<br />
each radio. It can also function as a simple<br />
range extender but DrayTek's mesh<br />
technology makes it even more versatile.<br />
Meshing allows you to create self-healing<br />
wireless networks using up to eight APs. One<br />
functions as a central mesh root while others<br />
are added as mesh nodes and take their<br />
settings from it to present one set of centrally<br />
managed SSIDs.<br />
Management features are unbeatable as the<br />
AP can be auto-provisioned using any<br />
DrayTek Vigor router that supports the Central<br />
AP Management (CAM) feature. DrayTek's<br />
free VigorConnect Windows app provides<br />
centralised on-site management facilities<br />
while wireless networks in geographically<br />
distributed sites can all be managed from<br />
one console with the optional VigorACS<br />
cloud service.<br />
The AP is easy to install in standalone<br />
mode as its web console's wizard sensibly<br />
requires the default admin password to be<br />
changed and offers the option to create two<br />
secure wireless networks. The console's<br />
dashboard is very informative as it provides a<br />
wealth of information on wireless networks<br />
including active clients and associations,<br />
traffic throughput for each SSID and AP<br />
system utilisation.<br />
Wireless security is excellent as each SSID<br />
can have their own encryption scheme which<br />
includes support for the stronger WPA3. You<br />
can enable SSID masking, limit the number of<br />
clients per radio or SSID, apply upload and<br />
download bandwidth limits to each SSID, and<br />
enable LAN and member isolation which<br />
stops wireless clients from accessing wired<br />
systems and other wireless clients on the<br />
same SSID.<br />
Meshing is just as simple to configure as you<br />
use the same quick-start wizard to select this<br />
mode and set the first AP as the root. Up to<br />
seven nodes can connect wirelessly to the<br />
mesh root using their 5GHz radio as a<br />
backhaul or they can be linked to it over<br />
longer wired connections.<br />
Mesh networks can be monitored and<br />
extended on-demand from the root AP's<br />
web console or DrayTek's Wireless mobile<br />
apps. You can spread your wireless network<br />
over a large area as nodes can connect to<br />
other nodes with up to three hops between<br />
them and the root AP and if any go down,<br />
clients transparently jump over the nearest<br />
active node.<br />
The VigorAP 1060C supports all key Wi-Fi<br />
6 technologies and delivered an impressive<br />
performance in the lab. Large file copies<br />
between a Windows 10 Pro workstation<br />
equipped with a Wi-Fi 6 PCI-E adapter card<br />
and a Windows server on the LAN averaged<br />
a speedy 104MB/sec at close range<br />
dropping to 94MB/sec when we moved the<br />
AP 10 metres away.<br />
SMBs ready to upgrade to Wi-Fi 6 will find<br />
DrayTek's VigorAP 1060C a great choice<br />
that's very easy to deploy. It provides good Wi-<br />
Fi 6 performance, offers a wealth of businessclass<br />
features including self-healing networks<br />
and delivers it all at an appealing price. NC<br />
Product: VigorAP 1060C<br />
Supplier: DrayTek<br />
Web site: www.draytek.co.uk<br />
Telephone: +44 (0)345 557 0007<br />
Price: £265 exc VAT<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 15
CASE STUDY: NORVADO<br />
LEADING THE FIELD<br />
NORVADO RELIES ON NETALLY'S ETHERSCOPE® NXG NETWORK ANALYZER TO CONDUCT COMPLETE<br />
AND ACCURATE REMOTE ASSESSMENTS, REDUCING THE TIME AND COST OF FIELD OPERATIONS<br />
Norvado is Northwest Wisconsin's<br />
premiere local broadband<br />
technology provider. Founded in<br />
1950, Norvado brings cutting-edge<br />
technology to Bayfield County, keeping<br />
communities connected, vibrant, and<br />
competitive with big-city offerings. In<br />
addition to providing industry-leading fiber<br />
optic high-speed Internet, Norvado sells,<br />
installs and maintains hosted PBX, managed<br />
network services, telephone and smart home<br />
systems, alarm/surveillance systems, and IP<br />
television services, and other products for<br />
residential, commercial, industrial and<br />
educational customers. An important part of<br />
the business is the pre-and post-installation<br />
assessment, which requires a complete and<br />
accurate evaluation of existing equipment<br />
and facilities.<br />
Without a thorough inventory of the<br />
environment, particularly in instances where<br />
critical details such as the IP scheme,<br />
number of servers and switches - possibly in<br />
hidden locations that are not easily<br />
uncovered by the Norvado pre-sales team -<br />
it becomes highly challenging to properly<br />
assess installation needs.<br />
"Often when we go onsite, we are taking over<br />
on-premises management from another<br />
company. In instances such as this, the client<br />
might not be technically minded and as a<br />
result, has little understanding of what's on their<br />
network or how it works. Sometimes we arrive<br />
onsite and find out the IT person responsible<br />
for the equipment has either left or now has<br />
other responsibilities, leaving no one with a<br />
clue about the infrastructure. This presents a<br />
real challenge for us because in such cases, we<br />
have to reverse engineer the environment to<br />
see what is there, so we can uncover their<br />
implementation needs. That becomes a time<br />
consuming and painstaking process,"<br />
explained Grant Kolwitz, Senior Customer<br />
Network Technician at Norvado.<br />
Adding to the challenge, Norvado recently<br />
acquired another regional broadband service<br />
provider. This new entity's experience with<br />
installing servers, networks and access points<br />
was somewhat limited, which necessitated<br />
Norvado's field team to travel as much as three<br />
hours each way to do a network inventory<br />
and/or Wi-Fi survey of a potential new client.<br />
This made the task of quoting a job more<br />
difficult. The Norvado field team recognised<br />
that a better assessment tool, one that could be<br />
16 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
CASE STUDY: NORVADO<br />
easily used by less technically skilled personnel,<br />
would be crucial in helping to keep up with the<br />
workload of their rapidly expanding business.<br />
SOLUTION<br />
Because the pre-sales survey assessment can<br />
be as varied as each client's individual network<br />
environments, Norvado needed a<br />
comprehensive testing tool that could be<br />
deployed to field team members. The NetAlly<br />
EtherScope® nXG all-in-one handheld<br />
network analyzer was chosen to enable sales,<br />
field engineers and technicians to conduct a<br />
wide-range of assessment tasks, from project<br />
planning, equipment inventory, coverage<br />
mapping, deployment, maintenance and<br />
documentation of clients' ever-changing Wi-Fi<br />
and Ethernet access networks.<br />
The EtherScope® nXG is used by Norvado's<br />
pre-sales teams to thoroughly assess the client<br />
environment and prevent unexpected surprises<br />
later in the project. About their use of the<br />
analyzer, Grant says, "Our pre-sales team is<br />
the first point of contact with the client, so we<br />
want them to be equipped with the right tools.<br />
Using the EtherScope nXG has allowed presales<br />
to gather a great deal of intel without<br />
field engineers having to intervene. All they<br />
have to do is either plug in or do a scan and<br />
collect the data. This tool is a game-changer."<br />
Grant went on to explain that because the<br />
EtherScope nXG tool was so thorough in<br />
collecting and assessing the environment, it<br />
meant field engineers didn't have to follow up<br />
with a second site visit. Pre-sales team<br />
members were also able to use the<br />
AirMapper Site Survey App within the<br />
EtherScope nXG tool to quickly and easily<br />
gather location-based Wi-Fi measurements<br />
and create visual heat maps of key<br />
performance. This was instrumental for project<br />
planning and developing an accurate quote<br />
for the installation.<br />
Once the quote is accepted and<br />
implementation is completed, field engineers<br />
use the EtherScope nXG to conduct a<br />
secondary scan to document everything that<br />
was done. This documentation is automatically<br />
uploaded via the complimentary Link-Live<br />
Cloud Service where it can be accessed,<br />
reviewed and shared as needed to verify the<br />
project was completed as specified.<br />
RESULTS<br />
Putting the EtherScope nXG in the hands of<br />
Norvado's pre-sales team has delivered<br />
significant time and cost savings for the<br />
business. "The total territory covered by our<br />
business can necessitate up to a three-hour<br />
drive to be onsite with a client. That's a lot of<br />
time in transit for field engineers such as myself.<br />
By giving the handheld EtherScope nXG<br />
network analyzer to our pre-sales team, they<br />
can conduct pre-assessment surveys and Wi-Fi<br />
heat mapping quickly and easily, eliminating<br />
the need for a follow-up trip to the site.<br />
The level of accuracy delivered by this tool<br />
ultimately saves us critical time and money,"<br />
explained Grant, adding that "the ability to<br />
create before and after documentation of the<br />
Wi-Fi coverage is extremely helpful when sitting<br />
down with the client. Now the field team can<br />
visually demonstrate the effectiveness of the<br />
implementation. Also, documentation, along<br />
with pictures, case notes and passwords, are<br />
uploaded to the Link-Live Cloud Service, where<br />
they are available to clients upon request".<br />
Grant concludes "The EtherScope nXG and<br />
AirMapper Site Survey App has made our<br />
pre-sales and field engineering teams far<br />
more efficient, minimising surprises, and<br />
getting a fuller, more complete picture of the<br />
environment. There are no other tools on the<br />
market that do for us what NetAlly's<br />
EtherScope nXG does. It makes our job<br />
easier and speeds up our assessments. That<br />
means we have more time to meet with<br />
clients, which in turn allows us to help grow<br />
the business." NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 17
OPINION: SD-WAN<br />
MAKING THE MOVE TO SD-WAN<br />
OLIVER WALLINGTON AT WIRELESS LOGIC EXPLAINS HOW SD-WAN CAN DRIVE BUSINESS<br />
CONTINUITY WITH RESILIENT AND RELIABLE CONNECTIVITY<br />
The IoT landscape has been rapidly<br />
evolving over the last decade, with<br />
new sectors and applications adopting<br />
the technology each year. However, the<br />
COVID-19 pandemic led to businesses<br />
requiring smarter and faster technologies to<br />
support satellite offices and distributed<br />
operations in the wake of lockdowns and<br />
social distancing guidelines imposed by<br />
governments worldwide.<br />
This new way of working means that<br />
companies now demand flexible and cost<br />
efficient network options to complement their<br />
cloud operations. Organisations are<br />
choosing to partner with Managed Service<br />
Providers (MSPs), Internet Service Providers<br />
(ISPs), or directly with IT Resellers to ensure<br />
business continuity is maintained across the<br />
organisation's increasingly complex network.<br />
Traditional WAN is becoming less<br />
prevalent due to its limitations in cloud<br />
environments, which can often hinder an<br />
organisation's growth capabilities. As a<br />
result, companies are deciding to refresh<br />
their WAN and increasingly considering SD-<br />
WAN as a solution for a variety of reasons,<br />
in line with (post-COVID) longer term<br />
requirements for managing distributed<br />
operations and<br />
employees across a wide area network.<br />
SD-WAN uses software to control the<br />
connectivity, management and services<br />
between several locations and a central<br />
network. It relies on different forms of<br />
underlay communication, such as MPLS or<br />
ADSL. In addition to fixed line connectivity,<br />
there are more and more projects now<br />
incorporating 4G and 5G as part of the SD-<br />
WAN connectivity piece, for seamless<br />
backup, an interim solution to reduce long<br />
lead times, and network resilience.<br />
REALISING THE BENEFITS OF SD-WAN<br />
AND THE ROLE OF LTE & 5G<br />
SD-WAN adoption was on the rise, even<br />
before COVID-19, but the global pandemic<br />
has accelerated business' digital<br />
transformation. This has resulted in<br />
organisations working with MSPs, ISPs and IT<br />
Resellers to ensure connectivity solutions that<br />
were deployed at the beginning of the<br />
pandemic are sustainable and reliable for the<br />
long term. SD-WAN provides WAN<br />
simplification, improved performance and<br />
lower costs, plus bandwidth efficiency and<br />
resilience by using different bearer services<br />
that minimise single points of failure across a<br />
wide area network.<br />
Furthermore, MSPs, ISPs, and IT Resellers<br />
are now able to unify public internet, LTE,<br />
private and 5G across a single, virtual and<br />
high-capacity SD-WAN solution. Cellular<br />
plays an important role in these deployments,<br />
acting in the first instance as a back-up to a<br />
fixed line, as well as providing the ability to<br />
rapidly deploy a connectivity solution where a<br />
fixed line is not available.<br />
Retailers in particular are deploying SD-<br />
WAN and 4G as a failover solution to ensure<br />
18 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: SD-WAN<br />
uptime, and that they are always alive to<br />
transact in stores when a fixed line goes<br />
down. SD-WAN's efficiencies can also benefit<br />
smaller deployments, such as satellite offices,<br />
and with critical applications such as voice<br />
and video. It can help choose the best path<br />
depending on latency, jitter and packet loss,<br />
and less critical applications can then be<br />
load balanced across multiple lines to better<br />
optimise bandwidth.<br />
MOVING TO SD-WAN<br />
Initiating an SD-WAN migration can<br />
introduce new risks to a business network,<br />
but there are a number of steps that<br />
companies can introduce to mitigate these<br />
challenges. One of the biggest<br />
considerations for businesses and their IT<br />
partners is security, and it must move in sync<br />
with the network. Cloud firewalls are no<br />
longer sufficient in today's increasingly<br />
connected marketplace, meaning that<br />
companies need to ensure tighter security<br />
features are deployed, configured and<br />
consolidated for employees to continue<br />
working productively, as well as removing<br />
potential cyber threats.<br />
Any SD-WAN security strategy that is<br />
developed and implemented must also be<br />
flexible and scalable enough to meet the<br />
organisation's future infrastructure<br />
requirements. What's more, ISPs, MSPs and IT<br />
Resellers can show commitment to IoT<br />
security, through regular training, monitoring<br />
and auditing for their customers. For<br />
instance, the ISO 27001 information security<br />
management accreditation demonstrates that<br />
the company takes the management of its<br />
customers' data seriously.<br />
Moreover, businesses and their IT partners<br />
have the challenge of selecting a cellular<br />
network provider. Network resilience and<br />
reliability are an important value proposition<br />
of SD-WAN, and they need to select cellular<br />
providers with the expertise to address<br />
challenges such as, which cellular network(s)<br />
to select for multi-site deployments, IP<br />
addressing and Network to Network<br />
Interfaces (NNI's), plus choosing the right<br />
tariff to fit each customer use case. The<br />
partners can also help navigate bandwidth<br />
management on the device and the need to<br />
proactively manage usage and bandwidth on<br />
the SIM.<br />
ISPs, MSPs and IT Resellers can partner with<br />
specialist IoT connectivity providers to<br />
navigate these challenges, as they deliver<br />
secure and resilient connectivity across<br />
multiple mobile cellular networks under one<br />
management platform and bill. Not only<br />
does this minimise complexity for businesses,<br />
but these experts have the relationships,<br />
knowledge and experience to effectively<br />
manage such processes, as well as navigate<br />
the complexity of providing multiple local<br />
mobile network profiles to our customers.<br />
ENABLING A NEW DIGITAL FUTURE<br />
As we move into our post-pandemic<br />
landscape, SD-WAN brings businesses muchneeded<br />
ROI by improving performance,<br />
efficiency and operational agility in the<br />
longer term. With cellular connectivity<br />
integrated into the solution, business leaders<br />
have peace of mind that a failover solution is<br />
available to ensure uptime, and that networks<br />
can be monitored or redirected as needed to<br />
improve application availability.<br />
For ISPs, MSPs and IT Resellers, they can<br />
bolster their SD-WAN propositions by adding<br />
a simple, secure and flexible 4G or 5G<br />
connectivity as a backup or as a primary<br />
connectivity solution, where a fixed line is not<br />
available, from an IoT managed service<br />
provider with expertise in the industry.<br />
Whilst SD-WAN delivers a number of<br />
benefits, organisations and their IT partners<br />
also need to consider the security<br />
implications, in addition to choosing the right<br />
network for their company. Nevertheless with<br />
the help of IoT connectivity providers and as<br />
more companies transition to SD-WAN, the<br />
migration process should become<br />
increasingly easier and more streamlined<br />
moving forward. NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 19
OPINION: IoT<br />
IoT AT THE EDGE<br />
PETER RUFFLEY, CEO OF ZIZO, EXPLAINS WHAT EDGE<br />
COMPUTING WILL MEAN FOR THE INTERNET OF THINGS<br />
Alot has been written about the IoT<br />
revolution and how the technology<br />
has the capability to revolutionise<br />
industries, transform productivity and<br />
unlock new levels of insight. But for those<br />
intrigued by the possibilities and looking<br />
to dip their toe in the water, the potential<br />
myths of high price point, infrastructure<br />
and connectivity challenges, as well as<br />
the required skill set can be significant<br />
hurdles that seem insurmountable.<br />
In addition, especially when it comes to<br />
the reality of industrial IoT, the cost, time<br />
and disruption that goes into a brand new<br />
facility - the prospect of having to rip and<br />
replace new infrastructure to support IoT -<br />
just isn't a viable option for many<br />
businesses. However, Edge IoT and<br />
analytics can provide a powerful<br />
mechanism for translating complex data<br />
sources into a streamlined, lower cost<br />
platform with faster return on<br />
investment and higher value.<br />
First let's consider some of the<br />
key challenges businesses face<br />
when considering an investment<br />
in IoT:<br />
INVESTMENT<br />
The transformational potential of<br />
IoT across multiple industries is<br />
staggering and much has been<br />
discussed about its power to<br />
revolutionise business models. But<br />
while the possibilities for market<br />
sectors are hugely exciting, the reality<br />
of many of these industry IoT solutions<br />
is that they are designed for vast use<br />
cases - the setups are intricate and<br />
complex, with incredibly powerful<br />
networking capabilities that require<br />
significant investment and skill to<br />
execute. In addition, the major players in<br />
the IoT space, including AWS and<br />
Microsoft, require huge upfront<br />
investment into IoT stacks and other<br />
hardware integrated into the data centre,<br />
as well as personnel who can code the<br />
solution, write it and build it - that's<br />
potentially hundreds of thousands of<br />
pounds even before any potential data or<br />
insight has been gained.<br />
Return on investment is something that<br />
has been lacking within the IoT space,<br />
causing proof of concepts to fail. When<br />
you consider one of the early use cases<br />
for IoT - smart meters - in that instance<br />
it's simple to work out the ROI as you<br />
don't have to send meter readers to sites,<br />
there is an immediate cost benefit. But<br />
with industrial IoT, it's much more than<br />
that. Perhaps it will expose some savings,<br />
maybe less machine maintenance will be<br />
required. Savings are harder to identify at<br />
the outset, therefore, large upfront<br />
investment in that kind of solution is<br />
difficult to justify under those<br />
circumstances.<br />
RIP AND REPLACE<br />
In a lot of industrial cases, the existing<br />
machinery that requires monitoring are<br />
large, complex and expensive structures.<br />
They are the ideal solution for the task at<br />
hand and for that reason they should not<br />
necessarily be interfered with, and<br />
instead be monitored in a non-invasive<br />
way. Many state of the art facilities have<br />
been designed and built at the cost of<br />
billions of pounds, you can't start ripping<br />
and replacing components because<br />
20 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: IoT<br />
cloud-enabled technology will provide a<br />
benefit that hasn't been quantified yet.<br />
Yet conversely, many of the IoT solutions<br />
out there from the major players in the<br />
market depend on being built in from the<br />
start - a concept which could result in<br />
significant business disruption and<br />
downtime.<br />
SKILL SET<br />
The skill set that is required to manage<br />
these types of complex setups is also a<br />
significant hurdle for many organisations.<br />
A high proportion of IoT customers in<br />
manufacturing are not necessarily ITsavvy<br />
in the way that traditional database<br />
users are, and with many providers<br />
requiring someone with the skills to<br />
effectively exploit these platforms, this is<br />
an issue that is damaging the chances of<br />
adoption in that sector. Can a business<br />
really afford to hire a dedicated IoT<br />
professional? How can they support the<br />
business in other ways outside of that<br />
role so they add as much value as<br />
possible?<br />
In reality, businesses need a way to get<br />
data out of the IoT devices without the<br />
complex ecosystem that surrounds them,<br />
through a streamlined platform that only<br />
needs a browser to access.<br />
INFRASTRUCTURE<br />
Another stumbling block for many IoT<br />
projects is that, where the infrastructure<br />
isn't developed, if the location is in an<br />
inconvenient place without reliable WiFi<br />
then the only clouds available are the<br />
ones floating in the sky. In this case,<br />
having an IoT solution that collects all<br />
the data, analyses it at the point of<br />
collection and enables rapid and reliable<br />
visibility of what's going on can make all<br />
the difference, and is a much more<br />
pragmatic solution, both in large<br />
factories and distant locations. That's the<br />
difference between the original vision of<br />
IoT, and what it actually is in practice.<br />
IoT AND EDGE COMPUTING<br />
The vision of IoT and the actual reality<br />
are very different. A yes or no response<br />
from a sensor is not the same as figuring<br />
out whether a complex piece of<br />
machinery is acting as it should and to<br />
optimum efficiency levels. It's not just<br />
about the opportunity to collect data, but<br />
also having the capability to modify that<br />
data collection, to add additional sensors<br />
to expand the data gathered even further.<br />
For example, it could be that the<br />
solution is monitoring temperature and<br />
speed, but actually, you also need to<br />
measure vibration. Another sensor is<br />
therefore required, so you need a<br />
platform that's adaptable and scalable. In<br />
the current industrial sector environment,<br />
you need to be flexible and ready to<br />
change in scale, both in terms of size and<br />
complexity of the data that is being<br />
gathered. With the concept of edge<br />
computing and analysing data where it is<br />
created fast gaining momentum,<br />
organisations are discovering how they<br />
can quickly access only the most valuable<br />
data, in real time, that will prove mission<br />
critical to their business.<br />
Coming back to the smart meter<br />
example, this type of IoT deployment<br />
involves millions of identical devices with<br />
the same data and a single purpose. It's<br />
still an investment, but the principle is<br />
simply connecting multiple homogeneous<br />
devices together. This is unlike today's<br />
industrial environment, where there could<br />
be a handful or even tens of thousands<br />
of different devices, all doing slightly<br />
different tasks in different ways. This<br />
specialised equipment therefore requires<br />
an IoT edge solution that can accurately<br />
translate, measure and analyse different<br />
formats of data in compatible and<br />
comparable data formats as it arrives,<br />
without having to rip and replace internal<br />
electronics of the machinery being<br />
measured.<br />
Edge computing enables data processing<br />
to be performed on the edge nodes prior<br />
to transmitting only the aggregated data to<br />
the central server. So instead of<br />
transmitting huge volumes of data every<br />
minute, this could be reduced to just a<br />
couple of messages every five minutes,<br />
depending on what is being measured and<br />
for what purpose. This results in a massive<br />
reduction in bandwidth and means that<br />
using the cellular network becomes cost<br />
effective, thereby reducing infrastructure<br />
costs and creating a quicker return on<br />
investment and value.<br />
For businesses looking to get started in<br />
IoT, the edge negates the need for a<br />
massively complex and costly<br />
deployment. Instead, it provides a simple<br />
entry capability to quickly get a project<br />
up and running, to provide data points<br />
and rapid insight into how a business can<br />
capitalise further with a data-led strategy<br />
- all at a reasonable price point.<br />
CONCLUSION<br />
While the vast capabilities of IoT<br />
deployments are widely publicised, many<br />
businesses are unfamiliar with the<br />
availability of simple, affordable entry IoT<br />
capabilities to provide data analysis<br />
down at the edge, where only the most<br />
valuable data collected will be shared<br />
and in real time, making the process<br />
more cost effective to the business.<br />
The big business solutions touted by the<br />
likes of AWS and Microsoft have their<br />
place, but for the majority of businesses<br />
without the huge use cases to warrant the<br />
dedicated attention and support from the<br />
major players, they will be left to their<br />
own devices to achieve their desired<br />
value. Instead, a small scale solution that<br />
incorporates big data, edge and IoT<br />
within a small footprint will actually have<br />
a significant impact - and one which is<br />
also easily scalable without having to<br />
overhaul existing infrastructure. NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 21
PRODUCT REVIEW<br />
Kemp Flowmon<br />
Collector<br />
PRODUCT REVIEW<br />
PRODUCT<br />
REVIEWPRODUCT RE<br />
Network traffic flow monitoring, analysis<br />
and reporting are essential tools for<br />
NetOps and SecOps teams as they<br />
provide the visibility needed to ensure their<br />
networks are running smoothly and securely.<br />
There are many products on the market but<br />
some are little more than a disparate<br />
collection of point solutions with no correlation<br />
across them.<br />
Kemp's Flowmon product family stands out as<br />
the entire portfolio can be managed from its<br />
Flowmon Monitoring Center (FMC). This<br />
provides a single pane of glass that both<br />
NetOps and SecOps can peer through to<br />
gather a wealth of information ranging from<br />
diagnostics, performance and capacity<br />
planning to incident investigation, cyber threat<br />
detection and encrypted traffic analysis.<br />
We are reviewing the Flowmon Collector<br />
appliance, which is a dedicated platform for<br />
the collection, long-term storage and<br />
analysis of NetFlow, IPFIX and sFlow data. It<br />
includes an integral Flowmon Probe which<br />
natively collects L2/L4 information, while<br />
Flowmon's IPFIX extension adds essential L7<br />
statistical data.<br />
The appliance is available as hardware<br />
rackmount models, can be deployed on cloud<br />
services such as AWS, Azure and Google<br />
Cloud Platform and virtualised on VMware,<br />
Hyper-V and KVM hosts. We opted for the<br />
VMware version, deployed the OVF template<br />
on our VMware vSphere host in five minutes<br />
and, to monitor all the lab's network traffic,<br />
moved the Probe monitoring ports to separate<br />
vSwitches and dedicated physical adapters with<br />
promiscuous mode enabled and connected to<br />
switch span ports.<br />
From the Flowmon Configuration Center<br />
(FCC) web console, we viewed the appliance's<br />
system and storage status and for the<br />
monitoring ports, ensured their flow export<br />
target was the local host. The Collector<br />
supports third-party flow generators which just<br />
need their target IP address set to the<br />
Collector's management ports.<br />
Once the Collector and Probe are configured<br />
to your requirements, flow storage quotas have<br />
been applied and management access<br />
secured, you can move over to the FMC<br />
console. From here, you can manage all flow<br />
sources, view traffic graphs for each one and<br />
drill down for more detailed information by<br />
selecting any part of the graphs.<br />
From the Analysis section, you view flow data<br />
graphs, choose a time slot and pick the<br />
channels and protocols you want to see. Right<br />
click on the portion of interest and a pop-up<br />
context menu offers 26 query options, ranging<br />
from IP-to-IP or port-to-port conversations and<br />
L7 applications to host OSs, VLAN labels and<br />
source or destination MAC addresses.<br />
FMC provides tools for creating email and<br />
SNMP trap alerts for specific events, viewing<br />
active devices (handy for spotting BYOD<br />
activity) and pulling up all details on VoIP calls.<br />
Reporting is extensive and we particularly liked<br />
the Chapters option, which combines profiles<br />
and source data channels to present<br />
information on anything from top talkers and<br />
problematic connections to L7 analysis for<br />
specific service usage.<br />
The Dashboard and Report console presents<br />
remarkable levels of information and its<br />
dashboard can be customised with an<br />
extensive range of widgets. It's incredibly easy<br />
to use and we had our first dashboard created<br />
without any reference to the manual.<br />
Adding new dashboard elements is a simple<br />
four-click process as the configuration page<br />
provides 34 predefined widgets ranging from<br />
service, mail and database protocols to<br />
operating systems, browsers, G-Suite and<br />
Microsoft 365. If you've created custom<br />
Channels from the FMC console, these will<br />
appear in the widget menu for addition to<br />
the dashboard.<br />
Kemp Flowmon is ideal for NetOps and<br />
SecOps teams as it amalgamates every<br />
network monitoring function into a single<br />
unified platform. The Flowmon Collector<br />
delivers complete visibility into network<br />
performance while security can be augmented<br />
with Kemp's Anomaly Detection System,<br />
Application Performance Monitoring and ondemand<br />
full packet capture analysis. NC<br />
Product: Flowmon Collector<br />
Supplier: Kemp Technologies<br />
Web site: www.flowmon.com<br />
Sales: sales@kemp.ax<br />
22 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
NETWORKcomputing<br />
We introduced the Network Computing "Masterclass" into the magazine a few years back. A<br />
Masterclass series in the magazine run for at least a year. Some have successfully run for longer. This<br />
concept enables us, with the help of a an expert vendor, to cover a subject area in a far more<br />
detailed way than could ever be covered in a single article. We feel that the Masterclasses we have<br />
carried have done a valuable job in guiding readers through many of the issues that they need to be<br />
aware of - issues that are perhaps not being talked about elsewhere. Vendor branding appears on<br />
the Masterclass page to distinguish a Masterclass article from the many "one-off" articles that we<br />
carry in Network Computing.<br />
We have identified a number of key subject areas which we feel would benefit from a Masterclass.<br />
These are:<br />
Network Testing and Monitoring<br />
Cabling and cable management<br />
Network access control<br />
Powering a Network<br />
The transition to unified comms<br />
Desktop virtualisation<br />
Traffic management<br />
Using a Data Centre<br />
Advantages and challenges of relying on an increasingly mobile workforce<br />
Cloud security<br />
Education and training<br />
If any of these subject areas are to be covered in a Masterclass we will be<br />
seeking a Partner to work with. A Masterclass Partner will ideally be a vendor<br />
with a track record of expertise in the particular area. Are you a vendor<br />
who could help us in launching a Masterclass covering one of the subjects<br />
listed above ? Alternatively, could you recommend an organisation who<br />
could help us ? Your suggestions will be very welcome.<br />
Please contact david.bonner@btc.co.uk
SECURITY UPDATE<br />
I.T. IS THE NEW VIP<br />
I.T. TEAMS MUST HAVE A<br />
BIGGER SEAT, AND BUDGET, AT<br />
THE BOARDROOM TABLE,<br />
ACCORDING TO ANDREA<br />
BABBS, GENERAL MANAGER,<br />
VIPRE SECURITY UK AND<br />
IRELAND<br />
The cyber threat continues to grow<br />
and evolve, with the number of<br />
attacks increasing year-on-year. As<br />
cunning hackers take advantage of the<br />
ongoing pandemic by targeting remote<br />
workforces, businesses are forced to<br />
contend not only with this increased<br />
security risk, but also furloughed staff,<br />
social distancing restrictions and a<br />
turbulent economic market.<br />
But while in survival mode, cybersecurity<br />
can often slip down businesses' priority<br />
lists. The last twelve months have<br />
arguably been the most challenging times<br />
for businesses of all sizes, but efforts<br />
invested to keep the business afloat will<br />
be useless if the back door to their<br />
network is left open for cybercriminals. To<br />
combat this, IT teams must have a bigger<br />
seat, and budget, at the boardroom<br />
table, while embedding their<br />
cybersecurity efforts across all<br />
departments of the business.<br />
MANAGING PRIORITIES<br />
Cybersecurity must remain a priority at all<br />
times for businesses, even in challenging<br />
times, despite COVID-19 stretching many<br />
organisations' IT and/or cybersecurity<br />
teams to the maximum. However,<br />
managing and surviving throughout the<br />
pandemic alone has remained the prime<br />
concern, as 84% of businesses and 80%<br />
of charities revealed that COVID-19 has<br />
made no changes to the importance they<br />
24 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
SECURITY UPDATE<br />
place on cybersecurity. That businesses<br />
still aren't prioritising cybersecurity despite<br />
an increased cyber threat level and more<br />
sophisticated hacking incidents taking<br />
place is surprising.<br />
The main hurdle the majority of<br />
businesses are facing at the moment is<br />
losses in revenue, meaning they may not<br />
have the budget to invest more heavily in<br />
cybersecurity - which is supported by a<br />
recent survey that found that 79% of<br />
organisations expect cybersecurity budgets<br />
to be impacted in the next six months, if<br />
not sooner. Yet, in order to succeed in the<br />
post-COVID-19 era, security must be at<br />
the top of the business agenda, not only<br />
to keep business data safe, but also to<br />
maintain business continuity and protect<br />
against emerging cyber threats.<br />
HUMAN ERROR<br />
We've all sent an email to the wrong<br />
person, but this mistake has the potential<br />
to put the whole company at risk. Whether<br />
it is sharing the incorrect attachment, or<br />
adding the wrong recipient to an email<br />
thread, once an employee clicks send, it<br />
is often out of the business' control to<br />
know whether this information will end up<br />
in the wrong hands without specific DLP<br />
rules, policies or tools in place.<br />
With so much communication reliant<br />
upon email, human error is the main<br />
cause of data breaches. Humans make<br />
mistakes, and with additional pressures<br />
from the ongoing pandemic such as<br />
working from home, surrounded by<br />
potential distractions, these errors are<br />
now even more likely to occur. But this is<br />
also due to a lack of awareness and<br />
training, and with the number of cyber<br />
attacks not slowing down, giving IT teams<br />
a bigger seat at the table, and a slice of<br />
the budget, will help to increase employee<br />
awareness and improve email culture<br />
throughout an organisation, at a time<br />
when mistakes can so easily be made.<br />
A MULTI-LAYERED DEFENCE<br />
Many organisations have not yet taken the<br />
essential steps to properly integrate<br />
cybersecurity into their general operations<br />
- despite a rising number of cyber attacks<br />
across all businesses, with 88% of UK<br />
companies having suffered a breach in the<br />
last 12 months. A cybersecurity strategy is<br />
most effective when it has multiple layers<br />
and is deployed consistently from the<br />
beginning, not as a once-a-year tick box<br />
review or training exercise.<br />
By deploying a multi-layered, securityfirst<br />
and awareness-first defence strategy,<br />
including the basic foundations of email,<br />
endpoint and web security alongside the<br />
emerging necessities of security awareness<br />
training, remote working zero-trust network<br />
access tools and other user-first solutions,<br />
businesses can secure their operations<br />
both internally and externally.<br />
Technology plays a crucial role in<br />
ensuring business data is kept safe, but so<br />
do educating and alerting employees for<br />
potential threats in real-time.<br />
Implementing innovative solutions that<br />
prompt employees to double-check emails<br />
before they send them can help reduce the<br />
risk of sharing the wrong information with<br />
the wrong individual, while enabling users<br />
to make more informed decisions and<br />
reinforcing compliance credentials.<br />
SHARING RESPONSIBILITY<br />
In order to create an effective cybersecurity<br />
strategy, the 'us vs. them' mentality must be<br />
shifted. It is not just the IT department's<br />
duty to keep the organisation secure.<br />
Instead, this issue must be prioritised in<br />
every department across the business - as<br />
every end user and team have something<br />
valuable at stake.<br />
All employees are responsible for<br />
playing a part in keeping business data<br />
safe and they should be actively recruited<br />
into this role from the beginning - the<br />
stakes are too high for businesses to not<br />
take advantage of all available resources<br />
and personnel.<br />
Business collaboration plays a vital part<br />
in this approach. In addition to educating<br />
employees and ingraining 'cybersecurity<br />
first' as part of the culture, the IT defence<br />
strategy must be embedded across all<br />
areas of the business, including HR,<br />
customer service and finance, for example.<br />
The potential consequences of a data<br />
breach must be explained, such as the<br />
financial repercussions, loss of customers<br />
and tarnished business reputation - real,<br />
revenue-impacting consequences.<br />
By having a workforce that is mindful and<br />
understands the responsibilities they have<br />
on the front line of defence, companies<br />
can ensure that everything they do is<br />
underpinned by both user education, and a<br />
robust and secure IT security infrastructure.<br />
CONCLUSION<br />
The final decision to click the link, send<br />
the sensitive information or download the<br />
file, lies with the user. But by ensuring that<br />
a strong and secure cybersecurity culture is<br />
instilled from the top of the business to the<br />
bottom, company assets can be kept safe,<br />
and the risk of successful cyber attacks can<br />
be reduced.<br />
IT teams are the foundation of creating<br />
and deploying the right cyber defence<br />
strategy, but unless they are given a priority<br />
seat at the table during these crucial times,<br />
the value of their approach might go<br />
unheeded. The responsibility of keeping<br />
information safe applies to all levels, from<br />
CEO to apprentice, but until a business has<br />
the basics right and takes on a 'security-first'<br />
approach, the risk still remains. Yet, the<br />
difference between a trained and an<br />
uneducated workforce could mean the<br />
difference between an organisation<br />
surviving a cyber attack, or suffering the<br />
devastating consequences. NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 25
OPINION: TRAINING<br />
THE TIMES ARE CHANGING FOR TECH<br />
TRAINING<br />
A "NEW NORMAL" IS COMING IN TECH - AND WE NEED TO MAKE<br />
SURE IT'S TRULY DIFFERENT THIS TIME. GRAHAM HUNTER AT<br />
COMPTIA EXPLAINS WHY<br />
As the U.S. and Europe take stock of<br />
exactly what happened during the last<br />
year and what it means, all sectors are<br />
eagerly looking ahead to define what their<br />
"new normal" looks like. From inescapable<br />
cybersecurity challenges requiring a more<br />
widespread and unified government and<br />
business response, to remote work becoming<br />
ubiquitous, I'm convinced that the working<br />
world is - like it or not - going to look very<br />
different one or two years from now.<br />
I hope that part of embracing a new normal,<br />
especially for the tech world, means that we will<br />
grow more open and willing to embrace<br />
employees and talent from all walks of life.<br />
That we will be willing to hire from talent pools<br />
outside of degree-holders, and that we will<br />
embrace the vision and leadership of people<br />
who are, frankly, not just white men.<br />
Our hiring practices in tech have long needed<br />
examining, as have the values and norms we<br />
seek from people in positions of leadership. It is<br />
not inconceivable to say that the woefully<br />
under-diverse makeup of tech firms and the<br />
instances and severity of cybersecurity attacks<br />
on all types of organisation being on the rise<br />
are linked. Our sector is screaming out for<br />
fresh perspectives on existing challenges, and<br />
on the challenges we don't even know about<br />
yet. Hiring people from the same pools and<br />
networks time and time again isn't going to<br />
help. We need to embrace different pathways,<br />
different voices, and different leadership.<br />
There has been a lack of representation in the<br />
tech sector for far too long. In 2018, just 8.5%<br />
of senior executives in tech were from black,<br />
Asian, minority ethnic (BAME) backgrounds.<br />
Less than 15% of all senior tech leaders were<br />
women. Yet more than a third (35%) of board<br />
members and over a quarter (26%) of senior<br />
execs from top tech firms attended Oxbridge<br />
universities. That's compared to just 1% of the<br />
population. I'll make a "bold" assertion here<br />
and insist that it's not because this tiny pool of<br />
Oxbridge graduates are more talented or gifted<br />
in tech than people from other walks of life.<br />
REAL CHANGE IS ABOUT MORE THAN<br />
JUST HIRING PRACTICES<br />
Real change must go deeper than just hiring<br />
more diverse people and believing that's the<br />
end of it. Following a summer of racially<br />
motivated civil unrest in the U.S. in 2020,<br />
Google tech leaders vowed to hire more<br />
black tech workers. While they did that,<br />
recent coverage points to high attrition<br />
among those workers and low representation<br />
at the highest levels, highlighting that the<br />
culture of embracing diversity in more than<br />
26 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: TRAINING<br />
just name may be deeply lacking.<br />
In my mind, the long-term answer is in how<br />
we train, mentor, support, and value the people<br />
we bring into the fold. Perhaps most critically,<br />
training plays an increasingly important role in<br />
ensuring that workers feel ready to tackle the<br />
challenges they face, while understanding that<br />
their employer has made an ongoing<br />
investment in their success. More and more<br />
companies are making an investment in<br />
industry recognised certifications that act as a<br />
gold seal of approval of their employees'<br />
knowledge and ability. This kind of level-setting<br />
is critical for tech workers, at a time when so<br />
many businesses struggle to comprehend and<br />
prepare for the new threats and tech<br />
challenges of the day.<br />
NEW PATHWAYS & THE ONLINE<br />
MODALITY HOLD DEMOCRATISING<br />
POWER<br />
The case for stronger diversity and better<br />
pathways to employment for underrepresented<br />
groups is more than just tokenism. Diverse<br />
businesses largely perform better. McKinsey<br />
research shows that companies with more<br />
gender diversity are 25% more likely to have<br />
above-average profitability. Similarly,<br />
companies with greater ethnic and cultural<br />
diversity far outperform in profitability those that<br />
remain homogenous. The days of an elitist tech<br />
workforce full of people with degrees from the<br />
same universities are - both by choice and<br />
necessity - coming to an end. It's time we<br />
embrace the new non-degree pathways that<br />
are emerging, and that means welcoming new<br />
voices, faces and perspectives into the fold.<br />
Non-degree pathways such as<br />
apprenticeships hold real promise for<br />
improving retention at tech firms (in the U.S., for<br />
example, Department of Labor data shows that<br />
94% of apprentices stay on after their program<br />
ends), and for bringing long-term diversity to<br />
organisations. When prospective employees<br />
are told in no uncertain terms that tech firms<br />
aren't just looking for Oxbridge/Ivy Leagueeducated<br />
candidates to join their ranks, they<br />
have an incentive to put their foot forward and<br />
try. And once in the fold of something like an<br />
apprenticeship, trainees receive mentorship and<br />
guidance that sets them up for success.<br />
Being paid to attend and learn on the job<br />
also ensures that new hires - even those from<br />
socioeconomically disadvantaged<br />
backgrounds - understand their value and<br />
have the financial incentive to continue<br />
working. Similarly, upskilling and certifying<br />
current staff goes a long way to boost morale,<br />
performance and retention.<br />
The new opportunities we create for workers<br />
must be accessible and realistic, regardless of<br />
specific pathways to employment. For many<br />
people, that will involve learning and training<br />
online. It has for long been foregone that<br />
trainees and new hires will have the means to<br />
commute into a classroom or an office, even<br />
with all the hidden costs involved, and even<br />
when the jobs offer none or unsustainable pay.<br />
This has been particularly exclusionary for<br />
people of colour, women (mothers in<br />
particular), and those with disabilities. It is also<br />
a reality for many people of diverse<br />
backgrounds that in-person settings are more<br />
intimidating, whether because of language and<br />
communication barriers, perceived or real<br />
differences in belief system or values, physical<br />
or learning disabilities, and more.<br />
Online learning isn't a solution for workplace<br />
issues, but it must be embraced as part of a<br />
new normal, with an eye to democratising -<br />
and removing the fear factor from - training<br />
and the workforce. NC<br />
If you are interested in learning more about<br />
CompTIA training and certification options for<br />
teams please send an email to<br />
info_UK@comptia.org to request a call from<br />
the team.<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 27
PRODUCT REVIEW<br />
DrayTek Vigor<br />
2927Lac<br />
PRODUCT REVIEW<br />
PRODUCT<br />
REVIEWPRODUCT RE<br />
DrayTek's Vigor 2927Lac router is ideally<br />
suited to SMBs and remote workers<br />
that can't afford any internet downtime.<br />
It offers a wealth of WAN redundancy features<br />
with dual Gigabit WAN ports supporting<br />
failover and load balancing plus an internal<br />
4G LTE modem with dual SIM slots for primary<br />
and backup connections to mobile networks -<br />
you can even use its USB port to add another<br />
4G modem.<br />
Network security is another strength as it<br />
provides a powerful SPI firewall along with<br />
application controls and optional web content<br />
filtering. It's ideal if you have remote workers<br />
requiring secure access to network resources<br />
as the price includes support for 50 IPsec VPN<br />
tunnels plus 25 SSL VPNs and facilities to<br />
create 16 hardware accelerated IPsec VPNs.<br />
The Vigor 2927Lac is even more versatile as<br />
it delivers concurrent 2.4GHz and 5GHz 11ac<br />
wireless services. What's more, the router runs<br />
DrayTek's Central AP Management (CAM)<br />
service which discovers and provisions up to<br />
20 DrayTek VigorAP wireless APs with the next<br />
firmware upgrade allowing it to function as the<br />
root node in a meshed wireless network.<br />
The router presents seven Gigabit network<br />
ports where the sixth can be used for LAN or<br />
WAN duties. Redundancy features keep on<br />
coming as two routers can be deployed in a<br />
high availability configuration where they<br />
share a virtual IP address and can be set to<br />
hot-standby or active-standby modes.<br />
SMBs won't have any problems deploying the<br />
router as its web console provides wizards for<br />
securing admin access, configuring internet<br />
access and setting up client or site-to-site<br />
VPNs. More wizards are provided for enabling<br />
the various optional security services and<br />
creating wireless networks.<br />
Protection starts immediately as the firewall<br />
has a default security policy already activated<br />
which you can modify with other rules and<br />
filters that define traffic directions, sources<br />
and destinations, protocols and block or pass<br />
actions. Internet redundancy is equally easy<br />
to configure as you define multiple WAN<br />
connections and decide whether to have<br />
them running in active/backup mode or all<br />
active, where the router load balances traffic<br />
across them.<br />
The basic URL filtering service uses keywords<br />
to block access to specific web sites. For more<br />
granular browsing control, DrayTek offers a<br />
free 30-day trial of the Cyren GlobalView<br />
service which allows up to 65 web categories<br />
to be blocked or allowed using profiles and if<br />
you like what you see, it only costs £21 per<br />
year to activate.<br />
Application controls are free on registration<br />
and offer a list of over 130 apps and<br />
protocols, Categories are provided for Apple,<br />
Google and Amazon web services and if you<br />
want Facebook out of the office, just create<br />
an enforcement rule for it and block all<br />
further access.<br />
Wireless services are extensive as each radio<br />
can present up to four virtual SSIDs each with<br />
their own encryption scheme. You can apply a<br />
schedule to each one to control when they are<br />
active, set upload and download bandwidth<br />
usage restrictions and apply station controls to<br />
limit client connections times.<br />
Wireless hotspot services forward LAN and<br />
wireless clients to a web page with an<br />
acceptable use policy which they must agree<br />
to before receiving internet access. Even<br />
better, they can authenticate with their<br />
Facebook or Google credentials and the<br />
router can send them a unique PIN via SMS<br />
to the mobile number they enter in the<br />
landing page.<br />
The Vigor 2927Lac router clearly shows why<br />
DrayTek is the go-to vendor for SMBs that<br />
want the best WAN redundancy. It delivers an<br />
impressive range of security features at a very<br />
affordable price and its integral wireless<br />
network and hotspot services make it even<br />
more appealing. NC<br />
Product: Vigor 2927Lac<br />
Supplier: DrayTek<br />
Web site: www.draytek.co.uk<br />
Telephone: +44 (0)345 557 0007<br />
Price: £355 exc VAT<br />
28 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
SECURITY UPDATE<br />
SECURING DISPERSED NETWORKS IN THE ERA OF HYBRID WORK<br />
RODNEY JOFFE, SVP AND FELLOW, NEUSTAR AND CHAIRMAN OF THE NEUSTAR<br />
INTERNATIONAL SECURITY COUNCIL, EXAMINES HOW OUR NEW ERA OF WORK<br />
IS HIGHLIGHTING THE NEED TO STRENGTHEN NETWORK SECURITY<br />
Recent data from the Neustar International<br />
Security Council (NISC) found that the<br />
majority (61%) of cybersecurity<br />
professionals reported either significant or<br />
moderate downtime or disruption in the first six<br />
months of the COVID-19 pandemic, due to<br />
the mass shift to remote work.<br />
A certain amount of this disturbance can be<br />
linked directly back to the level of change that<br />
was necessary to accommodate staff working<br />
from home, but there are also other influencing<br />
factors. Unfortunately, while organisations were<br />
busy ensuring their digital networks were able<br />
to continue operating across all touchpoints,<br />
cybercriminals were capitalising on the disorder<br />
for their own gain.<br />
Although we expected to see a spike in<br />
malicious activity while businesses were<br />
getting to grips with new ways of working, it<br />
has become much more than just a<br />
pandemic problem.<br />
NETWORK WOES<br />
It's now been over a year since organisations<br />
were forced to implement mass remote<br />
working models and, during that time,<br />
businesses have adapted as necessary. In<br />
contempt of initial challenges, the roll-out of<br />
numerous modern technologies has<br />
established a new standard for network<br />
security. Or so we thought.<br />
Despite having made these enhancements to<br />
their security stack, more than half of<br />
businesses (54%) admitted to still experiencing<br />
network security issues, six months after the<br />
pandemic began. While organisations have<br />
been brushing up on their defences,<br />
cybercriminals have been doing the same -<br />
using the time to sharpen their skills and find<br />
new ways to exploit weak network links; so far<br />
this year we've seen some of the largest and<br />
most powerful attacks on universities,<br />
healthcare networks and national critical<br />
infrastructure.<br />
Just a few months ago, the largest fuel<br />
pipeline in the U.S was subject to a hack that<br />
led to shortages across the East Coast.<br />
Attackers gained access to the networks of<br />
Colonial Pipeline Co. through a virtual private<br />
network account, which allowed employees to<br />
remotely access the company's computer<br />
network. Although the VPN account was no<br />
longer in use at the time of the attack, hackers<br />
were able to breach Colonial Pipeline's entire<br />
network using just a compromised username<br />
and password.<br />
The Colonial Pipeline attack is just one<br />
example of how determined cybercriminals are<br />
targeting weak points in networks to cause<br />
disruption and, in some cases, demand<br />
ransom. Regardless of how businesses have<br />
already improved their security since the<br />
pandemic began, the most important<br />
realisation is that there is still more to be done.<br />
It is essential, therefore, that organisations<br />
determine the vulnerabilities in their networks<br />
today and proactively plan to strengthen them.<br />
OUT OF OFFICE RISKS<br />
With many businesses planning to either<br />
remain remote or implement a hybrid working<br />
model, end-to-end network security will<br />
continue to be business critical. At the<br />
beginning of the pandemic, a major hurdle<br />
appeared because many companies did not<br />
provide computers for employees working from<br />
home prior to COVID-19, instead asking that<br />
they work from their own devices. This became<br />
immediately problematic for a few key reasons.<br />
Firstly, security controls on personal devices<br />
are not the same as those on work devices.<br />
Secondly, it leads to blurred lines between<br />
professional and personal use - there is no<br />
logical separation between using the same<br />
device to work, watch Netflix, and shop online.<br />
Employees using personal devices also<br />
complicates the use of VPNs, as most VPN<br />
software deployed establishes a VPN only for<br />
the specific business application. A VPN that<br />
connects to the company but comes from a<br />
machine that doesn't have an insulated<br />
virtualisation operating system can result in<br />
multiple cases of bleed over. In fact, there is a<br />
large group of malwares that benefits from<br />
crossing that membrane within a machine.<br />
PREPARING TO GO HYBRID<br />
The new era of work is highlighting the need<br />
for organisations to invest more in<br />
strengthening their network security, and it<br />
seems the majority are already taking action.<br />
Recent research from the NISC revealed that<br />
79% of organisations have enhanced the<br />
security of their corporate VPNs over the last<br />
year, while 89% of security professionals said<br />
the challenges posed by the pandemic have<br />
boosted their organisation's network security<br />
against potential future attacks.<br />
Nevertheless, there is still more to be done.<br />
After gaining a better understanding of the<br />
vulnerabilities in their networks, businesses<br />
must turn their attention to always-on<br />
monitoring and mitigation solutions. As<br />
cybercriminals work to spot weak links in<br />
networks, businesses need to know that they<br />
have 24/7 protection. Only then can they have<br />
true peace of mind that they are doing<br />
everything they can to protect their network,<br />
and their organisation. NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 29
OPINION: DATA LAKES<br />
DON'T LET YOUR DATA LAKES DECAY INTO DATA SWAMPS<br />
GRACE LIU, SENIOR VP OF IT STRATEGY AND GLOBAL APPLICATIONS, SEAGATE TECHNOLOGY<br />
SUGGESTS FOUR WAYS TO KEEP ENTERPRISE DATA LAKES VIBRANT AND INSIGHTFUL<br />
Data remains an intangible asset on<br />
most companies' balance sheets -<br />
and its value is too often<br />
indeterminable and not fully tapped.<br />
Figures compiled by IDC for Seagate's<br />
Rethink Data report estimate only 32% of<br />
data available to enterprises is fully<br />
leveraged, with the remaining 68%<br />
untapped and unused.<br />
To extract the most value from the data,<br />
companies are increasingly turning to<br />
constructing cloud-based 'data lakes' - a<br />
platform that centralises all types of data<br />
storage. It provides elastic storage<br />
capacity and flexible I/O throughput,<br />
covering different data sources, and<br />
supporting multiple computing and<br />
analytics engines.<br />
A data lake can be hundreds of<br />
petabytes in size, or even larger. A big risk<br />
therefore in any data lake project is that -<br />
if left unattended - it could turn into a<br />
data swamp; a repository where<br />
unleveraged yet potentially useful data<br />
sits dormant on storage media. It risks<br />
becoming a massive, mostly idle swamp<br />
of 'sunk' data that is completely<br />
inaccessible to end users - a waste.<br />
To keep data lakes from morphing into<br />
swamps - and keep them fresh, vibrant,<br />
and full of insights - CIOs, CTOs, and<br />
data architects should implement the<br />
following four points.<br />
1. Have a clear vision of the business<br />
problem you're trying to solve<br />
With a clearly-defined objective in mind,<br />
it should be relatively straightforward to<br />
target the data you need to collect, and<br />
the best machine learning techniques for<br />
gleaning insight from that data. Most<br />
business outcomes can be improved by<br />
an investment in storage infrastructure.<br />
In advertising, a data lake analytics<br />
engine can be leveraged to run advertising<br />
campaigns accurately by reaching the<br />
correct groups of people through the right<br />
channels. A data lake can be used to<br />
perform data collection, storage, and<br />
analytics across the full life cycle of data<br />
management. By doing so, Yeahmobi, a<br />
Chinese marketing services company, has<br />
successfully reduced its overall operating<br />
costs by approximately 50%.<br />
In the manufacturing sector, data lakes<br />
have been used to improve the yield<br />
rates, through the integration of an<br />
artificial intelligence (AI) algorithm, deep<br />
30 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: DATA LAKES<br />
learning, and the related manufacturing<br />
parameters.<br />
For the above to work effectively, it is<br />
important that new data is constantly<br />
introduced into the data lake so optimal<br />
results can be extracted with the right<br />
software applications.<br />
2. Capture and store all the information<br />
you can<br />
Organisations need to be able to capture<br />
the right data, identify it, store it where it<br />
is needed, and provide it to decision<br />
makers in a usable way. Activating data -<br />
putting it to use - starts with data capture.<br />
Given the overwhelming growth of data<br />
due to the proliferation of IoT applications<br />
and 5G deployments, enterprises cannot<br />
keep up and do not currently capture all<br />
available data. But increasingly<br />
enterprises are learning to capture and<br />
save as much data as they can in order<br />
not to miss out on its complete value: the<br />
value that's there today and the value that<br />
will come alive in the use cases of<br />
tomorrow. If the data is not stored, this<br />
value never materialises.<br />
In the early days of data lakes, it was<br />
the power user who had the ability to dive<br />
in, swim in the lake and find the right<br />
data. Nowadays Structured Query<br />
Language (SQL) has made big inroads<br />
into the data lake and given ordinary<br />
users more access to the data. For these<br />
users the focus is more on outcomes, with<br />
AI and machine learning (ML) being<br />
introduced to sift through the data and<br />
look for patterns. ML now gives rise to<br />
near real-time analytics, advanced<br />
analytics, and visualisation.<br />
The data lake landscape has evolved<br />
rapidly, with an emphasis much more on<br />
turning the right data into value.<br />
Transferring data to a well-managed<br />
cloud storage service helps companies<br />
move data generated daily by their<br />
businesses into a scalable data<br />
architecture. For example, Twitter<br />
transferred 300 PB of data to the Google<br />
Cloud Storage service. Transferring that<br />
much data via the network took months<br />
to complete, but businesses can find<br />
faster methods of moving this.<br />
3. Periodically evaluate the data<br />
Data lakes need auditing and refreshing.<br />
Enterprises should review the datasets<br />
they're managing in a cloud-based data<br />
lake - or they will find that the data lake<br />
becomes increasingly harder (muddier) to<br />
use. Worse yet, the organisation's data<br />
scientists will find it more difficult - if not<br />
impossible - to find the patterns they're<br />
searching for in the data.<br />
The use of cloud storage services, along<br />
with AI and automation software, is<br />
expected to have the most impact on<br />
making massive data lakes more<br />
manageable. It remains the magical<br />
solution for ploughing through the<br />
information. The best way to do this is to<br />
pick a data set, select a machine learning<br />
technique to go through it, and then<br />
apply it to others once a favourable result<br />
has been achieved. For example, in fraud<br />
detection in a bank, AI-based systems are<br />
being designed to learn what type of<br />
transactions are fraudulent based on<br />
frequency of transactions, transaction size<br />
and type of retailer.<br />
Data that has aged or is no longer<br />
relevant can be transferred to another<br />
repository where it can be retained. You<br />
never know when that data may offer<br />
new, yet-undiscovered value. To do so, an<br />
enterprise can, again, use a data<br />
movement service designed to move<br />
massive amounts of data across private,<br />
public, or hybrid-cloud environments.<br />
Such services deliver fast, simple, and<br />
secure edge storage and data transfers<br />
that can accelerate time to insights.<br />
4. Engage mass data operations<br />
Mass data operations, or DataOps, are<br />
defined by IDC as the discipline of<br />
connecting data creators with data<br />
consumers. DataOps should be part of<br />
every successful data management<br />
strategy. In addition to DataOps, a sound<br />
data management strategy includes data<br />
orchestration from endpoints to core,<br />
data architecture, and data security.<br />
The goal of data management is to<br />
facilitate a holistic view of data and<br />
enable users to access and derive<br />
optimal value from it: both data in<br />
motion and at rest.<br />
DERIVING VALUE FROM DATA<br />
Businesses today are generating massive<br />
amounts of enterprise data, which is<br />
forecast to grow at an average annual<br />
rate of 42% annually from 2020 to 2022,<br />
according to the Rethink Data report.<br />
A new Seagate-commissioned IDC<br />
survey (see URL below) found that<br />
enterprises frequently move this data<br />
among different storage locations,<br />
including endpoints, edge, and cloud. In<br />
over a thousand businesses surveyed,<br />
more than half move data between<br />
storage locations daily, weekly, or monthly.<br />
With the average size of a physical data<br />
transfer being over 140TB, the faster<br />
businesses can move this data from edge<br />
to cloud, the quicker they can unlock<br />
insights and derive value from their data.<br />
Given the rapid pace of digitisation -<br />
accelerated in many cases by the<br />
pandemic - many organisations are<br />
gathering and managing more data than<br />
ever before. Cultivating vibrant and<br />
insightful data lakes will lay the<br />
groundwork for long-term success of<br />
enterprise data management strategies, in<br />
turn enabling the success of digital<br />
infrastructure and business initiatives. NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 31
FEATURE: DIGITAL SKILLS<br />
TO CODE OR NOT TO CODE?<br />
48% OF EMPLOYERS THINK THE WORKFORCE IS LACKING IN<br />
DIGITAL SKILLS, SO COULD NO-CODE BE THE ANSWER?<br />
Despite the workforce becoming<br />
more digitally reliant, new survey<br />
results suggest that, less than half of<br />
employers (48%) in the UK believe that<br />
employees joining the workforce have the<br />
necessary digital skills or knowledge. This<br />
has created a fear that the lack of relevant<br />
skills could affect businesses' abilities to<br />
compete in the digital market, with over<br />
three quarters of businesses believing this<br />
could negatively impact their profitability,<br />
According to research by Gartner, 'low<br />
code' or 'no code' solutions are gaining<br />
traction and are predicted to account for<br />
more than 65% of application development<br />
by 2024.<br />
AI-powered software company, Intelastel<br />
surveyed 400 UK directors/CEOs/founders,<br />
managers, and self-employed/freelancers to<br />
reveal people's thoughts towards coding,<br />
their knowledge in coding and what they<br />
think are the opportunities within the industry.<br />
The majority (51%) of business leaders<br />
polled described themselves as 'somewhat<br />
digitally proficient' and 29% said they were<br />
'highly digitally proficient'. However, when<br />
asked to select the correct definition of<br />
programming, less than half (46%) of<br />
those surveyed answered correctly and<br />
almost a quarter (24%) asserted that<br />
there's no difference between a<br />
programmer and a developer.<br />
Iouri Prokhorov, CEO of Intelastel said,<br />
"This lack of basic understanding might<br />
suggest that many top executives are out of<br />
touch with the realities of the digital world.<br />
The findings from our survey suggest that<br />
despite there being a demand for more<br />
tech knowledge in the workforce, there are<br />
many reasons why businesses don't invest in<br />
this sort of education and training. Many<br />
believe that it is too time consuming (19%),<br />
while price (8%), lack of awareness (46%)<br />
and the belief that coding is pointless (5%)<br />
were stated as barriers."<br />
This has left many believing that 'no code'<br />
solutions will have a significant part to play<br />
in business operations in the future. 17% of<br />
business leaders believe that 'no-code', is a<br />
popular and promising alternative to<br />
traditional software development for nontechnical<br />
business users hoping to build their<br />
own full-fledged applications, is the future.<br />
The majority (58%) of respondents believe<br />
organisations should be moving towards a<br />
hybrid approach of training in both coding<br />
and 'no code', yet businesses cite a lack of<br />
promotion (39%) and a lack of education<br />
(26%) as reasons for not investing in 'no<br />
code' solutions.<br />
"No-code allows all variations of<br />
businesses to develop and integrate a<br />
great digital platform and can minimise<br />
the number of employees being left in the<br />
dark due to their lack of digital skills,"<br />
added Prokhorov.<br />
Despite what many believe, coding is<br />
more integrated into our everyday lives<br />
than is necessarily in our working digital<br />
life. Coding is required for tasks such as<br />
driving, shopping and even taking a<br />
shower, whereas it is not necessary for<br />
building an app, hosting a podcast, or<br />
launching an ecommerce site.<br />
Apps can be developed without using<br />
code, as can creating an online store<br />
using 'no-code' platforms, yet showering<br />
requires a pre-set microprocessor code.<br />
Vegetables are usually grown in<br />
computerised temperature-controlled<br />
greenhouses and the use of a checkout till<br />
is required when purchasing them - this all<br />
requires coding. NC<br />
To read more from the Intelastel<br />
investigation, visit:<br />
www.intelastel.com/blog/to-code-or-notto-code<br />
32 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: POWER MONITORING<br />
MORE POWER TO YOU<br />
MOXA OFFERS A GUIDE TO OPTIMISING POWER CONSUMPTION<br />
THROUGH REMOTE MONITORING<br />
The Industrial Internet of Things (IIoT)<br />
generates a tremendous amount of data<br />
that also needs to be stored.<br />
Consequently, more and more data centres<br />
are needed to fulfill this growing demand for<br />
data storage management, increasing energy<br />
consumption in the process. At the same<br />
time, factories, supermarkets, and other high<br />
power consumption applications are also<br />
facing pressure to improve energy efficiency<br />
for their heavy-load equipment and devices.<br />
Data centre operators and application<br />
owners need to figure out how to operate<br />
numerous servers and power-hungry<br />
equipment while optimising power<br />
consumption. Power distribution units (PDUs)<br />
are used to control and distribute power to<br />
various equipment. Nowadays, intelligent<br />
PDUs that feature metering and switching<br />
capabilities from remote sites have seen<br />
significant market growth due to increasing<br />
remote monitoring demands. In fact, a recent<br />
industry report identifies the increasing<br />
demand for data center monitoring solutions<br />
as the key driver of PDU market growth.<br />
Monitoring PDUs in your application not<br />
only helps you optimise your energy usage -<br />
by recording daily power consumption for<br />
payment calculation and energy<br />
management - but also allows you to collect<br />
data about the status of your PDUs for device<br />
maintenance.<br />
According to Moxa, in order to reap the<br />
benefits of monitoring PDUs, an energy<br />
management system (EMS) needs to collect<br />
meter data from PDUs so that operators can<br />
control, monitor, and optimise the<br />
performance of the PDUs. In addition, remote<br />
power panels (RPPs) may also be used as an<br />
extension of PDUs to increase the power<br />
distribution capacity by providing extra circuits.<br />
Thus, it's also important to monitor the circuit<br />
breakers and current transformers to ensure<br />
that power distribution through different<br />
circuits is under control. It takes reliable<br />
connectivity between the EMS and power<br />
devices, such as PDUs and RPPs, to ensure<br />
smooth and optimised power distribution.<br />
Here are some tips you can consider to<br />
ensure reliable connectivity in between.<br />
UNDERSTAND YOUR DEVELOPMENT<br />
STAGE<br />
Once you decide to monitor the PDUs and<br />
RPPs in your application environment, how<br />
you go about enabling connectivity depends<br />
on your implementation plan. Besides<br />
connecting power meters, circuit breakers<br />
and current transformers that might use<br />
different protocols and interfaces than your<br />
EMS, ask yourself the following questions to<br />
choose the right solution:<br />
Are you trying to retrofit existing PDUs or<br />
deploy a new one?<br />
Is there enough space for your wiring<br />
design?<br />
How many PDUs are you planning to<br />
connect to the network?<br />
Your answers to the above questions will tell<br />
you whether you are looking for a single-port<br />
or high port-density connectivity solution. For<br />
example, if you have limited space for<br />
retrofitting your existing PDUs in a relatively<br />
small-scale application, a single-port<br />
connectivity solution may be the ideal option<br />
due its compact design. In contrast, high<br />
port-density connectivity solutions can help<br />
you save costs if you have sufficient space to<br />
deploy multiple new PDUs.<br />
INSTALLATION AND MAINTENANCE<br />
Choosing an easy-to-use connectivity solution<br />
can save you significant time and effort. In<br />
the installation stage, wiring can be painful<br />
when you are connecting dozens of PDUs to<br />
the same network. Check if your connectivity<br />
solution has features such as Ethernet<br />
cascading, which provides an efficient wiring<br />
solution across several PDUs and RPPs to the<br />
EMS located in the control center. When your<br />
PDUs and RPPs are up and running, your<br />
networking devices will still require backups<br />
and updates from time to time. If your<br />
connectivity solutions provide user-friendly<br />
software tools, it can take the headache out<br />
of device configuration and maintenance.<br />
ENHANCE OPERATION RELIABILITY<br />
When unexpected network failures occur,<br />
meter data loss can lead to miscalculation of<br />
your power consumption, resulting in<br />
incorrect billing and incomplete power data<br />
for analytics. To enhance your power<br />
monitoring system reliability, you need to<br />
consider backup mechanisms from different<br />
angles. Start from the networking devices.<br />
Dual-power inputs and high EMI immunity<br />
are features that can protect your networking<br />
devices from electrical interference. Next,<br />
develop a redundancy mechanism for your<br />
network transmissions. There are various<br />
network redundancy features in the market.<br />
When considering these options, see if their<br />
recovery times are acceptable for your power<br />
monitoring application. NC<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 33
OPINION: SD-WAN<br />
WHY SD-WAN?<br />
AMY HOOD, PRODUCT SPECIALIST FOR DRAYTEK UK &<br />
IRELAND, EXPLAINS HOW SD-WAN CAN ENABLE DIGITAL<br />
TRANSFORMATION WITH SAAS/CLOUD<br />
Traditionally, the challenge of most<br />
network administrators was one of<br />
simple connectivity. With most<br />
applications running on private servers in<br />
a company's headquarters, the question<br />
was how to enable connectivity for other<br />
sites to access resources.<br />
However, with the adoption of a hybrid<br />
model including SaaS, public and private<br />
cloud infrastructure and applications such<br />
as Outlook365, Team, Zoom, OneDrive,<br />
Google Drive and Dropbox, it's not just<br />
connectivity that's the concern - it's also<br />
the quality of the connection and the<br />
flexibility to simultaneously handle routing<br />
to both public and private facing<br />
applications.<br />
This challenge has drawn attention to the<br />
solutions SD-WAN provides to make<br />
complex routing schemes simple and<br />
intuitive, and to give better insights to the<br />
performance of the network and a<br />
responsiveness to handle any degradation<br />
which has been detected.<br />
IMPROVED INTERFACE STATS<br />
With SD-WAN, wired WAN, Wireless WAN<br />
(including wireless 2.4G/5G WAN, LTE<br />
WAN, and USB WAN), and VPN quality<br />
are monitored 24/7. Using an "average"<br />
Mean Opinion Score (MOS), Network<br />
administrators can view the sustained<br />
quality of a WAN interface, to easily<br />
determine the performance of each<br />
connection. "Active" interface quality, on<br />
the other hand, shows the interface quality<br />
right at that moment. By integrating<br />
percentage numbers, network<br />
administrators can specify rules to load<br />
balance or failover based on the reliability<br />
and quality of connections. Ideally the<br />
connections should always be higher than<br />
the target MOS threshold. For example,<br />
4.0 MOS out of 5 for important traffic.<br />
INTERFACE QUALITY - FROM<br />
MACRO TO MICRO<br />
In SD-WAN environments, more data is<br />
collected for every interface on monitored<br />
CPEs. This makes it easier to create<br />
dashboards to track any suspicious<br />
Interface quality results. Network<br />
administrators can dive into more details<br />
about an interface, such as, data usage,<br />
latency, jitter and packet<br />
INTELLIGENT VOIP OPTIMISATION<br />
SD-WAN also provides intelligent VoIP<br />
optimisation from the start of a VoIP call to<br />
the end. Based on your network topology<br />
and the Interface quality, SD-WAN<br />
intelligently assigns the best-quality WAN<br />
for VoIP calls. So whenever you are<br />
making a new call, SD-WAN makes sure<br />
you are calling via the best WAN.<br />
After sending the VoIP call via bestquality<br />
WAN, SD-WAN will continue to<br />
monitor the quality of the live call and<br />
enforce a WAN failover to a secondary<br />
VoIP WAN if call quality is poor. As every<br />
call is logged with a MOS score and indepth<br />
interface data, the network<br />
administrator can analyse and refine<br />
routing policies based upon WAN<br />
performance.<br />
FULL TRAFFIC CONTROL<br />
SD-WAN provides complete routing control<br />
by allowing network administrators to<br />
specify the preferred route for selected<br />
applications/domains, to ensure their<br />
specific routing scenarios can be achieved.<br />
Sessions matching the criteria can be<br />
NATed or routed, all under your control. It's<br />
especially useful if you have a mix of<br />
private/MPLS WAN (requires routing).<br />
COMPONENTS AND TOPOLOGY<br />
SD-WAN is a great addition to any<br />
remotely managed network of routers. It<br />
provides network admins information to<br />
assess the quality of a WAN interface,<br />
easily determine the performance of each<br />
connection and make intelligent decisions<br />
on where to route traffic. Here are the<br />
typical components for an SD-WAN<br />
network topology:<br />
Edge routers providing edge<br />
computing. Edge routers are physical<br />
routers installed in HQ and branches.<br />
Established VPN tunnels from branches<br />
to HQ to form hub-and-spoke or mesh<br />
topology.<br />
A central software platform where<br />
network administrators perform<br />
configurations, provisioning, and<br />
monitoring activity.<br />
As organisations discover the<br />
effectiveness of their connectivity is directly<br />
related to the effectiveness of their teams,<br />
the benefits of deploying SD-WAN<br />
technology should be considered by all<br />
network admins. NC<br />
34 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
Performance Begins Now<br />
Software-defined<br />
Storage Solutions<br />
Driving advanced platform innovations for scale-out cloud and datacenter<br />
infrastructure featuring 3 rd Gen Intel ® Xeon ® Scalable processors<br />
Learn More at www.supermicro.com/storage<br />
© Supermicro and Supermicro logo are trademarks of Super Micro Computer, Inc. in the U.S. and/or other countries.