23.08.2021 Views

Jul-Aug-Sep 2021

  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NETWORKcomputing<br />

I N F O R M A T I O N A N D C O M M U N I C A T I O N S – N E T W O R K E D www.networkcomputing.co.uk<br />

IoT AT THE EDGE<br />

What will edge computing mean<br />

for the Internet of Things?<br />

HYBRID WORKING<br />

The genie is out of the<br />

botttle - so what next?<br />

NEW PATHWAYS<br />

Why the times are<br />

changing for tech training<br />

CONNECTING WITH<br />

QUALITY<br />

Draytek discuss solutions for<br />

our new network landscape<br />

AUGUST/SEPTEMBER <strong>2021</strong> VOL 30 NO 03


COMMENT<br />

COMMENT<br />

A NEW KIND OF BROADBAND STREAMING<br />

There's been very little need for a hosepipe ban in the UK this summer and now it seems<br />

that the country's water system is on the verge of being used in an altogether more innovative<br />

way. In <strong>Aug</strong>ust the UK Government announced a three-year project to accelerate<br />

the rollout of broadband and mobile signal in rural areas by feeding fibre cables through the<br />

country's network of water pipes. Four million pounds is being made available for cuttingedge<br />

innovators to trial the scheme. The government sees the project as potentially offering "a<br />

quicker and more cost-effective way of connecting fibre optic cables to homes, businesses<br />

and mobile masts, without the disruption caused by digging up roads and land. Civil works,<br />

in particular installing new ducts and poles, can make up as much as four fifths of the costs<br />

to industry of building new gigabit-capable broadband networks."<br />

Digital Infrastructure Minister Matt Warman said "We are calling on Britain's brilliant innovators<br />

to help us use this infrastructure to serve a dual purpose of serving up not just fresh and<br />

clean water but also lightning-fast digital connectivity." The Fibre in Water project will also test<br />

solutions to water leakage by putting connected sensors in the pipes, enabling water companies<br />

to identify and repair a leak more quickly and accurately. It's not the sort of network<br />

patching we typically feature in the magazine but it's welcome news all the same.<br />

While welcoming the news of the Fibre in Water project, Dahwood Ahmed, Regional<br />

Director UK&I at Extreme Networks observed that there's still a significant distance to cover<br />

when it comes to the UK's connectivity gap. "Feeding cables through the country's water pipes<br />

is a smart, efficient and creative approach, but to fully close the connectivity gap, the problem<br />

needs to be addressed with more than one solution," according to Dahwood. "One already<br />

proven option is the adoption of AltNets, also known as alternative networks. These providers<br />

create their own networks to offer last mile connectivity without relying on the UK's existing<br />

copper network. To close the UK connectivity gap once and for all, the government and technology<br />

innovators need to work together. Only then will citizens and businesses in the UK<br />

enjoy infinitely distributed high-speed connectivity, wherever they may be located."<br />

And speaking of innovations, voting has now opened to determine the winners of this year's<br />

Network Computing Awards. After having to forgo our traditional awards evening last year in<br />

favour of a virtual event we're delighted to be returning to a central London venue on<br />

October 14th for the <strong>2021</strong> awards. To cast your votes and for more information on how you<br />

can attend the awards night please visit: www.networkcomputingawards.co.uk. NC<br />

REVIEWS:<br />

Dave Mitchell<br />

DEPUTY EDITOR: Mark Lyward<br />

(netcomputing@btc.co.uk)<br />

PRODUCTION: Abby Penn<br />

(abby.penn@btc.co.uk)<br />

DESIGN: Ian Collis<br />

(ian.collis@btc.co.uk<br />

SALES:<br />

David Bonner<br />

(david.bonner@btc.co.uk)<br />

<strong>Jul</strong>ie Cornish<br />

(julie.cornish@btc.co.uk)<br />

SUBSCRIPTIONS: Christina Willis<br />

(christina.willis@btc.co.uk)<br />

PUBLISHER: John Jageurs<br />

(john.jageurs@btc.co.uk)<br />

Published by Barrow & Thompkins<br />

Connexion Ltd (BTC)<br />

35 Station Square,<br />

Petts Wood, Kent, BR5 1LZ<br />

Tel: +44 (0)1689 616 000<br />

Fax: +44 (0)1689 82 66 22<br />

SUBSCRIPTIONS:<br />

UK £35/year, £60/two years,<br />

£80/three years;<br />

Europe:<br />

£48/year, £85/two years £127/three years;<br />

ROW:<br />

£62/year, £115/two years, £168/three years;<br />

Subscribers get SPECIAL OFFERS — see subscriptions<br />

advertisement; Single copies of<br />

Network Computing can be bought for £8;<br />

(including postage & packing).<br />

© <strong>2021</strong> Barrow & Thompkins<br />

Connexion Ltd.<br />

All rights reserved.<br />

No part of the magazine may be<br />

reproduced without prior consent, in<br />

writing, from the publisher.<br />

GET FUTURE COPIES FREE<br />

BY REGISTERING ONLINE AT<br />

WWW.NETWORKCOMPUTING.CO.UK/REGISTER<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 03


CONTENTS<br />

CONTENTS<br />

A U G U S T / S E P T E M B E R 2 0 2 1<br />

INTERVIEW: DRAYTEK.............8<br />

We spoke to Alex Shuker, CTO at DrayTek,<br />

about the changing landscape for the networking<br />

industry, the impact of home-working<br />

and the upcoming switch-off of traditional<br />

telephony services<br />

COMMENT.....................................3<br />

A new kind of broadband streaming<br />

INDUSTRY NEWS.............................6<br />

The latest networking news<br />

ARTICLES<br />

THE VALUE OF SSL CERTIFICATES FOR<br />

ONLINE BUSINESSES.......................14<br />

By Ben Haskey at LCN.com<br />

MAKING THE MOVE TO SD-WAN.....18<br />

By Oliver Wallington at Wireless Logic<br />

I.T. IS THE NEW VIP..........................24<br />

By Andrea Babbs at VIPRE<br />

HYBRID WORKING..............12<br />

Herbert Lörch at M-Files considers whether<br />

there's now any point in returning to regular<br />

on-premises work if you can also work<br />

remotely in the cloud<br />

IoT AT THE EDGE................20<br />

Peter Ruffley at Zizo explains what edge<br />

computing will mean for the Internet of<br />

Things, and offers advice on where to start<br />

when investing in IoT<br />

LEADING THE FIELD................16<br />

Norvado relies on NetAlly's EtherScope®<br />

nXG Network Analyzer to conduct complete<br />

and accurate remote assessments, reducing<br />

the time and cost of field operations<br />

TECH TRAINING.....................26<br />

A "new normal" is coming in Tech - and we<br />

need to make sure it's truly different this time,<br />

according to Graham Hunter at CompTIA<br />

SECURING DISPERSED NETWORKS IN<br />

THE ERA OF HYBRID WORKING........29<br />

By Rodney Joffe at Neustar<br />

DON’T LET YOUR DATA LAKES DECAY<br />

INTO DATA SWAMPS........................30<br />

By Grace Liu at Seagate Technology<br />

TO CODE OR NOT TO CODE?.......32<br />

Could no-code be the answer to the digital<br />

skills shortage?<br />

MORE POWER TO YOU...................33<br />

Moxa offers a guide to optimising power<br />

consumption through remote monitoring<br />

WHY SD-WAN?................................34<br />

By Amy Hood at DrayTek<br />

PRODUCT REVIEW<br />

FLUKE LINKIQ CABLE+NETWORK<br />

TESTER............................................10<br />

DRAYTEK VIGORAP 1060C................15<br />

KEMP FLOWMON COLLECTOR..........22<br />

DRAYTEK VIGOR 2927LOC...............28<br />

04 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


INDUSTRY NEWS<br />

NEWS NEWSNEWS<br />

NEWS<br />

NEWS NEWS NEWS<br />

NEWS NEWS NEWS<br />

Extreme Networks to acquire Ipanema<br />

Extreme Networks has announced its intent to acquire a newly<br />

created entity called Ipanematech SAS ("Ipanema"), the SD-<br />

WAN division of Infovista. The acquisition will expand Extreme's<br />

ExtremeCloud portfolio, offering new cloud-managed SD-WAN<br />

and security solutions required to power the Infinite Enterprise.<br />

Ipanema's solution automatically and dynamically adjusts<br />

application traffic flows based on real-time network conditions,<br />

providing increased performance and improved quality of<br />

experience, even under diverse conditions across various types<br />

of cloud-managed WAN connectivity. Extreme plans to<br />

leverage these capabilities to establish an infinitely distributed<br />

and secure solution within the ExtremeCloud portfolio –<br />

progressing the company's position as one of the world's most<br />

advanced cloud platforms.<br />

Private 5G Network-as-a-Service platform from NTT<br />

NTT has launched its Private 5G platform (P5G), the first<br />

globally available private LTE/5G Network-as-a-Service<br />

platform. NTT P5G leverages design thinking principles to<br />

integrate security, control and privacy by design, providing<br />

performance and cost benefits with a clear ROI. Running on a<br />

cloud-native architecture, the platform can be delivered via<br />

cloud, on-premises, or at the edge. The platform is preintegrated<br />

with leading network and software partners, allowing<br />

enterprises to secure, scale and segment their network flexibly.<br />

With patent-pending MicroSlicing technology, NTT P5G allows<br />

mission-critical apps to leverage the advantages of private 5G.<br />

"Global enterprises are looking for a single private 5G solution<br />

to deploy across multiple countries. They need one truly private<br />

network, one point of accountability, one management platform,<br />

and one solution partner that eliminates all the major friction<br />

points across the entire global footprint of the enterprise," said<br />

Shahid Ahmed, NTT Ltd. EVP New Ventures and Innovation.<br />

"Our NTT P5G offering supports many of the CXO requirements<br />

today, and we will continue to invest in P5G as enterprise<br />

adoption evolves."<br />

Dataquest Group signs security deal with Acronis<br />

Dataquest Group has signed a deal with cybersecurity<br />

solutions providers Acronis. Dataquest provides a<br />

comprehensive range of technology services, ranging from<br />

managed print to Cloud solutions and is recognised as one of<br />

the UK’s fastest growing hybrid Cloud solutions providers.<br />

Chris Baker, Cloud Business Development Manager at<br />

Dataquest, commented: "Acronis delivers an integrated suite of<br />

data protection solutions, including backup, disaster recovery and<br />

storage, together with file sync and share, which will serve our<br />

clients well in these challenging times. To face the challenge<br />

presented by increasing security threats, Dataquest was seeking a<br />

simplified product that offered our clients the best protection,<br />

from a single, easy to manage source. Acronis and its range of<br />

innovative products was the ideal choice for partner."<br />

Chris Baker, Dataquest<br />

Common use-cases for Acronis Cyber Protect, in addition to<br />

normal backup and recovery, include auto-response to emerging<br />

threats, real-time (CDP) protection of important documents, zeroday<br />

malware and ransomware protection and recovery, together<br />

with compliance and forensic analysis.<br />

The Spectra Current I.T. podcast launched<br />

Spectra Logic has launched its new podcast series, The<br />

Spectra Current. The podcast series features conversations<br />

with IT industry experts, thought leaders, customers and Spectra<br />

Logic executives who review the latest trends in data storage,<br />

data management, emerging technologies, cybersecurity and<br />

digital transformation at large. Conversations centre around<br />

data centre experiences, business methodologies, corporate<br />

culture, industry insights and lighthearted banter on successes,<br />

failures and personal and professional recommendations.<br />

Hosted by Betsy Doughty, vice president of corporate<br />

marketing for Spectra Logic, the podcast will provide new<br />

episodes bimonthly. "We're excited to launch The Spectra<br />

Current to provide personal and professional experiences and<br />

chats around how organisations are modernising their IT<br />

architectures, corporate cultures and even their teams," said<br />

Betsy Doughty. "We've lined up a variety of remarkable guests<br />

who have agreed to share their unique stories and individual<br />

insights with our listeners." For more on Spectra Current visit:<br />

https://bit.ly/3AGNMCh<br />

06 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


INDUSTRY NEWS<br />

Comparitech counts the cost of annual cybercrime<br />

Anew report from Comparitech has discovered that global<br />

cybercrime is still severely underreported by police and<br />

government entities, with the true monetary value remaining<br />

largely unknown. Comparitech's researchers examined the top<br />

100 countries by GDP, looking at the cybercrime reports<br />

available and the figures and categories involved. They found<br />

figures for 67 countries but only 15 reports of the monetary<br />

values involved. According to their estimates 71.1 million fall<br />

victim to cybercrimes globally each year (this equates to nearly<br />

900 victims per 100,000 people) with the average victim loss<br />

amounting to $4,476 per crime. This amounts to victims losing<br />

$318 billion to cybercrime annually. The countries with the<br />

biggest losses are:<br />

United States: 5.28 million victims losing $28 billion<br />

Brazil: 5.8 million victims losing over $26 billion<br />

United Kingdom: 4.88 million victims losing $17.4 billion<br />

Russia: 3.4 million losing over $15.2 billion<br />

Javvad Malik, security awareness advocate at KnowBe4<br />

commented "These numbers are not surprising, but still are<br />

concerning. Cybercrime continues to be big business for<br />

criminals and with more services being digitally connected, it<br />

makes it even easier to make off with big gains. It's easy to<br />

create a tech service or to digitise existing services, however,<br />

security needs to be built in from the beginning to ensure that<br />

there are no vulnerabilities. This also includes educating users of<br />

products as to what kind of threats they can expect to face and<br />

how to report any suspicious activity. Without educating users to<br />

identify and report criminal activity, we won't be able to stem the<br />

flow of cybercrime."<br />

Using darknet intelligence to protect edge computing<br />

DataQube Global Ltd, developer of a 5G-ready edge data<br />

centre system, has teamed up with cyber intelligence and<br />

MSSP provider, KryptoKloud Ltd to safeguard its invaluable edge<br />

computing assets against cybercrime. The collaboration assures<br />

heightened protection for the DataQube units by delivering<br />

around the clock detection and response monitoring capabilities<br />

that can be managed locally or centrally via an intuitive interface.<br />

By incorporating KryptoKloud's security monitoring tools (which<br />

leverage darknet intelligence) into DataQube's core infrastructure,<br />

all data communication is dynamically monitored 24x7 to<br />

proactively identify possible security breaches. If malicious activity<br />

is detected an alert is triggered, together with a comprehensive<br />

escalation process for damage limitation and control.<br />

New WiFi 6 Standalone Access Points from NETGEAR<br />

NETGEAR has released the WAX202 and WAX206 desktop<br />

WiFi 6 Access Points, expanding the Business Essentials line<br />

of powerful, easy-to-deploy, and affordable business networking<br />

products. The WAX202 and WAX206 provide home office<br />

workers, micro businesses, and students with a cost-effective,<br />

standalone solution to typical wireless networking challenges.<br />

"The new WAX202, WAX206 and NETGEAR's Business<br />

Essentials family of products, make it possible for small<br />

businesses and working professionals to deploy a very reliable,<br />

high-performance, secure, and easy-to-manage standalone WiFi<br />

networks in their work and home environments at affordable<br />

price points," said Doug Cheung, Senior Product Line Manager,<br />

Wireless at NETGEAR.<br />

Neos Networks completes full fibre network for Perth<br />

Neos Networks has announced the completion of its DCMS<br />

funded Local Full Fibre Network project in Perth, Scotland,<br />

ahead of schedule. The fibre network connecting three key<br />

Council data centres and 31 public buildings and community<br />

establishments within Perth was completed two months ahead of<br />

the scheduled completion date at the end of <strong>Sep</strong>tember.<br />

Spanning 19.5km, the new end-to-end full fibre network covers<br />

city centre locations, including educational institutions, council<br />

buildings, leisure centres and sheltered housing, as well as key<br />

public buildings such as Perth fire station and the CCTV<br />

monitoring centre. It stretches out to the west of the city, close to<br />

the new 3,000-home Perth West housing development.<br />

Perth and Kinross Council awarded Neos Networks the major<br />

gigabit-capable connectivity project in November 2020, with the<br />

goal of facilitating next generation technologies such as 5G and<br />

IoT. Forming part of Wave 3 of the Department for Digital,<br />

Culture, Media and Sport (DCMS) Local Full Fibre Network<br />

programme, the project received £1m of funding from UK<br />

Government and was supported by Council and Building Digital<br />

UK (BD-UK) officials from procurement through to completion.<br />

NEWS NEWSNEWS<br />

NEWS<br />

NEWS NEWS NEWS NEWS NEWS<br />

NEWS<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 07


INTERVIEW: DRAYTEK<br />

CONNECTING WITH QUALITY<br />

NETWORK COMPUTING SPOKE TO ALEX SHUKER, CTO AT<br />

DRAYTEK UK, ABOUT THE CHANGING LANDSCAPE FOR THE<br />

NETWORKING INDUSTRY, THE IMPACT OF HOME-WORKING<br />

AND THE UPCOMING SWITCH-OFF OF TRADITIONAL<br />

TELEPHONY SERVICES<br />

Network Computing: DrayTek has<br />

been going for almost 25 years -<br />

how has the industry changed over<br />

that time? Is networking these days more<br />

about management and monitoring tools -<br />

perhaps via the cloud - more than specific<br />

hardware offerings?<br />

Alex Shuker: The focus for DrayTek has<br />

always been around providing solutions to<br />

the issues and challenges that businesses -<br />

and individuals - face. That is at the root of<br />

most of our product offerings - we champion<br />

solutions for business connectivity. From our<br />

point of view the focus has always been on<br />

providing the right router, access point or<br />

switch at the right time, but also crucially the<br />

additional services around that product. A<br />

lot of our core users are businesses who are<br />

installing networks for other organisations,<br />

and they bring their expertise in how to get<br />

that network working optimally, allowing<br />

those end users to focus instead on what<br />

they do well.<br />

A significant development for us is our<br />

central cloud-based management system.<br />

Customers can use it to connect to devices,<br />

and we enable them then to offer a service<br />

monitoring and managing those devices.<br />

This helps our customers to build the right<br />

service package for their clients around our<br />

management offering. Managed Service<br />

Providers may be offering a cloud service,<br />

but at some point in the process there is still<br />

that physical connection - and that's where<br />

DrayTek fits in, providing that equipment<br />

and supporting services. In that sense I<br />

guess we still have that hardware aspect at<br />

our core.<br />

A lot of what we supply could be<br />

described as 'commoditised' to an extent -<br />

once you have that physical connection, a<br />

large part of the job is done, if you like.<br />

But we also have a unique focus on<br />

configuration flexibility, quality and<br />

reliability, and that is an area where we<br />

stand out in the market.<br />

NC: How important is it for a company like<br />

DrayTek to be seen as a solution provider<br />

as opposed to just a hardware vendor trying<br />

to shift boxes?<br />

AS: The ideal story for us, obviously, is when<br />

someone puts in a DrayTek router or access<br />

point or switch, and they don't have to ever<br />

think about it ever again, and they can<br />

forget it's there. But increasingly nowadays<br />

people are offering services based on<br />

knowing how your network is performing,<br />

improving visibility of exactly what is being<br />

used - so we're seeing a migration more<br />

toward the SD-WAN side of things, toward<br />

application awareness. That's why it's so<br />

important for us to have this central<br />

management platform that offers the<br />

analytics and insight into the network, via<br />

an intuitive and user-friendly dashboard.<br />

08 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


INTERVIEW: DRAYTEK<br />

This means that MSPs and IT companies<br />

can see exactly what kind of traffic is on<br />

their networks, but also - as people are now<br />

consuming a lot more cloud services - it<br />

allows them to see not just that the<br />

connection is there and working, but how<br />

well it is working. If we're talking about a<br />

business's CRM system or their ordering<br />

system or their phone system, you simply<br />

can't have any latency or packet loss<br />

because that means you'll end up with a<br />

client on the other end of the phone who<br />

can't hear you, or experiencing long delays<br />

trying to navigate through screens. So the<br />

demand increasingly is for the ability to look<br />

at the quality of a connection, and to move<br />

seamlessly across to a different connection<br />

if necessary.<br />

We can easily show users not just that a<br />

connection is up or down, but also if it goes<br />

below a specific quality measure that they<br />

have set. As users increasingly demand that<br />

better service quality as well as visibility and<br />

awareness of exactly what's going on within<br />

their networks, that is what really drives us<br />

forward as a company in terms of the features<br />

and functionality we offer to the market.<br />

NC: The pandemic has obviously changed<br />

the way large numbers of us do our<br />

everyday work: what effect has the growth in<br />

home-working had on the roles of network<br />

managers, and by extension on companies<br />

like DrayTek?<br />

AS: People who are fairly tech-literate will<br />

already be aware of the need for backup<br />

strategies such as mobile broadband in<br />

case of a bulldozer up the street cutting off<br />

your broadband connection, so that core<br />

set of users already know what they can do<br />

if a connection goes down. But since the<br />

Covid crisis there is a whole set of users<br />

who have been put into that environment<br />

and are only just beginning to appreciate<br />

how integral those connections are to them<br />

being able to do their jobs properly. As a<br />

result we've seen a lot of people showing<br />

interest in backup and failover solutions for<br />

their home broadband.<br />

That shift has also helped people move<br />

towards awareness of the need for failover,<br />

for the ability to automatically go from one<br />

connection to another without the user<br />

having to actually change anything. If this all<br />

happens in one box, it will fail over<br />

automatically, fail back, and report in, so<br />

the company proactively knows that a<br />

particular element has gone down. If it's<br />

working well of course, the user site<br />

shouldn't even notice, but you need to know<br />

so you can maintain the service at its best:<br />

that reporting aspect is absolutely vital, even<br />

if it is happening 'behind the scenes' as far<br />

as the user is concerned.<br />

Covid has brought with it new and different<br />

types of stresses and demands - for example,<br />

previously there would have been large<br />

numbers of workers in say Accounts who'd<br />

never need to work outside the office, but<br />

now suddenly the number of VPN users was<br />

expanding to cover almost the entire<br />

workforce. So we have had lots of calls<br />

about that aspect of performance, about<br />

how many concurrent users they can have on<br />

the VPN. And I'm glad to say that we had a<br />

lot of very relieved customers, as we<br />

explained that it was generally just a matter<br />

of creating more profiles rather than having<br />

to buy a new tool. As time has gone on, that<br />

kind of thing has become a core part of<br />

customers' purchasing decisions: can they<br />

add on remote users in increasing numbers,<br />

can they kit-out home users with a router<br />

than includes all the failover functionality<br />

rather than having to rely on their home<br />

broadband connection.<br />

We're seeing a shift, I believe, from a<br />

largely reactive stance - "This is the situation<br />

we find ourselves in, what do we have to do<br />

to adapt and keep going?" - to a more<br />

forward-planning approach as businesses try<br />

to balance out the benefits and drawbacks of<br />

a workforce that looks to expect much more<br />

flexibility going forward.<br />

NC: The analogue telephony service is<br />

scheduled to be switched off in 2025, which<br />

is not that far away now - is it something your<br />

partners and/or end users are prepared for?<br />

AS: It's a conversation we've been having<br />

with MSPs for some time - they will be<br />

offering a complete package of broadband,<br />

phone line and more, and in the past they<br />

would be purchasing the telephone line and<br />

internet connection from Openreach, to be<br />

delivered on the same line. When the 'stopsell'<br />

happens, MSPs will have to think about<br />

how they will offer phone services.<br />

Obviously in some ways the goalposts have<br />

moved - again in large part due to Covid - as<br />

services like Teams and Zoom have become<br />

more core to how many organisations<br />

communicate. Nonetheless most businesses<br />

will still have a need for some kind of phone<br />

system, so there is some debate going on<br />

about how best to deliver that.<br />

One approach is to ensure that the router<br />

itself offers a good enough connection for<br />

voice, and have failover and ways of<br />

monitoring the service to make sure that the<br />

quality is up to scratch. One specific feature<br />

of our Vigor-ACS 3 SD-WAN is the ability to<br />

monitor the MOS (Mean Opinion Score) of<br />

the connection, so if that value drops below<br />

say 3.5 out of 5, then you are alerted that<br />

the quality of that connection isn't good<br />

enough for voice any more, and it needs to<br />

failover to a different connection.<br />

DrayTek also offers products with built-in<br />

phone ports, so the router connects to an<br />

analogue phone, and then to a SIP service,<br />

so that can be used just as a standard phone<br />

or to replace legacy systems. In the longer<br />

term of course everyone will move to IP<br />

solutions for voice, but for people with<br />

existing legacy systems they may have<br />

elements - analogue based PBX, or<br />

doorphones, for example - that they can't<br />

easily migrate across, where they need a<br />

phone port to plug into. We're working hard<br />

to ensure we have solutions that our partners<br />

want to recommend to their users, whatever<br />

their requirements. NC<br />

www.draytek.co.uk<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 09


PRODUCTREVIEW<br />

Fluke Networks<br />

LinkIQ<br />

Cable+Network<br />

Tester<br />

PRODUCT REVIEW<br />

PRODUCT<br />

REVIEWPRODUCT RE<br />

Network engineers never leave<br />

home without their cable tester as<br />

it's an essential tool for certifying<br />

new network installations or solving cable<br />

connection issues - and Fluke Networks is<br />

about to make their lives even easier. The<br />

LinkIQ Cable+Network Tester is quite<br />

unique as it's the first handheld device to<br />

combine cable testing with switch and<br />

Power over Ethernet (PoE) diagnostics.<br />

The LinkIQ packs a remarkable range of<br />

features into a compact chassis as it's<br />

capable of verifying up to 10-Gigabit<br />

cabling performance. It can automatically<br />

detect and run diagnostics on switches to<br />

provide information such as its name,<br />

data rate, port number plus VLAN and if<br />

PoE is being advertised, and it will load<br />

test up to 90W Class 8.<br />

Cable diagnostics are outstanding as the<br />

LinkIQ uses radio frequency (RF) tests to<br />

ascertain physical cable quality and the<br />

IEEE 802.3 standards it can support.<br />

These range from 10Base-T to 10GBase-T<br />

and a key feature is its ability to check if a<br />

cable run is qualified for the multi-Gigabit<br />

2.5GBase-T and 5GBase-T standards.<br />

We found the LinkIQ incredibly easy to<br />

use as it offers full automation and runs<br />

the most appropriate set of tests based on<br />

what it finds at the other end of the cable.<br />

Connect an open-ended cable and it'll tell<br />

you the length and pairing, while<br />

plugging in the Remote ID RJ-45 dongle<br />

at the far end of the run allows it to<br />

conduct a full validation test to determine<br />

all supported speeds.<br />

The industrial-quality touchscreen LCD<br />

panel makes light work of general<br />

operations and automated tests are<br />

started with a single tap. For cable tests, it<br />

provides a clear wire map diagram while<br />

below is a chart showing all the speeds<br />

the cable can support.<br />

We have some legacy cabling in the lab<br />

and after plugging the remote ID device<br />

into our rack's patch panel, it was<br />

reassuring to know that it was all capable<br />

of supporting up to 5GBase-T and that<br />

every cable run was in tip-top shape.<br />

Swapping the LinkIQ over to our 10GbE<br />

infrastructure confirmed it was all<br />

validated for 10GBase-T operations.<br />

Bringing our switches into the equation<br />

produced even more valuable<br />

information. For our standard Gigabit<br />

and 10GbE switches, the LinkIQ reported<br />

back on the device name, VLAN, all<br />

advertised speeds and full duplex<br />

capabilities.<br />

With the LinkIQ connected to a multi-<br />

Gigabit PoE++ switch, the test<br />

determined that it could support dual<br />

power signatures, which wire pairs were<br />

providing power and its hardware power<br />

class. There's a lot more as it revealed the<br />

watts provided, the minimum required<br />

volts to meet the 802.3bt standard plus<br />

the measured voltage under load.<br />

Results can be saved locally and the<br />

LinkIQ has room to store up to 1,000<br />

tests. Connect it to a PC using the<br />

supplied USB cable and you can upload<br />

all your results to the free LinkWare PC<br />

software, which supports every test device<br />

Fluke has produced for the past 20 years.<br />

After running a wide range of cable,<br />

switch and PoE tests, we uploaded our<br />

results to a PC running LinkWare and<br />

organised them into various databases<br />

and projects for easier access. It's a great<br />

tool for enhanced customer services as<br />

complete projects and individual test<br />

results can be exported to professionalquality<br />

PDFs to confirm the work has been<br />

carried out to the required standards.<br />

The LinkIQ impressed us during testing<br />

as this handheld device's smart<br />

combination of cable, switch and PoE<br />

diagnostics makes it supremely versatile.<br />

The automated tests make it incredibly<br />

easy to use, it can present a wealth of<br />

essential information and the LinkWare<br />

software provides classy project<br />

management and reporting tools.NC<br />

Product: LinkIQ Cable+Network Tester<br />

Supplier: Fluke Networks<br />

Web site: www.flukenetworks.com<br />

Tel: +44 (0)207 942 0721<br />

Price: From £1,520 exc VAT<br />

10 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


Your nominations have determined the finalists. We now ask for your help again.<br />

Please cast your votes to decide the ultimate winners at:<br />

WWW.NETWORKCOMPUTINGAWARDS.CO.UK<br />

ATTENTION VENDORS, DISTRIBUTORS AND RESELLERS:<br />

Are you or any of your channel partners in contention for an award? Make sure you book your<br />

places at the awards ceremony which will take place on 14th October.<br />

Contact Dave Bonner on 01689 616000 or dave.bonner@btc.co.uk<br />

The Awards are sponsored by :


OPINION: HYBRID WORKING<br />

THE GENIE IS OUT OF THE BOTTLE -<br />

AND NEEDS GUIDANCE<br />

WHAT'S THE POINT IN RETURNING TO REGULAR ON-PREMISES<br />

WORK IF YOU CAN ALSO WORK REMOTELY IN THE CLOUD?<br />

BY HERBERT LÖRCH, REGIONAL VICE PRESIDENT, WESTERN<br />

EUROPE, M-FILES<br />

Proactively or reactively, many organisations<br />

have experienced a tremendous digital<br />

transformation in the past few months.<br />

Within a few days or weeks of the global<br />

pandemic starting, most employees have found<br />

themselves switching to remote work. Working<br />

from outside the office is the new normal. For<br />

many organisations, platforms such as<br />

Microsoft Office 365 or Google G Suite have<br />

been the means of choice. They are, without<br />

question, ideally suited to bring together<br />

distributed teams and enable collaborative work<br />

on documents and processes.<br />

Of course, not everything has gone<br />

smoothly, and many employees in IT<br />

departments and at service providers have<br />

had to work under incredible pressure, but on<br />

the whole, most companies were surprised at<br />

how quickly they have been able to adapt. In<br />

retrospect, the Corona pandemic might be<br />

seen as the necessary shock and catalyst for<br />

fast digitisation.<br />

Since then, many employees have felt<br />

inspired by new possibilities and have eagerly<br />

used the wide range of features and apps<br />

offered in Microsoft Teams as an example.<br />

What's the point in returning to regular onpremises<br />

work if you can also work remotely in<br />

the cloud? Why not use the vast array of new<br />

cloud apps instead of waiting for tedious IT<br />

projects? This genie is out of the bottle, and<br />

that's a good thing. Diversity enriches,<br />

flexibility makes agile - and the new role of IT<br />

is not to get the genie back in the bottle but<br />

to control it in such a way that maximum<br />

benefit and security is achieved.<br />

FIRST THE PARTY AND NOW THE<br />

HANGOVER<br />

But as with every great party, the first ones to<br />

it can be left with the biggest hangover. As<br />

flexible, modern, and user-friendly as the new<br />

cloud wizards are, they often offer little in the<br />

way of information governance and<br />

compliance - at least out of the box.<br />

This can be quickly explained using<br />

Microsoft Teams as an example. Teams is<br />

ideally suited for quick coordination and<br />

easy collaboration. However, it is a<br />

nightmare for the management of files and<br />

documents: with every new team created, an<br />

isolated SharePoint site with one directory per<br />

channel is created in the background to hold<br />

the files. Since changes - such as the<br />

renaming of channels - are not consistently<br />

propagated throughout, these structures<br />

inevitably diverge. Inconsistencies and<br />

duplicates are therefore pre-programmed.<br />

Not to mention that countless individual<br />

SharePoint sites with their own default rights<br />

and user structures can cause major issues in<br />

themselves regarding Governance, Risk &<br />

Compliance (GRC).<br />

Uniform rules for retention periods and<br />

archiving, audit trails with complete proof of<br />

access and changes, and automatic content<br />

classification are also missing. Of course,<br />

Microsoft also offers mechanisms here that<br />

would allow at least a rudimentary form of<br />

control. But they require a consistently planned<br />

procedure with clearly defined structures, rules,<br />

and roles - something which there was simply<br />

no time for at the peak of the lockdown.<br />

What has been described here for Microsoft<br />

Teams applies in a similar way to other<br />

popular new cloud services such as Microsoft<br />

OneDrive, Google G Suite, Google Drive,<br />

Dropbox etc. All these new platforms now<br />

enrich the already existing mix of storage in file<br />

systems, archives or DMS/ECM and ERP, CRM<br />

and SCM applications. In the new normality,<br />

the number of potential storage locations has<br />

suddenly multiplied massively. Control and<br />

GRC will certainly not become easier. If data<br />

protection and IT security officers were able to<br />

look the other way at the beginning of the<br />

crisis or, in case of doubt, weigh up in favour<br />

of maintaining business operations, they will<br />

clearly not be able to accept this as a<br />

permanent state of affairs.<br />

SOMEONE HAS TO CLEAN UP<br />

Things will not be able to remain as they are -<br />

but cleaning up is not very popular, and who<br />

wants to clean up when, even unintentionally,<br />

12 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: HYBRID WORKING<br />

new chaos is constantly being created? The<br />

solution is intelligent content services, which<br />

take over this task automatically or, even<br />

better, ensure in the background that no mess<br />

is created in the first place or that it can be<br />

ignored. To do this, they have to have two<br />

essential capabilities: flexibility in terms of the<br />

platforms used and artificial intelligence as the<br />

basis for automation.<br />

Within our M-Files platform, for example, it<br />

makes no difference whether a file is stored in<br />

the file system, in SharePoint, Dropbox or in<br />

our own repository, since there are standard<br />

connectors for each of these platforms. M-Files<br />

can use AI to automatically analyse the<br />

contents of the file, classify it and enrich it with<br />

metadata. For example, if M-Files determines<br />

that the information is confidential, it can<br />

transfer the file to its own repository and<br />

restrict access. Documents that must be<br />

retained can be archived accordingly.<br />

Duplicates are reliably recognised during<br />

storage and the user is notified accordingly.<br />

Versioning and check-in/check-out are also<br />

possible where the original storage does not<br />

provide for this.<br />

Figuratively speaking, M-Files cleans up after<br />

the party without the participants needing to<br />

do anything. This means that users can use a<br />

wide range of storage locations, from the<br />

familiar file system to new cloud services, and<br />

the Content Services ensure uniform handling<br />

of the files and documents stored there. Users<br />

can use the file as they wish via the cloud<br />

services, for example, even if it is located onpremises,<br />

and IT retains transparent control<br />

over the information assets.<br />

CONTEXT CREATES ADDED VALUE<br />

But intelligent content services can do much<br />

more. They are the key to truly intelligent<br />

information management. Any information<br />

becomes more valuable if it can be used in<br />

the right context. A project contract in itself is<br />

interesting, but it becomes much more<br />

valuable when it is linked to contextual<br />

information about the project content, the<br />

project team, the customer or similar projects.<br />

This is precisely what intelligent content<br />

services do automatically. Using AI techniques<br />

such as content analytics and natural<br />

language understanding, the content of<br />

documents is unlocked, and a context is<br />

created in the form of classification and links<br />

to other information.<br />

Due to the cross-platform approach, this<br />

context can also extend beyond system<br />

boundaries. For example, the sales<br />

department can work with Salesforce and the<br />

project team with Microsoft Teams and<br />

automatically exchange information. M-Files<br />

recognises a quote in Salesforce as such,<br />

assigns it to the correct project, and can offer<br />

it to teams as contextual information.<br />

Conversely, the project status report from<br />

SharePoint can be integrated into Salesforce,<br />

for example. All of this is mainly done<br />

automatically without any programming by<br />

universal mechanisms. Modern content<br />

services can be seamlessly embedded in a<br />

wide range of applications and cloud services<br />

and offer the user context, metadata and even<br />

comprehensive processes and workflows -<br />

without the users having to leave their<br />

favoured work environments.<br />

A UNIFIED ENVIRONMENT<br />

The automated production of context is like<br />

the super glue that holds all information<br />

together, even if it is distributed over many<br />

different systems. In this way, intelligent content<br />

services enable users to maintain an overview<br />

and recognise context in the brave new world<br />

of cloud services.<br />

The enormous impact of the corona crisis on<br />

digitisation must now be directed into the right<br />

channels. Freed from system constraints, users<br />

can access the cloud services that enable them<br />

to do their jobs in the best way possible. In the<br />

background, intelligent cloud services ensure<br />

that uniform rules for handling information are<br />

observed concerning governance, information<br />

security and compliance. The opportunity is<br />

there, let's make something of it. NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 13


OPINION: SSL CERTIFICATES<br />

THE VALUE OF SSL CERTIFICATES FOR ONLINE<br />

BUSINESSES<br />

SSL CERTIFICATES SHOULD PLAY A KEY ROLE IN ANY ONLINE<br />

SECURITY STRATEGY, ACCORDING TO BEN HASKEY, SECURITY<br />

AND COMPLIANCE MANAGER AT LCN.COM<br />

Research suggests almost a third of<br />

businesses that experience a<br />

cybersecurity breach will lose revenue<br />

as a result. So, it pays to take a proactive<br />

approach to securing confidential business<br />

data. Creating a secure online experience<br />

doesn't just protect against lost revenue,<br />

though. Successful businesses will also reap<br />

the rewards in brand reputability, consumer<br />

trust and avoidance of further financial losses<br />

through downtime or reactive repairs.<br />

SSL certificates should play a key role in any<br />

online security strategy. Here, we look at the<br />

benefits, not only in security but also in user<br />

experience and marketing performance.<br />

WHAT IS AN SSL CERTIFICATE?<br />

An SSL certificate is a confirmation that a<br />

website is protected by Secure Socket Layer<br />

(SSL) technology. It is designed to create safe<br />

online interactions by encrypting the<br />

connection between the user and the website<br />

host. This secure connection means any data<br />

can only be decrypted by either the website<br />

host or the user - so, ecommerce websites<br />

can safely accept payments, for example.<br />

However, if a hacker attempts to breach the<br />

website and steal confidential data, they'll<br />

only be able to access an encrypted key.<br />

There are different levels of validation in SSL<br />

certificates, providing an increasing scale of<br />

detail when it comes to security checks:<br />

Extended Validation SSL certificates (EV SSL)<br />

demand the most comprehensive<br />

background checks, including standard<br />

validity checks on the domain owner, plus<br />

additional audits to confirm the applicant has<br />

the authority to issue the certificate.<br />

Organisation Validated SSL (OV SSL)<br />

certificates require similar validity and<br />

background checks but on a lesser scale,<br />

while Domain Validated SSL (DV SSL)<br />

certificates check the validity of the domain<br />

owner, but without any further background<br />

checks. Website hosts will choose their SSL<br />

certificates based on the website's purpose,<br />

traffic and the scale of data it receives. For<br />

example, large ecommerce sites should invest<br />

in the most comprehensive checks, while<br />

personal blogs may just require a DV SSL<br />

certificate.<br />

THE BUSINESS BENEFITS<br />

Research suggest that three-quarters of online<br />

consumers would switch suppliers after just a<br />

single poor brand experience. So, businesses<br />

have an obligation to provide protection<br />

without compromising on the user experience.<br />

SSL technology gives consumers the<br />

confidence to enter payment details or<br />

complete data forms without the risk of data<br />

theft or fraud - providing the quick and<br />

effortless experience modern consumers<br />

demand. And for businesses, the benefits go<br />

further than just the prospect of improved<br />

brand trust and repeat custom. The website<br />

host is also protected against potential data<br />

breaches, so hackers are unable to access<br />

confidential information like passwords and<br />

website details.<br />

This prevents malicious activity and also<br />

saves businesses on the costs of downtime and<br />

repairs from the reactive security measures<br />

needed to recover from a breach. Plus, it helps<br />

businesses avoid the hidden costs of breaches,<br />

too, like the operational disruption that sees<br />

employees' time spent on intensive recovery<br />

tasks instead of their normal role.<br />

AN EFFECTIVE MARKETING TOOL<br />

As search engines strive to provide the best<br />

possible experience for users, it means a push<br />

towards the priority of secure and trustworthy<br />

websites in their rankings. The likes of<br />

Google are now favouring websites with SSL<br />

certificates, leaving unsecured websites at risk<br />

of missing out on a significant chunk of the<br />

93 percent of internet traffic that comes<br />

directly from search engines.<br />

For those still able to attract traffic, their users<br />

will be greeted with warning messages from<br />

the browser, that the site is unsafe. Plus, the<br />

website will display the outdated 'HTTP' prefix,<br />

instead of the trusted 'HTTPS'. The reality for<br />

those without SSL certificates will be decreased<br />

visibility and traffic and soaring bounce rates.<br />

So, secure technologies represent a costeffective<br />

solution when it comes to mitigating<br />

this impact. However, SSL certificates should<br />

simply mark the first step in a wider<br />

commitment to cybersecurity and user safety.<br />

To reap the rewards, businesses must build<br />

trust and authority among users by displaying<br />

'proof'. This may include links and logos for<br />

review profiles like TrustPilot or testimonial<br />

and case study pages. Additional visual<br />

cues, like client logos and accreditations<br />

such as award wins also provide instant<br />

validation for users. NC<br />

14 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


PRODUCT REVIEW<br />

Draytek VigorAP<br />

1060C<br />

PRODUCT REVIEW<br />

PRODUCT<br />

REVIEWPRODUCT RE<br />

The move to Wi-Fi 6 for businesses is<br />

gathering momentum and DrayTek steps<br />

into the arena with the VigorAP 1060C -<br />

its most powerful wireless access point (AP) to<br />

date. It stands out from the crowd as this 11ax<br />

AP combines an impressively high<br />

performance with three operational modes<br />

plus four management methods - and delivers<br />

it all at a price SMBs will love.<br />

The VigorAP 1060C is an AX3600 dualband<br />

AP delivering speeds of up to<br />

2,400Mbits/sec on its 5GHz radio and<br />

1,200Mbits/sec on the 2.4GHz radio. It's<br />

smarter than many other Wi-Fi 6 APs as it<br />

has a third radio dedicated to RF analytics<br />

and enhanced security as it uses it to detect<br />

rogue APs.<br />

As a standalone AP, it has a lot to offer as it's<br />

easily managed from a fully-featured web<br />

interface and presents up to eight SSIDs on<br />

each radio. It can also function as a simple<br />

range extender but DrayTek's mesh<br />

technology makes it even more versatile.<br />

Meshing allows you to create self-healing<br />

wireless networks using up to eight APs. One<br />

functions as a central mesh root while others<br />

are added as mesh nodes and take their<br />

settings from it to present one set of centrally<br />

managed SSIDs.<br />

Management features are unbeatable as the<br />

AP can be auto-provisioned using any<br />

DrayTek Vigor router that supports the Central<br />

AP Management (CAM) feature. DrayTek's<br />

free VigorConnect Windows app provides<br />

centralised on-site management facilities<br />

while wireless networks in geographically<br />

distributed sites can all be managed from<br />

one console with the optional VigorACS<br />

cloud service.<br />

The AP is easy to install in standalone<br />

mode as its web console's wizard sensibly<br />

requires the default admin password to be<br />

changed and offers the option to create two<br />

secure wireless networks. The console's<br />

dashboard is very informative as it provides a<br />

wealth of information on wireless networks<br />

including active clients and associations,<br />

traffic throughput for each SSID and AP<br />

system utilisation.<br />

Wireless security is excellent as each SSID<br />

can have their own encryption scheme which<br />

includes support for the stronger WPA3. You<br />

can enable SSID masking, limit the number of<br />

clients per radio or SSID, apply upload and<br />

download bandwidth limits to each SSID, and<br />

enable LAN and member isolation which<br />

stops wireless clients from accessing wired<br />

systems and other wireless clients on the<br />

same SSID.<br />

Meshing is just as simple to configure as you<br />

use the same quick-start wizard to select this<br />

mode and set the first AP as the root. Up to<br />

seven nodes can connect wirelessly to the<br />

mesh root using their 5GHz radio as a<br />

backhaul or they can be linked to it over<br />

longer wired connections.<br />

Mesh networks can be monitored and<br />

extended on-demand from the root AP's<br />

web console or DrayTek's Wireless mobile<br />

apps. You can spread your wireless network<br />

over a large area as nodes can connect to<br />

other nodes with up to three hops between<br />

them and the root AP and if any go down,<br />

clients transparently jump over the nearest<br />

active node.<br />

The VigorAP 1060C supports all key Wi-Fi<br />

6 technologies and delivered an impressive<br />

performance in the lab. Large file copies<br />

between a Windows 10 Pro workstation<br />

equipped with a Wi-Fi 6 PCI-E adapter card<br />

and a Windows server on the LAN averaged<br />

a speedy 104MB/sec at close range<br />

dropping to 94MB/sec when we moved the<br />

AP 10 metres away.<br />

SMBs ready to upgrade to Wi-Fi 6 will find<br />

DrayTek's VigorAP 1060C a great choice<br />

that's very easy to deploy. It provides good Wi-<br />

Fi 6 performance, offers a wealth of businessclass<br />

features including self-healing networks<br />

and delivers it all at an appealing price. NC<br />

Product: VigorAP 1060C<br />

Supplier: DrayTek<br />

Web site: www.draytek.co.uk<br />

Telephone: +44 (0)345 557 0007<br />

Price: £265 exc VAT<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 15


CASE STUDY: NORVADO<br />

LEADING THE FIELD<br />

NORVADO RELIES ON NETALLY'S ETHERSCOPE® NXG NETWORK ANALYZER TO CONDUCT COMPLETE<br />

AND ACCURATE REMOTE ASSESSMENTS, REDUCING THE TIME AND COST OF FIELD OPERATIONS<br />

Norvado is Northwest Wisconsin's<br />

premiere local broadband<br />

technology provider. Founded in<br />

1950, Norvado brings cutting-edge<br />

technology to Bayfield County, keeping<br />

communities connected, vibrant, and<br />

competitive with big-city offerings. In<br />

addition to providing industry-leading fiber<br />

optic high-speed Internet, Norvado sells,<br />

installs and maintains hosted PBX, managed<br />

network services, telephone and smart home<br />

systems, alarm/surveillance systems, and IP<br />

television services, and other products for<br />

residential, commercial, industrial and<br />

educational customers. An important part of<br />

the business is the pre-and post-installation<br />

assessment, which requires a complete and<br />

accurate evaluation of existing equipment<br />

and facilities.<br />

Without a thorough inventory of the<br />

environment, particularly in instances where<br />

critical details such as the IP scheme,<br />

number of servers and switches - possibly in<br />

hidden locations that are not easily<br />

uncovered by the Norvado pre-sales team -<br />

it becomes highly challenging to properly<br />

assess installation needs.<br />

"Often when we go onsite, we are taking over<br />

on-premises management from another<br />

company. In instances such as this, the client<br />

might not be technically minded and as a<br />

result, has little understanding of what's on their<br />

network or how it works. Sometimes we arrive<br />

onsite and find out the IT person responsible<br />

for the equipment has either left or now has<br />

other responsibilities, leaving no one with a<br />

clue about the infrastructure. This presents a<br />

real challenge for us because in such cases, we<br />

have to reverse engineer the environment to<br />

see what is there, so we can uncover their<br />

implementation needs. That becomes a time<br />

consuming and painstaking process,"<br />

explained Grant Kolwitz, Senior Customer<br />

Network Technician at Norvado.<br />

Adding to the challenge, Norvado recently<br />

acquired another regional broadband service<br />

provider. This new entity's experience with<br />

installing servers, networks and access points<br />

was somewhat limited, which necessitated<br />

Norvado's field team to travel as much as three<br />

hours each way to do a network inventory<br />

and/or Wi-Fi survey of a potential new client.<br />

This made the task of quoting a job more<br />

difficult. The Norvado field team recognised<br />

that a better assessment tool, one that could be<br />

16 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


CASE STUDY: NORVADO<br />

easily used by less technically skilled personnel,<br />

would be crucial in helping to keep up with the<br />

workload of their rapidly expanding business.<br />

SOLUTION<br />

Because the pre-sales survey assessment can<br />

be as varied as each client's individual network<br />

environments, Norvado needed a<br />

comprehensive testing tool that could be<br />

deployed to field team members. The NetAlly<br />

EtherScope® nXG all-in-one handheld<br />

network analyzer was chosen to enable sales,<br />

field engineers and technicians to conduct a<br />

wide-range of assessment tasks, from project<br />

planning, equipment inventory, coverage<br />

mapping, deployment, maintenance and<br />

documentation of clients' ever-changing Wi-Fi<br />

and Ethernet access networks.<br />

The EtherScope® nXG is used by Norvado's<br />

pre-sales teams to thoroughly assess the client<br />

environment and prevent unexpected surprises<br />

later in the project. About their use of the<br />

analyzer, Grant says, "Our pre-sales team is<br />

the first point of contact with the client, so we<br />

want them to be equipped with the right tools.<br />

Using the EtherScope nXG has allowed presales<br />

to gather a great deal of intel without<br />

field engineers having to intervene. All they<br />

have to do is either plug in or do a scan and<br />

collect the data. This tool is a game-changer."<br />

Grant went on to explain that because the<br />

EtherScope nXG tool was so thorough in<br />

collecting and assessing the environment, it<br />

meant field engineers didn't have to follow up<br />

with a second site visit. Pre-sales team<br />

members were also able to use the<br />

AirMapper Site Survey App within the<br />

EtherScope nXG tool to quickly and easily<br />

gather location-based Wi-Fi measurements<br />

and create visual heat maps of key<br />

performance. This was instrumental for project<br />

planning and developing an accurate quote<br />

for the installation.<br />

Once the quote is accepted and<br />

implementation is completed, field engineers<br />

use the EtherScope nXG to conduct a<br />

secondary scan to document everything that<br />

was done. This documentation is automatically<br />

uploaded via the complimentary Link-Live<br />

Cloud Service where it can be accessed,<br />

reviewed and shared as needed to verify the<br />

project was completed as specified.<br />

RESULTS<br />

Putting the EtherScope nXG in the hands of<br />

Norvado's pre-sales team has delivered<br />

significant time and cost savings for the<br />

business. "The total territory covered by our<br />

business can necessitate up to a three-hour<br />

drive to be onsite with a client. That's a lot of<br />

time in transit for field engineers such as myself.<br />

By giving the handheld EtherScope nXG<br />

network analyzer to our pre-sales team, they<br />

can conduct pre-assessment surveys and Wi-Fi<br />

heat mapping quickly and easily, eliminating<br />

the need for a follow-up trip to the site.<br />

The level of accuracy delivered by this tool<br />

ultimately saves us critical time and money,"<br />

explained Grant, adding that "the ability to<br />

create before and after documentation of the<br />

Wi-Fi coverage is extremely helpful when sitting<br />

down with the client. Now the field team can<br />

visually demonstrate the effectiveness of the<br />

implementation. Also, documentation, along<br />

with pictures, case notes and passwords, are<br />

uploaded to the Link-Live Cloud Service, where<br />

they are available to clients upon request".<br />

Grant concludes "The EtherScope nXG and<br />

AirMapper Site Survey App has made our<br />

pre-sales and field engineering teams far<br />

more efficient, minimising surprises, and<br />

getting a fuller, more complete picture of the<br />

environment. There are no other tools on the<br />

market that do for us what NetAlly's<br />

EtherScope nXG does. It makes our job<br />

easier and speeds up our assessments. That<br />

means we have more time to meet with<br />

clients, which in turn allows us to help grow<br />

the business." NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 17


OPINION: SD-WAN<br />

MAKING THE MOVE TO SD-WAN<br />

OLIVER WALLINGTON AT WIRELESS LOGIC EXPLAINS HOW SD-WAN CAN DRIVE BUSINESS<br />

CONTINUITY WITH RESILIENT AND RELIABLE CONNECTIVITY<br />

The IoT landscape has been rapidly<br />

evolving over the last decade, with<br />

new sectors and applications adopting<br />

the technology each year. However, the<br />

COVID-19 pandemic led to businesses<br />

requiring smarter and faster technologies to<br />

support satellite offices and distributed<br />

operations in the wake of lockdowns and<br />

social distancing guidelines imposed by<br />

governments worldwide.<br />

This new way of working means that<br />

companies now demand flexible and cost<br />

efficient network options to complement their<br />

cloud operations. Organisations are<br />

choosing to partner with Managed Service<br />

Providers (MSPs), Internet Service Providers<br />

(ISPs), or directly with IT Resellers to ensure<br />

business continuity is maintained across the<br />

organisation's increasingly complex network.<br />

Traditional WAN is becoming less<br />

prevalent due to its limitations in cloud<br />

environments, which can often hinder an<br />

organisation's growth capabilities. As a<br />

result, companies are deciding to refresh<br />

their WAN and increasingly considering SD-<br />

WAN as a solution for a variety of reasons,<br />

in line with (post-COVID) longer term<br />

requirements for managing distributed<br />

operations and<br />

employees across a wide area network.<br />

SD-WAN uses software to control the<br />

connectivity, management and services<br />

between several locations and a central<br />

network. It relies on different forms of<br />

underlay communication, such as MPLS or<br />

ADSL. In addition to fixed line connectivity,<br />

there are more and more projects now<br />

incorporating 4G and 5G as part of the SD-<br />

WAN connectivity piece, for seamless<br />

backup, an interim solution to reduce long<br />

lead times, and network resilience.<br />

REALISING THE BENEFITS OF SD-WAN<br />

AND THE ROLE OF LTE & 5G<br />

SD-WAN adoption was on the rise, even<br />

before COVID-19, but the global pandemic<br />

has accelerated business' digital<br />

transformation. This has resulted in<br />

organisations working with MSPs, ISPs and IT<br />

Resellers to ensure connectivity solutions that<br />

were deployed at the beginning of the<br />

pandemic are sustainable and reliable for the<br />

long term. SD-WAN provides WAN<br />

simplification, improved performance and<br />

lower costs, plus bandwidth efficiency and<br />

resilience by using different bearer services<br />

that minimise single points of failure across a<br />

wide area network.<br />

Furthermore, MSPs, ISPs, and IT Resellers<br />

are now able to unify public internet, LTE,<br />

private and 5G across a single, virtual and<br />

high-capacity SD-WAN solution. Cellular<br />

plays an important role in these deployments,<br />

acting in the first instance as a back-up to a<br />

fixed line, as well as providing the ability to<br />

rapidly deploy a connectivity solution where a<br />

fixed line is not available.<br />

Retailers in particular are deploying SD-<br />

WAN and 4G as a failover solution to ensure<br />

18 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: SD-WAN<br />

uptime, and that they are always alive to<br />

transact in stores when a fixed line goes<br />

down. SD-WAN's efficiencies can also benefit<br />

smaller deployments, such as satellite offices,<br />

and with critical applications such as voice<br />

and video. It can help choose the best path<br />

depending on latency, jitter and packet loss,<br />

and less critical applications can then be<br />

load balanced across multiple lines to better<br />

optimise bandwidth.<br />

MOVING TO SD-WAN<br />

Initiating an SD-WAN migration can<br />

introduce new risks to a business network,<br />

but there are a number of steps that<br />

companies can introduce to mitigate these<br />

challenges. One of the biggest<br />

considerations for businesses and their IT<br />

partners is security, and it must move in sync<br />

with the network. Cloud firewalls are no<br />

longer sufficient in today's increasingly<br />

connected marketplace, meaning that<br />

companies need to ensure tighter security<br />

features are deployed, configured and<br />

consolidated for employees to continue<br />

working productively, as well as removing<br />

potential cyber threats.<br />

Any SD-WAN security strategy that is<br />

developed and implemented must also be<br />

flexible and scalable enough to meet the<br />

organisation's future infrastructure<br />

requirements. What's more, ISPs, MSPs and IT<br />

Resellers can show commitment to IoT<br />

security, through regular training, monitoring<br />

and auditing for their customers. For<br />

instance, the ISO 27001 information security<br />

management accreditation demonstrates that<br />

the company takes the management of its<br />

customers' data seriously.<br />

Moreover, businesses and their IT partners<br />

have the challenge of selecting a cellular<br />

network provider. Network resilience and<br />

reliability are an important value proposition<br />

of SD-WAN, and they need to select cellular<br />

providers with the expertise to address<br />

challenges such as, which cellular network(s)<br />

to select for multi-site deployments, IP<br />

addressing and Network to Network<br />

Interfaces (NNI's), plus choosing the right<br />

tariff to fit each customer use case. The<br />

partners can also help navigate bandwidth<br />

management on the device and the need to<br />

proactively manage usage and bandwidth on<br />

the SIM.<br />

ISPs, MSPs and IT Resellers can partner with<br />

specialist IoT connectivity providers to<br />

navigate these challenges, as they deliver<br />

secure and resilient connectivity across<br />

multiple mobile cellular networks under one<br />

management platform and bill. Not only<br />

does this minimise complexity for businesses,<br />

but these experts have the relationships,<br />

knowledge and experience to effectively<br />

manage such processes, as well as navigate<br />

the complexity of providing multiple local<br />

mobile network profiles to our customers.<br />

ENABLING A NEW DIGITAL FUTURE<br />

As we move into our post-pandemic<br />

landscape, SD-WAN brings businesses muchneeded<br />

ROI by improving performance,<br />

efficiency and operational agility in the<br />

longer term. With cellular connectivity<br />

integrated into the solution, business leaders<br />

have peace of mind that a failover solution is<br />

available to ensure uptime, and that networks<br />

can be monitored or redirected as needed to<br />

improve application availability.<br />

For ISPs, MSPs and IT Resellers, they can<br />

bolster their SD-WAN propositions by adding<br />

a simple, secure and flexible 4G or 5G<br />

connectivity as a backup or as a primary<br />

connectivity solution, where a fixed line is not<br />

available, from an IoT managed service<br />

provider with expertise in the industry.<br />

Whilst SD-WAN delivers a number of<br />

benefits, organisations and their IT partners<br />

also need to consider the security<br />

implications, in addition to choosing the right<br />

network for their company. Nevertheless with<br />

the help of IoT connectivity providers and as<br />

more companies transition to SD-WAN, the<br />

migration process should become<br />

increasingly easier and more streamlined<br />

moving forward. NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 19


OPINION: IoT<br />

IoT AT THE EDGE<br />

PETER RUFFLEY, CEO OF ZIZO, EXPLAINS WHAT EDGE<br />

COMPUTING WILL MEAN FOR THE INTERNET OF THINGS<br />

Alot has been written about the IoT<br />

revolution and how the technology<br />

has the capability to revolutionise<br />

industries, transform productivity and<br />

unlock new levels of insight. But for those<br />

intrigued by the possibilities and looking<br />

to dip their toe in the water, the potential<br />

myths of high price point, infrastructure<br />

and connectivity challenges, as well as<br />

the required skill set can be significant<br />

hurdles that seem insurmountable.<br />

In addition, especially when it comes to<br />

the reality of industrial IoT, the cost, time<br />

and disruption that goes into a brand new<br />

facility - the prospect of having to rip and<br />

replace new infrastructure to support IoT -<br />

just isn't a viable option for many<br />

businesses. However, Edge IoT and<br />

analytics can provide a powerful<br />

mechanism for translating complex data<br />

sources into a streamlined, lower cost<br />

platform with faster return on<br />

investment and higher value.<br />

First let's consider some of the<br />

key challenges businesses face<br />

when considering an investment<br />

in IoT:<br />

INVESTMENT<br />

The transformational potential of<br />

IoT across multiple industries is<br />

staggering and much has been<br />

discussed about its power to<br />

revolutionise business models. But<br />

while the possibilities for market<br />

sectors are hugely exciting, the reality<br />

of many of these industry IoT solutions<br />

is that they are designed for vast use<br />

cases - the setups are intricate and<br />

complex, with incredibly powerful<br />

networking capabilities that require<br />

significant investment and skill to<br />

execute. In addition, the major players in<br />

the IoT space, including AWS and<br />

Microsoft, require huge upfront<br />

investment into IoT stacks and other<br />

hardware integrated into the data centre,<br />

as well as personnel who can code the<br />

solution, write it and build it - that's<br />

potentially hundreds of thousands of<br />

pounds even before any potential data or<br />

insight has been gained.<br />

Return on investment is something that<br />

has been lacking within the IoT space,<br />

causing proof of concepts to fail. When<br />

you consider one of the early use cases<br />

for IoT - smart meters - in that instance<br />

it's simple to work out the ROI as you<br />

don't have to send meter readers to sites,<br />

there is an immediate cost benefit. But<br />

with industrial IoT, it's much more than<br />

that. Perhaps it will expose some savings,<br />

maybe less machine maintenance will be<br />

required. Savings are harder to identify at<br />

the outset, therefore, large upfront<br />

investment in that kind of solution is<br />

difficult to justify under those<br />

circumstances.<br />

RIP AND REPLACE<br />

In a lot of industrial cases, the existing<br />

machinery that requires monitoring are<br />

large, complex and expensive structures.<br />

They are the ideal solution for the task at<br />

hand and for that reason they should not<br />

necessarily be interfered with, and<br />

instead be monitored in a non-invasive<br />

way. Many state of the art facilities have<br />

been designed and built at the cost of<br />

billions of pounds, you can't start ripping<br />

and replacing components because<br />

20 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: IoT<br />

cloud-enabled technology will provide a<br />

benefit that hasn't been quantified yet.<br />

Yet conversely, many of the IoT solutions<br />

out there from the major players in the<br />

market depend on being built in from the<br />

start - a concept which could result in<br />

significant business disruption and<br />

downtime.<br />

SKILL SET<br />

The skill set that is required to manage<br />

these types of complex setups is also a<br />

significant hurdle for many organisations.<br />

A high proportion of IoT customers in<br />

manufacturing are not necessarily ITsavvy<br />

in the way that traditional database<br />

users are, and with many providers<br />

requiring someone with the skills to<br />

effectively exploit these platforms, this is<br />

an issue that is damaging the chances of<br />

adoption in that sector. Can a business<br />

really afford to hire a dedicated IoT<br />

professional? How can they support the<br />

business in other ways outside of that<br />

role so they add as much value as<br />

possible?<br />

In reality, businesses need a way to get<br />

data out of the IoT devices without the<br />

complex ecosystem that surrounds them,<br />

through a streamlined platform that only<br />

needs a browser to access.<br />

INFRASTRUCTURE<br />

Another stumbling block for many IoT<br />

projects is that, where the infrastructure<br />

isn't developed, if the location is in an<br />

inconvenient place without reliable WiFi<br />

then the only clouds available are the<br />

ones floating in the sky. In this case,<br />

having an IoT solution that collects all<br />

the data, analyses it at the point of<br />

collection and enables rapid and reliable<br />

visibility of what's going on can make all<br />

the difference, and is a much more<br />

pragmatic solution, both in large<br />

factories and distant locations. That's the<br />

difference between the original vision of<br />

IoT, and what it actually is in practice.<br />

IoT AND EDGE COMPUTING<br />

The vision of IoT and the actual reality<br />

are very different. A yes or no response<br />

from a sensor is not the same as figuring<br />

out whether a complex piece of<br />

machinery is acting as it should and to<br />

optimum efficiency levels. It's not just<br />

about the opportunity to collect data, but<br />

also having the capability to modify that<br />

data collection, to add additional sensors<br />

to expand the data gathered even further.<br />

For example, it could be that the<br />

solution is monitoring temperature and<br />

speed, but actually, you also need to<br />

measure vibration. Another sensor is<br />

therefore required, so you need a<br />

platform that's adaptable and scalable. In<br />

the current industrial sector environment,<br />

you need to be flexible and ready to<br />

change in scale, both in terms of size and<br />

complexity of the data that is being<br />

gathered. With the concept of edge<br />

computing and analysing data where it is<br />

created fast gaining momentum,<br />

organisations are discovering how they<br />

can quickly access only the most valuable<br />

data, in real time, that will prove mission<br />

critical to their business.<br />

Coming back to the smart meter<br />

example, this type of IoT deployment<br />

involves millions of identical devices with<br />

the same data and a single purpose. It's<br />

still an investment, but the principle is<br />

simply connecting multiple homogeneous<br />

devices together. This is unlike today's<br />

industrial environment, where there could<br />

be a handful or even tens of thousands<br />

of different devices, all doing slightly<br />

different tasks in different ways. This<br />

specialised equipment therefore requires<br />

an IoT edge solution that can accurately<br />

translate, measure and analyse different<br />

formats of data in compatible and<br />

comparable data formats as it arrives,<br />

without having to rip and replace internal<br />

electronics of the machinery being<br />

measured.<br />

Edge computing enables data processing<br />

to be performed on the edge nodes prior<br />

to transmitting only the aggregated data to<br />

the central server. So instead of<br />

transmitting huge volumes of data every<br />

minute, this could be reduced to just a<br />

couple of messages every five minutes,<br />

depending on what is being measured and<br />

for what purpose. This results in a massive<br />

reduction in bandwidth and means that<br />

using the cellular network becomes cost<br />

effective, thereby reducing infrastructure<br />

costs and creating a quicker return on<br />

investment and value.<br />

For businesses looking to get started in<br />

IoT, the edge negates the need for a<br />

massively complex and costly<br />

deployment. Instead, it provides a simple<br />

entry capability to quickly get a project<br />

up and running, to provide data points<br />

and rapid insight into how a business can<br />

capitalise further with a data-led strategy<br />

- all at a reasonable price point.<br />

CONCLUSION<br />

While the vast capabilities of IoT<br />

deployments are widely publicised, many<br />

businesses are unfamiliar with the<br />

availability of simple, affordable entry IoT<br />

capabilities to provide data analysis<br />

down at the edge, where only the most<br />

valuable data collected will be shared<br />

and in real time, making the process<br />

more cost effective to the business.<br />

The big business solutions touted by the<br />

likes of AWS and Microsoft have their<br />

place, but for the majority of businesses<br />

without the huge use cases to warrant the<br />

dedicated attention and support from the<br />

major players, they will be left to their<br />

own devices to achieve their desired<br />

value. Instead, a small scale solution that<br />

incorporates big data, edge and IoT<br />

within a small footprint will actually have<br />

a significant impact - and one which is<br />

also easily scalable without having to<br />

overhaul existing infrastructure. NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 21


PRODUCT REVIEW<br />

Kemp Flowmon<br />

Collector<br />

PRODUCT REVIEW<br />

PRODUCT<br />

REVIEWPRODUCT RE<br />

Network traffic flow monitoring, analysis<br />

and reporting are essential tools for<br />

NetOps and SecOps teams as they<br />

provide the visibility needed to ensure their<br />

networks are running smoothly and securely.<br />

There are many products on the market but<br />

some are little more than a disparate<br />

collection of point solutions with no correlation<br />

across them.<br />

Kemp's Flowmon product family stands out as<br />

the entire portfolio can be managed from its<br />

Flowmon Monitoring Center (FMC). This<br />

provides a single pane of glass that both<br />

NetOps and SecOps can peer through to<br />

gather a wealth of information ranging from<br />

diagnostics, performance and capacity<br />

planning to incident investigation, cyber threat<br />

detection and encrypted traffic analysis.<br />

We are reviewing the Flowmon Collector<br />

appliance, which is a dedicated platform for<br />

the collection, long-term storage and<br />

analysis of NetFlow, IPFIX and sFlow data. It<br />

includes an integral Flowmon Probe which<br />

natively collects L2/L4 information, while<br />

Flowmon's IPFIX extension adds essential L7<br />

statistical data.<br />

The appliance is available as hardware<br />

rackmount models, can be deployed on cloud<br />

services such as AWS, Azure and Google<br />

Cloud Platform and virtualised on VMware,<br />

Hyper-V and KVM hosts. We opted for the<br />

VMware version, deployed the OVF template<br />

on our VMware vSphere host in five minutes<br />

and, to monitor all the lab's network traffic,<br />

moved the Probe monitoring ports to separate<br />

vSwitches and dedicated physical adapters with<br />

promiscuous mode enabled and connected to<br />

switch span ports.<br />

From the Flowmon Configuration Center<br />

(FCC) web console, we viewed the appliance's<br />

system and storage status and for the<br />

monitoring ports, ensured their flow export<br />

target was the local host. The Collector<br />

supports third-party flow generators which just<br />

need their target IP address set to the<br />

Collector's management ports.<br />

Once the Collector and Probe are configured<br />

to your requirements, flow storage quotas have<br />

been applied and management access<br />

secured, you can move over to the FMC<br />

console. From here, you can manage all flow<br />

sources, view traffic graphs for each one and<br />

drill down for more detailed information by<br />

selecting any part of the graphs.<br />

From the Analysis section, you view flow data<br />

graphs, choose a time slot and pick the<br />

channels and protocols you want to see. Right<br />

click on the portion of interest and a pop-up<br />

context menu offers 26 query options, ranging<br />

from IP-to-IP or port-to-port conversations and<br />

L7 applications to host OSs, VLAN labels and<br />

source or destination MAC addresses.<br />

FMC provides tools for creating email and<br />

SNMP trap alerts for specific events, viewing<br />

active devices (handy for spotting BYOD<br />

activity) and pulling up all details on VoIP calls.<br />

Reporting is extensive and we particularly liked<br />

the Chapters option, which combines profiles<br />

and source data channels to present<br />

information on anything from top talkers and<br />

problematic connections to L7 analysis for<br />

specific service usage.<br />

The Dashboard and Report console presents<br />

remarkable levels of information and its<br />

dashboard can be customised with an<br />

extensive range of widgets. It's incredibly easy<br />

to use and we had our first dashboard created<br />

without any reference to the manual.<br />

Adding new dashboard elements is a simple<br />

four-click process as the configuration page<br />

provides 34 predefined widgets ranging from<br />

service, mail and database protocols to<br />

operating systems, browsers, G-Suite and<br />

Microsoft 365. If you've created custom<br />

Channels from the FMC console, these will<br />

appear in the widget menu for addition to<br />

the dashboard.<br />

Kemp Flowmon is ideal for NetOps and<br />

SecOps teams as it amalgamates every<br />

network monitoring function into a single<br />

unified platform. The Flowmon Collector<br />

delivers complete visibility into network<br />

performance while security can be augmented<br />

with Kemp's Anomaly Detection System,<br />

Application Performance Monitoring and ondemand<br />

full packet capture analysis. NC<br />

Product: Flowmon Collector<br />

Supplier: Kemp Technologies<br />

Web site: www.flowmon.com<br />

Sales: sales@kemp.ax<br />

22 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


NETWORKcomputing<br />

We introduced the Network Computing "Masterclass" into the magazine a few years back. A<br />

Masterclass series in the magazine run for at least a year. Some have successfully run for longer. This<br />

concept enables us, with the help of a an expert vendor, to cover a subject area in a far more<br />

detailed way than could ever be covered in a single article. We feel that the Masterclasses we have<br />

carried have done a valuable job in guiding readers through many of the issues that they need to be<br />

aware of - issues that are perhaps not being talked about elsewhere. Vendor branding appears on<br />

the Masterclass page to distinguish a Masterclass article from the many "one-off" articles that we<br />

carry in Network Computing.<br />

We have identified a number of key subject areas which we feel would benefit from a Masterclass.<br />

These are:<br />

Network Testing and Monitoring<br />

Cabling and cable management<br />

Network access control<br />

Powering a Network<br />

The transition to unified comms<br />

Desktop virtualisation<br />

Traffic management<br />

Using a Data Centre<br />

Advantages and challenges of relying on an increasingly mobile workforce<br />

Cloud security<br />

Education and training<br />

If any of these subject areas are to be covered in a Masterclass we will be<br />

seeking a Partner to work with. A Masterclass Partner will ideally be a vendor<br />

with a track record of expertise in the particular area. Are you a vendor<br />

who could help us in launching a Masterclass covering one of the subjects<br />

listed above ? Alternatively, could you recommend an organisation who<br />

could help us ? Your suggestions will be very welcome.<br />

Please contact david.bonner@btc.co.uk


SECURITY UPDATE<br />

I.T. IS THE NEW VIP<br />

I.T. TEAMS MUST HAVE A<br />

BIGGER SEAT, AND BUDGET, AT<br />

THE BOARDROOM TABLE,<br />

ACCORDING TO ANDREA<br />

BABBS, GENERAL MANAGER,<br />

VIPRE SECURITY UK AND<br />

IRELAND<br />

The cyber threat continues to grow<br />

and evolve, with the number of<br />

attacks increasing year-on-year. As<br />

cunning hackers take advantage of the<br />

ongoing pandemic by targeting remote<br />

workforces, businesses are forced to<br />

contend not only with this increased<br />

security risk, but also furloughed staff,<br />

social distancing restrictions and a<br />

turbulent economic market.<br />

But while in survival mode, cybersecurity<br />

can often slip down businesses' priority<br />

lists. The last twelve months have<br />

arguably been the most challenging times<br />

for businesses of all sizes, but efforts<br />

invested to keep the business afloat will<br />

be useless if the back door to their<br />

network is left open for cybercriminals. To<br />

combat this, IT teams must have a bigger<br />

seat, and budget, at the boardroom<br />

table, while embedding their<br />

cybersecurity efforts across all<br />

departments of the business.<br />

MANAGING PRIORITIES<br />

Cybersecurity must remain a priority at all<br />

times for businesses, even in challenging<br />

times, despite COVID-19 stretching many<br />

organisations' IT and/or cybersecurity<br />

teams to the maximum. However,<br />

managing and surviving throughout the<br />

pandemic alone has remained the prime<br />

concern, as 84% of businesses and 80%<br />

of charities revealed that COVID-19 has<br />

made no changes to the importance they<br />

24 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


SECURITY UPDATE<br />

place on cybersecurity. That businesses<br />

still aren't prioritising cybersecurity despite<br />

an increased cyber threat level and more<br />

sophisticated hacking incidents taking<br />

place is surprising.<br />

The main hurdle the majority of<br />

businesses are facing at the moment is<br />

losses in revenue, meaning they may not<br />

have the budget to invest more heavily in<br />

cybersecurity - which is supported by a<br />

recent survey that found that 79% of<br />

organisations expect cybersecurity budgets<br />

to be impacted in the next six months, if<br />

not sooner. Yet, in order to succeed in the<br />

post-COVID-19 era, security must be at<br />

the top of the business agenda, not only<br />

to keep business data safe, but also to<br />

maintain business continuity and protect<br />

against emerging cyber threats.<br />

HUMAN ERROR<br />

We've all sent an email to the wrong<br />

person, but this mistake has the potential<br />

to put the whole company at risk. Whether<br />

it is sharing the incorrect attachment, or<br />

adding the wrong recipient to an email<br />

thread, once an employee clicks send, it<br />

is often out of the business' control to<br />

know whether this information will end up<br />

in the wrong hands without specific DLP<br />

rules, policies or tools in place.<br />

With so much communication reliant<br />

upon email, human error is the main<br />

cause of data breaches. Humans make<br />

mistakes, and with additional pressures<br />

from the ongoing pandemic such as<br />

working from home, surrounded by<br />

potential distractions, these errors are<br />

now even more likely to occur. But this is<br />

also due to a lack of awareness and<br />

training, and with the number of cyber<br />

attacks not slowing down, giving IT teams<br />

a bigger seat at the table, and a slice of<br />

the budget, will help to increase employee<br />

awareness and improve email culture<br />

throughout an organisation, at a time<br />

when mistakes can so easily be made.<br />

A MULTI-LAYERED DEFENCE<br />

Many organisations have not yet taken the<br />

essential steps to properly integrate<br />

cybersecurity into their general operations<br />

- despite a rising number of cyber attacks<br />

across all businesses, with 88% of UK<br />

companies having suffered a breach in the<br />

last 12 months. A cybersecurity strategy is<br />

most effective when it has multiple layers<br />

and is deployed consistently from the<br />

beginning, not as a once-a-year tick box<br />

review or training exercise.<br />

By deploying a multi-layered, securityfirst<br />

and awareness-first defence strategy,<br />

including the basic foundations of email,<br />

endpoint and web security alongside the<br />

emerging necessities of security awareness<br />

training, remote working zero-trust network<br />

access tools and other user-first solutions,<br />

businesses can secure their operations<br />

both internally and externally.<br />

Technology plays a crucial role in<br />

ensuring business data is kept safe, but so<br />

do educating and alerting employees for<br />

potential threats in real-time.<br />

Implementing innovative solutions that<br />

prompt employees to double-check emails<br />

before they send them can help reduce the<br />

risk of sharing the wrong information with<br />

the wrong individual, while enabling users<br />

to make more informed decisions and<br />

reinforcing compliance credentials.<br />

SHARING RESPONSIBILITY<br />

In order to create an effective cybersecurity<br />

strategy, the 'us vs. them' mentality must be<br />

shifted. It is not just the IT department's<br />

duty to keep the organisation secure.<br />

Instead, this issue must be prioritised in<br />

every department across the business - as<br />

every end user and team have something<br />

valuable at stake.<br />

All employees are responsible for<br />

playing a part in keeping business data<br />

safe and they should be actively recruited<br />

into this role from the beginning - the<br />

stakes are too high for businesses to not<br />

take advantage of all available resources<br />

and personnel.<br />

Business collaboration plays a vital part<br />

in this approach. In addition to educating<br />

employees and ingraining 'cybersecurity<br />

first' as part of the culture, the IT defence<br />

strategy must be embedded across all<br />

areas of the business, including HR,<br />

customer service and finance, for example.<br />

The potential consequences of a data<br />

breach must be explained, such as the<br />

financial repercussions, loss of customers<br />

and tarnished business reputation - real,<br />

revenue-impacting consequences.<br />

By having a workforce that is mindful and<br />

understands the responsibilities they have<br />

on the front line of defence, companies<br />

can ensure that everything they do is<br />

underpinned by both user education, and a<br />

robust and secure IT security infrastructure.<br />

CONCLUSION<br />

The final decision to click the link, send<br />

the sensitive information or download the<br />

file, lies with the user. But by ensuring that<br />

a strong and secure cybersecurity culture is<br />

instilled from the top of the business to the<br />

bottom, company assets can be kept safe,<br />

and the risk of successful cyber attacks can<br />

be reduced.<br />

IT teams are the foundation of creating<br />

and deploying the right cyber defence<br />

strategy, but unless they are given a priority<br />

seat at the table during these crucial times,<br />

the value of their approach might go<br />

unheeded. The responsibility of keeping<br />

information safe applies to all levels, from<br />

CEO to apprentice, but until a business has<br />

the basics right and takes on a 'security-first'<br />

approach, the risk still remains. Yet, the<br />

difference between a trained and an<br />

uneducated workforce could mean the<br />

difference between an organisation<br />

surviving a cyber attack, or suffering the<br />

devastating consequences. NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 25


OPINION: TRAINING<br />

THE TIMES ARE CHANGING FOR TECH<br />

TRAINING<br />

A "NEW NORMAL" IS COMING IN TECH - AND WE NEED TO MAKE<br />

SURE IT'S TRULY DIFFERENT THIS TIME. GRAHAM HUNTER AT<br />

COMPTIA EXPLAINS WHY<br />

As the U.S. and Europe take stock of<br />

exactly what happened during the last<br />

year and what it means, all sectors are<br />

eagerly looking ahead to define what their<br />

"new normal" looks like. From inescapable<br />

cybersecurity challenges requiring a more<br />

widespread and unified government and<br />

business response, to remote work becoming<br />

ubiquitous, I'm convinced that the working<br />

world is - like it or not - going to look very<br />

different one or two years from now.<br />

I hope that part of embracing a new normal,<br />

especially for the tech world, means that we will<br />

grow more open and willing to embrace<br />

employees and talent from all walks of life.<br />

That we will be willing to hire from talent pools<br />

outside of degree-holders, and that we will<br />

embrace the vision and leadership of people<br />

who are, frankly, not just white men.<br />

Our hiring practices in tech have long needed<br />

examining, as have the values and norms we<br />

seek from people in positions of leadership. It is<br />

not inconceivable to say that the woefully<br />

under-diverse makeup of tech firms and the<br />

instances and severity of cybersecurity attacks<br />

on all types of organisation being on the rise<br />

are linked. Our sector is screaming out for<br />

fresh perspectives on existing challenges, and<br />

on the challenges we don't even know about<br />

yet. Hiring people from the same pools and<br />

networks time and time again isn't going to<br />

help. We need to embrace different pathways,<br />

different voices, and different leadership.<br />

There has been a lack of representation in the<br />

tech sector for far too long. In 2018, just 8.5%<br />

of senior executives in tech were from black,<br />

Asian, minority ethnic (BAME) backgrounds.<br />

Less than 15% of all senior tech leaders were<br />

women. Yet more than a third (35%) of board<br />

members and over a quarter (26%) of senior<br />

execs from top tech firms attended Oxbridge<br />

universities. That's compared to just 1% of the<br />

population. I'll make a "bold" assertion here<br />

and insist that it's not because this tiny pool of<br />

Oxbridge graduates are more talented or gifted<br />

in tech than people from other walks of life.<br />

REAL CHANGE IS ABOUT MORE THAN<br />

JUST HIRING PRACTICES<br />

Real change must go deeper than just hiring<br />

more diverse people and believing that's the<br />

end of it. Following a summer of racially<br />

motivated civil unrest in the U.S. in 2020,<br />

Google tech leaders vowed to hire more<br />

black tech workers. While they did that,<br />

recent coverage points to high attrition<br />

among those workers and low representation<br />

at the highest levels, highlighting that the<br />

culture of embracing diversity in more than<br />

26 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: TRAINING<br />

just name may be deeply lacking.<br />

In my mind, the long-term answer is in how<br />

we train, mentor, support, and value the people<br />

we bring into the fold. Perhaps most critically,<br />

training plays an increasingly important role in<br />

ensuring that workers feel ready to tackle the<br />

challenges they face, while understanding that<br />

their employer has made an ongoing<br />

investment in their success. More and more<br />

companies are making an investment in<br />

industry recognised certifications that act as a<br />

gold seal of approval of their employees'<br />

knowledge and ability. This kind of level-setting<br />

is critical for tech workers, at a time when so<br />

many businesses struggle to comprehend and<br />

prepare for the new threats and tech<br />

challenges of the day.<br />

NEW PATHWAYS & THE ONLINE<br />

MODALITY HOLD DEMOCRATISING<br />

POWER<br />

The case for stronger diversity and better<br />

pathways to employment for underrepresented<br />

groups is more than just tokenism. Diverse<br />

businesses largely perform better. McKinsey<br />

research shows that companies with more<br />

gender diversity are 25% more likely to have<br />

above-average profitability. Similarly,<br />

companies with greater ethnic and cultural<br />

diversity far outperform in profitability those that<br />

remain homogenous. The days of an elitist tech<br />

workforce full of people with degrees from the<br />

same universities are - both by choice and<br />

necessity - coming to an end. It's time we<br />

embrace the new non-degree pathways that<br />

are emerging, and that means welcoming new<br />

voices, faces and perspectives into the fold.<br />

Non-degree pathways such as<br />

apprenticeships hold real promise for<br />

improving retention at tech firms (in the U.S., for<br />

example, Department of Labor data shows that<br />

94% of apprentices stay on after their program<br />

ends), and for bringing long-term diversity to<br />

organisations. When prospective employees<br />

are told in no uncertain terms that tech firms<br />

aren't just looking for Oxbridge/Ivy Leagueeducated<br />

candidates to join their ranks, they<br />

have an incentive to put their foot forward and<br />

try. And once in the fold of something like an<br />

apprenticeship, trainees receive mentorship and<br />

guidance that sets them up for success.<br />

Being paid to attend and learn on the job<br />

also ensures that new hires - even those from<br />

socioeconomically disadvantaged<br />

backgrounds - understand their value and<br />

have the financial incentive to continue<br />

working. Similarly, upskilling and certifying<br />

current staff goes a long way to boost morale,<br />

performance and retention.<br />

The new opportunities we create for workers<br />

must be accessible and realistic, regardless of<br />

specific pathways to employment. For many<br />

people, that will involve learning and training<br />

online. It has for long been foregone that<br />

trainees and new hires will have the means to<br />

commute into a classroom or an office, even<br />

with all the hidden costs involved, and even<br />

when the jobs offer none or unsustainable pay.<br />

This has been particularly exclusionary for<br />

people of colour, women (mothers in<br />

particular), and those with disabilities. It is also<br />

a reality for many people of diverse<br />

backgrounds that in-person settings are more<br />

intimidating, whether because of language and<br />

communication barriers, perceived or real<br />

differences in belief system or values, physical<br />

or learning disabilities, and more.<br />

Online learning isn't a solution for workplace<br />

issues, but it must be embraced as part of a<br />

new normal, with an eye to democratising -<br />

and removing the fear factor from - training<br />

and the workforce. NC<br />

If you are interested in learning more about<br />

CompTIA training and certification options for<br />

teams please send an email to<br />

info_UK@comptia.org to request a call from<br />

the team.<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 27


PRODUCT REVIEW<br />

DrayTek Vigor<br />

2927Lac<br />

PRODUCT REVIEW<br />

PRODUCT<br />

REVIEWPRODUCT RE<br />

DrayTek's Vigor 2927Lac router is ideally<br />

suited to SMBs and remote workers<br />

that can't afford any internet downtime.<br />

It offers a wealth of WAN redundancy features<br />

with dual Gigabit WAN ports supporting<br />

failover and load balancing plus an internal<br />

4G LTE modem with dual SIM slots for primary<br />

and backup connections to mobile networks -<br />

you can even use its USB port to add another<br />

4G modem.<br />

Network security is another strength as it<br />

provides a powerful SPI firewall along with<br />

application controls and optional web content<br />

filtering. It's ideal if you have remote workers<br />

requiring secure access to network resources<br />

as the price includes support for 50 IPsec VPN<br />

tunnels plus 25 SSL VPNs and facilities to<br />

create 16 hardware accelerated IPsec VPNs.<br />

The Vigor 2927Lac is even more versatile as<br />

it delivers concurrent 2.4GHz and 5GHz 11ac<br />

wireless services. What's more, the router runs<br />

DrayTek's Central AP Management (CAM)<br />

service which discovers and provisions up to<br />

20 DrayTek VigorAP wireless APs with the next<br />

firmware upgrade allowing it to function as the<br />

root node in a meshed wireless network.<br />

The router presents seven Gigabit network<br />

ports where the sixth can be used for LAN or<br />

WAN duties. Redundancy features keep on<br />

coming as two routers can be deployed in a<br />

high availability configuration where they<br />

share a virtual IP address and can be set to<br />

hot-standby or active-standby modes.<br />

SMBs won't have any problems deploying the<br />

router as its web console provides wizards for<br />

securing admin access, configuring internet<br />

access and setting up client or site-to-site<br />

VPNs. More wizards are provided for enabling<br />

the various optional security services and<br />

creating wireless networks.<br />

Protection starts immediately as the firewall<br />

has a default security policy already activated<br />

which you can modify with other rules and<br />

filters that define traffic directions, sources<br />

and destinations, protocols and block or pass<br />

actions. Internet redundancy is equally easy<br />

to configure as you define multiple WAN<br />

connections and decide whether to have<br />

them running in active/backup mode or all<br />

active, where the router load balances traffic<br />

across them.<br />

The basic URL filtering service uses keywords<br />

to block access to specific web sites. For more<br />

granular browsing control, DrayTek offers a<br />

free 30-day trial of the Cyren GlobalView<br />

service which allows up to 65 web categories<br />

to be blocked or allowed using profiles and if<br />

you like what you see, it only costs £21 per<br />

year to activate.<br />

Application controls are free on registration<br />

and offer a list of over 130 apps and<br />

protocols, Categories are provided for Apple,<br />

Google and Amazon web services and if you<br />

want Facebook out of the office, just create<br />

an enforcement rule for it and block all<br />

further access.<br />

Wireless services are extensive as each radio<br />

can present up to four virtual SSIDs each with<br />

their own encryption scheme. You can apply a<br />

schedule to each one to control when they are<br />

active, set upload and download bandwidth<br />

usage restrictions and apply station controls to<br />

limit client connections times.<br />

Wireless hotspot services forward LAN and<br />

wireless clients to a web page with an<br />

acceptable use policy which they must agree<br />

to before receiving internet access. Even<br />

better, they can authenticate with their<br />

Facebook or Google credentials and the<br />

router can send them a unique PIN via SMS<br />

to the mobile number they enter in the<br />

landing page.<br />

The Vigor 2927Lac router clearly shows why<br />

DrayTek is the go-to vendor for SMBs that<br />

want the best WAN redundancy. It delivers an<br />

impressive range of security features at a very<br />

affordable price and its integral wireless<br />

network and hotspot services make it even<br />

more appealing. NC<br />

Product: Vigor 2927Lac<br />

Supplier: DrayTek<br />

Web site: www.draytek.co.uk<br />

Telephone: +44 (0)345 557 0007<br />

Price: £355 exc VAT<br />

28 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


SECURITY UPDATE<br />

SECURING DISPERSED NETWORKS IN THE ERA OF HYBRID WORK<br />

RODNEY JOFFE, SVP AND FELLOW, NEUSTAR AND CHAIRMAN OF THE NEUSTAR<br />

INTERNATIONAL SECURITY COUNCIL, EXAMINES HOW OUR NEW ERA OF WORK<br />

IS HIGHLIGHTING THE NEED TO STRENGTHEN NETWORK SECURITY<br />

Recent data from the Neustar International<br />

Security Council (NISC) found that the<br />

majority (61%) of cybersecurity<br />

professionals reported either significant or<br />

moderate downtime or disruption in the first six<br />

months of the COVID-19 pandemic, due to<br />

the mass shift to remote work.<br />

A certain amount of this disturbance can be<br />

linked directly back to the level of change that<br />

was necessary to accommodate staff working<br />

from home, but there are also other influencing<br />

factors. Unfortunately, while organisations were<br />

busy ensuring their digital networks were able<br />

to continue operating across all touchpoints,<br />

cybercriminals were capitalising on the disorder<br />

for their own gain.<br />

Although we expected to see a spike in<br />

malicious activity while businesses were<br />

getting to grips with new ways of working, it<br />

has become much more than just a<br />

pandemic problem.<br />

NETWORK WOES<br />

It's now been over a year since organisations<br />

were forced to implement mass remote<br />

working models and, during that time,<br />

businesses have adapted as necessary. In<br />

contempt of initial challenges, the roll-out of<br />

numerous modern technologies has<br />

established a new standard for network<br />

security. Or so we thought.<br />

Despite having made these enhancements to<br />

their security stack, more than half of<br />

businesses (54%) admitted to still experiencing<br />

network security issues, six months after the<br />

pandemic began. While organisations have<br />

been brushing up on their defences,<br />

cybercriminals have been doing the same -<br />

using the time to sharpen their skills and find<br />

new ways to exploit weak network links; so far<br />

this year we've seen some of the largest and<br />

most powerful attacks on universities,<br />

healthcare networks and national critical<br />

infrastructure.<br />

Just a few months ago, the largest fuel<br />

pipeline in the U.S was subject to a hack that<br />

led to shortages across the East Coast.<br />

Attackers gained access to the networks of<br />

Colonial Pipeline Co. through a virtual private<br />

network account, which allowed employees to<br />

remotely access the company's computer<br />

network. Although the VPN account was no<br />

longer in use at the time of the attack, hackers<br />

were able to breach Colonial Pipeline's entire<br />

network using just a compromised username<br />

and password.<br />

The Colonial Pipeline attack is just one<br />

example of how determined cybercriminals are<br />

targeting weak points in networks to cause<br />

disruption and, in some cases, demand<br />

ransom. Regardless of how businesses have<br />

already improved their security since the<br />

pandemic began, the most important<br />

realisation is that there is still more to be done.<br />

It is essential, therefore, that organisations<br />

determine the vulnerabilities in their networks<br />

today and proactively plan to strengthen them.<br />

OUT OF OFFICE RISKS<br />

With many businesses planning to either<br />

remain remote or implement a hybrid working<br />

model, end-to-end network security will<br />

continue to be business critical. At the<br />

beginning of the pandemic, a major hurdle<br />

appeared because many companies did not<br />

provide computers for employees working from<br />

home prior to COVID-19, instead asking that<br />

they work from their own devices. This became<br />

immediately problematic for a few key reasons.<br />

Firstly, security controls on personal devices<br />

are not the same as those on work devices.<br />

Secondly, it leads to blurred lines between<br />

professional and personal use - there is no<br />

logical separation between using the same<br />

device to work, watch Netflix, and shop online.<br />

Employees using personal devices also<br />

complicates the use of VPNs, as most VPN<br />

software deployed establishes a VPN only for<br />

the specific business application. A VPN that<br />

connects to the company but comes from a<br />

machine that doesn't have an insulated<br />

virtualisation operating system can result in<br />

multiple cases of bleed over. In fact, there is a<br />

large group of malwares that benefits from<br />

crossing that membrane within a machine.<br />

PREPARING TO GO HYBRID<br />

The new era of work is highlighting the need<br />

for organisations to invest more in<br />

strengthening their network security, and it<br />

seems the majority are already taking action.<br />

Recent research from the NISC revealed that<br />

79% of organisations have enhanced the<br />

security of their corporate VPNs over the last<br />

year, while 89% of security professionals said<br />

the challenges posed by the pandemic have<br />

boosted their organisation's network security<br />

against potential future attacks.<br />

Nevertheless, there is still more to be done.<br />

After gaining a better understanding of the<br />

vulnerabilities in their networks, businesses<br />

must turn their attention to always-on<br />

monitoring and mitigation solutions. As<br />

cybercriminals work to spot weak links in<br />

networks, businesses need to know that they<br />

have 24/7 protection. Only then can they have<br />

true peace of mind that they are doing<br />

everything they can to protect their network,<br />

and their organisation. NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 29


OPINION: DATA LAKES<br />

DON'T LET YOUR DATA LAKES DECAY INTO DATA SWAMPS<br />

GRACE LIU, SENIOR VP OF IT STRATEGY AND GLOBAL APPLICATIONS, SEAGATE TECHNOLOGY<br />

SUGGESTS FOUR WAYS TO KEEP ENTERPRISE DATA LAKES VIBRANT AND INSIGHTFUL<br />

Data remains an intangible asset on<br />

most companies' balance sheets -<br />

and its value is too often<br />

indeterminable and not fully tapped.<br />

Figures compiled by IDC for Seagate's<br />

Rethink Data report estimate only 32% of<br />

data available to enterprises is fully<br />

leveraged, with the remaining 68%<br />

untapped and unused.<br />

To extract the most value from the data,<br />

companies are increasingly turning to<br />

constructing cloud-based 'data lakes' - a<br />

platform that centralises all types of data<br />

storage. It provides elastic storage<br />

capacity and flexible I/O throughput,<br />

covering different data sources, and<br />

supporting multiple computing and<br />

analytics engines.<br />

A data lake can be hundreds of<br />

petabytes in size, or even larger. A big risk<br />

therefore in any data lake project is that -<br />

if left unattended - it could turn into a<br />

data swamp; a repository where<br />

unleveraged yet potentially useful data<br />

sits dormant on storage media. It risks<br />

becoming a massive, mostly idle swamp<br />

of 'sunk' data that is completely<br />

inaccessible to end users - a waste.<br />

To keep data lakes from morphing into<br />

swamps - and keep them fresh, vibrant,<br />

and full of insights - CIOs, CTOs, and<br />

data architects should implement the<br />

following four points.<br />

1. Have a clear vision of the business<br />

problem you're trying to solve<br />

With a clearly-defined objective in mind,<br />

it should be relatively straightforward to<br />

target the data you need to collect, and<br />

the best machine learning techniques for<br />

gleaning insight from that data. Most<br />

business outcomes can be improved by<br />

an investment in storage infrastructure.<br />

In advertising, a data lake analytics<br />

engine can be leveraged to run advertising<br />

campaigns accurately by reaching the<br />

correct groups of people through the right<br />

channels. A data lake can be used to<br />

perform data collection, storage, and<br />

analytics across the full life cycle of data<br />

management. By doing so, Yeahmobi, a<br />

Chinese marketing services company, has<br />

successfully reduced its overall operating<br />

costs by approximately 50%.<br />

In the manufacturing sector, data lakes<br />

have been used to improve the yield<br />

rates, through the integration of an<br />

artificial intelligence (AI) algorithm, deep<br />

30 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: DATA LAKES<br />

learning, and the related manufacturing<br />

parameters.<br />

For the above to work effectively, it is<br />

important that new data is constantly<br />

introduced into the data lake so optimal<br />

results can be extracted with the right<br />

software applications.<br />

2. Capture and store all the information<br />

you can<br />

Organisations need to be able to capture<br />

the right data, identify it, store it where it<br />

is needed, and provide it to decision<br />

makers in a usable way. Activating data -<br />

putting it to use - starts with data capture.<br />

Given the overwhelming growth of data<br />

due to the proliferation of IoT applications<br />

and 5G deployments, enterprises cannot<br />

keep up and do not currently capture all<br />

available data. But increasingly<br />

enterprises are learning to capture and<br />

save as much data as they can in order<br />

not to miss out on its complete value: the<br />

value that's there today and the value that<br />

will come alive in the use cases of<br />

tomorrow. If the data is not stored, this<br />

value never materialises.<br />

In the early days of data lakes, it was<br />

the power user who had the ability to dive<br />

in, swim in the lake and find the right<br />

data. Nowadays Structured Query<br />

Language (SQL) has made big inroads<br />

into the data lake and given ordinary<br />

users more access to the data. For these<br />

users the focus is more on outcomes, with<br />

AI and machine learning (ML) being<br />

introduced to sift through the data and<br />

look for patterns. ML now gives rise to<br />

near real-time analytics, advanced<br />

analytics, and visualisation.<br />

The data lake landscape has evolved<br />

rapidly, with an emphasis much more on<br />

turning the right data into value.<br />

Transferring data to a well-managed<br />

cloud storage service helps companies<br />

move data generated daily by their<br />

businesses into a scalable data<br />

architecture. For example, Twitter<br />

transferred 300 PB of data to the Google<br />

Cloud Storage service. Transferring that<br />

much data via the network took months<br />

to complete, but businesses can find<br />

faster methods of moving this.<br />

3. Periodically evaluate the data<br />

Data lakes need auditing and refreshing.<br />

Enterprises should review the datasets<br />

they're managing in a cloud-based data<br />

lake - or they will find that the data lake<br />

becomes increasingly harder (muddier) to<br />

use. Worse yet, the organisation's data<br />

scientists will find it more difficult - if not<br />

impossible - to find the patterns they're<br />

searching for in the data.<br />

The use of cloud storage services, along<br />

with AI and automation software, is<br />

expected to have the most impact on<br />

making massive data lakes more<br />

manageable. It remains the magical<br />

solution for ploughing through the<br />

information. The best way to do this is to<br />

pick a data set, select a machine learning<br />

technique to go through it, and then<br />

apply it to others once a favourable result<br />

has been achieved. For example, in fraud<br />

detection in a bank, AI-based systems are<br />

being designed to learn what type of<br />

transactions are fraudulent based on<br />

frequency of transactions, transaction size<br />

and type of retailer.<br />

Data that has aged or is no longer<br />

relevant can be transferred to another<br />

repository where it can be retained. You<br />

never know when that data may offer<br />

new, yet-undiscovered value. To do so, an<br />

enterprise can, again, use a data<br />

movement service designed to move<br />

massive amounts of data across private,<br />

public, or hybrid-cloud environments.<br />

Such services deliver fast, simple, and<br />

secure edge storage and data transfers<br />

that can accelerate time to insights.<br />

4. Engage mass data operations<br />

Mass data operations, or DataOps, are<br />

defined by IDC as the discipline of<br />

connecting data creators with data<br />

consumers. DataOps should be part of<br />

every successful data management<br />

strategy. In addition to DataOps, a sound<br />

data management strategy includes data<br />

orchestration from endpoints to core,<br />

data architecture, and data security.<br />

The goal of data management is to<br />

facilitate a holistic view of data and<br />

enable users to access and derive<br />

optimal value from it: both data in<br />

motion and at rest.<br />

DERIVING VALUE FROM DATA<br />

Businesses today are generating massive<br />

amounts of enterprise data, which is<br />

forecast to grow at an average annual<br />

rate of 42% annually from 2020 to 2022,<br />

according to the Rethink Data report.<br />

A new Seagate-commissioned IDC<br />

survey (see URL below) found that<br />

enterprises frequently move this data<br />

among different storage locations,<br />

including endpoints, edge, and cloud. In<br />

over a thousand businesses surveyed,<br />

more than half move data between<br />

storage locations daily, weekly, or monthly.<br />

With the average size of a physical data<br />

transfer being over 140TB, the faster<br />

businesses can move this data from edge<br />

to cloud, the quicker they can unlock<br />

insights and derive value from their data.<br />

Given the rapid pace of digitisation -<br />

accelerated in many cases by the<br />

pandemic - many organisations are<br />

gathering and managing more data than<br />

ever before. Cultivating vibrant and<br />

insightful data lakes will lay the<br />

groundwork for long-term success of<br />

enterprise data management strategies, in<br />

turn enabling the success of digital<br />

infrastructure and business initiatives. NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 31


FEATURE: DIGITAL SKILLS<br />

TO CODE OR NOT TO CODE?<br />

48% OF EMPLOYERS THINK THE WORKFORCE IS LACKING IN<br />

DIGITAL SKILLS, SO COULD NO-CODE BE THE ANSWER?<br />

Despite the workforce becoming<br />

more digitally reliant, new survey<br />

results suggest that, less than half of<br />

employers (48%) in the UK believe that<br />

employees joining the workforce have the<br />

necessary digital skills or knowledge. This<br />

has created a fear that the lack of relevant<br />

skills could affect businesses' abilities to<br />

compete in the digital market, with over<br />

three quarters of businesses believing this<br />

could negatively impact their profitability,<br />

According to research by Gartner, 'low<br />

code' or 'no code' solutions are gaining<br />

traction and are predicted to account for<br />

more than 65% of application development<br />

by 2024.<br />

AI-powered software company, Intelastel<br />

surveyed 400 UK directors/CEOs/founders,<br />

managers, and self-employed/freelancers to<br />

reveal people's thoughts towards coding,<br />

their knowledge in coding and what they<br />

think are the opportunities within the industry.<br />

The majority (51%) of business leaders<br />

polled described themselves as 'somewhat<br />

digitally proficient' and 29% said they were<br />

'highly digitally proficient'. However, when<br />

asked to select the correct definition of<br />

programming, less than half (46%) of<br />

those surveyed answered correctly and<br />

almost a quarter (24%) asserted that<br />

there's no difference between a<br />

programmer and a developer.<br />

Iouri Prokhorov, CEO of Intelastel said,<br />

"This lack of basic understanding might<br />

suggest that many top executives are out of<br />

touch with the realities of the digital world.<br />

The findings from our survey suggest that<br />

despite there being a demand for more<br />

tech knowledge in the workforce, there are<br />

many reasons why businesses don't invest in<br />

this sort of education and training. Many<br />

believe that it is too time consuming (19%),<br />

while price (8%), lack of awareness (46%)<br />

and the belief that coding is pointless (5%)<br />

were stated as barriers."<br />

This has left many believing that 'no code'<br />

solutions will have a significant part to play<br />

in business operations in the future. 17% of<br />

business leaders believe that 'no-code', is a<br />

popular and promising alternative to<br />

traditional software development for nontechnical<br />

business users hoping to build their<br />

own full-fledged applications, is the future.<br />

The majority (58%) of respondents believe<br />

organisations should be moving towards a<br />

hybrid approach of training in both coding<br />

and 'no code', yet businesses cite a lack of<br />

promotion (39%) and a lack of education<br />

(26%) as reasons for not investing in 'no<br />

code' solutions.<br />

"No-code allows all variations of<br />

businesses to develop and integrate a<br />

great digital platform and can minimise<br />

the number of employees being left in the<br />

dark due to their lack of digital skills,"<br />

added Prokhorov.<br />

Despite what many believe, coding is<br />

more integrated into our everyday lives<br />

than is necessarily in our working digital<br />

life. Coding is required for tasks such as<br />

driving, shopping and even taking a<br />

shower, whereas it is not necessary for<br />

building an app, hosting a podcast, or<br />

launching an ecommerce site.<br />

Apps can be developed without using<br />

code, as can creating an online store<br />

using 'no-code' platforms, yet showering<br />

requires a pre-set microprocessor code.<br />

Vegetables are usually grown in<br />

computerised temperature-controlled<br />

greenhouses and the use of a checkout till<br />

is required when purchasing them - this all<br />

requires coding. NC<br />

To read more from the Intelastel<br />

investigation, visit:<br />

www.intelastel.com/blog/to-code-or-notto-code<br />

32 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: POWER MONITORING<br />

MORE POWER TO YOU<br />

MOXA OFFERS A GUIDE TO OPTIMISING POWER CONSUMPTION<br />

THROUGH REMOTE MONITORING<br />

The Industrial Internet of Things (IIoT)<br />

generates a tremendous amount of data<br />

that also needs to be stored.<br />

Consequently, more and more data centres<br />

are needed to fulfill this growing demand for<br />

data storage management, increasing energy<br />

consumption in the process. At the same<br />

time, factories, supermarkets, and other high<br />

power consumption applications are also<br />

facing pressure to improve energy efficiency<br />

for their heavy-load equipment and devices.<br />

Data centre operators and application<br />

owners need to figure out how to operate<br />

numerous servers and power-hungry<br />

equipment while optimising power<br />

consumption. Power distribution units (PDUs)<br />

are used to control and distribute power to<br />

various equipment. Nowadays, intelligent<br />

PDUs that feature metering and switching<br />

capabilities from remote sites have seen<br />

significant market growth due to increasing<br />

remote monitoring demands. In fact, a recent<br />

industry report identifies the increasing<br />

demand for data center monitoring solutions<br />

as the key driver of PDU market growth.<br />

Monitoring PDUs in your application not<br />

only helps you optimise your energy usage -<br />

by recording daily power consumption for<br />

payment calculation and energy<br />

management - but also allows you to collect<br />

data about the status of your PDUs for device<br />

maintenance.<br />

According to Moxa, in order to reap the<br />

benefits of monitoring PDUs, an energy<br />

management system (EMS) needs to collect<br />

meter data from PDUs so that operators can<br />

control, monitor, and optimise the<br />

performance of the PDUs. In addition, remote<br />

power panels (RPPs) may also be used as an<br />

extension of PDUs to increase the power<br />

distribution capacity by providing extra circuits.<br />

Thus, it's also important to monitor the circuit<br />

breakers and current transformers to ensure<br />

that power distribution through different<br />

circuits is under control. It takes reliable<br />

connectivity between the EMS and power<br />

devices, such as PDUs and RPPs, to ensure<br />

smooth and optimised power distribution.<br />

Here are some tips you can consider to<br />

ensure reliable connectivity in between.<br />

UNDERSTAND YOUR DEVELOPMENT<br />

STAGE<br />

Once you decide to monitor the PDUs and<br />

RPPs in your application environment, how<br />

you go about enabling connectivity depends<br />

on your implementation plan. Besides<br />

connecting power meters, circuit breakers<br />

and current transformers that might use<br />

different protocols and interfaces than your<br />

EMS, ask yourself the following questions to<br />

choose the right solution:<br />

Are you trying to retrofit existing PDUs or<br />

deploy a new one?<br />

Is there enough space for your wiring<br />

design?<br />

How many PDUs are you planning to<br />

connect to the network?<br />

Your answers to the above questions will tell<br />

you whether you are looking for a single-port<br />

or high port-density connectivity solution. For<br />

example, if you have limited space for<br />

retrofitting your existing PDUs in a relatively<br />

small-scale application, a single-port<br />

connectivity solution may be the ideal option<br />

due its compact design. In contrast, high<br />

port-density connectivity solutions can help<br />

you save costs if you have sufficient space to<br />

deploy multiple new PDUs.<br />

INSTALLATION AND MAINTENANCE<br />

Choosing an easy-to-use connectivity solution<br />

can save you significant time and effort. In<br />

the installation stage, wiring can be painful<br />

when you are connecting dozens of PDUs to<br />

the same network. Check if your connectivity<br />

solution has features such as Ethernet<br />

cascading, which provides an efficient wiring<br />

solution across several PDUs and RPPs to the<br />

EMS located in the control center. When your<br />

PDUs and RPPs are up and running, your<br />

networking devices will still require backups<br />

and updates from time to time. If your<br />

connectivity solutions provide user-friendly<br />

software tools, it can take the headache out<br />

of device configuration and maintenance.<br />

ENHANCE OPERATION RELIABILITY<br />

When unexpected network failures occur,<br />

meter data loss can lead to miscalculation of<br />

your power consumption, resulting in<br />

incorrect billing and incomplete power data<br />

for analytics. To enhance your power<br />

monitoring system reliability, you need to<br />

consider backup mechanisms from different<br />

angles. Start from the networking devices.<br />

Dual-power inputs and high EMI immunity<br />

are features that can protect your networking<br />

devices from electrical interference. Next,<br />

develop a redundancy mechanism for your<br />

network transmissions. There are various<br />

network redundancy features in the market.<br />

When considering these options, see if their<br />

recovery times are acceptable for your power<br />

monitoring application. NC<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards AUGUST/SEPTEMBER <strong>2021</strong> NETWORKcomputing 33


OPINION: SD-WAN<br />

WHY SD-WAN?<br />

AMY HOOD, PRODUCT SPECIALIST FOR DRAYTEK UK &<br />

IRELAND, EXPLAINS HOW SD-WAN CAN ENABLE DIGITAL<br />

TRANSFORMATION WITH SAAS/CLOUD<br />

Traditionally, the challenge of most<br />

network administrators was one of<br />

simple connectivity. With most<br />

applications running on private servers in<br />

a company's headquarters, the question<br />

was how to enable connectivity for other<br />

sites to access resources.<br />

However, with the adoption of a hybrid<br />

model including SaaS, public and private<br />

cloud infrastructure and applications such<br />

as Outlook365, Team, Zoom, OneDrive,<br />

Google Drive and Dropbox, it's not just<br />

connectivity that's the concern - it's also<br />

the quality of the connection and the<br />

flexibility to simultaneously handle routing<br />

to both public and private facing<br />

applications.<br />

This challenge has drawn attention to the<br />

solutions SD-WAN provides to make<br />

complex routing schemes simple and<br />

intuitive, and to give better insights to the<br />

performance of the network and a<br />

responsiveness to handle any degradation<br />

which has been detected.<br />

IMPROVED INTERFACE STATS<br />

With SD-WAN, wired WAN, Wireless WAN<br />

(including wireless 2.4G/5G WAN, LTE<br />

WAN, and USB WAN), and VPN quality<br />

are monitored 24/7. Using an "average"<br />

Mean Opinion Score (MOS), Network<br />

administrators can view the sustained<br />

quality of a WAN interface, to easily<br />

determine the performance of each<br />

connection. "Active" interface quality, on<br />

the other hand, shows the interface quality<br />

right at that moment. By integrating<br />

percentage numbers, network<br />

administrators can specify rules to load<br />

balance or failover based on the reliability<br />

and quality of connections. Ideally the<br />

connections should always be higher than<br />

the target MOS threshold. For example,<br />

4.0 MOS out of 5 for important traffic.<br />

INTERFACE QUALITY - FROM<br />

MACRO TO MICRO<br />

In SD-WAN environments, more data is<br />

collected for every interface on monitored<br />

CPEs. This makes it easier to create<br />

dashboards to track any suspicious<br />

Interface quality results. Network<br />

administrators can dive into more details<br />

about an interface, such as, data usage,<br />

latency, jitter and packet<br />

INTELLIGENT VOIP OPTIMISATION<br />

SD-WAN also provides intelligent VoIP<br />

optimisation from the start of a VoIP call to<br />

the end. Based on your network topology<br />

and the Interface quality, SD-WAN<br />

intelligently assigns the best-quality WAN<br />

for VoIP calls. So whenever you are<br />

making a new call, SD-WAN makes sure<br />

you are calling via the best WAN.<br />

After sending the VoIP call via bestquality<br />

WAN, SD-WAN will continue to<br />

monitor the quality of the live call and<br />

enforce a WAN failover to a secondary<br />

VoIP WAN if call quality is poor. As every<br />

call is logged with a MOS score and indepth<br />

interface data, the network<br />

administrator can analyse and refine<br />

routing policies based upon WAN<br />

performance.<br />

FULL TRAFFIC CONTROL<br />

SD-WAN provides complete routing control<br />

by allowing network administrators to<br />

specify the preferred route for selected<br />

applications/domains, to ensure their<br />

specific routing scenarios can be achieved.<br />

Sessions matching the criteria can be<br />

NATed or routed, all under your control. It's<br />

especially useful if you have a mix of<br />

private/MPLS WAN (requires routing).<br />

COMPONENTS AND TOPOLOGY<br />

SD-WAN is a great addition to any<br />

remotely managed network of routers. It<br />

provides network admins information to<br />

assess the quality of a WAN interface,<br />

easily determine the performance of each<br />

connection and make intelligent decisions<br />

on where to route traffic. Here are the<br />

typical components for an SD-WAN<br />

network topology:<br />

Edge routers providing edge<br />

computing. Edge routers are physical<br />

routers installed in HQ and branches.<br />

Established VPN tunnels from branches<br />

to HQ to form hub-and-spoke or mesh<br />

topology.<br />

A central software platform where<br />

network administrators perform<br />

configurations, provisioning, and<br />

monitoring activity.<br />

As organisations discover the<br />

effectiveness of their connectivity is directly<br />

related to the effectiveness of their teams,<br />

the benefits of deploying SD-WAN<br />

technology should be considered by all<br />

network admins. NC<br />

34 NETWORKcomputing AUGUST/SEPTEMBER <strong>2021</strong> @NCMagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


Performance Begins Now<br />

Software-defined<br />

Storage Solutions<br />

Driving advanced platform innovations for scale-out cloud and datacenter<br />

infrastructure featuring 3 rd Gen Intel ® Xeon ® Scalable processors<br />

Learn More at www.supermicro.com/storage<br />

© Supermicro and Supermicro logo are trademarks of Super Micro Computer, Inc. in the U.S. and/or other countries.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!