15.12.2021 Views

NC Nov-Dec 2021

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NETWORKcomputing<br />

I N F O R M A T I O N A N D C O M M U N I C A T I O N S – N E T W O R K E D www.networkcomputing.co.uk<br />

A GREAT NIGHT FOR NETWORKING<br />

The Network Computing Awards return to<br />

London in style!<br />

THE SASE CHOICE<br />

A closer look at Secure<br />

Access Service Edge<br />

A HYBRID HORIZON<br />

Riding the tidal wave of<br />

digital transformation<br />

OUT OF NETOPTIONS?<br />

Why NetOps isn’t set to<br />

supplant human expertise<br />

NOVEMBER/DECEMBER <strong>2021</strong> VOL 30 NO 04


COMMENT<br />

COMMENT<br />

READY TO WELCOME A HYBRID NEW YEAR?<br />

As we go to print with this issue of Network Computing the UK Government's Plan B<br />

measures have come into effect and all those who weren't already working from home<br />

are being urged to do so once again. It's been clear for some time now that the workplace<br />

has changed irrevocably and hybrid working is here to stay - so how can we ensure<br />

we're working smoothly and securely in the year ahead?<br />

According to Thomas LaRock, Head Geek at SolarWinds, we need to start normalising risk<br />

aversion as we head into 2022. "That is, moving from simply accepting the current exposure<br />

to a mindset where any level of risk exposure is unacceptable. This means beginning to evaluate<br />

and implement the principles of a secure enterprise, starting first and foremost with<br />

understanding security compromises will happen as cyber hackers deploy more sophisticated<br />

attacks. Tech pros should also implement detection, monitoring, alerts, and response along<br />

the kill chain and engage in red team/tabletop exercises to measure effectiveness."<br />

This is echoed by a new whitepaper from VIPRE UK which highlights the need for a change<br />

of employee mindset, urging us to embrace the concept of the 'human firewall': "The 'new<br />

normal' of hybrid working opens up a variety of cyber attack points, including unsecured<br />

internet connections, to simple distractions you normally wouldn't have in an office environment.<br />

Protection starts with the human, as 85% of data breaches involve an internal mistake,<br />

indicating a need for change, and the foundation of this is investing in your human firewall."<br />

REVIEWS:<br />

Dave Mitchell<br />

DEPUTY EDITOR: Mark Lyward<br />

(netcomputing@btc.co.uk)<br />

PRODUCTION: Abby Penn<br />

(abby.penn@btc.co.uk)<br />

DESIGN: Ian Collis<br />

(ian.collis@btc.co.uk<br />

SALES:<br />

David Bonner<br />

(david.bonner@btc.co.uk)<br />

Julie Cornish<br />

(julie.cornish@btc.co.uk)<br />

SUBSCRIPTIONS: Christina Willis<br />

(christina.willis@btc.co.uk)<br />

PUBLISHER: John Jageurs<br />

(john.jageurs@btc.co.uk)<br />

Published by Barrow & Thompkins<br />

Connexion Ltd (BTC)<br />

35 Station Square,<br />

Petts Wood, Kent, BR5 1LZ<br />

Tel: +44 (0)1689 616 000<br />

Fax: +44 (0)1689 82 66 22<br />

SUBSCRIPTIONS:<br />

UK £35/year, £60/two years,<br />

£80/three years;<br />

Europe:<br />

£48/year, £85/two years £127/three years;<br />

ROW:<br />

£62/year, £115/two years, £168/three years;<br />

Subscribers get SPECIAL OFFERS — see subscriptions<br />

advertisement; Single copies of<br />

Network Computing can be bought for £8;<br />

(including postage & packing).<br />

© <strong>2021</strong> Barrow & Thompkins<br />

Connexion Ltd.<br />

All rights reserved.<br />

No part of the magazine may be<br />

reproduced without prior consent, in<br />

writing, from the publisher.<br />

Ransomware is also set to proliferate in the new year, with industry experts forecasting a significant<br />

increase in the rate and sophistication of attacks. Ian McShane, Field CTO, Arctic<br />

Wolf cautions that "We're currently stuck in a culture of 'the here and now' around ransomware.<br />

The National Cybersecurity Centre's latest report on the UK's 'hacking epidemic'<br />

suggests ransomware is an established threat the government is finally waking up to. Soon<br />

though, they will realise this is just the start of a bigger cybersecurity challenge UK businesses<br />

will face heading into 2022. While ransomware is here to stay, it will quickly be recognised<br />

that there is a bigger issue at play here - the entry point. Often technology is considered to<br />

be the first line of defence, but the first line of defence is actually users. Right now, people<br />

don't consider standard technology and users part of the greater supply chain because it does<br />

not feel like a security issue. The fact is simply using email is a supply chain concern."<br />

Whether working home or away - or a hybrid point somewhere between the two - we'll all<br />

have a part to play in keeping this new networking normal secure. <strong>NC</strong><br />

GET FUTURE COPIES FREE<br />

BY REGISTERING ONLINE AT<br />

WWW.NETWORKCOMPUTING.CO.UK/REGISTER<br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 03


CONTENTS<br />

CONTENTS<br />

N O V E M B E R / D E C E M B E R 2 0 2 1<br />

COMMENT.....................................3<br />

Ready to welcome a hybrid New Year?<br />

INDUSTRY NEWS.............................6<br />

The latest networking news<br />

ARTICLES<br />

SECURING A DIGITAL WORKFORCE<br />

WITH SASE......................................10<br />

By Daniel Blackwell at Pulsant<br />

THE SASE CHOICE...............10<br />

Secure Access Service Edge would seem to<br />

offer the perfect blend of networking and<br />

security for our brave new hybrid world. But<br />

where should you start when selecting SASE<br />

for your business?<br />

OUT OF NETOPTIONS?.......26<br />

Alan Stewart Brown, VP of EMEA, Opengear<br />

explains how NetOps and network<br />

automation can enhance the value of<br />

network engineers and their expertise<br />

A HYBRID HORIZON..............8<br />

Jay Alexander, CTO at Keysight<br />

Technologies offers a guide to getting to<br />

grips with digital transformation and<br />

hybrid working<br />

FROM NAAS TO PAAS..........22<br />

Neil Templeton, Vice President of Digital<br />

Innovation Marketing, explores how<br />

Network-as-a-Service can unlock the value<br />

of Platform-as-a-Service<br />

NETWORK COMPUTING<br />

AWARDS <strong>2021</strong>......................27<br />

The Network Computing Awards made a<br />

welcome return to a non-virtual venue in<br />

central London in October. Discover more<br />

about the <strong>2021</strong> winners inside<br />

A ROADMAP TO CLOSING THE<br />

NETWORK AND SECURITY DIVIDE......12<br />

By Neil Thacker at Netskope<br />

CUTTING THROUGH THE NOISE TO<br />

FIND THE PERFECT SASE PROVIDER....15<br />

By Mike Wood at Versa Networks<br />

CYBERSECURITY - ARE YOU<br />

CONFIDENT OR COMPLACENT?....16<br />

By Paul German at Certes Networks<br />

A ZERO-TRUST FUTURE FOR A HYBRID<br />

WORKING WORLD.............................19<br />

By Michele Mabilia at Kyocera Document<br />

Solutions<br />

THE FOUNDATION FOR IoT SUCCESS<br />

IS BUSINESS STRATEGY.......................20<br />

By Peter Ruffley at Zizo<br />

CASE STUDY<br />

CAN STORAGE EVER BE INSTALLED<br />

AND FORGOTTEN?.........................24<br />

Rainer W. Kaese at Toshiba shares the<br />

details of a storage system that has been<br />

running for four years without any need for<br />

maintenance or unexpected downtime<br />

PRODUCT REVIEW<br />

TREND NETWORKS R180000 TONE AND<br />

PROBE KIT........................................14<br />

ZIVVER SECURE EMAIL....................18<br />

04 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


INDUSTRY NEWS<br />

NEWSNEWS<br />

NEWS NEWS<br />

NEWS NEWS NEWS NEWS<br />

NEWS NEWS<br />

IoT network for Cairngorms National Park Authority<br />

Natural beauty spots across Scotland have seen an<br />

unprecedented surge in visitors amid the pandemic, the<br />

Cairngorms National Park Authority (CNPA) is working with<br />

leading IoT service and solutions provider, North to accrue and<br />

access data that will help manage surges of tourism in a<br />

sustainable way.<br />

Through the installation of gateways and sensor devices<br />

connecting to North's IoT Scotland network framework, the<br />

National Park Authority and other local land managers will be<br />

able to use innovative technologies to monitor footfall, route<br />

usage and vehicle parking. The network will also be available to<br />

local businesses to deploy data gathering sensors, providing<br />

them with the opportunity to gain key data findings and insights<br />

on how they can improve their services.<br />

Funded by the Scottish Government, Scottish Enterprise,<br />

Highlands and Islands Enterprise and North, the £6m IoT<br />

Scotland network provides the infrastructure for companies<br />

and organisations to tap into smart sensor applications. The<br />

proposed footfall and car park sensors will be installed<br />

around the Aviemore and Cairngorm areas and will<br />

communicate with the IoT Scotland network through the<br />

gateways set up at Glenmore Lodge, Ciste, Day Lodge and<br />

two buildings within Aviemore.<br />

Using the data from footfall around the area, the National Park<br />

Authority and partners will be able to monitor the most popular<br />

routes and car parks to ensure they are effectively managed to<br />

prevent degradation of the natural beauty spots. Additionally,<br />

sensors will be used to track real-time data to maximise visitor<br />

experience and safety, relieving car park pressures and<br />

encouraging drivers towards less populous areas. Local<br />

businesses will be able to access the network and adopt smart<br />

technology to improve their services in and around the local<br />

area, as they benefit from a surge in visitors from the easing of<br />

lockdown restrictions and flux in 'staycations'.<br />

Core Network Services for the Distributed Edge<br />

NS1 has unveiled its cloud-managed solution for DNS,<br />

DHCP, and IP address management (DDI), delivered<br />

through the NS1 Connect platform. NS1 Cloud-Managed DDI<br />

enables organisations to deliver core network services across<br />

their distributed network footprint with the agility of softwarebased<br />

deployment, the scale of cloud-native operations, and the<br />

operating efficiency of SaaS management.<br />

"Network teams managing application traffic and connectivity in<br />

distributed environments demand a new approach to delivering<br />

core services that can scale with the business," said David Coffey,<br />

chief product officer, NS1. "With the release of Cloud-Managed<br />

DDI on NS1 Connect, we have converged foundational services<br />

like external and internal DNS, DHCP, IPAM, and intelligent traffic<br />

steering on a single technology stack with internet scale<br />

infrastructure, centralised management, lightweight deployment,<br />

automated scalability, and global intelligence."<br />

Supermicro expands GPU system portfolio<br />

Super Micro Computer has released new systems based on<br />

the NVIDIA Ampere architecture GPUs and 3rd Gen Intel<br />

Xeon Scalable processors with built-in AI accelerators<br />

(Supermicro X12 series). These servers are designed for<br />

demanding AI applications where low latency and high<br />

application performance are essential.<br />

The 2U NVIDIA HGX A100 4-GPU system is suited for deploying<br />

modern AI training clusters at scale with high-speed CPU-GPU<br />

and GPU-GPU interconnect. The Supermicro 2U 2-Node system<br />

reduces energy usage and costs by sharing power supplies and<br />

cooling fans and supports a range of discrete GPU accelerators,<br />

which can be matched to the workload. Both of these systems<br />

include advanced hardware security features that are enabled by<br />

the latest Intel Software Guard Extensions (Intel SGX).<br />

Wi-Fi management added into WatchGuard Cloud<br />

WatchGuard Technologies has announced Wi-Fi in<br />

WatchGuard Cloud along with a new line-up of Wi-Fi 6-<br />

enabled access points (APs). The addition of Wi-Fi in<br />

WatchGuard Cloud provides cross-platform integration and<br />

centralised management of all WatchGuard products, while the<br />

new APs give customers enhanced connectivity, performance,<br />

and best-in-class security. The launch of AP130, AP330, and<br />

AP430CR comes as the availability of Wi-Fi 6-enabled devices<br />

continues to grow.<br />

06 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


INDUSTRY NEWS<br />

With support for WPA3, the highest level of encryption, and<br />

cutting-edge Wi-Fi 6 technology, these new APs are perfect for<br />

small to midsize companies and distributed enterprise customers<br />

looking for the most secure Wi-Fi configuration.<br />

TREND Networks launches seven new fibre testers<br />

TREND Networks has expanded its fibre testing range with<br />

seven affordable new products in the FiberMASTER series. A<br />

simple handheld OTDR, PON OTDR, Power Meter and Light<br />

Source, and Inspection Probe will enable cable installers to get<br />

the dependable test results needed, while saving time on training,<br />

and thousands of pounds. The new testers feature industryleading<br />

dynamic range, enabling users to test longer fibers, PON<br />

systems and to maintain accuracy on high-loss fibers.<br />

"Demand for fibre cable is growing as high data volumes and<br />

bandwidth requirements are increasing. At the same time,<br />

skilled technicians are hard to find and technicians coming<br />

into the industry often have minimal training," said Tim<br />

Widdershoven, Marketing Director for TREND Networks. "The<br />

new range is designed so that even those with limited<br />

experience or training can quickly be up and running, carrying<br />

out accurate tests while saving more than 50% compared to<br />

other premium brands."<br />

The new FiberMASTER OTDR, designed for Tier 2 fibre cable<br />

certification, is among the smallest touchscreen OTDRs in the<br />

world. It features simple setup to ensure test accuracy to<br />

ISO/TIA/IEEE standards. Available in Quad, Multi-Mode and<br />

Single-Mode models, the OTDR includes easy to understand<br />

visual event maps to help even novice users interpret test data<br />

correctly. Installers can quickly access a wide range of key<br />

troubleshooting data with the OTDR, such as distance to fault,<br />

length measurement, and distance to connectors or splices via<br />

the tester’s intuitive user interface.<br />

Extreme Networks revs up NASCAR Technology<br />

Extreme Networks is participating in the NASCAR Technology<br />

Partner Platform, an exclusive community of technology<br />

companies working together to evolve the racing industry to new<br />

levels of innovation and success by pushing technological<br />

boundaries. Verizon Business is the technology integration and<br />

managed services lead for the project, deploying an Extreme<br />

large public venue solution architecture inclusive of Wi-Fi 6 access<br />

points and real-time analytics. The deployment spans the 11 high<br />

speed race and super speedways operated directly by NASCAR.<br />

Leveraging Extreme's cloud-driven Wi-Fi 6, NASCAR will offer<br />

high-efficiency, high-capacity networking that will serve as the<br />

critical foundation for powering experiences like mobile ticketing,<br />

mobile concessions, and mobile sports betting. Extreme Analytics<br />

provides NASCAR with real-time visibility into the health and<br />

performance of the Wi-Fi network, mobile application usage<br />

patterns across the stadium, and fan preferences.<br />

Kaseya adds UK GDPR module to Compliance Manager<br />

Kaseya has launched the UK GDPR module for Compliance<br />

Manager. Compliance Manager is Kaseya's award-winning<br />

compliance process automation platform that simplifies assessing,<br />

maintaining and documenting compliance through its wizarddriven<br />

workflow engine, automated network and computer data<br />

discovery, web-based management portal and built-in<br />

compliance document generation and archiving capabilities.<br />

The UK GDPR regulation, which went into effect on 1st January<br />

<strong>2021</strong>, applies to organisations that target, process or store<br />

electronic data from UK citizens, regardless of where the<br />

organisation is located. It is largely based on the original EU<br />

GDPR standard but includes several changes in key areas of the<br />

law concerning national security, intelligence services and<br />

immigration. Kaseya's new module covers the new UK GDPR<br />

requirements around the collection of data from minors and<br />

representatives of controllers outside the UK and includes updated<br />

policies and procedures documents and new recommendations<br />

provided by the UK Information Commissioners Office.<br />

NEWS NEWSNEWS<br />

NEWS<br />

NEWS NEWS NEWS NEWS NEWS<br />

NEWS<br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 07


OPINION<br />

RIDING THE TIDAL WAVE OF DIGITAL TRANSFORMATION<br />

JAY ALEXANDER, CHIEF TECHNOLOGY OFFICER, KEYSIGHT TECHNOLOGIES OFFERS A GUIDE TO<br />

GETTING TO GRIPS WITH DIGITAL TRANSFORMATION AND HYBRID WORKING<br />

Over the past 18 months, many of us<br />

have experienced significant<br />

change, personally and<br />

professionally. As we embark on the "new<br />

normal" - or really the "next normal," because<br />

it, too, will evolve - it's important to<br />

internalise what has happened to the<br />

technology-adoption cycle and the<br />

associated customer expectations.<br />

It starts with digital transformation, the<br />

megatrend affecting virtually all parts of<br />

today's economy. All things digital are the<br />

essential enablers of the longstanding vision<br />

of "everyone and everything, connected." This<br />

enablement has been happening for a long<br />

time, and in many cases has followed a<br />

phased progression, starting with curious early<br />

adopters willing to experiment, and continuing<br />

with acceptance by the cautious mainstream.<br />

But an interesting change to the pattern<br />

occurred during the pandemic: previously<br />

available technologies such as video chat<br />

became ubiquitous. They're now a lifeline to<br />

our families, friends, doctors, and more.<br />

Another example: online ordering for delivery<br />

or pick-up of food, medicine, office supplies,<br />

and even hardware items for home repair, has<br />

increasingly become part of our weekly<br />

routines. Thus, the first effect of the pandemic<br />

on technology evolution has been an<br />

acceleration of the classic adoption cycle.<br />

Broader, faster adoption of new technologies<br />

is driving the second effect: no matter where<br />

or how you engage with digital<br />

transformation, customer expectations have<br />

changed forever. Impatient demands for<br />

instant access, constant availability, and zero<br />

lag are getting stronger and gaining urgency.<br />

These all fit inside the overarching goal of<br />

delivering a great user experience.<br />

MOVING FROM VALIDATION TO<br />

ACCELERATION<br />

This is all very challenging, to say the least,<br />

but there is a positive aspect: the pandemic<br />

experience has thoroughly validated the<br />

core idea that, done wisely, digital<br />

transformation leads to better outcomes for<br />

businesses and customers.<br />

Going forward, we have to assume people<br />

and enterprises will continue to use hybrid<br />

approaches for essentially all activity systems.<br />

Why? Because an "online plus in-person"<br />

hybrid is convenient, it helps to simplify the<br />

process, and it offers the flexibility to address<br />

dynamic or complex requirements. There is no<br />

going back. The worldwide stress test brought<br />

on by the pandemic has amplified the need to<br />

accelerate our collective digital<br />

transformation.<br />

Surveys by Bloomberg, McKinsey, and others<br />

show this is already happening: many or most<br />

companies believe the pandemic has sped up<br />

their digital transformation by three to seven<br />

years. On average, the speed-up is on the<br />

order of 5.3 years.<br />

It can be tempting to simply throw the latest,<br />

hottest new technology at the problem,<br />

hoping that it will magically make everything<br />

work better and keep customers happy.<br />

However, this rarely produces the desired<br />

outcomes and therefore ultimately slows<br />

rather than accelerates the transformation.<br />

A better way to tackle the acceleration<br />

challenge starts with businesses gaining clarity<br />

around individual business strategies in order<br />

to more efficiently meet customer needs. With<br />

a strong customer-centric strategy, clarity<br />

includes three essential elements: a crisp<br />

definition of a customer set, an imaginative<br />

understanding of their unmet needs, and a<br />

compelling offering that delivers real value to<br />

those customers.<br />

08 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION<br />

CREATING BEST-CASE OUTCOMES<br />

With that level of clarity established, a<br />

company can then embark on thoughtful, but<br />

fast-paced, planning of the changes most<br />

relevant to its unique digital transformation<br />

journey. From there it is then possible to move<br />

on to the selection and deployment of the<br />

right technology-or technologies-to make<br />

those changes a reality.<br />

This is because if a business wants to achieve<br />

exceptional performance across all digital<br />

platforms, it will ultimately have to assess how<br />

far it needs to reach - from core to cloud to<br />

edge, or vice versa - and how far up or down<br />

the protocol stack to look. Some may also<br />

find it useful to examine how to validate<br />

performance gains, potential and actual, and<br />

decide what to test in the lab and what to<br />

monitor in the field.<br />

All of this makes it clear that all things digital,<br />

those essential enablers of "everyone and<br />

everything, connected," are also what make for<br />

superior user experience. The business goal is<br />

to create an experience that provides<br />

differentiation and competitive advantage. The<br />

best-case outcome is a user experience that<br />

meets or exceeds ever heightened expectations.<br />

FACING THE CHALLENGES<br />

Getting there is not easy. There are significant<br />

obstacles on the road ahead, and the strain of<br />

the past year and a half has revealed crucial<br />

weaknesses that are on the verge of becoming<br />

fatal liabilities.<br />

Demand for bandwidth continues to grow<br />

unabated, and it's rising like a digital tidal<br />

wave. In today's world, more devices are<br />

transmitting and receiving richer content:<br />

high-resolution images; 4K and 8K video;<br />

dynamic, interactive experiences like<br />

multiplayer gaming; and telemedicine.<br />

Here, the key drivers include exponential<br />

growth in IoT devices and machine-tomachine<br />

communication. They also include<br />

new capabilities and use cases made possible<br />

by the ongoing rollout of 5G. In networking,<br />

the world continues to deploy 400 gigabit<br />

Ethernet, but the jump to 800 gig is coming,<br />

and 1.6 terabit Ethernet is on the horizon.<br />

The need for ever more processing power is<br />

unending. After almost 60 years, it looks like<br />

Moore's Law is decelerating. Makers of<br />

classical computers and supercomputers<br />

continue to innovate, but most are also<br />

investing in quantum computing. Perhaps<br />

ironically, quantum effects in semiconductors<br />

are one of the factors limiting the ability of<br />

device makers to move process geometries<br />

significantly below 5 nanometers. Thus,<br />

between the traditional manufacturers and a<br />

cadre of focused startups, quantum is<br />

gaining momentum.<br />

DRIVING THE DIGITAL<br />

TRANSFORMATION OF EVERYTHING<br />

Pulling back on the zoom lens, these forces<br />

are driving technology trends we all need to<br />

be ready for now: process automation,<br />

machine learning, artificial intelligence, the AI<br />

of things, edge computing, and so much<br />

more. Staying ahead of these trends is<br />

essential to meeting customer needs, building<br />

competitive advantage, and achieving<br />

business success.<br />

ABOUT THE AUTHOR<br />

Jay Alexander is Chief Technology Officer of<br />

Keysight Technologies. He leads Keysight's<br />

centralised technology development team to<br />

focus on addressing top opportunities and<br />

market trends.<br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 09


FEATURE: SASE<br />

SECURING A DISTRIBUTED WORKFORCE<br />

WITH SASE<br />

DANIEL BLACKWELL AT PULSANT EXPLAINS WHY SECURE<br />

ACCESS SERVICE EDGE (SASE) IS THE IDEAL SOLUTION FOR<br />

USER-CENTRIC SECURITY<br />

Despite the widescale shift towards<br />

dispersed working, many businesses still<br />

haven't addressed the long-term security<br />

risks associated with an expanded attack<br />

surface. The problem is employees are now<br />

working from uncontrolled environments.<br />

Personal devices and home networks don't<br />

have the same security protocols and controls<br />

as corporate devices and networks, making<br />

them more prone to cyber attacks. In a remote<br />

environment there is usually little control over<br />

what can be reached over the internet, with<br />

access often shared with other devices, posing<br />

further risks. Many home networks also aren't<br />

password-protected, use easily guessed or<br />

default passwords, or may be configured<br />

without encryption, providing a far easier<br />

avenue for an attacker to gain access to a<br />

corporate network.<br />

REMOVING THE IT HEADACHE<br />

For IT teams this presents a huge headache.<br />

Applying security policies to each remote worker<br />

can be a complex and expensive venture. For<br />

example, applying the same policies and<br />

controls could require deploying a firewall at<br />

each employee's home which is not only<br />

expensive, but creates huge management<br />

overheads. Alternatively, each employee could<br />

be provided with a remote VPN connection<br />

back to a central office location, but as<br />

organisations increasingly move to decentralised<br />

services with SaaS and public cloud, it doesn't<br />

make sense to route traffic back through an<br />

office location.<br />

THE ROLE OF SASE<br />

Secure Access Service Edge (SASE) is the<br />

ideal solution for user-centric security, where<br />

policies can be applied directly to employees,<br />

wherever they are working, using a<br />

centralised management policy. However,<br />

much of what SASE is, or isn't, is yet to be<br />

truly defined or standardised.<br />

Gartner defines SASE as an extension of SD-<br />

WAN to include other network security controls<br />

and services that can be centrally managed<br />

through the same SD-WAN management<br />

plane. Many vendors have jumped on the<br />

SASE bandwagon and are using it to describe<br />

cloud-based security solutions that are not<br />

managed by a single management dashboard<br />

and actually involve multiple separate<br />

products. Others are claiming to provide SASE<br />

even without an SD-WAN offering, while some<br />

offer elements of SASE but not the full product<br />

range. Currently there are very few vendors in<br />

who offer SASE as per Gartner's full definition,<br />

but this doesn't mean that SASE isn't something<br />

that organisations should consider.<br />

ZERO-TRUST POLICIES<br />

At its core SASE is about the application and<br />

the user. With SD-WAN, it's about having<br />

control over the application and applying<br />

routing policies to make sure that the right<br />

applications get the best possible path. This<br />

delivers a better end user experience and<br />

enables organisations to change or bring on<br />

new applications efficiently and quickly.<br />

SASE refers to applying the same principles of<br />

efficiency and agility to security controls. The<br />

application and the user are still considered,<br />

but more specifically the right user getting to<br />

the right applications and only those<br />

applications. This can even be broken down<br />

further to the right device, at the right time of<br />

day, from the right network, and access<br />

restricted to applications and web services<br />

based on the security posture of the user,<br />

device, and destination.<br />

The physical location of the SASE 'engine'<br />

should be considered. The term cloud implies<br />

that something is located everywhere, when in<br />

the UK this typically means it's hosted in one<br />

location. By having regional points-ofpresence,<br />

the enforcement of security policies<br />

is distributed closer to each user wherever they<br />

are working. Using this approach,<br />

organisations can stop employees from<br />

accessing known bad web services, regardless<br />

of location, removing the risk of downloading<br />

malicious files or applications. If malware does<br />

get through and a device is breached, access<br />

can be revoked, preventing attackers from<br />

gaining access to applications or services.<br />

SECURING THE EDGE<br />

SASE forms a comprehensive package that<br />

combines a variety of solutions, and as<br />

organisations move towards distributed and<br />

decentralised applications, SASE and SD-WAN<br />

provide agile and flexible central controls.<br />

Remote working policies are now permanent<br />

and widespread, and in the near future, SASE<br />

and SD-WAN will enable both IT and security<br />

teams to bring security protocols closer to users.<br />

The outcome will be a highly-resilient network<br />

that truly supports its users and protects them<br />

from emerging and increasingly sophisticated<br />

cyber threats - wherever they are. <strong>NC</strong><br />

10 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


NETWORKcomputing<br />

We introduced the Network Computing "Masterclass" into the magazine a few years back. A<br />

Masterclass series in the magazine run for at least a year. Some have successfully run for longer. This<br />

concept enables us, with the help of a an expert vendor, to cover a subject area in a far more<br />

detailed way than could ever be covered in a single article. We feel that the Masterclasses we have<br />

carried have done a valuable job in guiding readers through many of the issues that they need to be<br />

aware of - issues that are perhaps not being talked about elsewhere. Vendor branding appears on<br />

the Masterclass page to distinguish a Masterclass article from the many "one-off" articles that we<br />

carry in Network Computing.<br />

We have identified a number of key subject areas which we feel would benefit from a Masterclass.<br />

These are:<br />

Network Testing and Monitoring<br />

Cabling and cable management<br />

Network access control<br />

Powering a Network<br />

The transition to unified comms<br />

Desktop virtualisation<br />

Traffic management<br />

Using a Data Centre<br />

Advantages and challenges of relying on an increasingly mobile workforce<br />

Cloud security<br />

Education and training<br />

If any of these subject areas are to be covered in a Masterclass we will be<br />

seeking a Partner to work with. A Masterclass Partner will ideally be a vendor<br />

with a track record of expertise in the particular area. Are you a vendor<br />

who could help us in launching a Masterclass covering one of the subjects<br />

listed above ? Alternatively, could you recommend an organisation who<br />

could help us ? Your suggestions will be very welcome.<br />

Please contact david.bonner@btc.co.uk


FEATURE: SASE<br />

A ROADMAP TO CLOSING THE NETWORK<br />

AND SECURITY DIVIDE<br />

NETWORK AND SECURITY TEAMS CAN NO LONGER OPERATE AS<br />

PARALLEL-BUT-SEPARATE ENTITIES, ACCORDING TO NEIL THACKER,<br />

CISO EMEA AT NETSKOPE<br />

Cloud-centric digital transformation has<br />

allowed network teams to build a<br />

workplace that can be anywhere, at<br />

any time and at the convenience of<br />

employees. This has revolutionised how we<br />

work, and made the enforced shift to remote<br />

and home working during the pandemic<br />

possible. It has also brought challenges,<br />

particularly for security teams who still need to<br />

identify employees and provision access to<br />

the required services in a secure manner.<br />

Before the widespread shift to the cloud, a<br />

security problem was just that; a problem for<br />

the security team to handle. However,<br />

increasingly network and security teams are<br />

no longer able to operate as parallel-butseparate<br />

teams; they have to function<br />

seamlessly together if the organisation is to<br />

operate safely and effectively.<br />

Traditionally both teams could coexist<br />

without significant issues but within the cloud,<br />

the primary concern of the networking<br />

function - performance - is not so easily<br />

separated from security's need to protect. The<br />

protective perimeter approach is no longer<br />

applicable in this new cloud environment.<br />

That means, as networking teams look to<br />

maximise all of the potential performance<br />

benefits from operating in the cloud, they<br />

must find a way to balance security's need to<br />

secure and control who has access to<br />

corporate data without negatively impacting<br />

performance.<br />

Most teams know they need to play well<br />

together and see the need for a change in<br />

attitudes and closer collaboration.<br />

Companies are exploring ways to converge<br />

efforts, personnel and budgets by adopting a<br />

SASE (Secure Access Service Edge)<br />

architecture as a way to ensure neither<br />

performance nor protection is deprioritised. If<br />

early transitions to the cloud were complex,<br />

this next step will be no less challenging. My<br />

job is to support CIOs, security leads and<br />

networking teams to make these necessary<br />

changes and I advise starting with three steps.<br />

Firstly, establish some shared parameters<br />

and metrics for success. By agreeing on a<br />

common set of parameters for digital risk,<br />

network performance, and user experience,<br />

network and security teams can ensure that<br />

everyone is working towards a common goal<br />

with no conflicting priorities. Once that is<br />

done, every activity or change can be<br />

measured and evaluated against those<br />

agreed goals. Each team must be equally<br />

12 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


FEATURE: SASE<br />

responsible for each of the metrics. This can<br />

feel like a big cultural change but establishing<br />

this at the beginning means no procurement<br />

decision is taken, or architectural ideology<br />

pursued, that would negatively impact upon<br />

an agreed KPI. These parameters enable<br />

teams to enter purchasing processes with<br />

clear red lines for all parties, meaning you<br />

can pass any potential sources of internal<br />

conflict onto the vendor pitching their<br />

technology solution.<br />

Secondly, it's vital to make sure that there is<br />

good visibility of performance on an ongoing<br />

basis. Understanding how data is used has<br />

always been a driver of improved<br />

performance both for interfiling potential<br />

optimisations and removing roadblocks. The<br />

benefits of the cloud do not need to be at the<br />

expense of visibility over what data is being<br />

used - by whom, when, and in what ways.<br />

Security professionals often find<br />

themselves uncomfortable if performance,<br />

cost and usability advantage are prioritised<br />

over risk management. With ever more<br />

threats now focused on exploiting<br />

vulnerabilities in accessing the cloud, a lack<br />

of visibility is no longer something<br />

businesses can afford to tolerate.<br />

SASE allows businesses to secure data<br />

wherever it resides or travels (inside or outside<br />

of corporate infrastructure). Network and<br />

security teams should use the insights<br />

delivered by a mature SASE platform to reveal<br />

the reality of business activity and processes,<br />

and identify opportunities to improve<br />

performance or implement policies that<br />

secure vulnerabilities. Constant visibility over<br />

activity enables continuous learning about the<br />

ways in which the business is operating, and<br />

understanding of end-user actions,<br />

behaviours and processes, and so will help<br />

manage digital risk as well as identifying<br />

potential improvements in performance.<br />

Once you have established shared<br />

parameters and created a system that gives<br />

you good insight into performance, the third<br />

step is to develop a coordinated strategy to<br />

combat emerging threats. With these<br />

structures in place, network and security<br />

teams can get ahead of threats and develop<br />

clear business, network, and security<br />

procedures that fall within a set risk tolerance.<br />

Just as improved visibility can allow network<br />

professionals to use the latest threat<br />

intelligence to design a more robust and<br />

appropriate access infrastructure, the set<br />

parameters also prevent security professionals<br />

from designing architectures that result in an<br />

unacceptable drop in performance. Adopting<br />

SASE architecture forces network and security<br />

teams to embrace a shared strategy,<br />

recognising that collaboration from the outset<br />

is the only way to meet both teams' objectives.<br />

One lasting effect of Covid-19 will be the<br />

mass adoption of a work-from-anywhere<br />

approach. It is clear that employees like being<br />

able to work at a time and place that works<br />

best for them, using the devices they choose,<br />

and accessing the applications that they<br />

determine best support productivity.<br />

Networking and security teams are therefore<br />

having to rethink their 'business-as-usual'<br />

infrastructure as a result of these new working<br />

approaches, and If we do not identify and<br />

respond to them then we fail in our core<br />

responsibility to facilitate and support business<br />

operations. But this change cannot mean<br />

compromising the security of corporate data.<br />

To summarise, when working with the cloud,<br />

networking and security teams have parallel<br />

goals and must collaborate to build an<br />

enabling infrastructure that both protects and<br />

shares the essential data that enables long<br />

term business growth. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 13


PRODUCT REVIEW<br />

Trend Networks<br />

R180000 Tone and<br />

Probe Kit<br />

PRODUCT REVIEW<br />

PRODUCT<br />

REVIEWPRODUCT RE<br />

Atone generator and probe kit is an<br />

essential piece of equipment for all<br />

professional cable guys. It allows them<br />

to trace, identify and verify data, telephone,<br />

coax and electrical cable runs, identify<br />

unlabelled cables and quickly troubleshoot<br />

faulty connections. There’s no shortage of kits<br />

on today’s market but the Trend Networks<br />

R180000 Tone and Probe Kit stands out for a<br />

number of sound reasons. It offers a power<br />

output of 11dBm (decibel milliwatts) meaning<br />

it can trace any copper cable over long<br />

distances, the higher amplifier gain of the<br />

probe enabling users to pick up weak signals<br />

and trace the cable with ease.<br />

The Tone generator’s multi resistance range<br />

of continuity tests make judging the resistance<br />

range of the cable a simple affair, and the<br />

unbalanced pair applying tone on RJ45<br />

socket pins increases the radiation of the tone.<br />

The kit’s ergonomic design makes it very easy<br />

to use and its rugged build quality allows it to<br />

go where other kits fear to tread.<br />

The kit comprises the Trend Networks<br />

R180002 tone generator, the R180001<br />

amplifier probe, a short RJ-45 to RJ-11<br />

adapter cable and a crocodile to RJ-45 patch<br />

cord for connecting to unterminated wires. It’s<br />

all neatly packed into a sturdy carry case with<br />

a Velcro strap for belt attachment.<br />

Constructed of high-impact plastic, the<br />

palm-sized tone generator has an RJ-45 port<br />

at the top and two buttons on its upper<br />

surface for selecting the test modes and tone<br />

patterns. The test mode button is used to swap<br />

between tone generation and continuity tests<br />

while the tone pattern button offers two warble<br />

speeds and is also used to power the unit off.<br />

Plenty of LEDs are provided with upper ones<br />

for reverse and normal polarity and another<br />

for voltage indication, tone generation,<br />

continuity test and Talk Set power status. The<br />

Line 2 LED indicates a voltage has been<br />

detected and a smart safety feature will<br />

illuminate when the unit is turned off to<br />

indicate a voltage is present on the cable<br />

under test.<br />

Running continuity tests is easy as you short<br />

the wires at the far end of the circuit and<br />

select this test from the tone generator’s<br />

mode button. Audio and visual cues are<br />

provided as the unit indicates the resistance<br />

of the circuit by emitting a continuous sound<br />

or a series of beeps, while the dedicated<br />

continuity LED will be solidly lit or will use<br />

different patterns of flashes also based on the<br />

measured resistance.<br />

The R180001 amplifier probe is an equally<br />

well constructed plastic wand. Tone detection<br />

is activated by pressing the large yellow button<br />

and an LED below the tip shows the signal<br />

strength. A volume wheel is located on the<br />

right side and we were impressed with how<br />

loud the probe’s integral speaker was.<br />

Operation in noisy data centres won’t be a<br />

problem either as the probe has a headphone<br />

jack socket on the left side.<br />

Beneath the probe’s tip is a high-intensity<br />

white LED so you can find your way in dingy<br />

wiring cabinets, and we liked the central<br />

button design as we could activate tone<br />

detection and the torch together with our<br />

thumb. Another useful feature is that the<br />

probe tip is secured with one screw, so a<br />

broken one can be easily replaced.<br />

For cable tracing, the kit is easy to use and<br />

we barely referred to the manuals when<br />

testing the lab’s Ethernet cable infrastructure.<br />

With the tone generator plugged into the lab’s<br />

network points, we had no problems tracing<br />

the other ends in our rack cabinet cable<br />

bundles as the probe clearly identified them.<br />

The 180000 Tone and Probe Kit will be an<br />

invaluable ally for installers and engineers as<br />

it provides a wealth of cable tracing and<br />

testing functions in a compact and rugged<br />

package. It’s very easy to use, provides plenty<br />

of audio and visual assistance during tests<br />

and at £99 for the complete package, is an<br />

absolute bargain. <strong>NC</strong><br />

Product: R180000 Tone and Probe Kit<br />

Supplier: Trend Networks<br />

Web site: www.trend-networks.com<br />

Tel: +44 (0)1925 428 380<br />

Price: £99 exc VAT<br />

14 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


FEATURE: SASE<br />

CUTTING THROUGH THE NOISE TO FIND YOUR PERFECT SASE PROVIDER<br />

MIKE WOOD, CMO AT VERSA NETWORKS OFFERS HIS ADVICE ON SELECTING THE BEST<br />

SECURE ACCESS SERVICE EDGE VENDOR FOR YOUR BUSINESS<br />

Remote and hybrid working is one of the<br />

most discussed topics in business today -<br />

and this is likely to continue over the next<br />

few years. As soon as this working practice was<br />

deployed nationwide there has been a<br />

constant struggle for businesses to achieve<br />

optimum network connectivity while<br />

maintaining sufficient network security.<br />

Essentially, remote working has been one big<br />

tug of war; connectivity on one side, security<br />

on the other.<br />

In response to this struggle, businesses have<br />

been approached by vendors across the globe,<br />

all offering different solutions for their remote<br />

working conundrums. A popular choice is<br />

Secure Access Service Edge (SASE), a model of<br />

perfect synergy between network and security,<br />

combining solutions like Zero Trust and<br />

Firewall-as-a-Service into a single cloud-based<br />

service.<br />

For businesses that have battled with finding<br />

the optimum balance during the pandemic,<br />

and those still searching, SASE becomes that<br />

all important silver lining. However, with so<br />

many vendors now claiming to offer SASE, it<br />

can be an arduous task trying to find the<br />

perfect solution.<br />

WHAT INDUSTRY CHALLENGES ARE<br />

BUSINESSES FACING?<br />

Unfortunately for businesses, choosing a new<br />

security solution is not like simply browsing<br />

through a catalogue and picking one that<br />

looks the part. There are several factors to<br />

consider relating to current and ongoing<br />

challenges in the industry. Aside from user<br />

experience and security, IT teams must also<br />

strike the right balance between other factors,<br />

such as network visibility and cost.<br />

Since the shift to remote working, IT teams<br />

found themselves responsible for overseeing<br />

the maintenance of all devices and<br />

applications spread across the country. Without<br />

sufficient visibility, the time to identify and locate<br />

an issue or vulnerability greatly increases and<br />

risks interfering with both security effectiveness<br />

and business performance.<br />

Above all else, however, is the pressure to<br />

meet company demands without an increase<br />

in budget or resources. The most direct option<br />

would simply be to employ more staff and<br />

allocate each a single area of focus, but very<br />

few have that luxury. Suddenly, it's easy to see<br />

why the demand for solutions like SASE has<br />

exploded.<br />

WHAT SHOULD BUSINESSES BE<br />

LOOKING FOR IN A SASE PROVIDER?<br />

Before entering into any agreement with a<br />

provider, businesses should first consider their<br />

top priorities and what they want to get out of<br />

their solution. Some vendors will promise you<br />

the world, but the trick is to look past the sales<br />

barrier and ask the important questions.<br />

In our new hybrid world, flexibility and visibility<br />

are two must-haves for any network solution.<br />

Teams should set their sights on SASE options<br />

that deliver a cloud-native architecture that<br />

encompasses everything on one single<br />

management console to maintain and monitor<br />

the network from any location. Finding a<br />

solution that will slot comfortably into existing<br />

security stacks is ideal for organisations<br />

needing to update their systems quickly, without<br />

jeopardising network performance.<br />

As most businesses are made up of a<br />

combination of on-premises and cloud<br />

infrastructure, it's essential to choose a vendor<br />

that can confidently offer multiple<br />

implementation delivery options for any<br />

location and device. Further, it's worth<br />

enquiring about capabilities of integrating data<br />

loss prevention (DLP) technology as a cloud,<br />

multi-cloud and on-premises function to deliver<br />

the necessary protection and visibility over<br />

sensitive data.<br />

Finally, futureproofing is everything.<br />

Businesses are constantly evolving and<br />

growing, so technology must be able to move<br />

with it. The latest security stacks must be able to<br />

integrate future technologies that are frequently<br />

entering the market, such as Internet of Things<br />

(IoT) and 5G, to help businesses keep up with<br />

the latest demands. Additionally, for small<br />

businesses with growth in their sights, the ability<br />

to scale solutions as and when needed is a key<br />

requirement. It's all very well choosing a<br />

provider that can support your systems when<br />

you're a 50-person company, but what about<br />

when you reach 200? Scalability will set apart<br />

those vendors that can provide a successful<br />

long-term service and partnership.<br />

Choosing a SASE provider does not have to<br />

be a long and complicated decision, but<br />

equally it shouldn't be rushed. Taking the time<br />

to sift through all the options to find that needle<br />

in a haystack will guarantee businesses a<br />

strong and long-term solution for their network<br />

performance and cybersecurity. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 15


SECURITY UPDATE<br />

CYBERSECURITY - ARE YOU CONFIDENT OR<br />

COMPLACENT?<br />

PAUL GERMAN, CEO AT CERTES NETWORKS DISCUSSES THE<br />

OFTEN MISPLACED CONFIDE<strong>NC</strong>E SURROUNDING<br />

CYBERSECURITY IN BUSINESSES.<br />

We all know that today's cybersecurity<br />

landscape is an ever-changing one.<br />

So how often should organisations<br />

review their cybersecurity strategy? If it's a<br />

question that hasn't been asked in a while<br />

then chances are that, in this world of<br />

constant threat, you're probably at risk.<br />

Despite the near constant stream of data<br />

breaches making headlines, far too many<br />

organisations insist their current cybersecurity<br />

model is good enough. However, the contrary<br />

holds true. Quite simply, if any of the<br />

statements below apply to your business, then<br />

it's arguable that cybersecurity confidence is<br />

actually misplaced complacency.<br />

1. We haven't been hacked before, and I<br />

know where my organisation's critical or<br />

sensitive data is at all times. Why change<br />

something that's working today?<br />

No business can ever be 100% sure where<br />

its data is or that it hasn't been compromised<br />

in transit. Failure to recognise this issue is a<br />

board-level responsibility.<br />

2. We tick the boxes when it comes to GDPR,<br />

PCI DSS, HIPAA (and other regulations) so my<br />

organisation is secure.<br />

No company that has met their compliance<br />

requirements has ever been hacked, right?<br />

Taking a compliance-led approach to<br />

securing customer data will cause a<br />

fundamental vulnerability within the<br />

cybersecurity infrastructure, simply waiting for<br />

hackers to exploit. Compliance is important,<br />

clearly, but it should be a subset of the<br />

overall, continuously evolving security strategy,<br />

rather than an end-point goal in itself.<br />

Organisations are understandably<br />

concerned about the financial penalties<br />

associated with failing to achieve<br />

regulatory compliance. But take a step<br />

back and consider the financial<br />

implications of a data breach, of high<br />

profile customer data compromise. That is<br />

a far more significant cost and an event<br />

that will have long-term repercussions on<br />

customer perception and loyalty.<br />

3. We trust that our WAN provider has the<br />

necessary controls in place to keep our data<br />

secure as it moves between locations.<br />

WAN providers can't guarantee the security<br />

of their environments, and the security of<br />

your data is ultimately your responsibility.<br />

What's needed is a data-first 'Zero Trust'<br />

mindset that protects data before sending it<br />

to the carrier network.<br />

4. IT costs need to be reduced, so the easiest<br />

thing is to cut the security budget; it reduces<br />

16 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


SECURITY UPDATE<br />

cost without reducing functionality. But, just in<br />

case, we've increased our cyber insurance<br />

coverage.<br />

Cybersecurity insurance policies require<br />

customer diligence. You cannot buy a security<br />

policy, not deploy security and then expect a<br />

post-hack payout. More significantly, think<br />

about the cost and loss of earnings associated<br />

with the fallout of a data breach...<br />

5. My network is secure so I don't need to<br />

secure our data in motion. After all, we own<br />

the entire infrastructure end to end, wherever<br />

our data goes.<br />

When 70% of all breaches are as a result of<br />

internal user compromise, this is a false sense<br />

of security. Not only are current security<br />

models broken, current trust models are too,<br />

so they must be realigned and rebuilt. The<br />

only way to do that is to change the emphasis.<br />

Shift the security focus from infrastructure to<br />

the user or application and it doesn't matter<br />

how complex technology has become, or<br />

becomes in the future; the security model<br />

remains simple and hence both manageable<br />

and relevant. Moreover, whether the<br />

environment is owned by the business, third<br />

party, or in the cloud, when access is based<br />

on users and application, only a user with<br />

cryptographic keys and credentials gains<br />

access. It is that simple.<br />

6. We need not worry: we can do encryption<br />

on our firewall, switches and routers for less<br />

money and achieve the same result.<br />

Turning on encryption in a network device<br />

WILL degrade the performance, typically by<br />

50%. The reason lies in the way encryption<br />

has been deployed to date. In order to<br />

address the continued friction between<br />

operational goals and security imperatives,<br />

organisations need to decouple encryption<br />

from the infrastructure completely and instead<br />

overlay the security measures, leaving the<br />

underlying infrastructure untouched. The<br />

answer is Layer 4 encryption.<br />

Layer 4 encryption is dedicated to providing<br />

the level of trust of data in motion and<br />

applications moving across the infrastructure,<br />

yet avoids any impact on network<br />

performance and complexity. Furthermore,<br />

Layer 4 encryption operates in 'stealth' mode:<br />

it is only the data payload that is encrypted -<br />

not the entire network data packet. All of the<br />

complex management and maintenance<br />

problems created by traditional encryption<br />

deployment are removed. The data in motion<br />

is secure without adding complexity or<br />

compromising the operational performance of<br />

the infrastructure.<br />

7. We don't need encryption because our<br />

firewalls will keep the hackers out, or if not our<br />

intrusion detection will let us know<br />

immediately so we can stop a breach while<br />

it's happening.<br />

The current security mindset must move<br />

away from outdated thinking about<br />

securing the perimeter, assuming that<br />

breaches can be protected against,<br />

detected, and reacted to. With the average<br />

time to detection being 120 to 150 days,<br />

depending on the source, this clearly is a<br />

fallacy. When it comes to data breaches, it<br />

is a case of 'when' not 'if', so organisations<br />

must think about how they can best 'contain'<br />

a hacker from wreaking havoc on their data<br />

by adopting a software-defined approach<br />

to security and leaving the infrastructurebased<br />

security mindset behind.<br />

8. Data compromise is something that<br />

happens to other businesses, not ours!<br />

That's what all the brands that have been in<br />

the headlines over the past 18 months thought<br />

as well. The game has changed; it's no longer<br />

about the high profile, kudos-winning<br />

breaches. Today's hacking community is far<br />

more focused on the theft of sensitive, critical<br />

customer data that will leave those affected<br />

with long-term repercussions. Cybersecurity<br />

must be a process of continual evolution: just<br />

because you feel protected today doesn't mean<br />

you will be tomorrow. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 17


PRODUCT REVIEW<br />

Zivver Secure Email<br />

PRODUCT REVIEW<br />

PRODUCT<br />

REVIEWPRODUCT RE<br />

Email is responsible for the majority of<br />

data breaches and leaks with human<br />

error cited regularly as the main cause.<br />

The reasons are manifold and range from<br />

misaddressed emails to using CC instead of<br />

BCC, and if the message contains<br />

confidential information, companies could<br />

be violating GDPR compliance and facing<br />

hefty fines.<br />

This is where Zivver steps in as its Secure<br />

Email is a deceptively simple solution that<br />

combines machine learning, AI and end-toend<br />

encryption to protect outbound email<br />

throughout the entire creation and delivery<br />

processes. A key feature of Zivver is extreme<br />

ease of use as it slips seamlessly into existing<br />

working practices with minimal disruption and<br />

integrates neatly with Outlook, OWA and<br />

Gmail so users only require basic training.<br />

Fundamental to Zivver is its business rules<br />

as these are applied in real-time to every<br />

message during creation and prior to<br />

sending. Examples include options to enforce<br />

2FA when sensitive information in the<br />

subject, body or attachment is detected,<br />

BCC checks and non-recent sharing of<br />

confidential information.<br />

Zivver detects NHS and credit card<br />

numbers in emails and uses checksum<br />

algorithms to confirm they are genuine<br />

numbers. Rules have three actions where<br />

they highlight possible rule breaches, warn<br />

users that they should rectify the breach or<br />

block them if they don’t.<br />

Deployment is, indeed, a simple process and<br />

starts by providing organisation and email<br />

domain details in your Zivver cloud portal<br />

account. Customisation features are<br />

extensive and include portal branding and<br />

creating personalised notification messages<br />

for recipients.<br />

Setting up Zivver users is simple, as you can<br />

add them manually where they receive an<br />

invitation to create a personal account and<br />

set up 2FA. Larger organisations can employ<br />

Zivver’s SyncTool to synchronise Active<br />

Directory and Exchange accounts.<br />

Our test users were running Outlook and<br />

just needed to download the Zivver Office<br />

plug-in. This added a new option to the<br />

Outlook menu ribbon where they could log<br />

in to their account and, if permitted, access<br />

its message control settings.<br />

Procedures for creating new Outlook<br />

emails are exactly the same but Zivver adds<br />

an upper toolbar to the message highlighting<br />

actions required by the user. Each new<br />

recipient must be verified and methods<br />

include sending them an email, providing a<br />

one-time access code, applying an<br />

organisational code and sending an SMS to<br />

a valid mobile number.<br />

If sensitive information is detected, the<br />

toolbar highlights this and reacts<br />

dynamically to changes made to any part of<br />

the message. Attachments are scanned<br />

when added and a standout feature is<br />

Zivver supports file sizes up to 5TB.<br />

To open secure emails, recipients simply<br />

click the message body link and they are<br />

transported to the Zivver portal where they<br />

enter their verification details. They don’t<br />

require a Zivver account and can receive<br />

secure emails and reply to them irrespective<br />

of their location or email client.<br />

We all know how ineffective standard email<br />

recall processes are but Zivver users can<br />

confidently recall messages sent in error.<br />

Furthermore, if they haven’t been accessed<br />

by any recipients prior to withdrawal, Zivver<br />

guarantees that potential data leaks have<br />

been contained and won’t need reporting.<br />

Along with extensive auditing features in the<br />

admin portal, users can view all emails from<br />

their client, see which recipients opened<br />

them and who downloaded attachments.<br />

They can also login in to their personal<br />

Zivver portal account and view them from<br />

there as well.<br />

Zivver Secure Email is a simple solution to<br />

a major problem that plagues businesses of<br />

all sizes. It’s incredibly easy to deploy,<br />

requires no changes in working practices<br />

and ensures confidential information sent by<br />

email is totally secure. <strong>NC</strong><br />

Product: Secure Email<br />

Supplier: Zivver<br />

Web site: www.zivver.com<br />

Tel: +44 (0)20 3285 6300<br />

18 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


SECURITY UPDATE<br />

A ZERO-TRUST FUTURE FOR A<br />

HYBRID WORKING WORLD<br />

MICHELE MABILIA AT KYOCERA<br />

DOCUMENT SOLUTIONS UK EXPLAINS<br />

WHY A HOLISTIC APPROACH TO<br />

SECURITY IS THE BEST WAY FORWARD<br />

As employees return to offices, what was<br />

a largely successful period of remote<br />

working for many businesses is now<br />

giving way to a hybrid working future.<br />

Flexibility for employees is now the norm<br />

rather than the exception, which promises to<br />

make for happier workforces in the long term.<br />

That said, there are still challenges to<br />

address. One of these is the need to protect<br />

company data and devices from the impact<br />

of ransomware attacks, which have become<br />

the modus operandi for millions of hackers in<br />

the last couple of years.<br />

As businesses plan for hybrid working,<br />

connected devices such as mobile phones,<br />

laptops, desktop computers and printers are<br />

often earmarked for close scrutiny in the bid<br />

to shore up cybersecurity capabilities. To<br />

achieve this, organisations need to take a<br />

cautious approach to security, and ensure<br />

this is replicated across the entire IT estate.<br />

This is where a holistic zero-trust approach<br />

has merit.<br />

THE CHALLENGE<br />

The hybrid working model brings several key<br />

challenges for employers, including the need<br />

to properly manage BYOD policies and staff<br />

using the same devices for work and personal<br />

activities, as well as encouraging responsible<br />

cyber practices without regular face-to-face<br />

interaction. Alongside all of this is the<br />

responsibility to ensure that all endpoints -<br />

whether remote or office-based - have the<br />

right security software in place to prevent<br />

attacks. Finally, this has to be done while<br />

minimising the impact on productivity.<br />

Mobile phones, laptops and printers are<br />

often among the first devices mentioned when<br />

discussing security risks. There are legitimate<br />

reasons for this: these are highly recognisable<br />

pieces of home or office equipment, so it is<br />

easy to consider these devices as a likely route<br />

through which opportunistic hackers could try<br />

to gain access to sensitive data. Alongside<br />

these, the ubiquity of software such as email<br />

or cloud storage means cybercriminals have a<br />

huge attack surface to conduct their<br />

operations. With so many areas to keep an<br />

eye on, a zero-trust approach to IT security<br />

makes sense.<br />

THE RISK<br />

To highlight the current cybersecurity state of<br />

play, recent research has found that 92 per<br />

cent of UK businesses suffered a cyberattack<br />

in the last 12 months, and 78% feel<br />

unprepared to deal with current threats.<br />

Despite the upsurge in cyberattacks, more<br />

than a quarter of UK companies do not<br />

consider IT to be ranked within their top three<br />

priorities as they plan for the next 12 months.<br />

This is concerning when considering the<br />

finding that cyberattacks cost nearly one in ten<br />

(8%) UK businesses over £1 million.<br />

Plenty of work needs to be done across the<br />

entire IT estate, as not enough is being done<br />

to actively address these issues. Organisations<br />

need tools to cover all the bases, including<br />

multi-factor authentication to govern access to<br />

sensitive data, secure document management<br />

systems to ensure information is shared in a<br />

safe and compliant manner, and encryption<br />

capabilities that reduce the chances of stored<br />

data - whether on-premise or in the cloud -<br />

being compromised.<br />

THE REWARD<br />

Adopting a zero-trust framework and applying<br />

it across all elements of the IT estate offers a<br />

variety of security benefits. Zero-trust<br />

presumes all applications and services are<br />

malicious and are denied access from<br />

connecting until they can be positively verified<br />

by their identity attributes. Therefore, this<br />

model reduces risk because it closely<br />

scrutinises what is on the network and how<br />

those assets are communicating. Further, as<br />

baselines are created, a zero-trust model<br />

reduces risk by eliminating overprovisioned<br />

software and services and continuously<br />

checking the 'credentials' of all devices -<br />

whether they are printers, laptops, desktop<br />

computers, mobile phones or any other<br />

internet-enabled technology.<br />

THE FUTURE<br />

Functioning efficiently and safely in a hybrid<br />

work environment all boils down to risk<br />

management. This means getting better<br />

visibility and understanding of the way people<br />

work, and by association, the way they interact<br />

with business systems and sensitive data.<br />

Zero-trust doesn’t have to be a complete<br />

change in the business working model or<br />

mean that existing security architectures need<br />

to be replaced. It simply provides a solution to<br />

gain more control within the network, creating<br />

an even stronger shield and barrier. It is the<br />

way forward for organisations that want to be<br />

confident that they have the necessary tools<br />

and support to combat evolving threats. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 19


OPINION: IoT<br />

THE FOUNDATION FOR IoT SUCCESS IS BUSINESS STRATEGY<br />

WHEN IT COMES TO IoT THE POTENTIAL FOR OUR LIVES, BUSINESSES AND INDUSTRIES TO<br />

TRANSFORM AND IMPROVE HAS NEVER BEEN GREATER, ACCORDING TO ZIZO CEO PETER RUFFLEY<br />

From a fully connected home, through<br />

to data being shared with<br />

manufacturers to help enhance<br />

products and manufacturing methods, the<br />

monitoring of patient wellbeing and<br />

medical equipment with the creation of<br />

'smart' hospitals, optimising the supply<br />

chain and ensuring the right temperature of<br />

goods in transit, and calculating the most<br />

effective route for drivers to enhance the<br />

first and last mile within delivery services -<br />

the possibilities for IoT seem endless.<br />

Research predicts that by 2025, there<br />

will be 55.7 billion connected devices<br />

worldwide, 75% of which will be<br />

connected to an IoT platform. What this<br />

means is that the amount of data being<br />

collected, and potentially the high volume<br />

of low value data collected, is becoming<br />

truly overwhelming.<br />

As Peter Ruffley, CEO at Zizo explains,<br />

whilst 5G and edge computing will make<br />

it possible to transmit data through high<br />

powered, low latency networks, these<br />

technologies are in their infancy, with few<br />

use cases. Network infrastructure<br />

challenges mean that 5G is still some way<br />

off and if we are going to be doubling the<br />

amount of connected IoT devices,<br />

organisations need to fully understand the<br />

value that is locked within their data. The<br />

question has to be, why does ALL IoT data<br />

need to be sent back to data centres?<br />

If organisations want to become truly<br />

data driven and be able to have IoT data<br />

move their business forward, they must<br />

begin by having a concise business<br />

strategy in place, teamed with supporting<br />

technology. In order to do this successfully<br />

20 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: IoT<br />

and achieve the most value from IoT, there<br />

are five steps businesses must consider first.<br />

DEFINING BUSINESS CHALLENGES<br />

Just because an organisation has connected<br />

devices it doesn't mean that they'll<br />

necessarily get value from them. Value lies<br />

within the data. So, whilst there will be those<br />

in the company saying 'we need IoT', what<br />

questions ultimately does the data from IoT<br />

devices need to answer to help the business<br />

grow, improve processes and/or enhance<br />

the customer experience? What insight does<br />

the business want to have from monitoring<br />

each device? What does the outcome of the<br />

investment need to be?<br />

GOOD AND BAD DATA<br />

With so much data at their fingertips (this can<br />

be millions or billions of rows of data),<br />

businesses really need to start, if they haven't<br />

already, moving away from the idea of<br />

having every device connected and the 'let's<br />

store everything just in case' mindset when it<br />

comes to their data. They need to be able to<br />

work out what is 'good' data and what is<br />

'bad' data. If all a business has coming back<br />

from devices is low value data / low hanging<br />

fruit, it will not benefit them.<br />

Cloud storage, while low cost at the start of<br />

any IoT project, quickly becomes expensive<br />

at scale, and the same goes for processing<br />

Peter Ruffley, CEO, Zizo<br />

that data - which as the volume grows, so<br />

does the processing time, and the cost.<br />

EDGE ANALYTICS<br />

Organisations need to become more<br />

strategic with how and where data is<br />

analysed. Not just in terms of getting<br />

insights, but looking at the data itself and<br />

working out where the inherent value lies<br />

within it. When data can be analysed down<br />

at the edge, only the most valuable data<br />

collected will be shared and in real time,<br />

making the process more cost effective to<br />

the business. Additionally, the amount of<br />

data being collected from connected<br />

devices puts a great deal of pressure on a<br />

cloud network.<br />

If organisations want to be sending data<br />

to the cloud, then a hybrid approach using<br />

edge analytics will ease the load. Edge data<br />

analysis is traditionally delivered through a<br />

single sensor node before being passed<br />

back to the cloud, but new advances in<br />

edge computing platforms allow for the<br />

analysis of both real-time and historical<br />

data, creating a more holistic view and<br />

enabling better training models for Artificial<br />

Intelligence and Machine Learning.<br />

READY FOR 5G - WHEN IT ARRIVES<br />

There is no doubt that 5G is going to<br />

make a huge impact on the way that<br />

businesses and other entities, such as smart<br />

cities, are able to utilise and manage data.<br />

However, like the initial roll-out of IoT<br />

platforms and technology, we are still very<br />

much in the early adopter phase, with<br />

limited access to both full 5G platforms or<br />

test beds.<br />

Many technologies are still utilising older<br />

bandwidths, and there is a case for looking<br />

at some of the more proven technologies to<br />

deliver point solutions that are better suited<br />

to individual use cases.<br />

SPECIALIST EXPERTISE<br />

A business might spend a considerable<br />

amount on IoT and other emerging<br />

technologies and be able to retrieve a lot of<br />

data but if it doesn't know how to get value<br />

from it, it's pretty much worthless. Due to the<br />

complex nature of any IoT deployment,<br />

there will be a requirement for specialist<br />

skills and expertise.<br />

Working with device suppliers will help<br />

organisations to understand data formats<br />

and to work out what data is actually<br />

needed to deliver insights to meet the<br />

defined strategy. Edge computing will also<br />

have a big part to play in sending the right<br />

data to tools and technologies that can be<br />

accessed by individuals who can make a<br />

difference for the business. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 21


OPINION: PAAS<br />

FROM NAAS TO PAAS<br />

NEIL TEMPLETON, VICE PRESIDENT, DIGITAL INNOVATION<br />

MARKETING, EXPLORES HOW NETWORK-AS-A-SERVICE CAN<br />

UNLOCK THE VALUE OF PLATFORM-AS-A-SERVICE<br />

The widespread adoption of the<br />

cloud has transformed the way<br />

applications are developed, just as<br />

much as it has transformed the way they<br />

are deployed and consumed.<br />

Cloud platform services, also known as<br />

Platform as a Service (PaaS), is a<br />

complete development and deployment<br />

environment in the cloud. PaaS has<br />

resources that enable developers to<br />

deliver everything from simple cloudbased<br />

apps to sophisticated, cloudenabled<br />

enterprise applications. All<br />

servers, storage, and networking can be<br />

managed by the enterprise or a thirdparty<br />

provider while the developers can<br />

maintain management of the<br />

applications.<br />

No matter the size of the company,<br />

using PaaS offers numerous advantages,<br />

from its scalability through to its simple<br />

and cost effect deployment. But, together<br />

with Network-as-a-Service (NaaS),<br />

developers can support the complete<br />

application lifecycle by unlocking the<br />

value of PaaS.<br />

ANYTHING-AS-A-SERVICE<br />

The three key benefits of a cloud<br />

environment - flexibility, scalability, and<br />

speed - extend quite nicely to app<br />

development and have helped<br />

developers perpetuate transformative<br />

ways of working through concepts such<br />

as Agile and DevOps.<br />

It's becoming an enterprise trend.<br />

Although SaaS (Software-as-a-Service)<br />

will retain the lion’s share of cloud<br />

infrastructure spend for the next several<br />

years, Gartner expects application<br />

infrastructure services, or PaaS, to grow<br />

by a higher margin through <strong>2021</strong>, at<br />

26.6% compared to 16% for SaaS.<br />

This is evidence of adoption trends<br />

moving down the infrastructure stack -<br />

from where they started out, with<br />

consumption of apps, to the creation of<br />

apps. It's a trend that is somewhat<br />

influenced by the pandemic as<br />

enterprises have accelerated digital<br />

transformation plans, ingesting and<br />

expelling almost everything 'as-aservice'.<br />

According to Deloitte, the boost that<br />

XaaS (Anything-as-a-Service) can give to<br />

innovation is wide-ranging, with 80% of<br />

businesses agreeing that adoption of XaaS<br />

has led their organisation to reinvent<br />

business processes, develop new<br />

products/services, invent a new business<br />

model, and even change how they sell to<br />

customers.<br />

To break that down; we've seen how<br />

SaaS has changed the way organisations<br />

consume services; we've seen how IaaS<br />

changes the way companies deploy<br />

software; and PaaS is changing how<br />

software is developed. The next natural<br />

innovation in as-a-Service has to be in<br />

connectivity.<br />

As we have seen with the consumption<br />

and deployment of cloud apps, until the<br />

appearance of NaaS, connectivity was<br />

one of the main stumbling blocks to<br />

maximising cloud value. Simply put, the<br />

historically cumbersome method of<br />

procuring and consuming network<br />

connectivity was out of sync with the<br />

promise of the cloud.<br />

22 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


OPINION: PAAS<br />

Yet just as NaaS solved this challenge<br />

for SaaS and IaaS, it has now emerged as<br />

a key part of the infrastructure puzzle for<br />

developers to unlock the value of PaaS.<br />

PAAS BENEFITS<br />

When it comes to developing enterprise<br />

applications, PaaS makes use of the cloud<br />

to reduce complexity and cost.<br />

Because most PaaS environments are also<br />

supported by their own software<br />

development tools, such as libraries, SDKs<br />

and APIs, they also help streamline and<br />

speed the process up, so developers can<br />

focus on creating a solution and not<br />

wrestling with infrastructure.<br />

PaaS supports the complete application<br />

lifecycle from building, testing and<br />

deployment through to managing and<br />

updating software. Furthermore, there are<br />

now a whole array of tools available to<br />

support and enable associated<br />

development modalities such as Agile<br />

and DevOps.<br />

TOP 5 REASONS TO ADOPT PAAS<br />

1. Speed: PaaS enables developers to get<br />

to work building apps and not configuring<br />

and provisioning their backend<br />

infrastructure.<br />

2. Reduced cost: Because PaaS<br />

environments come with their own prebuilt<br />

libraries, SDKs and APIs, developers<br />

don’t have to start from scratch, requiring<br />

fewer resources or accelerating dev time.<br />

3. Scalability: In the old world of<br />

application building, scaling an app could<br />

prove a headache and required hands-on<br />

resources. But because PaaS is a cloudnative<br />

environment, scalability is also<br />

native, and your app grows with your<br />

business.<br />

4. Portability: Apps today need to work<br />

across multiple environments and the<br />

trend towards containerisation means this<br />

is possible with PaaS.<br />

5. Future proofing: Because the PaaS<br />

vendor is responsible for the platform, all<br />

the new feature updates and security<br />

patches are automatically taken care of,<br />

leaving you to focus on the value offered<br />

by the app itself, not the underlying<br />

infrastructure.<br />

More flexible connectivity options<br />

through NaaS platforms unlock those<br />

same options for the network. This<br />

ensures high reliability today and platform<br />

freedom for the future. If a business needs<br />

change, new connections to new<br />

providers can be provisioned in seconds,<br />

so the tools needed to create the very best<br />

apps and services are always accessible.<br />

NaaS holds a mirror up to digital<br />

transformation driven by changing<br />

customer behaviour. Just as consumers<br />

are used to buying anything at any time<br />

with a tap of a button, enterprise buyers<br />

are looking for the same convenience to<br />

purchase bandwidth online, and ondemand,<br />

instead of being tied to a longterm<br />

contract. This has positive<br />

repercussions for test and production.<br />

The faster new developments and testing<br />

environments can be provisioned and<br />

completed applications deployed, the<br />

faster businesses can get to market. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 23


CASE STUDY<br />

CAN STORAGE EVER BE INSTALLED<br />

AND FORGOTTEN?<br />

RAINER W. KAESE, SENIOR MANAGER BUSINESS DEVELOPMENT,<br />

STORAGE PRODUCTS DIVISION AT TOSHIBA SHARES THE<br />

DETAILS OF A STORAGE SYSTEM THAT HAS BEEN RUNNING FOR<br />

FOUR YEARS WITHOUT ANY NEED FOR MAINTENA<strong>NC</strong>E OR<br />

UNEXPECTED DOWNTIME<br />

Even the most stable and reliable<br />

storage systems still require some<br />

degree of maintenance. Many may<br />

believe that firmware updates, software<br />

updates and replacement of failed storage<br />

components can never be avoided. Really?<br />

This does not have to be so, here is a<br />

storage system example that has been<br />

running for four years without any need for<br />

maintenance or unexpected downtime.<br />

Back in 2017, Toshiba installed a ZFS<br />

storage system supporting storage<br />

infrastructure needs of the "Technology<br />

Experience Lab" at NTT Global Data<br />

Centers. Since then, the storage system has<br />

proven its outstanding reliability: except for<br />

a scheduled 10 minutes of downtime to<br />

install some additional ZFS features, the<br />

system runs steadily without component<br />

failures in any of the 60 HDDs, SSD,<br />

controllers, power supplies, fans, cables or<br />

other components.<br />

The Technology Experience Lab provides<br />

data center managers and their teams with<br />

the room and infrastructure to explore<br />

innovative approaches for architecting their<br />

servers and storage. It enables businesses<br />

to evaluate the efficacy of private or hybrid<br />

clouds, distributed architectures, and<br />

alternative approaches to deliver IT<br />

services in a low-risk environment. In<br />

addition, its community of users provides<br />

support and ideas through meetups, boot<br />

camps, webinars, and hackathons.<br />

In total, 102 TB of net storage were<br />

desired, requiring 240 TB of raw storage,<br />

utilising the ZFS-based JovianDSS software<br />

of Toshiba’s partner Open-E. This software<br />

had proven to offer high availability, no<br />

single point of failure, and high-flexibility,<br />

providing consistent snapshots and instant<br />

restore when required. The hardware to<br />

support it would need to be reliable and<br />

high-performance to take full advantages of<br />

the software, supporting several iSCSI block<br />

storage targets ranging in size from 10 TB<br />

to 40 TB, plus some shared file folders.<br />

The planning stage was the core for the<br />

long-term success of the final storage<br />

implementation. Toshiba often undertakes<br />

research into server implementation in its<br />

laboratories. It has resulted in close<br />

relationships with a broad range of<br />

component and software suppliers coupled<br />

with a deep understanding of what works<br />

well. Leveraging this knowledge, the team<br />

was able to recommend a hardware<br />

architecture that worked with Open-E<br />

JovianDSS and had proven itself in other<br />

projects.<br />

To form the 102 TB of net storage, the<br />

team selected Toshiba’s 4 TB, 3.5" SAS<br />

Enterprise Capacity Drives<br />

(MG04SCA40EA). With their MTTF (mean<br />

time to failure) of 1,400,000 hours and a<br />

non-recoverable error rate of just ten errors<br />

per 1016 bits read, they were ideal for<br />

achieving the reliability required.<br />

Performance was not ignored either. The<br />

7,200 rpm drives achieved a Zpool read<br />

performance rating of 12.9 x single disk<br />

and 8.5 x single disk for writes. For the ZFS<br />

write logs and reach caches, reliable 10<br />

DWPD SAS Enterprise SSDs with 1.6 TB<br />

storage from KIOXIA (formerly Toshiba<br />

Memory) were selected.<br />

A significant factor in HDD failures is<br />

heat, so the HDD enclosure chassis had to<br />

be closely reviewed before selection. The<br />

team selected AIC’s J4060-01 Dual<br />

Expander, 12 GB/s, 60 bay toploader<br />

JBOD. The 1400 W 1+1 hot-swap<br />

redundant 80+ Platinum power supply<br />

24 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


CASE STUDY<br />

ensured electrical efficiency while also<br />

fulfilling the reliability requirements. The<br />

JBOD also features four 80 x 38 mm hotswap<br />

fans. System testing showed that the<br />

coolest and warmest drive temperature<br />

difference was just 4°C, confirming that the<br />

correct JBOD had been selected.<br />

Connectivity to the JBOD was provided<br />

by the Microchip Adaptec® RAID Adapter<br />

ASR-8885 with 8 internal and 8 external<br />

ports, run in HBA mode. This model was<br />

highlighted as a top choice back in 2017.<br />

Finally, the storage server and JBOD<br />

location in the Technology Experience Lab,<br />

at the Frankfurt 1 Campus of NTT Global<br />

Data Centers, was the last piece of the<br />

reliability strategy. Its 60,000 m2 of space<br />

offers exceptional network connectivity and<br />

its power is derived from two separate<br />

European power supply networks that<br />

reach directly to the server and drive<br />

enclosure. Physical security is ensured,<br />

while storage reliability is supported by<br />

their highly efficient cooling system.<br />

Until now the system runs failure-free for<br />

four years and the plan is to continue<br />

running the system to explore its reliability<br />

further – even when the supplier warranty<br />

ends for most of the enterprise-grade<br />

hardware components in one year. Based<br />

on field experience with Toshiba Enterprise<br />

HDDs, the team expects that the storage<br />

has many more years of failure-free<br />

functionality to offer.<br />

Over the course of its operation, the<br />

storage solution has handled a multitude<br />

of proof-of-concept activities in the<br />

Technology Experience Lab, much to the<br />

satisfaction of all involved. "The Technology<br />

Experience Lab benefits a lot from this<br />

storage solution, and we are truly<br />

impressed by its continuous stability. Set up<br />

within our highly available data centers, I<br />

can't imagine a more reliable way of<br />

running enterprise storage. We’re looking<br />

forward to many more years of failure-free<br />

operation", said Dominik Friedel, Business<br />

Development Manager of NTT Global<br />

Data Centers.<br />

Having reviewed how the storage is used,<br />

with countless snapshots and scrubbing,<br />

and iSCSI block targets being connected<br />

and disconnected, week in, week out, the<br />

software has proven to be the optimal<br />

choice too. "I’m proud to see how well this<br />

installation works after all these years, but<br />

I am also sure that this is not all this setup<br />

can do. Excellent performance and<br />

reliability are ensured by the ZFS and<br />

Linux-based system in combination with<br />

first-class hardware, so it can last for<br />

decades. And that's not just a supposition;<br />

Open-E has been developing ZFS data<br />

storage systems for over 20 years and we<br />

have similar, long-lasting installations like<br />

this in use at customers all over the<br />

world”, said Krzysztof Franek, CEO of<br />

Open-E GmbH.<br />

Perhaps most critical to the success of this<br />

project has been the collaboration. Deep<br />

expertise in each field is essential, but is<br />

not enough in isolation. Only by bringing<br />

the best of what technology has to offer<br />

together, and exploring its capabilities and<br />

options, it’s possible to successfully fulfil<br />

such demanding requirements.<br />

"We are exceptionally proud to have the<br />

partner network of Open-E, KIOXIA, AIC,<br />

NTT and Microchip. Even if your Toshiba<br />

Hard Disk Drives are incredibly reliable,<br />

they still need a reliable system built of<br />

many components to deliver real end-user<br />

value", added Rainer Kaese. <strong>NC</strong><br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 25


OPINION: NETOPS<br />

OUT OF NETOPTIONS?<br />

ALAN STEWART BROWN, VP OF EMEA, OPENGEAR ON WHY NETOPS<br />

AND NETWORK AUTOMATION WON’T REPLACE HUMAN EXPERTISE<br />

The road to network resilience is a thorny<br />

one, with networks becoming ever-more<br />

complex and harder to manage. One<br />

way organisations can enhance resilience is by<br />

adopting NetOps: an approach which embeds<br />

a growing amount of automation, virtualisation<br />

and orchestration, to make networking<br />

operations and functions faster and more<br />

accessible. Research commissioned by<br />

Opengear discovered 87% of businesses had<br />

increased investment in NetOps in the past two<br />

years, with a further 51% planning to implement<br />

this functionality in the next year. But as more<br />

businesses adopt a NetOps approach,<br />

particularly via automated processes, the<br />

traditional role of the network engineer has<br />

come under scrutiny.<br />

With the increasing popularity of NetOps and<br />

the ability for automation to reduce human<br />

error, is there still a place for the engineer in the<br />

maintenance of a business network? The<br />

answer is an unequivocal 'yes'. Rather than<br />

removing the need for the network engineer, the<br />

advance of NetOps and network automation<br />

enhances the value network engineers can bring<br />

to a business.<br />

NO MORE HEROES?<br />

Network engineers have historically been viewed<br />

as the saviours when something goes wrong.<br />

The culture around saving the day meant one<br />

professional was relied on to step in when a<br />

fault occurred. They were often seen as having a<br />

level of understanding about the network that<br />

others were unable to attain, and much of the<br />

work involved hard manual effort and following<br />

repetitive applications or routines.<br />

If a particular event had happened on the<br />

network, most companies would expect an<br />

engineer to log in, run through five or six<br />

routines to work out what was happening and<br />

then remediate the problem. NetOps is<br />

changing that culture in a positive way by<br />

altering the entire procedure so that when such<br />

an event happens, the system automatically<br />

runs through those five or six steps. If that does<br />

not resolve the problem it is escalated to the<br />

network engineer to handle the next level of<br />

troubleshooting.<br />

All this removes the dependency on a single<br />

hero to do the diagnostic and remediation<br />

work but also enables more engineers to be<br />

heroes by freeing them to apply their skills more<br />

proactively in managing the network at a<br />

higher operational level.<br />

NEED FOR RESKILLING<br />

Through the capabilities it delivers, NetOps is<br />

helping overcome skills shortages for<br />

businesses. There are simply not enough<br />

engineers available to comprehensively staff<br />

every network location. Businesses can use<br />

NetOps tools to concentrate their network<br />

team's resource at a network operations centre<br />

effectively rather than having to find resources<br />

to staff each and every site.<br />

So, the advent of NetOps will bring new<br />

opportunities to network engineers but will also<br />

require a level of reskilling. For years the badge<br />

of honour was being a certified engineer and<br />

CCIE (Cisco Certified Internetwork Expert) or a<br />

CCNA (Cisco Certified Network Associate) or<br />

J<strong>NC</strong>IE (Juniper). That is still valuable but for<br />

NetOps, there is an additional skillset engineers<br />

will need to train for. They will need to program<br />

in Python, for example, and understand how<br />

docker containers work. They will need to<br />

deploy commonly-used toolsets like Chef,<br />

Puppet and Ansible. Network engineers need to<br />

understand how all this works - and those<br />

businesses that understand all this are training<br />

them up in the required skillsets.<br />

The success of this process will require<br />

commitment from engineers. Some will be<br />

wary of NetOps and automation, in part due<br />

to a lack of understanding of or familiarity with<br />

the approach. Overcoming this will, in part,<br />

come down to engineers being prepared to<br />

dip their toes in the water of the new<br />

approach. Simply using a Raspberry Pi at<br />

home, for example, will help them to gain<br />

experience in that environment.<br />

For young network engineers entering the<br />

business, collaboration with more experienced<br />

employees will be crucial, and the onus will be<br />

on business leaders to ensure that new starters<br />

learn from every aspect of the organisation.<br />

The business may also need to invest more in<br />

training and support for their engineers. In the<br />

Opengear survey, just 32% of respondents<br />

said their network management/engineering<br />

team had undertaken industry training courses<br />

in order to transition to NetOps. More than<br />

half (53%) of the survey sample said they had<br />

personally learnt about it (NetOps) in their<br />

spare time.<br />

Providing more flexibility, increasing speed<br />

and improving programmability, NetOps is a<br />

proactive approach to networking that uses<br />

automation and provisioning to modernise<br />

networks and increase their resilience. Yet, if<br />

enterprises are to make a success of it, they<br />

need to transition to a NetOps culture.<br />

Ultimately, that entails more than just<br />

integration of new solutions; it needs a<br />

mindset shift among the professionals that<br />

work within it.<br />

Enterprises and their engineers taking these<br />

considerations into account and focusing on<br />

achieving them will ensure effective integration<br />

of NetOps and enable a smoother journey on<br />

the road to resilience. <strong>NC</strong><br />

26 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


AWARDS <strong>2021</strong><br />

SPONSORED BY<br />

Photo gallery: https://flic.kr/s/aHsmX4ePr4<br />

A welcome return to networking in <strong>2021</strong><br />

Remote working, hybrid working, WFH -<br />

the past year has been dominated by this<br />

new networking normal, which made the<br />

<strong>2021</strong> Network Computing Awards, held in<br />

central London in October, all the more<br />

welcome. It was a genuinely refreshing change<br />

of pace to finally meet up again with our<br />

industry colleagues, nominees and guests in<br />

an actual, decidedly non-virtual setting!<br />

Despite the obvious difficulties faced by many<br />

as we continue to navigate the pandemic - at<br />

the time of writing the Government's Plan B<br />

has just come into effect - the awards<br />

ceremony was attended by a good number of<br />

people who all contributed to the terrific<br />

atmosphere on the night. I think we weren't the<br />

only ones who were glad to have a decidedly<br />

non-virtual night out again! The overwhelming<br />

feeling from the organisers and the attendees<br />

was that there really is no substitute for<br />

presenting and accepting awards in person.<br />

Over the following pages you'll find a full<br />

round-up of this year's winners. They include<br />

Extreme Networks, winners of Product of the<br />

YouTube: https://youtu.be/CbIErKc7q7Q<br />

Year for ExtremeCloud IQ, DrayTek, winners of<br />

the New Hardware Product of the Year<br />

category, and Storm Technologies, who took<br />

home the trophy for Reseller of the Year. Zyxel<br />

won both the Cloud-Based Solution of the Year<br />

and Network Project of the Year awards and<br />

ExaGrid were also big winners on the night,<br />

collecting four awards including Company of<br />

the Year. We'd like to once again congratulate<br />

all of this year's winners and runner-ups and<br />

thank our awards sponsors, as well as<br />

everyone who took the time to vote online.<br />

www.networkcomputingawards.co.uk<br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards<br />

NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 27


AWARDS <strong>2021</strong><br />

NETWORK INFRASTRUCTURE PRODUCT OF THE YEAR<br />

WINNER: NetAlly LinkRunner 10G<br />

RUNNER UP: Extreme Networks<br />

The LinkRunner® 10G is the most cost-effective solution available for comprehensive 10M/100M, 1G, Multi-Gig, and 10Gig network testing.<br />

LinkRunner 10G simplifies testing and configuration of copper and fiber Ethernet networks, streamlining workflows by combining essential<br />

functions of installation and triage in a single, ruggedized unit. This next-generation Android-based tester delivers complete network validation<br />

and troubleshooting, from the media (copper/fiber) to the application (layers 1 - 7), accelerating deployments, speeding problem identification,<br />

and improving the efficiency and effectiveness of network installers and operations teams. As a lightweight, handheld, multi-function instrument,<br />

LinkRunner 10G eliminates the need to purchase multiple testers.<br />

DATA CENTRE PRODUCT OF THE YEAR<br />

WINNER: Prism DCS Hot/Cold Aisle Containment<br />

RUNNER UP: Supermicro Computer<br />

Prism DCS is a data centre solutions provider specialising in the provision of hot & cold aisle containment, server cabinets, and security<br />

cages. Prism partner with leading data centre operators & global hyperscale providers to improve the efficiency, sustainability and security of<br />

their operations.<br />

Leveraging an in-house manufacture and installation service, Prism provide bespoke engineered solutions that empower clients & endusers<br />

with strategic agility & flexibility in the development of critical digital infrastructure. www.prismdcs.co.uk<br />

IT OPTIMISATION PRODUCT OF THE YEAR<br />

WINNER: Allied Telesis - Vista Manager EX<br />

RUNNER UP: Gigabit Networks<br />

Vista Manager EX is our single-pane-of-glass monitoring and management platform for both Allied Telesis and third party network devices. The<br />

dashboard/map alerts the user to any events affecting the network such as security threats, link tampering, network loops, environmental alarms,<br />

and failed nodes; highlighting them so they can be easily dealt with. Supporting both wired and wireless networks, Vista Manager is a powerful<br />

tool for network service providers or customers wanting to optimise resources and time. Offering centralised network and device management,<br />

firmware and configuration backup, recovery and upgrade tools; its ideal for even the largest enterprise networks.<br />

TESTING/MONITORING PRODUCT OF THE YEAR<br />

WINNER: Netreo Omnicenter<br />

RUNNER UP: NetAlly<br />

Netreo's full-stack IT Infrastructure Management (ITIM) solution features AIOps and high-performance Network Performance Monitoring and<br />

Diagnostics (NPMD) to empower enterprise and IT leaders with AIOps-driven observability, actionable insights, process automation, and<br />

accelerated issue resolution. By having real-time intelligence on all resources, devices and applications deployed in cloud, on-premises and<br />

hybrid networks, Netreo users have the confidence to deliver more reliable and innovative internal and external customer experiences. Netreo is<br />

one of Inc. 5000's fastest-growing companies, trusted worldwide by thousands of private and public entities managing half a billion resources<br />

per day, and available via subscription in on-premises and cloud deployment models.<br />

28 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


AWARDS <strong>2021</strong><br />

TELEPHONY PRODUCT OF THE YEAR<br />

WINNER: CloudCall<br />

RUNNER UP: 3CX<br />

STORAGE PRODUCT OF THE YEAR<br />

WINNER: ExaGrid EX84 appliance<br />

RUNNER UP: Apricorn<br />

ExaGrid's EX84 appliance was voted Storage Product of the Year and we are so proud that our latest appliance models have received such<br />

recognition. In January <strong>2021</strong>, ExaGrid released a new line of Tiered Backup Storage appliances, including our appliance to date, the largest<br />

EX84. The largest ExaGrid system, comprised of 32 EX84 appliances, can take in up to a 2.7PB with an ingest rate of up to 488TB/hour,<br />

making it the largest system, with data deduplication, in the industry that offers aggressive data deduplication. We are so grateful to all of the<br />

voters who chose the EX84 for this award!<br />

NETWORK MANAGEMENT PRODUCT OF THE YEAR<br />

WINNER: Progress Software - WhatsUpGold <strong>2021</strong><br />

RUNNER UP: SolarWinds<br />

Progress Software's WhatsUpGold <strong>2021</strong>is a sophisticated network monitoring solution that delivers an impressive range of tools integrated<br />

seamlessly into a single console. The simplified licensing schemes make it very affordable for SMBs, it is scalable enough for enterprises and the<br />

new log management features add even more versatility. WhatsUp Gold (WUG) is a great network monitoring choice for SMBs and enterprises and<br />

this latest version aims to make it even more appealing.<br />

DATA PROTECTION PRODUCT OF THE YEAR<br />

WINNER: Rohde & Schwarz Cybersecurity - R&S®Trusted Gate<br />

RUNNER UP: Altaro<br />

As a data protection-compliant multi-level system, R&S Trusted Gate offers a way out of the cloud dilemma for public authorities and<br />

companies. The special feature of the solution lies in the secure design of a multi-level system: according to this, the personal content of the<br />

encryption level is separated from the cloud services at the business level. In this way, the benefits of external cloud services can be enjoyed<br />

without transferring personal data to an "insecure third country". Businesses and public authorities retain data sovereignty and meet the<br />

requirements of the GDPR.<br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards<br />

NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 29


AWARDS <strong>2021</strong><br />

SD-WAN VENDOR OF THE YEAR<br />

WINNER: Versa Networks<br />

RUNNER UP: Citrix<br />

CLOUD DELIVERED SECURITY SOLUTION OF THE YEAR<br />

WINNER: Heimdal Security - Privileged Access Management<br />

RUNNER UP: Rohde and Schwarz<br />

Privileged Access Management features a lightweight interface that puts you in complete control over the user's elevated session. Approve or<br />

deny from the dashboard or on the go right from your mobile device. Keep track of sessions, block elevation for system files, live-cancel user<br />

admin rights, set escalation period, and instantly shut down system process after session expiration. Insider threats are on the rise. Deal with<br />

them on your terms and with the best tools available. Privileged Access Management unlocks an extra security layer that prevents malware from<br />

spreading through your networks - automatic rights removal when a threat is detected on a machine running with elevated rights. Prevent,<br />

protect, and secure your networks inside and outside.<br />

THE RETURN ON INVESTMENT AWARD<br />

WINNER: ExaGrid's EX84 appliance<br />

RUNNER UP: OneUp Sales<br />

ExaGrid's EX84 appliance won the Return On Investment award, an especially meaningful win for ExaGrid as we pride ourselves on our unique<br />

scale-out architecture and to end the practice of forklift upgrades and product obsolescence that customers are often faced with. ExaGrid<br />

provides a scale-out architecture where appliances are simply added as data grows. Each appliance includes storage, processor, memory and<br />

network ports, so as data grows, all resources required are available to maintain a fixed-length backup window. This scale-out storage<br />

approach eliminates expensive forklift upgrades, and allows for mixing appliances of different sizes and models in the same scale-out system,<br />

which eliminates product obsolescence while protecting IT investments up front and over time.<br />

NEW HARDWARE PRODUCT OF THE YEAR<br />

WINNER: DrayTek VigorAP 960C<br />

RUNNER UP: Kemp Technologies<br />

The DrayTek VigorAP 960C is a WiFi 6 Access Point with Mesh, offering up to 1.8Gbps Dual-Band wireless rates. WiFi 6 brings significantly<br />

improved efficiency, better overall performance and reliably handles more clients per AP. In addition, there are three operating modes and a<br />

choice of four management methods - making the VigorAP 960C supremely versatile. Use as a standalone AP, range extender or as a Mesh<br />

node with 4 SSIDs per radio and WPA3 security. For more information, visit www.draytek.co.uk.<br />

NEW SOFTWARE PRODUCT OF THE YEAR<br />

WINNER: Rohde & Schwarz Cybersecurity - R&S®Trusted VPN Client<br />

RUNNER UP: DrayTek<br />

R&S Trusted VPN Client by IT security expert Rohde & Schwarz Cybersecurity protects the network communication of a client platform (Windows<br />

laptop or tablet) with a government or corporate network over an untrusted network such as the internet. R&S Trusted VPN Client, approved for<br />

securing "classified information - for official use only" by the German Federal Office for Information Security, is software-based, requires no<br />

additional hardware and functions thanks to zero trust technology independently of the operating system's security mechanisms.<br />

30 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


AWARDS <strong>2021</strong><br />

SALES ENABLEMENT SOLUTION OF THE YEAR<br />

WINNER: OneUp Sales - OneUp Sales<br />

RUNNER UP: WebCRM<br />

Empower directors, managers and consultants with the tools they need to succeed, remote or in-office. With unrivalled performance reporting,<br />

gamification, and daily update emails to your team, OneUp integrates with dozens of CRMs, VOIP systems and other third-party solutions to<br />

enable sales leaders to see all their key metrics in one place. The average salesperson uses 6 systems to carry out their role every day - that's a<br />

lot of places to pull reports from as a manager. OneUp integrations with dozens of systems to ensure your data is all in one place. From CRMs<br />

to VOIP systems to timesheet software, we've got you covered.<br />

EDUCATION AND TRAINING PROVIDER OF THE YEAR<br />

WINNER: CNet Training<br />

RUNNER UP: KnowBe4<br />

Established in 1996, CNet Training is the global leader in technical education for the global digital infrastructure industry (comprising the data<br />

centre and network cable infrastructure sectors). A significant part of CNet's history is the development of The Global Digital Infrastructure<br />

Education Framework, which offers industry professionals an opportunity to map data centre and network infrastructure education, qualifications<br />

and certifications to meet individual and business needs. CNet is also the only industry dedicated education provider to award both<br />

internationally recognised qualifications and professional certifications, starting at level 3 and culminating with a level 7 Masters programs. The<br />

company delivers programs across the world and via live Instructor-led remote attendance. www.cnet-training.com<br />

REMOTE WORKING PRODUCT OF THE YEAR<br />

WINNER: OneUp Sales - OneUp Sales<br />

RUNNER UP: 3CX<br />

We're a highly technical team with a love for building products that delight. We set out on day 1 to do something different - to bring elements of<br />

video games into the corporate world. Our focus was on building more exciting, fulfilling workplaces. Whilst we're not quite handing everyone<br />

an Xbox controller, we like to think we've stayed pretty close to that plan with OneUp Sales.<br />

DISTRIBUTOR OF THE YEAR<br />

WINNER: Brigantia<br />

RUNNER UP: Nuvias<br />

Brigantia is an award-winning, value-added managed services distributor providing a comprehensive range of cybersecurity solutions<br />

complemented by secure, enterprise-class data communications and cloud services. Brigantia has three distinct business areas designed to add<br />

maximum value to its reseller, MSP, MSSP and consultant partners' businesses: Distribution, Consulting and Enhance. Brigantia exists to add<br />

value to all its partners' businesses.<br />

RESELLER OF THE YEAR<br />

WINNER: Storm Technologies<br />

RUNNER UP: Contrac<br />

Established in June 2000, Storm has grown from strength to strength as a focused IT value-added reseller. Our aim is to deliver exceptional<br />

service to our customers in corporate and public sector organisations.<br />

Whether you require developing a specific technology strategy or just looking for some knowledgeable and friendly guidance, we maintain top-tier<br />

accreditations to ensure we can bring you the best possible expertise and pricing. The success of your projects is what drives us. Our people and<br />

operations are second to none, we listen to you and deal with your enquiry quickly and efficiently irrespective of the size of your business.<br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards<br />

NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 31


AWARDS <strong>2021</strong><br />

THE INSPIRATION AWARD<br />

WINNER: Ian Moyse, Chief Revenue Officer, OneUp Sales.<br />

RUNNER UP: Melissa Chambal<br />

"I am really pleased to be recognised for this award, let alone for a second time in recent years. I thank those who nominated and voted for me and<br />

believe it is in return for the contribution I make in giving back to the sector through speaking, panels, schools speaking, blogging and acting as<br />

judge on awards such as WISA, Top Sales, UK Cloud Awards, BESMA, etc. I encourage others to give back and contribute to coaching and<br />

supporting others in their sector." - Ian Moyse.<br />

HARDWARE PRODUCT OF THE YEAR<br />

WINNER: WatchGuard Technologies - Firebox M Series<br />

RUNNER UP: ExaGrid<br />

In October, WatchGuard Technologies announced the release of its new Firebox M290, M390, M590, and M690 unified threat management<br />

appliances. An affordable yet highly capable solution for small and midsize businesses, these new firewalls deliver increased security and the<br />

fastest performance of any mid-range Firebox appliance ever, with the processing power to handle encrypted and HTTPS traffic.<br />

In addition, new expandable ports and integration with WatchGuard Cloud enable these firewalls to offer the flexibility needed to<br />

accommodate changing networking and security needs for customers and service provider partners. For further information, please visit:<br />

www.watchguard.com/wgrd-products/rack-mount/m-series.<br />

SOFTWARE PRODUCT OF THE YEAR<br />

WINNER: Netreo Omnicenter<br />

RUNNER UP: Allied Telesis<br />

Founded in 2000 by ex-Cisco employees, Netreo designs, manufactures, markets, sells and supports IT solutions for optimising the complex and<br />

evolving infrastructures that drive successful global enterprises. Netreo empowers business and IT leadership with real-time observability, AIOpsdriven<br />

analysis, actionable insights, and process automation that drive business success through full-stack IT Infrastructure Management (ITIM),<br />

Network Performance Monitoring and Diagnostics (NPMD), AIOps, Application Performance Management (APM), and Digital Experience<br />

Management (DEM) solutions. Designed for the most complex cloud, on-premises and hybrid infrastructures in highly regulated industries,<br />

Netreo is most prominent in Healthcare, Financial services, Aerospace, Manufacturing, SLED, Retail, Transportation, and Logistics industries.<br />

CLOUD-BASED SOLUTION OF THE YEAR<br />

WINNER: Zyxel Nebula Control Centre<br />

RUNNER UP: OneUp Sales<br />

This year's 'Cloud-Based Solution of the Year' was awarded to Zyxel's Nebula Control Centre. Rachel Rothwell, Regional Director Western<br />

Europe at Zyxel, commented: "We are very proud of this achievement, we have spent many years listening to our customers and developing<br />

a cloud platform with all the facilities our resellers would require, the maturity and depth of the feature set is now well established and is<br />

clearly recognised by winning such an award. I would like to thank all our valued resellers for their votes and loyalty to Zyxel."<br />

32 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK


AWARDS <strong>2021</strong><br />

THE CUSTOMER SERVICE AWARD<br />

WINNER: Kemp Technologies (Kemp is now part of Progress)<br />

RUNNER UP: Brigantia<br />

The Customer Service Award <strong>2021</strong> award is a true testament to our customer-first approach and consistent demonstration of world class<br />

support that our team exhibits daily across all verticals, horizontals and workloads.<br />

Progress Kemp offer the most capable LoadMaster ADC and network visibility products to ensure applications are always-on, highly available<br />

and secure with optimized performance. Our support team is available worldwide and round the clock, in multiple languages, ready to utilize<br />

their advanced networking and security skills and in-depth application knowledge to support every aspect of application delivery, winning us an<br />

overall 94% customer satisfaction score.<br />

SPECIAL AWARD FOR PERFORMA<strong>NC</strong>E DURING THE PANDEMIC<br />

WINNER: Sudlows<br />

RUNNER UP: OneUp Sales<br />

The Coronavirus pandemic has made the last two years particularly challenging. At Sudlows, our teams continued to work extremely hard<br />

throughout this difficult time to deliver critical infrastructure projects across the healthcare and education sectors. We are therefore especially<br />

proud to have won the 'Special Award for Performance During the Pandemic' at the Networking Computing awards. We would like to say a<br />

massive well done and a big thank you to everyone at Sudlows.<br />

THE ONE TO WATCH COMPANY<br />

WINNER: Supermicro Computer<br />

RUNNER UP: OneUp Sales<br />

Supermicro (SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced Server<br />

Building Block Solutions® for Enterprise Data Center, Cloud Computing, Artificial Intelligence, and Edge Computing Systems worldwide.<br />

Supermicro is committed to protecting the environment through its "We Keep IT Green®" initiative and provides customers with the most<br />

energy-efficient, environmentally-friendly solutions available on the market.<br />

BE<strong>NC</strong>H TESTED PRODUCT OF THE YEAR - HARDWARE CATEGORY<br />

WINNER: ExaGrid - Tiered Backup Storage<br />

Ransomware threats are becoming more devious, but ExaGrid's Tiered Backup Storage and its innovative Retention Time-Lock feature<br />

deliver essential protection with a secure, air-gapped retention repository, delayed deletes and immutable data objects. It ensures critical<br />

backups are safe from malicious deletion and even if an attack does succeed in encrypting primary data, ExaGrid's highly efficient recovery<br />

services will have you up and running in no time.<br />

WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards<br />

NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 33


AWARDS <strong>2021</strong><br />

BE<strong>NC</strong>H TESTED PRODUCT OF THE YEAR - SOFTWARE AND SERVICES CATEGORY<br />

WINNER: Progress Software - WhatsUpGold <strong>2021</strong><br />

WhatsUpGold <strong>2021</strong> is a sophisticated network monitoring solution that delivers an impressive range of tools integrated seamlessly into a single<br />

console. The simplified licensing schemes make it very affordable for SMBs, it's scalable enough for enterprises and the new log management<br />

features add even more versatility.<br />

NETWORK PROJECT OF THE YEAR<br />

WINNER: Boudica Schools Trust / Zyxel<br />

Rachel Rothwell, Regional Director Western Europe at Zyxel, commented: "I am especially proud of this award, the recognition for our customer's<br />

hard work and the collaboration between Zyxel and our reseller's to help drive, deliver and succeed on improving the learning and security of<br />

our children's education. The challenges to upgrade the network, improve the speeds and centralise the management has become more<br />

complex due to the evolution of cloud computing creating more challenges on demand and cyber security. We couldn't deliver this without our<br />

valued partners and we thank you Eastern Voice and Data for choosing Zyxel."<br />

THE INNOVATION AWARD<br />

WINNER: CNet Training<br />

RUNNER UP: Kemp Technologies<br />

Designed and delivered by CNet Training, the new 5-day Certified Wireless Infrastructure Technician (CWIT®) technical education program<br />

embraces the very latest innovations and technology focusing on a broad range of common wireless technologies which co-exist to create a<br />

complete wireless networking solution, that deliver a seamless mobility experience. It considers the complete wireless networking footprint that<br />

comprises cellular technology and Wi-Fi as well as Bluetooth, satellite, microwave and line of sight optics.<br />

The program provides the knowledge and practical skills to confidently install, test and certify installations in support of Wireless Ethernet and Small<br />

Cell applications in the WAN environment. www.cnet-training.com/programs/certified-wireless-infrastructure-technician-cwit/<br />

PRODUCT OF THE YEAR<br />

WINNER: Extreme Networks - ExtremeCloud IQ<br />

RUNNER UP: Heimdal Security<br />

ExtremeCloud IQ is a machine learning and AI-driven cloud management platform that simplifies onboarding, configuration, monitoring,<br />

managing, troubleshooting, alerting, and reporting for network infrastructure devices, including new Wi-Fi 6 access points. The platform offers<br />

unmatched cloud deployment flexibility, portable licensing across Extreme's entire portfolio, and industry-leading uptime. It is unequalled in its ability<br />

to provide administrators with a 360-degree view of device, client, application, and network health and performance. ExtremeCloud IQ is the first in<br />

the industry to offer unlimited data retention, giving customers unprecedented access to historical data and enabling increased machine learning<br />

accuracy and precision of AI actions, providing insights and outcomes to help customers improve processes and increase operational efficiency. It is<br />

also built upon a microservices architecture, enabling new services and applications to be added without network downtime or IT staff intervention.<br />

COMPANY OF THE YEAR<br />

WINNER: ExaGrid<br />

RUNNER UP: Allied Telesis<br />

ExaGrid is so honoured to win the Company of the Year award, especially as we were nominated alongside such incredible companies in the<br />

industry. We have received this award two years in a row now, and we are so grateful to our customers, partners, and especially to all of the<br />

voters who have given us their support and continued recognition. We continue to innovate our Tiered Backup Storage solution with the goal of<br />

solving all of the challenges related to backups and we are pleased that our unique approach to backup storage has received such accolades.<br />

Our revenue growth is accelerating as customers leave behind first-generation deduplication appliances.<br />

34 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />

WWW.NETWORKCOMPUTING.CO.UK

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!