NC Nov-Dec 2021
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
NETWORKcomputing<br />
I N F O R M A T I O N A N D C O M M U N I C A T I O N S – N E T W O R K E D www.networkcomputing.co.uk<br />
A GREAT NIGHT FOR NETWORKING<br />
The Network Computing Awards return to<br />
London in style!<br />
THE SASE CHOICE<br />
A closer look at Secure<br />
Access Service Edge<br />
A HYBRID HORIZON<br />
Riding the tidal wave of<br />
digital transformation<br />
OUT OF NETOPTIONS?<br />
Why NetOps isn’t set to<br />
supplant human expertise<br />
NOVEMBER/DECEMBER <strong>2021</strong> VOL 30 NO 04
COMMENT<br />
COMMENT<br />
READY TO WELCOME A HYBRID NEW YEAR?<br />
As we go to print with this issue of Network Computing the UK Government's Plan B<br />
measures have come into effect and all those who weren't already working from home<br />
are being urged to do so once again. It's been clear for some time now that the workplace<br />
has changed irrevocably and hybrid working is here to stay - so how can we ensure<br />
we're working smoothly and securely in the year ahead?<br />
According to Thomas LaRock, Head Geek at SolarWinds, we need to start normalising risk<br />
aversion as we head into 2022. "That is, moving from simply accepting the current exposure<br />
to a mindset where any level of risk exposure is unacceptable. This means beginning to evaluate<br />
and implement the principles of a secure enterprise, starting first and foremost with<br />
understanding security compromises will happen as cyber hackers deploy more sophisticated<br />
attacks. Tech pros should also implement detection, monitoring, alerts, and response along<br />
the kill chain and engage in red team/tabletop exercises to measure effectiveness."<br />
This is echoed by a new whitepaper from VIPRE UK which highlights the need for a change<br />
of employee mindset, urging us to embrace the concept of the 'human firewall': "The 'new<br />
normal' of hybrid working opens up a variety of cyber attack points, including unsecured<br />
internet connections, to simple distractions you normally wouldn't have in an office environment.<br />
Protection starts with the human, as 85% of data breaches involve an internal mistake,<br />
indicating a need for change, and the foundation of this is investing in your human firewall."<br />
REVIEWS:<br />
Dave Mitchell<br />
DEPUTY EDITOR: Mark Lyward<br />
(netcomputing@btc.co.uk)<br />
PRODUCTION: Abby Penn<br />
(abby.penn@btc.co.uk)<br />
DESIGN: Ian Collis<br />
(ian.collis@btc.co.uk<br />
SALES:<br />
David Bonner<br />
(david.bonner@btc.co.uk)<br />
Julie Cornish<br />
(julie.cornish@btc.co.uk)<br />
SUBSCRIPTIONS: Christina Willis<br />
(christina.willis@btc.co.uk)<br />
PUBLISHER: John Jageurs<br />
(john.jageurs@btc.co.uk)<br />
Published by Barrow & Thompkins<br />
Connexion Ltd (BTC)<br />
35 Station Square,<br />
Petts Wood, Kent, BR5 1LZ<br />
Tel: +44 (0)1689 616 000<br />
Fax: +44 (0)1689 82 66 22<br />
SUBSCRIPTIONS:<br />
UK £35/year, £60/two years,<br />
£80/three years;<br />
Europe:<br />
£48/year, £85/two years £127/three years;<br />
ROW:<br />
£62/year, £115/two years, £168/three years;<br />
Subscribers get SPECIAL OFFERS — see subscriptions<br />
advertisement; Single copies of<br />
Network Computing can be bought for £8;<br />
(including postage & packing).<br />
© <strong>2021</strong> Barrow & Thompkins<br />
Connexion Ltd.<br />
All rights reserved.<br />
No part of the magazine may be<br />
reproduced without prior consent, in<br />
writing, from the publisher.<br />
Ransomware is also set to proliferate in the new year, with industry experts forecasting a significant<br />
increase in the rate and sophistication of attacks. Ian McShane, Field CTO, Arctic<br />
Wolf cautions that "We're currently stuck in a culture of 'the here and now' around ransomware.<br />
The National Cybersecurity Centre's latest report on the UK's 'hacking epidemic'<br />
suggests ransomware is an established threat the government is finally waking up to. Soon<br />
though, they will realise this is just the start of a bigger cybersecurity challenge UK businesses<br />
will face heading into 2022. While ransomware is here to stay, it will quickly be recognised<br />
that there is a bigger issue at play here - the entry point. Often technology is considered to<br />
be the first line of defence, but the first line of defence is actually users. Right now, people<br />
don't consider standard technology and users part of the greater supply chain because it does<br />
not feel like a security issue. The fact is simply using email is a supply chain concern."<br />
Whether working home or away - or a hybrid point somewhere between the two - we'll all<br />
have a part to play in keeping this new networking normal secure. <strong>NC</strong><br />
GET FUTURE COPIES FREE<br />
BY REGISTERING ONLINE AT<br />
WWW.NETWORKCOMPUTING.CO.UK/REGISTER<br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 03
CONTENTS<br />
CONTENTS<br />
N O V E M B E R / D E C E M B E R 2 0 2 1<br />
COMMENT.....................................3<br />
Ready to welcome a hybrid New Year?<br />
INDUSTRY NEWS.............................6<br />
The latest networking news<br />
ARTICLES<br />
SECURING A DIGITAL WORKFORCE<br />
WITH SASE......................................10<br />
By Daniel Blackwell at Pulsant<br />
THE SASE CHOICE...............10<br />
Secure Access Service Edge would seem to<br />
offer the perfect blend of networking and<br />
security for our brave new hybrid world. But<br />
where should you start when selecting SASE<br />
for your business?<br />
OUT OF NETOPTIONS?.......26<br />
Alan Stewart Brown, VP of EMEA, Opengear<br />
explains how NetOps and network<br />
automation can enhance the value of<br />
network engineers and their expertise<br />
A HYBRID HORIZON..............8<br />
Jay Alexander, CTO at Keysight<br />
Technologies offers a guide to getting to<br />
grips with digital transformation and<br />
hybrid working<br />
FROM NAAS TO PAAS..........22<br />
Neil Templeton, Vice President of Digital<br />
Innovation Marketing, explores how<br />
Network-as-a-Service can unlock the value<br />
of Platform-as-a-Service<br />
NETWORK COMPUTING<br />
AWARDS <strong>2021</strong>......................27<br />
The Network Computing Awards made a<br />
welcome return to a non-virtual venue in<br />
central London in October. Discover more<br />
about the <strong>2021</strong> winners inside<br />
A ROADMAP TO CLOSING THE<br />
NETWORK AND SECURITY DIVIDE......12<br />
By Neil Thacker at Netskope<br />
CUTTING THROUGH THE NOISE TO<br />
FIND THE PERFECT SASE PROVIDER....15<br />
By Mike Wood at Versa Networks<br />
CYBERSECURITY - ARE YOU<br />
CONFIDENT OR COMPLACENT?....16<br />
By Paul German at Certes Networks<br />
A ZERO-TRUST FUTURE FOR A HYBRID<br />
WORKING WORLD.............................19<br />
By Michele Mabilia at Kyocera Document<br />
Solutions<br />
THE FOUNDATION FOR IoT SUCCESS<br />
IS BUSINESS STRATEGY.......................20<br />
By Peter Ruffley at Zizo<br />
CASE STUDY<br />
CAN STORAGE EVER BE INSTALLED<br />
AND FORGOTTEN?.........................24<br />
Rainer W. Kaese at Toshiba shares the<br />
details of a storage system that has been<br />
running for four years without any need for<br />
maintenance or unexpected downtime<br />
PRODUCT REVIEW<br />
TREND NETWORKS R180000 TONE AND<br />
PROBE KIT........................................14<br />
ZIVVER SECURE EMAIL....................18<br />
04 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
INDUSTRY NEWS<br />
NEWSNEWS<br />
NEWS NEWS<br />
NEWS NEWS NEWS NEWS<br />
NEWS NEWS<br />
IoT network for Cairngorms National Park Authority<br />
Natural beauty spots across Scotland have seen an<br />
unprecedented surge in visitors amid the pandemic, the<br />
Cairngorms National Park Authority (CNPA) is working with<br />
leading IoT service and solutions provider, North to accrue and<br />
access data that will help manage surges of tourism in a<br />
sustainable way.<br />
Through the installation of gateways and sensor devices<br />
connecting to North's IoT Scotland network framework, the<br />
National Park Authority and other local land managers will be<br />
able to use innovative technologies to monitor footfall, route<br />
usage and vehicle parking. The network will also be available to<br />
local businesses to deploy data gathering sensors, providing<br />
them with the opportunity to gain key data findings and insights<br />
on how they can improve their services.<br />
Funded by the Scottish Government, Scottish Enterprise,<br />
Highlands and Islands Enterprise and North, the £6m IoT<br />
Scotland network provides the infrastructure for companies<br />
and organisations to tap into smart sensor applications. The<br />
proposed footfall and car park sensors will be installed<br />
around the Aviemore and Cairngorm areas and will<br />
communicate with the IoT Scotland network through the<br />
gateways set up at Glenmore Lodge, Ciste, Day Lodge and<br />
two buildings within Aviemore.<br />
Using the data from footfall around the area, the National Park<br />
Authority and partners will be able to monitor the most popular<br />
routes and car parks to ensure they are effectively managed to<br />
prevent degradation of the natural beauty spots. Additionally,<br />
sensors will be used to track real-time data to maximise visitor<br />
experience and safety, relieving car park pressures and<br />
encouraging drivers towards less populous areas. Local<br />
businesses will be able to access the network and adopt smart<br />
technology to improve their services in and around the local<br />
area, as they benefit from a surge in visitors from the easing of<br />
lockdown restrictions and flux in 'staycations'.<br />
Core Network Services for the Distributed Edge<br />
NS1 has unveiled its cloud-managed solution for DNS,<br />
DHCP, and IP address management (DDI), delivered<br />
through the NS1 Connect platform. NS1 Cloud-Managed DDI<br />
enables organisations to deliver core network services across<br />
their distributed network footprint with the agility of softwarebased<br />
deployment, the scale of cloud-native operations, and the<br />
operating efficiency of SaaS management.<br />
"Network teams managing application traffic and connectivity in<br />
distributed environments demand a new approach to delivering<br />
core services that can scale with the business," said David Coffey,<br />
chief product officer, NS1. "With the release of Cloud-Managed<br />
DDI on NS1 Connect, we have converged foundational services<br />
like external and internal DNS, DHCP, IPAM, and intelligent traffic<br />
steering on a single technology stack with internet scale<br />
infrastructure, centralised management, lightweight deployment,<br />
automated scalability, and global intelligence."<br />
Supermicro expands GPU system portfolio<br />
Super Micro Computer has released new systems based on<br />
the NVIDIA Ampere architecture GPUs and 3rd Gen Intel<br />
Xeon Scalable processors with built-in AI accelerators<br />
(Supermicro X12 series). These servers are designed for<br />
demanding AI applications where low latency and high<br />
application performance are essential.<br />
The 2U NVIDIA HGX A100 4-GPU system is suited for deploying<br />
modern AI training clusters at scale with high-speed CPU-GPU<br />
and GPU-GPU interconnect. The Supermicro 2U 2-Node system<br />
reduces energy usage and costs by sharing power supplies and<br />
cooling fans and supports a range of discrete GPU accelerators,<br />
which can be matched to the workload. Both of these systems<br />
include advanced hardware security features that are enabled by<br />
the latest Intel Software Guard Extensions (Intel SGX).<br />
Wi-Fi management added into WatchGuard Cloud<br />
WatchGuard Technologies has announced Wi-Fi in<br />
WatchGuard Cloud along with a new line-up of Wi-Fi 6-<br />
enabled access points (APs). The addition of Wi-Fi in<br />
WatchGuard Cloud provides cross-platform integration and<br />
centralised management of all WatchGuard products, while the<br />
new APs give customers enhanced connectivity, performance,<br />
and best-in-class security. The launch of AP130, AP330, and<br />
AP430CR comes as the availability of Wi-Fi 6-enabled devices<br />
continues to grow.<br />
06 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
INDUSTRY NEWS<br />
With support for WPA3, the highest level of encryption, and<br />
cutting-edge Wi-Fi 6 technology, these new APs are perfect for<br />
small to midsize companies and distributed enterprise customers<br />
looking for the most secure Wi-Fi configuration.<br />
TREND Networks launches seven new fibre testers<br />
TREND Networks has expanded its fibre testing range with<br />
seven affordable new products in the FiberMASTER series. A<br />
simple handheld OTDR, PON OTDR, Power Meter and Light<br />
Source, and Inspection Probe will enable cable installers to get<br />
the dependable test results needed, while saving time on training,<br />
and thousands of pounds. The new testers feature industryleading<br />
dynamic range, enabling users to test longer fibers, PON<br />
systems and to maintain accuracy on high-loss fibers.<br />
"Demand for fibre cable is growing as high data volumes and<br />
bandwidth requirements are increasing. At the same time,<br />
skilled technicians are hard to find and technicians coming<br />
into the industry often have minimal training," said Tim<br />
Widdershoven, Marketing Director for TREND Networks. "The<br />
new range is designed so that even those with limited<br />
experience or training can quickly be up and running, carrying<br />
out accurate tests while saving more than 50% compared to<br />
other premium brands."<br />
The new FiberMASTER OTDR, designed for Tier 2 fibre cable<br />
certification, is among the smallest touchscreen OTDRs in the<br />
world. It features simple setup to ensure test accuracy to<br />
ISO/TIA/IEEE standards. Available in Quad, Multi-Mode and<br />
Single-Mode models, the OTDR includes easy to understand<br />
visual event maps to help even novice users interpret test data<br />
correctly. Installers can quickly access a wide range of key<br />
troubleshooting data with the OTDR, such as distance to fault,<br />
length measurement, and distance to connectors or splices via<br />
the tester’s intuitive user interface.<br />
Extreme Networks revs up NASCAR Technology<br />
Extreme Networks is participating in the NASCAR Technology<br />
Partner Platform, an exclusive community of technology<br />
companies working together to evolve the racing industry to new<br />
levels of innovation and success by pushing technological<br />
boundaries. Verizon Business is the technology integration and<br />
managed services lead for the project, deploying an Extreme<br />
large public venue solution architecture inclusive of Wi-Fi 6 access<br />
points and real-time analytics. The deployment spans the 11 high<br />
speed race and super speedways operated directly by NASCAR.<br />
Leveraging Extreme's cloud-driven Wi-Fi 6, NASCAR will offer<br />
high-efficiency, high-capacity networking that will serve as the<br />
critical foundation for powering experiences like mobile ticketing,<br />
mobile concessions, and mobile sports betting. Extreme Analytics<br />
provides NASCAR with real-time visibility into the health and<br />
performance of the Wi-Fi network, mobile application usage<br />
patterns across the stadium, and fan preferences.<br />
Kaseya adds UK GDPR module to Compliance Manager<br />
Kaseya has launched the UK GDPR module for Compliance<br />
Manager. Compliance Manager is Kaseya's award-winning<br />
compliance process automation platform that simplifies assessing,<br />
maintaining and documenting compliance through its wizarddriven<br />
workflow engine, automated network and computer data<br />
discovery, web-based management portal and built-in<br />
compliance document generation and archiving capabilities.<br />
The UK GDPR regulation, which went into effect on 1st January<br />
<strong>2021</strong>, applies to organisations that target, process or store<br />
electronic data from UK citizens, regardless of where the<br />
organisation is located. It is largely based on the original EU<br />
GDPR standard but includes several changes in key areas of the<br />
law concerning national security, intelligence services and<br />
immigration. Kaseya's new module covers the new UK GDPR<br />
requirements around the collection of data from minors and<br />
representatives of controllers outside the UK and includes updated<br />
policies and procedures documents and new recommendations<br />
provided by the UK Information Commissioners Office.<br />
NEWS NEWSNEWS<br />
NEWS<br />
NEWS NEWS NEWS NEWS NEWS<br />
NEWS<br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 07
OPINION<br />
RIDING THE TIDAL WAVE OF DIGITAL TRANSFORMATION<br />
JAY ALEXANDER, CHIEF TECHNOLOGY OFFICER, KEYSIGHT TECHNOLOGIES OFFERS A GUIDE TO<br />
GETTING TO GRIPS WITH DIGITAL TRANSFORMATION AND HYBRID WORKING<br />
Over the past 18 months, many of us<br />
have experienced significant<br />
change, personally and<br />
professionally. As we embark on the "new<br />
normal" - or really the "next normal," because<br />
it, too, will evolve - it's important to<br />
internalise what has happened to the<br />
technology-adoption cycle and the<br />
associated customer expectations.<br />
It starts with digital transformation, the<br />
megatrend affecting virtually all parts of<br />
today's economy. All things digital are the<br />
essential enablers of the longstanding vision<br />
of "everyone and everything, connected." This<br />
enablement has been happening for a long<br />
time, and in many cases has followed a<br />
phased progression, starting with curious early<br />
adopters willing to experiment, and continuing<br />
with acceptance by the cautious mainstream.<br />
But an interesting change to the pattern<br />
occurred during the pandemic: previously<br />
available technologies such as video chat<br />
became ubiquitous. They're now a lifeline to<br />
our families, friends, doctors, and more.<br />
Another example: online ordering for delivery<br />
or pick-up of food, medicine, office supplies,<br />
and even hardware items for home repair, has<br />
increasingly become part of our weekly<br />
routines. Thus, the first effect of the pandemic<br />
on technology evolution has been an<br />
acceleration of the classic adoption cycle.<br />
Broader, faster adoption of new technologies<br />
is driving the second effect: no matter where<br />
or how you engage with digital<br />
transformation, customer expectations have<br />
changed forever. Impatient demands for<br />
instant access, constant availability, and zero<br />
lag are getting stronger and gaining urgency.<br />
These all fit inside the overarching goal of<br />
delivering a great user experience.<br />
MOVING FROM VALIDATION TO<br />
ACCELERATION<br />
This is all very challenging, to say the least,<br />
but there is a positive aspect: the pandemic<br />
experience has thoroughly validated the<br />
core idea that, done wisely, digital<br />
transformation leads to better outcomes for<br />
businesses and customers.<br />
Going forward, we have to assume people<br />
and enterprises will continue to use hybrid<br />
approaches for essentially all activity systems.<br />
Why? Because an "online plus in-person"<br />
hybrid is convenient, it helps to simplify the<br />
process, and it offers the flexibility to address<br />
dynamic or complex requirements. There is no<br />
going back. The worldwide stress test brought<br />
on by the pandemic has amplified the need to<br />
accelerate our collective digital<br />
transformation.<br />
Surveys by Bloomberg, McKinsey, and others<br />
show this is already happening: many or most<br />
companies believe the pandemic has sped up<br />
their digital transformation by three to seven<br />
years. On average, the speed-up is on the<br />
order of 5.3 years.<br />
It can be tempting to simply throw the latest,<br />
hottest new technology at the problem,<br />
hoping that it will magically make everything<br />
work better and keep customers happy.<br />
However, this rarely produces the desired<br />
outcomes and therefore ultimately slows<br />
rather than accelerates the transformation.<br />
A better way to tackle the acceleration<br />
challenge starts with businesses gaining clarity<br />
around individual business strategies in order<br />
to more efficiently meet customer needs. With<br />
a strong customer-centric strategy, clarity<br />
includes three essential elements: a crisp<br />
definition of a customer set, an imaginative<br />
understanding of their unmet needs, and a<br />
compelling offering that delivers real value to<br />
those customers.<br />
08 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION<br />
CREATING BEST-CASE OUTCOMES<br />
With that level of clarity established, a<br />
company can then embark on thoughtful, but<br />
fast-paced, planning of the changes most<br />
relevant to its unique digital transformation<br />
journey. From there it is then possible to move<br />
on to the selection and deployment of the<br />
right technology-or technologies-to make<br />
those changes a reality.<br />
This is because if a business wants to achieve<br />
exceptional performance across all digital<br />
platforms, it will ultimately have to assess how<br />
far it needs to reach - from core to cloud to<br />
edge, or vice versa - and how far up or down<br />
the protocol stack to look. Some may also<br />
find it useful to examine how to validate<br />
performance gains, potential and actual, and<br />
decide what to test in the lab and what to<br />
monitor in the field.<br />
All of this makes it clear that all things digital,<br />
those essential enablers of "everyone and<br />
everything, connected," are also what make for<br />
superior user experience. The business goal is<br />
to create an experience that provides<br />
differentiation and competitive advantage. The<br />
best-case outcome is a user experience that<br />
meets or exceeds ever heightened expectations.<br />
FACING THE CHALLENGES<br />
Getting there is not easy. There are significant<br />
obstacles on the road ahead, and the strain of<br />
the past year and a half has revealed crucial<br />
weaknesses that are on the verge of becoming<br />
fatal liabilities.<br />
Demand for bandwidth continues to grow<br />
unabated, and it's rising like a digital tidal<br />
wave. In today's world, more devices are<br />
transmitting and receiving richer content:<br />
high-resolution images; 4K and 8K video;<br />
dynamic, interactive experiences like<br />
multiplayer gaming; and telemedicine.<br />
Here, the key drivers include exponential<br />
growth in IoT devices and machine-tomachine<br />
communication. They also include<br />
new capabilities and use cases made possible<br />
by the ongoing rollout of 5G. In networking,<br />
the world continues to deploy 400 gigabit<br />
Ethernet, but the jump to 800 gig is coming,<br />
and 1.6 terabit Ethernet is on the horizon.<br />
The need for ever more processing power is<br />
unending. After almost 60 years, it looks like<br />
Moore's Law is decelerating. Makers of<br />
classical computers and supercomputers<br />
continue to innovate, but most are also<br />
investing in quantum computing. Perhaps<br />
ironically, quantum effects in semiconductors<br />
are one of the factors limiting the ability of<br />
device makers to move process geometries<br />
significantly below 5 nanometers. Thus,<br />
between the traditional manufacturers and a<br />
cadre of focused startups, quantum is<br />
gaining momentum.<br />
DRIVING THE DIGITAL<br />
TRANSFORMATION OF EVERYTHING<br />
Pulling back on the zoom lens, these forces<br />
are driving technology trends we all need to<br />
be ready for now: process automation,<br />
machine learning, artificial intelligence, the AI<br />
of things, edge computing, and so much<br />
more. Staying ahead of these trends is<br />
essential to meeting customer needs, building<br />
competitive advantage, and achieving<br />
business success.<br />
ABOUT THE AUTHOR<br />
Jay Alexander is Chief Technology Officer of<br />
Keysight Technologies. He leads Keysight's<br />
centralised technology development team to<br />
focus on addressing top opportunities and<br />
market trends.<br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 09
FEATURE: SASE<br />
SECURING A DISTRIBUTED WORKFORCE<br />
WITH SASE<br />
DANIEL BLACKWELL AT PULSANT EXPLAINS WHY SECURE<br />
ACCESS SERVICE EDGE (SASE) IS THE IDEAL SOLUTION FOR<br />
USER-CENTRIC SECURITY<br />
Despite the widescale shift towards<br />
dispersed working, many businesses still<br />
haven't addressed the long-term security<br />
risks associated with an expanded attack<br />
surface. The problem is employees are now<br />
working from uncontrolled environments.<br />
Personal devices and home networks don't<br />
have the same security protocols and controls<br />
as corporate devices and networks, making<br />
them more prone to cyber attacks. In a remote<br />
environment there is usually little control over<br />
what can be reached over the internet, with<br />
access often shared with other devices, posing<br />
further risks. Many home networks also aren't<br />
password-protected, use easily guessed or<br />
default passwords, or may be configured<br />
without encryption, providing a far easier<br />
avenue for an attacker to gain access to a<br />
corporate network.<br />
REMOVING THE IT HEADACHE<br />
For IT teams this presents a huge headache.<br />
Applying security policies to each remote worker<br />
can be a complex and expensive venture. For<br />
example, applying the same policies and<br />
controls could require deploying a firewall at<br />
each employee's home which is not only<br />
expensive, but creates huge management<br />
overheads. Alternatively, each employee could<br />
be provided with a remote VPN connection<br />
back to a central office location, but as<br />
organisations increasingly move to decentralised<br />
services with SaaS and public cloud, it doesn't<br />
make sense to route traffic back through an<br />
office location.<br />
THE ROLE OF SASE<br />
Secure Access Service Edge (SASE) is the<br />
ideal solution for user-centric security, where<br />
policies can be applied directly to employees,<br />
wherever they are working, using a<br />
centralised management policy. However,<br />
much of what SASE is, or isn't, is yet to be<br />
truly defined or standardised.<br />
Gartner defines SASE as an extension of SD-<br />
WAN to include other network security controls<br />
and services that can be centrally managed<br />
through the same SD-WAN management<br />
plane. Many vendors have jumped on the<br />
SASE bandwagon and are using it to describe<br />
cloud-based security solutions that are not<br />
managed by a single management dashboard<br />
and actually involve multiple separate<br />
products. Others are claiming to provide SASE<br />
even without an SD-WAN offering, while some<br />
offer elements of SASE but not the full product<br />
range. Currently there are very few vendors in<br />
who offer SASE as per Gartner's full definition,<br />
but this doesn't mean that SASE isn't something<br />
that organisations should consider.<br />
ZERO-TRUST POLICIES<br />
At its core SASE is about the application and<br />
the user. With SD-WAN, it's about having<br />
control over the application and applying<br />
routing policies to make sure that the right<br />
applications get the best possible path. This<br />
delivers a better end user experience and<br />
enables organisations to change or bring on<br />
new applications efficiently and quickly.<br />
SASE refers to applying the same principles of<br />
efficiency and agility to security controls. The<br />
application and the user are still considered,<br />
but more specifically the right user getting to<br />
the right applications and only those<br />
applications. This can even be broken down<br />
further to the right device, at the right time of<br />
day, from the right network, and access<br />
restricted to applications and web services<br />
based on the security posture of the user,<br />
device, and destination.<br />
The physical location of the SASE 'engine'<br />
should be considered. The term cloud implies<br />
that something is located everywhere, when in<br />
the UK this typically means it's hosted in one<br />
location. By having regional points-ofpresence,<br />
the enforcement of security policies<br />
is distributed closer to each user wherever they<br />
are working. Using this approach,<br />
organisations can stop employees from<br />
accessing known bad web services, regardless<br />
of location, removing the risk of downloading<br />
malicious files or applications. If malware does<br />
get through and a device is breached, access<br />
can be revoked, preventing attackers from<br />
gaining access to applications or services.<br />
SECURING THE EDGE<br />
SASE forms a comprehensive package that<br />
combines a variety of solutions, and as<br />
organisations move towards distributed and<br />
decentralised applications, SASE and SD-WAN<br />
provide agile and flexible central controls.<br />
Remote working policies are now permanent<br />
and widespread, and in the near future, SASE<br />
and SD-WAN will enable both IT and security<br />
teams to bring security protocols closer to users.<br />
The outcome will be a highly-resilient network<br />
that truly supports its users and protects them<br />
from emerging and increasingly sophisticated<br />
cyber threats - wherever they are. <strong>NC</strong><br />
10 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
NETWORKcomputing<br />
We introduced the Network Computing "Masterclass" into the magazine a few years back. A<br />
Masterclass series in the magazine run for at least a year. Some have successfully run for longer. This<br />
concept enables us, with the help of a an expert vendor, to cover a subject area in a far more<br />
detailed way than could ever be covered in a single article. We feel that the Masterclasses we have<br />
carried have done a valuable job in guiding readers through many of the issues that they need to be<br />
aware of - issues that are perhaps not being talked about elsewhere. Vendor branding appears on<br />
the Masterclass page to distinguish a Masterclass article from the many "one-off" articles that we<br />
carry in Network Computing.<br />
We have identified a number of key subject areas which we feel would benefit from a Masterclass.<br />
These are:<br />
Network Testing and Monitoring<br />
Cabling and cable management<br />
Network access control<br />
Powering a Network<br />
The transition to unified comms<br />
Desktop virtualisation<br />
Traffic management<br />
Using a Data Centre<br />
Advantages and challenges of relying on an increasingly mobile workforce<br />
Cloud security<br />
Education and training<br />
If any of these subject areas are to be covered in a Masterclass we will be<br />
seeking a Partner to work with. A Masterclass Partner will ideally be a vendor<br />
with a track record of expertise in the particular area. Are you a vendor<br />
who could help us in launching a Masterclass covering one of the subjects<br />
listed above ? Alternatively, could you recommend an organisation who<br />
could help us ? Your suggestions will be very welcome.<br />
Please contact david.bonner@btc.co.uk
FEATURE: SASE<br />
A ROADMAP TO CLOSING THE NETWORK<br />
AND SECURITY DIVIDE<br />
NETWORK AND SECURITY TEAMS CAN NO LONGER OPERATE AS<br />
PARALLEL-BUT-SEPARATE ENTITIES, ACCORDING TO NEIL THACKER,<br />
CISO EMEA AT NETSKOPE<br />
Cloud-centric digital transformation has<br />
allowed network teams to build a<br />
workplace that can be anywhere, at<br />
any time and at the convenience of<br />
employees. This has revolutionised how we<br />
work, and made the enforced shift to remote<br />
and home working during the pandemic<br />
possible. It has also brought challenges,<br />
particularly for security teams who still need to<br />
identify employees and provision access to<br />
the required services in a secure manner.<br />
Before the widespread shift to the cloud, a<br />
security problem was just that; a problem for<br />
the security team to handle. However,<br />
increasingly network and security teams are<br />
no longer able to operate as parallel-butseparate<br />
teams; they have to function<br />
seamlessly together if the organisation is to<br />
operate safely and effectively.<br />
Traditionally both teams could coexist<br />
without significant issues but within the cloud,<br />
the primary concern of the networking<br />
function - performance - is not so easily<br />
separated from security's need to protect. The<br />
protective perimeter approach is no longer<br />
applicable in this new cloud environment.<br />
That means, as networking teams look to<br />
maximise all of the potential performance<br />
benefits from operating in the cloud, they<br />
must find a way to balance security's need to<br />
secure and control who has access to<br />
corporate data without negatively impacting<br />
performance.<br />
Most teams know they need to play well<br />
together and see the need for a change in<br />
attitudes and closer collaboration.<br />
Companies are exploring ways to converge<br />
efforts, personnel and budgets by adopting a<br />
SASE (Secure Access Service Edge)<br />
architecture as a way to ensure neither<br />
performance nor protection is deprioritised. If<br />
early transitions to the cloud were complex,<br />
this next step will be no less challenging. My<br />
job is to support CIOs, security leads and<br />
networking teams to make these necessary<br />
changes and I advise starting with three steps.<br />
Firstly, establish some shared parameters<br />
and metrics for success. By agreeing on a<br />
common set of parameters for digital risk,<br />
network performance, and user experience,<br />
network and security teams can ensure that<br />
everyone is working towards a common goal<br />
with no conflicting priorities. Once that is<br />
done, every activity or change can be<br />
measured and evaluated against those<br />
agreed goals. Each team must be equally<br />
12 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
FEATURE: SASE<br />
responsible for each of the metrics. This can<br />
feel like a big cultural change but establishing<br />
this at the beginning means no procurement<br />
decision is taken, or architectural ideology<br />
pursued, that would negatively impact upon<br />
an agreed KPI. These parameters enable<br />
teams to enter purchasing processes with<br />
clear red lines for all parties, meaning you<br />
can pass any potential sources of internal<br />
conflict onto the vendor pitching their<br />
technology solution.<br />
Secondly, it's vital to make sure that there is<br />
good visibility of performance on an ongoing<br />
basis. Understanding how data is used has<br />
always been a driver of improved<br />
performance both for interfiling potential<br />
optimisations and removing roadblocks. The<br />
benefits of the cloud do not need to be at the<br />
expense of visibility over what data is being<br />
used - by whom, when, and in what ways.<br />
Security professionals often find<br />
themselves uncomfortable if performance,<br />
cost and usability advantage are prioritised<br />
over risk management. With ever more<br />
threats now focused on exploiting<br />
vulnerabilities in accessing the cloud, a lack<br />
of visibility is no longer something<br />
businesses can afford to tolerate.<br />
SASE allows businesses to secure data<br />
wherever it resides or travels (inside or outside<br />
of corporate infrastructure). Network and<br />
security teams should use the insights<br />
delivered by a mature SASE platform to reveal<br />
the reality of business activity and processes,<br />
and identify opportunities to improve<br />
performance or implement policies that<br />
secure vulnerabilities. Constant visibility over<br />
activity enables continuous learning about the<br />
ways in which the business is operating, and<br />
understanding of end-user actions,<br />
behaviours and processes, and so will help<br />
manage digital risk as well as identifying<br />
potential improvements in performance.<br />
Once you have established shared<br />
parameters and created a system that gives<br />
you good insight into performance, the third<br />
step is to develop a coordinated strategy to<br />
combat emerging threats. With these<br />
structures in place, network and security<br />
teams can get ahead of threats and develop<br />
clear business, network, and security<br />
procedures that fall within a set risk tolerance.<br />
Just as improved visibility can allow network<br />
professionals to use the latest threat<br />
intelligence to design a more robust and<br />
appropriate access infrastructure, the set<br />
parameters also prevent security professionals<br />
from designing architectures that result in an<br />
unacceptable drop in performance. Adopting<br />
SASE architecture forces network and security<br />
teams to embrace a shared strategy,<br />
recognising that collaboration from the outset<br />
is the only way to meet both teams' objectives.<br />
One lasting effect of Covid-19 will be the<br />
mass adoption of a work-from-anywhere<br />
approach. It is clear that employees like being<br />
able to work at a time and place that works<br />
best for them, using the devices they choose,<br />
and accessing the applications that they<br />
determine best support productivity.<br />
Networking and security teams are therefore<br />
having to rethink their 'business-as-usual'<br />
infrastructure as a result of these new working<br />
approaches, and If we do not identify and<br />
respond to them then we fail in our core<br />
responsibility to facilitate and support business<br />
operations. But this change cannot mean<br />
compromising the security of corporate data.<br />
To summarise, when working with the cloud,<br />
networking and security teams have parallel<br />
goals and must collaborate to build an<br />
enabling infrastructure that both protects and<br />
shares the essential data that enables long<br />
term business growth. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 13
PRODUCT REVIEW<br />
Trend Networks<br />
R180000 Tone and<br />
Probe Kit<br />
PRODUCT REVIEW<br />
PRODUCT<br />
REVIEWPRODUCT RE<br />
Atone generator and probe kit is an<br />
essential piece of equipment for all<br />
professional cable guys. It allows them<br />
to trace, identify and verify data, telephone,<br />
coax and electrical cable runs, identify<br />
unlabelled cables and quickly troubleshoot<br />
faulty connections. There’s no shortage of kits<br />
on today’s market but the Trend Networks<br />
R180000 Tone and Probe Kit stands out for a<br />
number of sound reasons. It offers a power<br />
output of 11dBm (decibel milliwatts) meaning<br />
it can trace any copper cable over long<br />
distances, the higher amplifier gain of the<br />
probe enabling users to pick up weak signals<br />
and trace the cable with ease.<br />
The Tone generator’s multi resistance range<br />
of continuity tests make judging the resistance<br />
range of the cable a simple affair, and the<br />
unbalanced pair applying tone on RJ45<br />
socket pins increases the radiation of the tone.<br />
The kit’s ergonomic design makes it very easy<br />
to use and its rugged build quality allows it to<br />
go where other kits fear to tread.<br />
The kit comprises the Trend Networks<br />
R180002 tone generator, the R180001<br />
amplifier probe, a short RJ-45 to RJ-11<br />
adapter cable and a crocodile to RJ-45 patch<br />
cord for connecting to unterminated wires. It’s<br />
all neatly packed into a sturdy carry case with<br />
a Velcro strap for belt attachment.<br />
Constructed of high-impact plastic, the<br />
palm-sized tone generator has an RJ-45 port<br />
at the top and two buttons on its upper<br />
surface for selecting the test modes and tone<br />
patterns. The test mode button is used to swap<br />
between tone generation and continuity tests<br />
while the tone pattern button offers two warble<br />
speeds and is also used to power the unit off.<br />
Plenty of LEDs are provided with upper ones<br />
for reverse and normal polarity and another<br />
for voltage indication, tone generation,<br />
continuity test and Talk Set power status. The<br />
Line 2 LED indicates a voltage has been<br />
detected and a smart safety feature will<br />
illuminate when the unit is turned off to<br />
indicate a voltage is present on the cable<br />
under test.<br />
Running continuity tests is easy as you short<br />
the wires at the far end of the circuit and<br />
select this test from the tone generator’s<br />
mode button. Audio and visual cues are<br />
provided as the unit indicates the resistance<br />
of the circuit by emitting a continuous sound<br />
or a series of beeps, while the dedicated<br />
continuity LED will be solidly lit or will use<br />
different patterns of flashes also based on the<br />
measured resistance.<br />
The R180001 amplifier probe is an equally<br />
well constructed plastic wand. Tone detection<br />
is activated by pressing the large yellow button<br />
and an LED below the tip shows the signal<br />
strength. A volume wheel is located on the<br />
right side and we were impressed with how<br />
loud the probe’s integral speaker was.<br />
Operation in noisy data centres won’t be a<br />
problem either as the probe has a headphone<br />
jack socket on the left side.<br />
Beneath the probe’s tip is a high-intensity<br />
white LED so you can find your way in dingy<br />
wiring cabinets, and we liked the central<br />
button design as we could activate tone<br />
detection and the torch together with our<br />
thumb. Another useful feature is that the<br />
probe tip is secured with one screw, so a<br />
broken one can be easily replaced.<br />
For cable tracing, the kit is easy to use and<br />
we barely referred to the manuals when<br />
testing the lab’s Ethernet cable infrastructure.<br />
With the tone generator plugged into the lab’s<br />
network points, we had no problems tracing<br />
the other ends in our rack cabinet cable<br />
bundles as the probe clearly identified them.<br />
The 180000 Tone and Probe Kit will be an<br />
invaluable ally for installers and engineers as<br />
it provides a wealth of cable tracing and<br />
testing functions in a compact and rugged<br />
package. It’s very easy to use, provides plenty<br />
of audio and visual assistance during tests<br />
and at £99 for the complete package, is an<br />
absolute bargain. <strong>NC</strong><br />
Product: R180000 Tone and Probe Kit<br />
Supplier: Trend Networks<br />
Web site: www.trend-networks.com<br />
Tel: +44 (0)1925 428 380<br />
Price: £99 exc VAT<br />
14 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
FEATURE: SASE<br />
CUTTING THROUGH THE NOISE TO FIND YOUR PERFECT SASE PROVIDER<br />
MIKE WOOD, CMO AT VERSA NETWORKS OFFERS HIS ADVICE ON SELECTING THE BEST<br />
SECURE ACCESS SERVICE EDGE VENDOR FOR YOUR BUSINESS<br />
Remote and hybrid working is one of the<br />
most discussed topics in business today -<br />
and this is likely to continue over the next<br />
few years. As soon as this working practice was<br />
deployed nationwide there has been a<br />
constant struggle for businesses to achieve<br />
optimum network connectivity while<br />
maintaining sufficient network security.<br />
Essentially, remote working has been one big<br />
tug of war; connectivity on one side, security<br />
on the other.<br />
In response to this struggle, businesses have<br />
been approached by vendors across the globe,<br />
all offering different solutions for their remote<br />
working conundrums. A popular choice is<br />
Secure Access Service Edge (SASE), a model of<br />
perfect synergy between network and security,<br />
combining solutions like Zero Trust and<br />
Firewall-as-a-Service into a single cloud-based<br />
service.<br />
For businesses that have battled with finding<br />
the optimum balance during the pandemic,<br />
and those still searching, SASE becomes that<br />
all important silver lining. However, with so<br />
many vendors now claiming to offer SASE, it<br />
can be an arduous task trying to find the<br />
perfect solution.<br />
WHAT INDUSTRY CHALLENGES ARE<br />
BUSINESSES FACING?<br />
Unfortunately for businesses, choosing a new<br />
security solution is not like simply browsing<br />
through a catalogue and picking one that<br />
looks the part. There are several factors to<br />
consider relating to current and ongoing<br />
challenges in the industry. Aside from user<br />
experience and security, IT teams must also<br />
strike the right balance between other factors,<br />
such as network visibility and cost.<br />
Since the shift to remote working, IT teams<br />
found themselves responsible for overseeing<br />
the maintenance of all devices and<br />
applications spread across the country. Without<br />
sufficient visibility, the time to identify and locate<br />
an issue or vulnerability greatly increases and<br />
risks interfering with both security effectiveness<br />
and business performance.<br />
Above all else, however, is the pressure to<br />
meet company demands without an increase<br />
in budget or resources. The most direct option<br />
would simply be to employ more staff and<br />
allocate each a single area of focus, but very<br />
few have that luxury. Suddenly, it's easy to see<br />
why the demand for solutions like SASE has<br />
exploded.<br />
WHAT SHOULD BUSINESSES BE<br />
LOOKING FOR IN A SASE PROVIDER?<br />
Before entering into any agreement with a<br />
provider, businesses should first consider their<br />
top priorities and what they want to get out of<br />
their solution. Some vendors will promise you<br />
the world, but the trick is to look past the sales<br />
barrier and ask the important questions.<br />
In our new hybrid world, flexibility and visibility<br />
are two must-haves for any network solution.<br />
Teams should set their sights on SASE options<br />
that deliver a cloud-native architecture that<br />
encompasses everything on one single<br />
management console to maintain and monitor<br />
the network from any location. Finding a<br />
solution that will slot comfortably into existing<br />
security stacks is ideal for organisations<br />
needing to update their systems quickly, without<br />
jeopardising network performance.<br />
As most businesses are made up of a<br />
combination of on-premises and cloud<br />
infrastructure, it's essential to choose a vendor<br />
that can confidently offer multiple<br />
implementation delivery options for any<br />
location and device. Further, it's worth<br />
enquiring about capabilities of integrating data<br />
loss prevention (DLP) technology as a cloud,<br />
multi-cloud and on-premises function to deliver<br />
the necessary protection and visibility over<br />
sensitive data.<br />
Finally, futureproofing is everything.<br />
Businesses are constantly evolving and<br />
growing, so technology must be able to move<br />
with it. The latest security stacks must be able to<br />
integrate future technologies that are frequently<br />
entering the market, such as Internet of Things<br />
(IoT) and 5G, to help businesses keep up with<br />
the latest demands. Additionally, for small<br />
businesses with growth in their sights, the ability<br />
to scale solutions as and when needed is a key<br />
requirement. It's all very well choosing a<br />
provider that can support your systems when<br />
you're a 50-person company, but what about<br />
when you reach 200? Scalability will set apart<br />
those vendors that can provide a successful<br />
long-term service and partnership.<br />
Choosing a SASE provider does not have to<br />
be a long and complicated decision, but<br />
equally it shouldn't be rushed. Taking the time<br />
to sift through all the options to find that needle<br />
in a haystack will guarantee businesses a<br />
strong and long-term solution for their network<br />
performance and cybersecurity. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 15
SECURITY UPDATE<br />
CYBERSECURITY - ARE YOU CONFIDENT OR<br />
COMPLACENT?<br />
PAUL GERMAN, CEO AT CERTES NETWORKS DISCUSSES THE<br />
OFTEN MISPLACED CONFIDE<strong>NC</strong>E SURROUNDING<br />
CYBERSECURITY IN BUSINESSES.<br />
We all know that today's cybersecurity<br />
landscape is an ever-changing one.<br />
So how often should organisations<br />
review their cybersecurity strategy? If it's a<br />
question that hasn't been asked in a while<br />
then chances are that, in this world of<br />
constant threat, you're probably at risk.<br />
Despite the near constant stream of data<br />
breaches making headlines, far too many<br />
organisations insist their current cybersecurity<br />
model is good enough. However, the contrary<br />
holds true. Quite simply, if any of the<br />
statements below apply to your business, then<br />
it's arguable that cybersecurity confidence is<br />
actually misplaced complacency.<br />
1. We haven't been hacked before, and I<br />
know where my organisation's critical or<br />
sensitive data is at all times. Why change<br />
something that's working today?<br />
No business can ever be 100% sure where<br />
its data is or that it hasn't been compromised<br />
in transit. Failure to recognise this issue is a<br />
board-level responsibility.<br />
2. We tick the boxes when it comes to GDPR,<br />
PCI DSS, HIPAA (and other regulations) so my<br />
organisation is secure.<br />
No company that has met their compliance<br />
requirements has ever been hacked, right?<br />
Taking a compliance-led approach to<br />
securing customer data will cause a<br />
fundamental vulnerability within the<br />
cybersecurity infrastructure, simply waiting for<br />
hackers to exploit. Compliance is important,<br />
clearly, but it should be a subset of the<br />
overall, continuously evolving security strategy,<br />
rather than an end-point goal in itself.<br />
Organisations are understandably<br />
concerned about the financial penalties<br />
associated with failing to achieve<br />
regulatory compliance. But take a step<br />
back and consider the financial<br />
implications of a data breach, of high<br />
profile customer data compromise. That is<br />
a far more significant cost and an event<br />
that will have long-term repercussions on<br />
customer perception and loyalty.<br />
3. We trust that our WAN provider has the<br />
necessary controls in place to keep our data<br />
secure as it moves between locations.<br />
WAN providers can't guarantee the security<br />
of their environments, and the security of<br />
your data is ultimately your responsibility.<br />
What's needed is a data-first 'Zero Trust'<br />
mindset that protects data before sending it<br />
to the carrier network.<br />
4. IT costs need to be reduced, so the easiest<br />
thing is to cut the security budget; it reduces<br />
16 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
SECURITY UPDATE<br />
cost without reducing functionality. But, just in<br />
case, we've increased our cyber insurance<br />
coverage.<br />
Cybersecurity insurance policies require<br />
customer diligence. You cannot buy a security<br />
policy, not deploy security and then expect a<br />
post-hack payout. More significantly, think<br />
about the cost and loss of earnings associated<br />
with the fallout of a data breach...<br />
5. My network is secure so I don't need to<br />
secure our data in motion. After all, we own<br />
the entire infrastructure end to end, wherever<br />
our data goes.<br />
When 70% of all breaches are as a result of<br />
internal user compromise, this is a false sense<br />
of security. Not only are current security<br />
models broken, current trust models are too,<br />
so they must be realigned and rebuilt. The<br />
only way to do that is to change the emphasis.<br />
Shift the security focus from infrastructure to<br />
the user or application and it doesn't matter<br />
how complex technology has become, or<br />
becomes in the future; the security model<br />
remains simple and hence both manageable<br />
and relevant. Moreover, whether the<br />
environment is owned by the business, third<br />
party, or in the cloud, when access is based<br />
on users and application, only a user with<br />
cryptographic keys and credentials gains<br />
access. It is that simple.<br />
6. We need not worry: we can do encryption<br />
on our firewall, switches and routers for less<br />
money and achieve the same result.<br />
Turning on encryption in a network device<br />
WILL degrade the performance, typically by<br />
50%. The reason lies in the way encryption<br />
has been deployed to date. In order to<br />
address the continued friction between<br />
operational goals and security imperatives,<br />
organisations need to decouple encryption<br />
from the infrastructure completely and instead<br />
overlay the security measures, leaving the<br />
underlying infrastructure untouched. The<br />
answer is Layer 4 encryption.<br />
Layer 4 encryption is dedicated to providing<br />
the level of trust of data in motion and<br />
applications moving across the infrastructure,<br />
yet avoids any impact on network<br />
performance and complexity. Furthermore,<br />
Layer 4 encryption operates in 'stealth' mode:<br />
it is only the data payload that is encrypted -<br />
not the entire network data packet. All of the<br />
complex management and maintenance<br />
problems created by traditional encryption<br />
deployment are removed. The data in motion<br />
is secure without adding complexity or<br />
compromising the operational performance of<br />
the infrastructure.<br />
7. We don't need encryption because our<br />
firewalls will keep the hackers out, or if not our<br />
intrusion detection will let us know<br />
immediately so we can stop a breach while<br />
it's happening.<br />
The current security mindset must move<br />
away from outdated thinking about<br />
securing the perimeter, assuming that<br />
breaches can be protected against,<br />
detected, and reacted to. With the average<br />
time to detection being 120 to 150 days,<br />
depending on the source, this clearly is a<br />
fallacy. When it comes to data breaches, it<br />
is a case of 'when' not 'if', so organisations<br />
must think about how they can best 'contain'<br />
a hacker from wreaking havoc on their data<br />
by adopting a software-defined approach<br />
to security and leaving the infrastructurebased<br />
security mindset behind.<br />
8. Data compromise is something that<br />
happens to other businesses, not ours!<br />
That's what all the brands that have been in<br />
the headlines over the past 18 months thought<br />
as well. The game has changed; it's no longer<br />
about the high profile, kudos-winning<br />
breaches. Today's hacking community is far<br />
more focused on the theft of sensitive, critical<br />
customer data that will leave those affected<br />
with long-term repercussions. Cybersecurity<br />
must be a process of continual evolution: just<br />
because you feel protected today doesn't mean<br />
you will be tomorrow. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 17
PRODUCT REVIEW<br />
Zivver Secure Email<br />
PRODUCT REVIEW<br />
PRODUCT<br />
REVIEWPRODUCT RE<br />
Email is responsible for the majority of<br />
data breaches and leaks with human<br />
error cited regularly as the main cause.<br />
The reasons are manifold and range from<br />
misaddressed emails to using CC instead of<br />
BCC, and if the message contains<br />
confidential information, companies could<br />
be violating GDPR compliance and facing<br />
hefty fines.<br />
This is where Zivver steps in as its Secure<br />
Email is a deceptively simple solution that<br />
combines machine learning, AI and end-toend<br />
encryption to protect outbound email<br />
throughout the entire creation and delivery<br />
processes. A key feature of Zivver is extreme<br />
ease of use as it slips seamlessly into existing<br />
working practices with minimal disruption and<br />
integrates neatly with Outlook, OWA and<br />
Gmail so users only require basic training.<br />
Fundamental to Zivver is its business rules<br />
as these are applied in real-time to every<br />
message during creation and prior to<br />
sending. Examples include options to enforce<br />
2FA when sensitive information in the<br />
subject, body or attachment is detected,<br />
BCC checks and non-recent sharing of<br />
confidential information.<br />
Zivver detects NHS and credit card<br />
numbers in emails and uses checksum<br />
algorithms to confirm they are genuine<br />
numbers. Rules have three actions where<br />
they highlight possible rule breaches, warn<br />
users that they should rectify the breach or<br />
block them if they don’t.<br />
Deployment is, indeed, a simple process and<br />
starts by providing organisation and email<br />
domain details in your Zivver cloud portal<br />
account. Customisation features are<br />
extensive and include portal branding and<br />
creating personalised notification messages<br />
for recipients.<br />
Setting up Zivver users is simple, as you can<br />
add them manually where they receive an<br />
invitation to create a personal account and<br />
set up 2FA. Larger organisations can employ<br />
Zivver’s SyncTool to synchronise Active<br />
Directory and Exchange accounts.<br />
Our test users were running Outlook and<br />
just needed to download the Zivver Office<br />
plug-in. This added a new option to the<br />
Outlook menu ribbon where they could log<br />
in to their account and, if permitted, access<br />
its message control settings.<br />
Procedures for creating new Outlook<br />
emails are exactly the same but Zivver adds<br />
an upper toolbar to the message highlighting<br />
actions required by the user. Each new<br />
recipient must be verified and methods<br />
include sending them an email, providing a<br />
one-time access code, applying an<br />
organisational code and sending an SMS to<br />
a valid mobile number.<br />
If sensitive information is detected, the<br />
toolbar highlights this and reacts<br />
dynamically to changes made to any part of<br />
the message. Attachments are scanned<br />
when added and a standout feature is<br />
Zivver supports file sizes up to 5TB.<br />
To open secure emails, recipients simply<br />
click the message body link and they are<br />
transported to the Zivver portal where they<br />
enter their verification details. They don’t<br />
require a Zivver account and can receive<br />
secure emails and reply to them irrespective<br />
of their location or email client.<br />
We all know how ineffective standard email<br />
recall processes are but Zivver users can<br />
confidently recall messages sent in error.<br />
Furthermore, if they haven’t been accessed<br />
by any recipients prior to withdrawal, Zivver<br />
guarantees that potential data leaks have<br />
been contained and won’t need reporting.<br />
Along with extensive auditing features in the<br />
admin portal, users can view all emails from<br />
their client, see which recipients opened<br />
them and who downloaded attachments.<br />
They can also login in to their personal<br />
Zivver portal account and view them from<br />
there as well.<br />
Zivver Secure Email is a simple solution to<br />
a major problem that plagues businesses of<br />
all sizes. It’s incredibly easy to deploy,<br />
requires no changes in working practices<br />
and ensures confidential information sent by<br />
email is totally secure. <strong>NC</strong><br />
Product: Secure Email<br />
Supplier: Zivver<br />
Web site: www.zivver.com<br />
Tel: +44 (0)20 3285 6300<br />
18 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
SECURITY UPDATE<br />
A ZERO-TRUST FUTURE FOR A<br />
HYBRID WORKING WORLD<br />
MICHELE MABILIA AT KYOCERA<br />
DOCUMENT SOLUTIONS UK EXPLAINS<br />
WHY A HOLISTIC APPROACH TO<br />
SECURITY IS THE BEST WAY FORWARD<br />
As employees return to offices, what was<br />
a largely successful period of remote<br />
working for many businesses is now<br />
giving way to a hybrid working future.<br />
Flexibility for employees is now the norm<br />
rather than the exception, which promises to<br />
make for happier workforces in the long term.<br />
That said, there are still challenges to<br />
address. One of these is the need to protect<br />
company data and devices from the impact<br />
of ransomware attacks, which have become<br />
the modus operandi for millions of hackers in<br />
the last couple of years.<br />
As businesses plan for hybrid working,<br />
connected devices such as mobile phones,<br />
laptops, desktop computers and printers are<br />
often earmarked for close scrutiny in the bid<br />
to shore up cybersecurity capabilities. To<br />
achieve this, organisations need to take a<br />
cautious approach to security, and ensure<br />
this is replicated across the entire IT estate.<br />
This is where a holistic zero-trust approach<br />
has merit.<br />
THE CHALLENGE<br />
The hybrid working model brings several key<br />
challenges for employers, including the need<br />
to properly manage BYOD policies and staff<br />
using the same devices for work and personal<br />
activities, as well as encouraging responsible<br />
cyber practices without regular face-to-face<br />
interaction. Alongside all of this is the<br />
responsibility to ensure that all endpoints -<br />
whether remote or office-based - have the<br />
right security software in place to prevent<br />
attacks. Finally, this has to be done while<br />
minimising the impact on productivity.<br />
Mobile phones, laptops and printers are<br />
often among the first devices mentioned when<br />
discussing security risks. There are legitimate<br />
reasons for this: these are highly recognisable<br />
pieces of home or office equipment, so it is<br />
easy to consider these devices as a likely route<br />
through which opportunistic hackers could try<br />
to gain access to sensitive data. Alongside<br />
these, the ubiquity of software such as email<br />
or cloud storage means cybercriminals have a<br />
huge attack surface to conduct their<br />
operations. With so many areas to keep an<br />
eye on, a zero-trust approach to IT security<br />
makes sense.<br />
THE RISK<br />
To highlight the current cybersecurity state of<br />
play, recent research has found that 92 per<br />
cent of UK businesses suffered a cyberattack<br />
in the last 12 months, and 78% feel<br />
unprepared to deal with current threats.<br />
Despite the upsurge in cyberattacks, more<br />
than a quarter of UK companies do not<br />
consider IT to be ranked within their top three<br />
priorities as they plan for the next 12 months.<br />
This is concerning when considering the<br />
finding that cyberattacks cost nearly one in ten<br />
(8%) UK businesses over £1 million.<br />
Plenty of work needs to be done across the<br />
entire IT estate, as not enough is being done<br />
to actively address these issues. Organisations<br />
need tools to cover all the bases, including<br />
multi-factor authentication to govern access to<br />
sensitive data, secure document management<br />
systems to ensure information is shared in a<br />
safe and compliant manner, and encryption<br />
capabilities that reduce the chances of stored<br />
data - whether on-premise or in the cloud -<br />
being compromised.<br />
THE REWARD<br />
Adopting a zero-trust framework and applying<br />
it across all elements of the IT estate offers a<br />
variety of security benefits. Zero-trust<br />
presumes all applications and services are<br />
malicious and are denied access from<br />
connecting until they can be positively verified<br />
by their identity attributes. Therefore, this<br />
model reduces risk because it closely<br />
scrutinises what is on the network and how<br />
those assets are communicating. Further, as<br />
baselines are created, a zero-trust model<br />
reduces risk by eliminating overprovisioned<br />
software and services and continuously<br />
checking the 'credentials' of all devices -<br />
whether they are printers, laptops, desktop<br />
computers, mobile phones or any other<br />
internet-enabled technology.<br />
THE FUTURE<br />
Functioning efficiently and safely in a hybrid<br />
work environment all boils down to risk<br />
management. This means getting better<br />
visibility and understanding of the way people<br />
work, and by association, the way they interact<br />
with business systems and sensitive data.<br />
Zero-trust doesn’t have to be a complete<br />
change in the business working model or<br />
mean that existing security architectures need<br />
to be replaced. It simply provides a solution to<br />
gain more control within the network, creating<br />
an even stronger shield and barrier. It is the<br />
way forward for organisations that want to be<br />
confident that they have the necessary tools<br />
and support to combat evolving threats. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 19
OPINION: IoT<br />
THE FOUNDATION FOR IoT SUCCESS IS BUSINESS STRATEGY<br />
WHEN IT COMES TO IoT THE POTENTIAL FOR OUR LIVES, BUSINESSES AND INDUSTRIES TO<br />
TRANSFORM AND IMPROVE HAS NEVER BEEN GREATER, ACCORDING TO ZIZO CEO PETER RUFFLEY<br />
From a fully connected home, through<br />
to data being shared with<br />
manufacturers to help enhance<br />
products and manufacturing methods, the<br />
monitoring of patient wellbeing and<br />
medical equipment with the creation of<br />
'smart' hospitals, optimising the supply<br />
chain and ensuring the right temperature of<br />
goods in transit, and calculating the most<br />
effective route for drivers to enhance the<br />
first and last mile within delivery services -<br />
the possibilities for IoT seem endless.<br />
Research predicts that by 2025, there<br />
will be 55.7 billion connected devices<br />
worldwide, 75% of which will be<br />
connected to an IoT platform. What this<br />
means is that the amount of data being<br />
collected, and potentially the high volume<br />
of low value data collected, is becoming<br />
truly overwhelming.<br />
As Peter Ruffley, CEO at Zizo explains,<br />
whilst 5G and edge computing will make<br />
it possible to transmit data through high<br />
powered, low latency networks, these<br />
technologies are in their infancy, with few<br />
use cases. Network infrastructure<br />
challenges mean that 5G is still some way<br />
off and if we are going to be doubling the<br />
amount of connected IoT devices,<br />
organisations need to fully understand the<br />
value that is locked within their data. The<br />
question has to be, why does ALL IoT data<br />
need to be sent back to data centres?<br />
If organisations want to become truly<br />
data driven and be able to have IoT data<br />
move their business forward, they must<br />
begin by having a concise business<br />
strategy in place, teamed with supporting<br />
technology. In order to do this successfully<br />
20 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: IoT<br />
and achieve the most value from IoT, there<br />
are five steps businesses must consider first.<br />
DEFINING BUSINESS CHALLENGES<br />
Just because an organisation has connected<br />
devices it doesn't mean that they'll<br />
necessarily get value from them. Value lies<br />
within the data. So, whilst there will be those<br />
in the company saying 'we need IoT', what<br />
questions ultimately does the data from IoT<br />
devices need to answer to help the business<br />
grow, improve processes and/or enhance<br />
the customer experience? What insight does<br />
the business want to have from monitoring<br />
each device? What does the outcome of the<br />
investment need to be?<br />
GOOD AND BAD DATA<br />
With so much data at their fingertips (this can<br />
be millions or billions of rows of data),<br />
businesses really need to start, if they haven't<br />
already, moving away from the idea of<br />
having every device connected and the 'let's<br />
store everything just in case' mindset when it<br />
comes to their data. They need to be able to<br />
work out what is 'good' data and what is<br />
'bad' data. If all a business has coming back<br />
from devices is low value data / low hanging<br />
fruit, it will not benefit them.<br />
Cloud storage, while low cost at the start of<br />
any IoT project, quickly becomes expensive<br />
at scale, and the same goes for processing<br />
Peter Ruffley, CEO, Zizo<br />
that data - which as the volume grows, so<br />
does the processing time, and the cost.<br />
EDGE ANALYTICS<br />
Organisations need to become more<br />
strategic with how and where data is<br />
analysed. Not just in terms of getting<br />
insights, but looking at the data itself and<br />
working out where the inherent value lies<br />
within it. When data can be analysed down<br />
at the edge, only the most valuable data<br />
collected will be shared and in real time,<br />
making the process more cost effective to<br />
the business. Additionally, the amount of<br />
data being collected from connected<br />
devices puts a great deal of pressure on a<br />
cloud network.<br />
If organisations want to be sending data<br />
to the cloud, then a hybrid approach using<br />
edge analytics will ease the load. Edge data<br />
analysis is traditionally delivered through a<br />
single sensor node before being passed<br />
back to the cloud, but new advances in<br />
edge computing platforms allow for the<br />
analysis of both real-time and historical<br />
data, creating a more holistic view and<br />
enabling better training models for Artificial<br />
Intelligence and Machine Learning.<br />
READY FOR 5G - WHEN IT ARRIVES<br />
There is no doubt that 5G is going to<br />
make a huge impact on the way that<br />
businesses and other entities, such as smart<br />
cities, are able to utilise and manage data.<br />
However, like the initial roll-out of IoT<br />
platforms and technology, we are still very<br />
much in the early adopter phase, with<br />
limited access to both full 5G platforms or<br />
test beds.<br />
Many technologies are still utilising older<br />
bandwidths, and there is a case for looking<br />
at some of the more proven technologies to<br />
deliver point solutions that are better suited<br />
to individual use cases.<br />
SPECIALIST EXPERTISE<br />
A business might spend a considerable<br />
amount on IoT and other emerging<br />
technologies and be able to retrieve a lot of<br />
data but if it doesn't know how to get value<br />
from it, it's pretty much worthless. Due to the<br />
complex nature of any IoT deployment,<br />
there will be a requirement for specialist<br />
skills and expertise.<br />
Working with device suppliers will help<br />
organisations to understand data formats<br />
and to work out what data is actually<br />
needed to deliver insights to meet the<br />
defined strategy. Edge computing will also<br />
have a big part to play in sending the right<br />
data to tools and technologies that can be<br />
accessed by individuals who can make a<br />
difference for the business. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 21
OPINION: PAAS<br />
FROM NAAS TO PAAS<br />
NEIL TEMPLETON, VICE PRESIDENT, DIGITAL INNOVATION<br />
MARKETING, EXPLORES HOW NETWORK-AS-A-SERVICE CAN<br />
UNLOCK THE VALUE OF PLATFORM-AS-A-SERVICE<br />
The widespread adoption of the<br />
cloud has transformed the way<br />
applications are developed, just as<br />
much as it has transformed the way they<br />
are deployed and consumed.<br />
Cloud platform services, also known as<br />
Platform as a Service (PaaS), is a<br />
complete development and deployment<br />
environment in the cloud. PaaS has<br />
resources that enable developers to<br />
deliver everything from simple cloudbased<br />
apps to sophisticated, cloudenabled<br />
enterprise applications. All<br />
servers, storage, and networking can be<br />
managed by the enterprise or a thirdparty<br />
provider while the developers can<br />
maintain management of the<br />
applications.<br />
No matter the size of the company,<br />
using PaaS offers numerous advantages,<br />
from its scalability through to its simple<br />
and cost effect deployment. But, together<br />
with Network-as-a-Service (NaaS),<br />
developers can support the complete<br />
application lifecycle by unlocking the<br />
value of PaaS.<br />
ANYTHING-AS-A-SERVICE<br />
The three key benefits of a cloud<br />
environment - flexibility, scalability, and<br />
speed - extend quite nicely to app<br />
development and have helped<br />
developers perpetuate transformative<br />
ways of working through concepts such<br />
as Agile and DevOps.<br />
It's becoming an enterprise trend.<br />
Although SaaS (Software-as-a-Service)<br />
will retain the lion’s share of cloud<br />
infrastructure spend for the next several<br />
years, Gartner expects application<br />
infrastructure services, or PaaS, to grow<br />
by a higher margin through <strong>2021</strong>, at<br />
26.6% compared to 16% for SaaS.<br />
This is evidence of adoption trends<br />
moving down the infrastructure stack -<br />
from where they started out, with<br />
consumption of apps, to the creation of<br />
apps. It's a trend that is somewhat<br />
influenced by the pandemic as<br />
enterprises have accelerated digital<br />
transformation plans, ingesting and<br />
expelling almost everything 'as-aservice'.<br />
According to Deloitte, the boost that<br />
XaaS (Anything-as-a-Service) can give to<br />
innovation is wide-ranging, with 80% of<br />
businesses agreeing that adoption of XaaS<br />
has led their organisation to reinvent<br />
business processes, develop new<br />
products/services, invent a new business<br />
model, and even change how they sell to<br />
customers.<br />
To break that down; we've seen how<br />
SaaS has changed the way organisations<br />
consume services; we've seen how IaaS<br />
changes the way companies deploy<br />
software; and PaaS is changing how<br />
software is developed. The next natural<br />
innovation in as-a-Service has to be in<br />
connectivity.<br />
As we have seen with the consumption<br />
and deployment of cloud apps, until the<br />
appearance of NaaS, connectivity was<br />
one of the main stumbling blocks to<br />
maximising cloud value. Simply put, the<br />
historically cumbersome method of<br />
procuring and consuming network<br />
connectivity was out of sync with the<br />
promise of the cloud.<br />
22 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
OPINION: PAAS<br />
Yet just as NaaS solved this challenge<br />
for SaaS and IaaS, it has now emerged as<br />
a key part of the infrastructure puzzle for<br />
developers to unlock the value of PaaS.<br />
PAAS BENEFITS<br />
When it comes to developing enterprise<br />
applications, PaaS makes use of the cloud<br />
to reduce complexity and cost.<br />
Because most PaaS environments are also<br />
supported by their own software<br />
development tools, such as libraries, SDKs<br />
and APIs, they also help streamline and<br />
speed the process up, so developers can<br />
focus on creating a solution and not<br />
wrestling with infrastructure.<br />
PaaS supports the complete application<br />
lifecycle from building, testing and<br />
deployment through to managing and<br />
updating software. Furthermore, there are<br />
now a whole array of tools available to<br />
support and enable associated<br />
development modalities such as Agile<br />
and DevOps.<br />
TOP 5 REASONS TO ADOPT PAAS<br />
1. Speed: PaaS enables developers to get<br />
to work building apps and not configuring<br />
and provisioning their backend<br />
infrastructure.<br />
2. Reduced cost: Because PaaS<br />
environments come with their own prebuilt<br />
libraries, SDKs and APIs, developers<br />
don’t have to start from scratch, requiring<br />
fewer resources or accelerating dev time.<br />
3. Scalability: In the old world of<br />
application building, scaling an app could<br />
prove a headache and required hands-on<br />
resources. But because PaaS is a cloudnative<br />
environment, scalability is also<br />
native, and your app grows with your<br />
business.<br />
4. Portability: Apps today need to work<br />
across multiple environments and the<br />
trend towards containerisation means this<br />
is possible with PaaS.<br />
5. Future proofing: Because the PaaS<br />
vendor is responsible for the platform, all<br />
the new feature updates and security<br />
patches are automatically taken care of,<br />
leaving you to focus on the value offered<br />
by the app itself, not the underlying<br />
infrastructure.<br />
More flexible connectivity options<br />
through NaaS platforms unlock those<br />
same options for the network. This<br />
ensures high reliability today and platform<br />
freedom for the future. If a business needs<br />
change, new connections to new<br />
providers can be provisioned in seconds,<br />
so the tools needed to create the very best<br />
apps and services are always accessible.<br />
NaaS holds a mirror up to digital<br />
transformation driven by changing<br />
customer behaviour. Just as consumers<br />
are used to buying anything at any time<br />
with a tap of a button, enterprise buyers<br />
are looking for the same convenience to<br />
purchase bandwidth online, and ondemand,<br />
instead of being tied to a longterm<br />
contract. This has positive<br />
repercussions for test and production.<br />
The faster new developments and testing<br />
environments can be provisioned and<br />
completed applications deployed, the<br />
faster businesses can get to market. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 23
CASE STUDY<br />
CAN STORAGE EVER BE INSTALLED<br />
AND FORGOTTEN?<br />
RAINER W. KAESE, SENIOR MANAGER BUSINESS DEVELOPMENT,<br />
STORAGE PRODUCTS DIVISION AT TOSHIBA SHARES THE<br />
DETAILS OF A STORAGE SYSTEM THAT HAS BEEN RUNNING FOR<br />
FOUR YEARS WITHOUT ANY NEED FOR MAINTENA<strong>NC</strong>E OR<br />
UNEXPECTED DOWNTIME<br />
Even the most stable and reliable<br />
storage systems still require some<br />
degree of maintenance. Many may<br />
believe that firmware updates, software<br />
updates and replacement of failed storage<br />
components can never be avoided. Really?<br />
This does not have to be so, here is a<br />
storage system example that has been<br />
running for four years without any need for<br />
maintenance or unexpected downtime.<br />
Back in 2017, Toshiba installed a ZFS<br />
storage system supporting storage<br />
infrastructure needs of the "Technology<br />
Experience Lab" at NTT Global Data<br />
Centers. Since then, the storage system has<br />
proven its outstanding reliability: except for<br />
a scheduled 10 minutes of downtime to<br />
install some additional ZFS features, the<br />
system runs steadily without component<br />
failures in any of the 60 HDDs, SSD,<br />
controllers, power supplies, fans, cables or<br />
other components.<br />
The Technology Experience Lab provides<br />
data center managers and their teams with<br />
the room and infrastructure to explore<br />
innovative approaches for architecting their<br />
servers and storage. It enables businesses<br />
to evaluate the efficacy of private or hybrid<br />
clouds, distributed architectures, and<br />
alternative approaches to deliver IT<br />
services in a low-risk environment. In<br />
addition, its community of users provides<br />
support and ideas through meetups, boot<br />
camps, webinars, and hackathons.<br />
In total, 102 TB of net storage were<br />
desired, requiring 240 TB of raw storage,<br />
utilising the ZFS-based JovianDSS software<br />
of Toshiba’s partner Open-E. This software<br />
had proven to offer high availability, no<br />
single point of failure, and high-flexibility,<br />
providing consistent snapshots and instant<br />
restore when required. The hardware to<br />
support it would need to be reliable and<br />
high-performance to take full advantages of<br />
the software, supporting several iSCSI block<br />
storage targets ranging in size from 10 TB<br />
to 40 TB, plus some shared file folders.<br />
The planning stage was the core for the<br />
long-term success of the final storage<br />
implementation. Toshiba often undertakes<br />
research into server implementation in its<br />
laboratories. It has resulted in close<br />
relationships with a broad range of<br />
component and software suppliers coupled<br />
with a deep understanding of what works<br />
well. Leveraging this knowledge, the team<br />
was able to recommend a hardware<br />
architecture that worked with Open-E<br />
JovianDSS and had proven itself in other<br />
projects.<br />
To form the 102 TB of net storage, the<br />
team selected Toshiba’s 4 TB, 3.5" SAS<br />
Enterprise Capacity Drives<br />
(MG04SCA40EA). With their MTTF (mean<br />
time to failure) of 1,400,000 hours and a<br />
non-recoverable error rate of just ten errors<br />
per 1016 bits read, they were ideal for<br />
achieving the reliability required.<br />
Performance was not ignored either. The<br />
7,200 rpm drives achieved a Zpool read<br />
performance rating of 12.9 x single disk<br />
and 8.5 x single disk for writes. For the ZFS<br />
write logs and reach caches, reliable 10<br />
DWPD SAS Enterprise SSDs with 1.6 TB<br />
storage from KIOXIA (formerly Toshiba<br />
Memory) were selected.<br />
A significant factor in HDD failures is<br />
heat, so the HDD enclosure chassis had to<br />
be closely reviewed before selection. The<br />
team selected AIC’s J4060-01 Dual<br />
Expander, 12 GB/s, 60 bay toploader<br />
JBOD. The 1400 W 1+1 hot-swap<br />
redundant 80+ Platinum power supply<br />
24 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
CASE STUDY<br />
ensured electrical efficiency while also<br />
fulfilling the reliability requirements. The<br />
JBOD also features four 80 x 38 mm hotswap<br />
fans. System testing showed that the<br />
coolest and warmest drive temperature<br />
difference was just 4°C, confirming that the<br />
correct JBOD had been selected.<br />
Connectivity to the JBOD was provided<br />
by the Microchip Adaptec® RAID Adapter<br />
ASR-8885 with 8 internal and 8 external<br />
ports, run in HBA mode. This model was<br />
highlighted as a top choice back in 2017.<br />
Finally, the storage server and JBOD<br />
location in the Technology Experience Lab,<br />
at the Frankfurt 1 Campus of NTT Global<br />
Data Centers, was the last piece of the<br />
reliability strategy. Its 60,000 m2 of space<br />
offers exceptional network connectivity and<br />
its power is derived from two separate<br />
European power supply networks that<br />
reach directly to the server and drive<br />
enclosure. Physical security is ensured,<br />
while storage reliability is supported by<br />
their highly efficient cooling system.<br />
Until now the system runs failure-free for<br />
four years and the plan is to continue<br />
running the system to explore its reliability<br />
further – even when the supplier warranty<br />
ends for most of the enterprise-grade<br />
hardware components in one year. Based<br />
on field experience with Toshiba Enterprise<br />
HDDs, the team expects that the storage<br />
has many more years of failure-free<br />
functionality to offer.<br />
Over the course of its operation, the<br />
storage solution has handled a multitude<br />
of proof-of-concept activities in the<br />
Technology Experience Lab, much to the<br />
satisfaction of all involved. "The Technology<br />
Experience Lab benefits a lot from this<br />
storage solution, and we are truly<br />
impressed by its continuous stability. Set up<br />
within our highly available data centers, I<br />
can't imagine a more reliable way of<br />
running enterprise storage. We’re looking<br />
forward to many more years of failure-free<br />
operation", said Dominik Friedel, Business<br />
Development Manager of NTT Global<br />
Data Centers.<br />
Having reviewed how the storage is used,<br />
with countless snapshots and scrubbing,<br />
and iSCSI block targets being connected<br />
and disconnected, week in, week out, the<br />
software has proven to be the optimal<br />
choice too. "I’m proud to see how well this<br />
installation works after all these years, but<br />
I am also sure that this is not all this setup<br />
can do. Excellent performance and<br />
reliability are ensured by the ZFS and<br />
Linux-based system in combination with<br />
first-class hardware, so it can last for<br />
decades. And that's not just a supposition;<br />
Open-E has been developing ZFS data<br />
storage systems for over 20 years and we<br />
have similar, long-lasting installations like<br />
this in use at customers all over the<br />
world”, said Krzysztof Franek, CEO of<br />
Open-E GmbH.<br />
Perhaps most critical to the success of this<br />
project has been the collaboration. Deep<br />
expertise in each field is essential, but is<br />
not enough in isolation. Only by bringing<br />
the best of what technology has to offer<br />
together, and exploring its capabilities and<br />
options, it’s possible to successfully fulfil<br />
such demanding requirements.<br />
"We are exceptionally proud to have the<br />
partner network of Open-E, KIOXIA, AIC,<br />
NTT and Microchip. Even if your Toshiba<br />
Hard Disk Drives are incredibly reliable,<br />
they still need a reliable system built of<br />
many components to deliver real end-user<br />
value", added Rainer Kaese. <strong>NC</strong><br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 25
OPINION: NETOPS<br />
OUT OF NETOPTIONS?<br />
ALAN STEWART BROWN, VP OF EMEA, OPENGEAR ON WHY NETOPS<br />
AND NETWORK AUTOMATION WON’T REPLACE HUMAN EXPERTISE<br />
The road to network resilience is a thorny<br />
one, with networks becoming ever-more<br />
complex and harder to manage. One<br />
way organisations can enhance resilience is by<br />
adopting NetOps: an approach which embeds<br />
a growing amount of automation, virtualisation<br />
and orchestration, to make networking<br />
operations and functions faster and more<br />
accessible. Research commissioned by<br />
Opengear discovered 87% of businesses had<br />
increased investment in NetOps in the past two<br />
years, with a further 51% planning to implement<br />
this functionality in the next year. But as more<br />
businesses adopt a NetOps approach,<br />
particularly via automated processes, the<br />
traditional role of the network engineer has<br />
come under scrutiny.<br />
With the increasing popularity of NetOps and<br />
the ability for automation to reduce human<br />
error, is there still a place for the engineer in the<br />
maintenance of a business network? The<br />
answer is an unequivocal 'yes'. Rather than<br />
removing the need for the network engineer, the<br />
advance of NetOps and network automation<br />
enhances the value network engineers can bring<br />
to a business.<br />
NO MORE HEROES?<br />
Network engineers have historically been viewed<br />
as the saviours when something goes wrong.<br />
The culture around saving the day meant one<br />
professional was relied on to step in when a<br />
fault occurred. They were often seen as having a<br />
level of understanding about the network that<br />
others were unable to attain, and much of the<br />
work involved hard manual effort and following<br />
repetitive applications or routines.<br />
If a particular event had happened on the<br />
network, most companies would expect an<br />
engineer to log in, run through five or six<br />
routines to work out what was happening and<br />
then remediate the problem. NetOps is<br />
changing that culture in a positive way by<br />
altering the entire procedure so that when such<br />
an event happens, the system automatically<br />
runs through those five or six steps. If that does<br />
not resolve the problem it is escalated to the<br />
network engineer to handle the next level of<br />
troubleshooting.<br />
All this removes the dependency on a single<br />
hero to do the diagnostic and remediation<br />
work but also enables more engineers to be<br />
heroes by freeing them to apply their skills more<br />
proactively in managing the network at a<br />
higher operational level.<br />
NEED FOR RESKILLING<br />
Through the capabilities it delivers, NetOps is<br />
helping overcome skills shortages for<br />
businesses. There are simply not enough<br />
engineers available to comprehensively staff<br />
every network location. Businesses can use<br />
NetOps tools to concentrate their network<br />
team's resource at a network operations centre<br />
effectively rather than having to find resources<br />
to staff each and every site.<br />
So, the advent of NetOps will bring new<br />
opportunities to network engineers but will also<br />
require a level of reskilling. For years the badge<br />
of honour was being a certified engineer and<br />
CCIE (Cisco Certified Internetwork Expert) or a<br />
CCNA (Cisco Certified Network Associate) or<br />
J<strong>NC</strong>IE (Juniper). That is still valuable but for<br />
NetOps, there is an additional skillset engineers<br />
will need to train for. They will need to program<br />
in Python, for example, and understand how<br />
docker containers work. They will need to<br />
deploy commonly-used toolsets like Chef,<br />
Puppet and Ansible. Network engineers need to<br />
understand how all this works - and those<br />
businesses that understand all this are training<br />
them up in the required skillsets.<br />
The success of this process will require<br />
commitment from engineers. Some will be<br />
wary of NetOps and automation, in part due<br />
to a lack of understanding of or familiarity with<br />
the approach. Overcoming this will, in part,<br />
come down to engineers being prepared to<br />
dip their toes in the water of the new<br />
approach. Simply using a Raspberry Pi at<br />
home, for example, will help them to gain<br />
experience in that environment.<br />
For young network engineers entering the<br />
business, collaboration with more experienced<br />
employees will be crucial, and the onus will be<br />
on business leaders to ensure that new starters<br />
learn from every aspect of the organisation.<br />
The business may also need to invest more in<br />
training and support for their engineers. In the<br />
Opengear survey, just 32% of respondents<br />
said their network management/engineering<br />
team had undertaken industry training courses<br />
in order to transition to NetOps. More than<br />
half (53%) of the survey sample said they had<br />
personally learnt about it (NetOps) in their<br />
spare time.<br />
Providing more flexibility, increasing speed<br />
and improving programmability, NetOps is a<br />
proactive approach to networking that uses<br />
automation and provisioning to modernise<br />
networks and increase their resilience. Yet, if<br />
enterprises are to make a success of it, they<br />
need to transition to a NetOps culture.<br />
Ultimately, that entails more than just<br />
integration of new solutions; it needs a<br />
mindset shift among the professionals that<br />
work within it.<br />
Enterprises and their engineers taking these<br />
considerations into account and focusing on<br />
achieving them will ensure effective integration<br />
of NetOps and enable a smoother journey on<br />
the road to resilience. <strong>NC</strong><br />
26 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
AWARDS <strong>2021</strong><br />
SPONSORED BY<br />
Photo gallery: https://flic.kr/s/aHsmX4ePr4<br />
A welcome return to networking in <strong>2021</strong><br />
Remote working, hybrid working, WFH -<br />
the past year has been dominated by this<br />
new networking normal, which made the<br />
<strong>2021</strong> Network Computing Awards, held in<br />
central London in October, all the more<br />
welcome. It was a genuinely refreshing change<br />
of pace to finally meet up again with our<br />
industry colleagues, nominees and guests in<br />
an actual, decidedly non-virtual setting!<br />
Despite the obvious difficulties faced by many<br />
as we continue to navigate the pandemic - at<br />
the time of writing the Government's Plan B<br />
has just come into effect - the awards<br />
ceremony was attended by a good number of<br />
people who all contributed to the terrific<br />
atmosphere on the night. I think we weren't the<br />
only ones who were glad to have a decidedly<br />
non-virtual night out again! The overwhelming<br />
feeling from the organisers and the attendees<br />
was that there really is no substitute for<br />
presenting and accepting awards in person.<br />
Over the following pages you'll find a full<br />
round-up of this year's winners. They include<br />
Extreme Networks, winners of Product of the<br />
YouTube: https://youtu.be/CbIErKc7q7Q<br />
Year for ExtremeCloud IQ, DrayTek, winners of<br />
the New Hardware Product of the Year<br />
category, and Storm Technologies, who took<br />
home the trophy for Reseller of the Year. Zyxel<br />
won both the Cloud-Based Solution of the Year<br />
and Network Project of the Year awards and<br />
ExaGrid were also big winners on the night,<br />
collecting four awards including Company of<br />
the Year. We'd like to once again congratulate<br />
all of this year's winners and runner-ups and<br />
thank our awards sponsors, as well as<br />
everyone who took the time to vote online.<br />
www.networkcomputingawards.co.uk<br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards<br />
NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 27
AWARDS <strong>2021</strong><br />
NETWORK INFRASTRUCTURE PRODUCT OF THE YEAR<br />
WINNER: NetAlly LinkRunner 10G<br />
RUNNER UP: Extreme Networks<br />
The LinkRunner® 10G is the most cost-effective solution available for comprehensive 10M/100M, 1G, Multi-Gig, and 10Gig network testing.<br />
LinkRunner 10G simplifies testing and configuration of copper and fiber Ethernet networks, streamlining workflows by combining essential<br />
functions of installation and triage in a single, ruggedized unit. This next-generation Android-based tester delivers complete network validation<br />
and troubleshooting, from the media (copper/fiber) to the application (layers 1 - 7), accelerating deployments, speeding problem identification,<br />
and improving the efficiency and effectiveness of network installers and operations teams. As a lightweight, handheld, multi-function instrument,<br />
LinkRunner 10G eliminates the need to purchase multiple testers.<br />
DATA CENTRE PRODUCT OF THE YEAR<br />
WINNER: Prism DCS Hot/Cold Aisle Containment<br />
RUNNER UP: Supermicro Computer<br />
Prism DCS is a data centre solutions provider specialising in the provision of hot & cold aisle containment, server cabinets, and security<br />
cages. Prism partner with leading data centre operators & global hyperscale providers to improve the efficiency, sustainability and security of<br />
their operations.<br />
Leveraging an in-house manufacture and installation service, Prism provide bespoke engineered solutions that empower clients & endusers<br />
with strategic agility & flexibility in the development of critical digital infrastructure. www.prismdcs.co.uk<br />
IT OPTIMISATION PRODUCT OF THE YEAR<br />
WINNER: Allied Telesis - Vista Manager EX<br />
RUNNER UP: Gigabit Networks<br />
Vista Manager EX is our single-pane-of-glass monitoring and management platform for both Allied Telesis and third party network devices. The<br />
dashboard/map alerts the user to any events affecting the network such as security threats, link tampering, network loops, environmental alarms,<br />
and failed nodes; highlighting them so they can be easily dealt with. Supporting both wired and wireless networks, Vista Manager is a powerful<br />
tool for network service providers or customers wanting to optimise resources and time. Offering centralised network and device management,<br />
firmware and configuration backup, recovery and upgrade tools; its ideal for even the largest enterprise networks.<br />
TESTING/MONITORING PRODUCT OF THE YEAR<br />
WINNER: Netreo Omnicenter<br />
RUNNER UP: NetAlly<br />
Netreo's full-stack IT Infrastructure Management (ITIM) solution features AIOps and high-performance Network Performance Monitoring and<br />
Diagnostics (NPMD) to empower enterprise and IT leaders with AIOps-driven observability, actionable insights, process automation, and<br />
accelerated issue resolution. By having real-time intelligence on all resources, devices and applications deployed in cloud, on-premises and<br />
hybrid networks, Netreo users have the confidence to deliver more reliable and innovative internal and external customer experiences. Netreo is<br />
one of Inc. 5000's fastest-growing companies, trusted worldwide by thousands of private and public entities managing half a billion resources<br />
per day, and available via subscription in on-premises and cloud deployment models.<br />
28 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
AWARDS <strong>2021</strong><br />
TELEPHONY PRODUCT OF THE YEAR<br />
WINNER: CloudCall<br />
RUNNER UP: 3CX<br />
STORAGE PRODUCT OF THE YEAR<br />
WINNER: ExaGrid EX84 appliance<br />
RUNNER UP: Apricorn<br />
ExaGrid's EX84 appliance was voted Storage Product of the Year and we are so proud that our latest appliance models have received such<br />
recognition. In January <strong>2021</strong>, ExaGrid released a new line of Tiered Backup Storage appliances, including our appliance to date, the largest<br />
EX84. The largest ExaGrid system, comprised of 32 EX84 appliances, can take in up to a 2.7PB with an ingest rate of up to 488TB/hour,<br />
making it the largest system, with data deduplication, in the industry that offers aggressive data deduplication. We are so grateful to all of the<br />
voters who chose the EX84 for this award!<br />
NETWORK MANAGEMENT PRODUCT OF THE YEAR<br />
WINNER: Progress Software - WhatsUpGold <strong>2021</strong><br />
RUNNER UP: SolarWinds<br />
Progress Software's WhatsUpGold <strong>2021</strong>is a sophisticated network monitoring solution that delivers an impressive range of tools integrated<br />
seamlessly into a single console. The simplified licensing schemes make it very affordable for SMBs, it is scalable enough for enterprises and the<br />
new log management features add even more versatility. WhatsUp Gold (WUG) is a great network monitoring choice for SMBs and enterprises and<br />
this latest version aims to make it even more appealing.<br />
DATA PROTECTION PRODUCT OF THE YEAR<br />
WINNER: Rohde & Schwarz Cybersecurity - R&S®Trusted Gate<br />
RUNNER UP: Altaro<br />
As a data protection-compliant multi-level system, R&S Trusted Gate offers a way out of the cloud dilemma for public authorities and<br />
companies. The special feature of the solution lies in the secure design of a multi-level system: according to this, the personal content of the<br />
encryption level is separated from the cloud services at the business level. In this way, the benefits of external cloud services can be enjoyed<br />
without transferring personal data to an "insecure third country". Businesses and public authorities retain data sovereignty and meet the<br />
requirements of the GDPR.<br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards<br />
NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 29
AWARDS <strong>2021</strong><br />
SD-WAN VENDOR OF THE YEAR<br />
WINNER: Versa Networks<br />
RUNNER UP: Citrix<br />
CLOUD DELIVERED SECURITY SOLUTION OF THE YEAR<br />
WINNER: Heimdal Security - Privileged Access Management<br />
RUNNER UP: Rohde and Schwarz<br />
Privileged Access Management features a lightweight interface that puts you in complete control over the user's elevated session. Approve or<br />
deny from the dashboard or on the go right from your mobile device. Keep track of sessions, block elevation for system files, live-cancel user<br />
admin rights, set escalation period, and instantly shut down system process after session expiration. Insider threats are on the rise. Deal with<br />
them on your terms and with the best tools available. Privileged Access Management unlocks an extra security layer that prevents malware from<br />
spreading through your networks - automatic rights removal when a threat is detected on a machine running with elevated rights. Prevent,<br />
protect, and secure your networks inside and outside.<br />
THE RETURN ON INVESTMENT AWARD<br />
WINNER: ExaGrid's EX84 appliance<br />
RUNNER UP: OneUp Sales<br />
ExaGrid's EX84 appliance won the Return On Investment award, an especially meaningful win for ExaGrid as we pride ourselves on our unique<br />
scale-out architecture and to end the practice of forklift upgrades and product obsolescence that customers are often faced with. ExaGrid<br />
provides a scale-out architecture where appliances are simply added as data grows. Each appliance includes storage, processor, memory and<br />
network ports, so as data grows, all resources required are available to maintain a fixed-length backup window. This scale-out storage<br />
approach eliminates expensive forklift upgrades, and allows for mixing appliances of different sizes and models in the same scale-out system,<br />
which eliminates product obsolescence while protecting IT investments up front and over time.<br />
NEW HARDWARE PRODUCT OF THE YEAR<br />
WINNER: DrayTek VigorAP 960C<br />
RUNNER UP: Kemp Technologies<br />
The DrayTek VigorAP 960C is a WiFi 6 Access Point with Mesh, offering up to 1.8Gbps Dual-Band wireless rates. WiFi 6 brings significantly<br />
improved efficiency, better overall performance and reliably handles more clients per AP. In addition, there are three operating modes and a<br />
choice of four management methods - making the VigorAP 960C supremely versatile. Use as a standalone AP, range extender or as a Mesh<br />
node with 4 SSIDs per radio and WPA3 security. For more information, visit www.draytek.co.uk.<br />
NEW SOFTWARE PRODUCT OF THE YEAR<br />
WINNER: Rohde & Schwarz Cybersecurity - R&S®Trusted VPN Client<br />
RUNNER UP: DrayTek<br />
R&S Trusted VPN Client by IT security expert Rohde & Schwarz Cybersecurity protects the network communication of a client platform (Windows<br />
laptop or tablet) with a government or corporate network over an untrusted network such as the internet. R&S Trusted VPN Client, approved for<br />
securing "classified information - for official use only" by the German Federal Office for Information Security, is software-based, requires no<br />
additional hardware and functions thanks to zero trust technology independently of the operating system's security mechanisms.<br />
30 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
AWARDS <strong>2021</strong><br />
SALES ENABLEMENT SOLUTION OF THE YEAR<br />
WINNER: OneUp Sales - OneUp Sales<br />
RUNNER UP: WebCRM<br />
Empower directors, managers and consultants with the tools they need to succeed, remote or in-office. With unrivalled performance reporting,<br />
gamification, and daily update emails to your team, OneUp integrates with dozens of CRMs, VOIP systems and other third-party solutions to<br />
enable sales leaders to see all their key metrics in one place. The average salesperson uses 6 systems to carry out their role every day - that's a<br />
lot of places to pull reports from as a manager. OneUp integrations with dozens of systems to ensure your data is all in one place. From CRMs<br />
to VOIP systems to timesheet software, we've got you covered.<br />
EDUCATION AND TRAINING PROVIDER OF THE YEAR<br />
WINNER: CNet Training<br />
RUNNER UP: KnowBe4<br />
Established in 1996, CNet Training is the global leader in technical education for the global digital infrastructure industry (comprising the data<br />
centre and network cable infrastructure sectors). A significant part of CNet's history is the development of The Global Digital Infrastructure<br />
Education Framework, which offers industry professionals an opportunity to map data centre and network infrastructure education, qualifications<br />
and certifications to meet individual and business needs. CNet is also the only industry dedicated education provider to award both<br />
internationally recognised qualifications and professional certifications, starting at level 3 and culminating with a level 7 Masters programs. The<br />
company delivers programs across the world and via live Instructor-led remote attendance. www.cnet-training.com<br />
REMOTE WORKING PRODUCT OF THE YEAR<br />
WINNER: OneUp Sales - OneUp Sales<br />
RUNNER UP: 3CX<br />
We're a highly technical team with a love for building products that delight. We set out on day 1 to do something different - to bring elements of<br />
video games into the corporate world. Our focus was on building more exciting, fulfilling workplaces. Whilst we're not quite handing everyone<br />
an Xbox controller, we like to think we've stayed pretty close to that plan with OneUp Sales.<br />
DISTRIBUTOR OF THE YEAR<br />
WINNER: Brigantia<br />
RUNNER UP: Nuvias<br />
Brigantia is an award-winning, value-added managed services distributor providing a comprehensive range of cybersecurity solutions<br />
complemented by secure, enterprise-class data communications and cloud services. Brigantia has three distinct business areas designed to add<br />
maximum value to its reseller, MSP, MSSP and consultant partners' businesses: Distribution, Consulting and Enhance. Brigantia exists to add<br />
value to all its partners' businesses.<br />
RESELLER OF THE YEAR<br />
WINNER: Storm Technologies<br />
RUNNER UP: Contrac<br />
Established in June 2000, Storm has grown from strength to strength as a focused IT value-added reseller. Our aim is to deliver exceptional<br />
service to our customers in corporate and public sector organisations.<br />
Whether you require developing a specific technology strategy or just looking for some knowledgeable and friendly guidance, we maintain top-tier<br />
accreditations to ensure we can bring you the best possible expertise and pricing. The success of your projects is what drives us. Our people and<br />
operations are second to none, we listen to you and deal with your enquiry quickly and efficiently irrespective of the size of your business.<br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards<br />
NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 31
AWARDS <strong>2021</strong><br />
THE INSPIRATION AWARD<br />
WINNER: Ian Moyse, Chief Revenue Officer, OneUp Sales.<br />
RUNNER UP: Melissa Chambal<br />
"I am really pleased to be recognised for this award, let alone for a second time in recent years. I thank those who nominated and voted for me and<br />
believe it is in return for the contribution I make in giving back to the sector through speaking, panels, schools speaking, blogging and acting as<br />
judge on awards such as WISA, Top Sales, UK Cloud Awards, BESMA, etc. I encourage others to give back and contribute to coaching and<br />
supporting others in their sector." - Ian Moyse.<br />
HARDWARE PRODUCT OF THE YEAR<br />
WINNER: WatchGuard Technologies - Firebox M Series<br />
RUNNER UP: ExaGrid<br />
In October, WatchGuard Technologies announced the release of its new Firebox M290, M390, M590, and M690 unified threat management<br />
appliances. An affordable yet highly capable solution for small and midsize businesses, these new firewalls deliver increased security and the<br />
fastest performance of any mid-range Firebox appliance ever, with the processing power to handle encrypted and HTTPS traffic.<br />
In addition, new expandable ports and integration with WatchGuard Cloud enable these firewalls to offer the flexibility needed to<br />
accommodate changing networking and security needs for customers and service provider partners. For further information, please visit:<br />
www.watchguard.com/wgrd-products/rack-mount/m-series.<br />
SOFTWARE PRODUCT OF THE YEAR<br />
WINNER: Netreo Omnicenter<br />
RUNNER UP: Allied Telesis<br />
Founded in 2000 by ex-Cisco employees, Netreo designs, manufactures, markets, sells and supports IT solutions for optimising the complex and<br />
evolving infrastructures that drive successful global enterprises. Netreo empowers business and IT leadership with real-time observability, AIOpsdriven<br />
analysis, actionable insights, and process automation that drive business success through full-stack IT Infrastructure Management (ITIM),<br />
Network Performance Monitoring and Diagnostics (NPMD), AIOps, Application Performance Management (APM), and Digital Experience<br />
Management (DEM) solutions. Designed for the most complex cloud, on-premises and hybrid infrastructures in highly regulated industries,<br />
Netreo is most prominent in Healthcare, Financial services, Aerospace, Manufacturing, SLED, Retail, Transportation, and Logistics industries.<br />
CLOUD-BASED SOLUTION OF THE YEAR<br />
WINNER: Zyxel Nebula Control Centre<br />
RUNNER UP: OneUp Sales<br />
This year's 'Cloud-Based Solution of the Year' was awarded to Zyxel's Nebula Control Centre. Rachel Rothwell, Regional Director Western<br />
Europe at Zyxel, commented: "We are very proud of this achievement, we have spent many years listening to our customers and developing<br />
a cloud platform with all the facilities our resellers would require, the maturity and depth of the feature set is now well established and is<br />
clearly recognised by winning such an award. I would like to thank all our valued resellers for their votes and loyalty to Zyxel."<br />
32 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK
AWARDS <strong>2021</strong><br />
THE CUSTOMER SERVICE AWARD<br />
WINNER: Kemp Technologies (Kemp is now part of Progress)<br />
RUNNER UP: Brigantia<br />
The Customer Service Award <strong>2021</strong> award is a true testament to our customer-first approach and consistent demonstration of world class<br />
support that our team exhibits daily across all verticals, horizontals and workloads.<br />
Progress Kemp offer the most capable LoadMaster ADC and network visibility products to ensure applications are always-on, highly available<br />
and secure with optimized performance. Our support team is available worldwide and round the clock, in multiple languages, ready to utilize<br />
their advanced networking and security skills and in-depth application knowledge to support every aspect of application delivery, winning us an<br />
overall 94% customer satisfaction score.<br />
SPECIAL AWARD FOR PERFORMA<strong>NC</strong>E DURING THE PANDEMIC<br />
WINNER: Sudlows<br />
RUNNER UP: OneUp Sales<br />
The Coronavirus pandemic has made the last two years particularly challenging. At Sudlows, our teams continued to work extremely hard<br />
throughout this difficult time to deliver critical infrastructure projects across the healthcare and education sectors. We are therefore especially<br />
proud to have won the 'Special Award for Performance During the Pandemic' at the Networking Computing awards. We would like to say a<br />
massive well done and a big thank you to everyone at Sudlows.<br />
THE ONE TO WATCH COMPANY<br />
WINNER: Supermicro Computer<br />
RUNNER UP: OneUp Sales<br />
Supermicro (SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced Server<br />
Building Block Solutions® for Enterprise Data Center, Cloud Computing, Artificial Intelligence, and Edge Computing Systems worldwide.<br />
Supermicro is committed to protecting the environment through its "We Keep IT Green®" initiative and provides customers with the most<br />
energy-efficient, environmentally-friendly solutions available on the market.<br />
BE<strong>NC</strong>H TESTED PRODUCT OF THE YEAR - HARDWARE CATEGORY<br />
WINNER: ExaGrid - Tiered Backup Storage<br />
Ransomware threats are becoming more devious, but ExaGrid's Tiered Backup Storage and its innovative Retention Time-Lock feature<br />
deliver essential protection with a secure, air-gapped retention repository, delayed deletes and immutable data objects. It ensures critical<br />
backups are safe from malicious deletion and even if an attack does succeed in encrypting primary data, ExaGrid's highly efficient recovery<br />
services will have you up and running in no time.<br />
WWW.NETWORKCOMPUTING.CO.UK @<strong>NC</strong>MagAndAwards<br />
NOVEMBER/DECEMBER <strong>2021</strong> NETWORKcomputing 33
AWARDS <strong>2021</strong><br />
BE<strong>NC</strong>H TESTED PRODUCT OF THE YEAR - SOFTWARE AND SERVICES CATEGORY<br />
WINNER: Progress Software - WhatsUpGold <strong>2021</strong><br />
WhatsUpGold <strong>2021</strong> is a sophisticated network monitoring solution that delivers an impressive range of tools integrated seamlessly into a single<br />
console. The simplified licensing schemes make it very affordable for SMBs, it's scalable enough for enterprises and the new log management<br />
features add even more versatility.<br />
NETWORK PROJECT OF THE YEAR<br />
WINNER: Boudica Schools Trust / Zyxel<br />
Rachel Rothwell, Regional Director Western Europe at Zyxel, commented: "I am especially proud of this award, the recognition for our customer's<br />
hard work and the collaboration between Zyxel and our reseller's to help drive, deliver and succeed on improving the learning and security of<br />
our children's education. The challenges to upgrade the network, improve the speeds and centralise the management has become more<br />
complex due to the evolution of cloud computing creating more challenges on demand and cyber security. We couldn't deliver this without our<br />
valued partners and we thank you Eastern Voice and Data for choosing Zyxel."<br />
THE INNOVATION AWARD<br />
WINNER: CNet Training<br />
RUNNER UP: Kemp Technologies<br />
Designed and delivered by CNet Training, the new 5-day Certified Wireless Infrastructure Technician (CWIT®) technical education program<br />
embraces the very latest innovations and technology focusing on a broad range of common wireless technologies which co-exist to create a<br />
complete wireless networking solution, that deliver a seamless mobility experience. It considers the complete wireless networking footprint that<br />
comprises cellular technology and Wi-Fi as well as Bluetooth, satellite, microwave and line of sight optics.<br />
The program provides the knowledge and practical skills to confidently install, test and certify installations in support of Wireless Ethernet and Small<br />
Cell applications in the WAN environment. www.cnet-training.com/programs/certified-wireless-infrastructure-technician-cwit/<br />
PRODUCT OF THE YEAR<br />
WINNER: Extreme Networks - ExtremeCloud IQ<br />
RUNNER UP: Heimdal Security<br />
ExtremeCloud IQ is a machine learning and AI-driven cloud management platform that simplifies onboarding, configuration, monitoring,<br />
managing, troubleshooting, alerting, and reporting for network infrastructure devices, including new Wi-Fi 6 access points. The platform offers<br />
unmatched cloud deployment flexibility, portable licensing across Extreme's entire portfolio, and industry-leading uptime. It is unequalled in its ability<br />
to provide administrators with a 360-degree view of device, client, application, and network health and performance. ExtremeCloud IQ is the first in<br />
the industry to offer unlimited data retention, giving customers unprecedented access to historical data and enabling increased machine learning<br />
accuracy and precision of AI actions, providing insights and outcomes to help customers improve processes and increase operational efficiency. It is<br />
also built upon a microservices architecture, enabling new services and applications to be added without network downtime or IT staff intervention.<br />
COMPANY OF THE YEAR<br />
WINNER: ExaGrid<br />
RUNNER UP: Allied Telesis<br />
ExaGrid is so honoured to win the Company of the Year award, especially as we were nominated alongside such incredible companies in the<br />
industry. We have received this award two years in a row now, and we are so grateful to our customers, partners, and especially to all of the<br />
voters who have given us their support and continued recognition. We continue to innovate our Tiered Backup Storage solution with the goal of<br />
solving all of the challenges related to backups and we are pleased that our unique approach to backup storage has received such accolades.<br />
Our revenue growth is accelerating as customers leave behind first-generation deduplication appliances.<br />
34 NETWORKcomputing NOVEMBER/DECEMBER <strong>2021</strong> @<strong>NC</strong>MagAndAwards<br />
WWW.NETWORKCOMPUTING.CO.UK