Upload
netfort
View
485
Download
5
Tags:
Embed Size (px)
DESCRIPTION
This slide deck takes a look at the results from a recent network monitoring survey carried out by NetFort. The increased use of external SAAS and cloud based services; consolidation of servers into fewer data centres is driving demand for deeper insight into bandwidth consumption, especially on critical links. However, the number of applications in use on networks today and increased use of CDNs (Content Distribution Networks) makes it very difficult to see clearly what is happening and making life very difficult for network managers. NetFort LANGuardian is deep packet inspection software for investigating, monitoring, and reporting on network activity. LANGuardian helps network administrators to: - Classify network traffic by application and by user - Troubleshoot bandwidth issues right across the network - Perform network or user forensics on past events - Investigate activity on Windows file shares, - Keep track of user activity on the Internet.
Citation preview
www.netfort.com
Network Monitoring Trends 2014
The evolving use of network monitoring tools
www.netfort.comSlide 2
Survey Highlights• 76% of respondents already use network
monitoring tools.• Most important feature not provided by
existing tools:– Ability to break down traffic by application and user
• Reports most often requested by management:– Information on bandwidth consumption
• 71% respondents think it is a necessity to associate network activity with usernames and not just IP addresses.
www.netfort.comSlide 3
Size of network
31.37%
25.49%21.57%
13.37%7.84%
<100<500<1000<5000
Almost half of the respondents managed networks of between 100 and 1000 computers.
How many computers are you responsible for in your network?
www.netfort.comSlide 4
Yes
No
0.00% 10.00% 20.00% 30.00% 40.00% 50.00% 60.00% 70.00% 80.00%
76.47%
23.53%
Network monitoring tools in placeDo you have any network monitoring tools in place at the moment?
Over three-quarters of the respondents have network monitoring tools in place.
www.netfort.comSlide 5
26.98%
3.17%
3.17%6.35%
3.17%4.76%3.17%3.17%
46.03%
SolarWinds WhatsUp GoldPRTG CactiMRTG Cisco PrimeSpiceworks ManageEngineOther
Network monitoring tools usedWhich monitoring tools do you use?
Majority of respondents quoted more than one tool.
www.netfort.comSlide 6
Tools used to monitor NetFlow traffic
SolarWindsCacti
Cisco ToolsPRTG
NetFlowMRTGSNMP
SonicWALLMerakiOther
0% 2% 4% 6% 8% 10% 12% 14% 16% 18% 20%
20.00%
11.11%
8.89%
8.89%
8.89%
6.67%
6.67%
4.44%
4.44%
20.00%
Do you monitor NetFlow traffic and bandwidth? If Yes, how do you do it?
88% of respondents monitor NetFlow traffic.
www.netfort.comSlide 7
Desired NetFlow solution improvements
Ease of use
Limiting media streams for a more responsive browsing experience
Easier navigation between menus
Ease of use / more refined GUI
Better organised
Reporting
Automated reports
More robust reports
Simplified reporting access
Additional features
DDoS protection in more places
Computer speed not compromised by number of computers in useNTOP
Combined NetFlow/sFlow solution
Granular control
What improvements would you like to see in NetFlow-based solutions?
www.netfort.comSlide 8
Features unavailable in current tools
27.45%
17.65%
17.65%
11.76%
11.76%
9.80% 3.92% Breakdown traffic by application and userHave more visibility on bandwidth consumptionMonitor application performanceMonitor internet activityMonitor activity by IP and usernameHave more visibility on user activ-ity and network usageMonitor file share activity
What additional network monitoring features would you like that are unavailable in current tools?
www.netfort.comSlide 9
Information requested by managers
Bandw
idth c
onsum
ption
Ulilizati
on
Applica
tion p
erform
ance
When is
sues a
rise
User ac
tivity
Up tim
eOthe
r0.00%
5.00%
10.00%
15.00%
20.00%
25.00%
30.00%
35.00%
Are you asked to report to your manager on network information on a regular basis? What specifically are you asked to report on?
www.netfort.comSlide 10
Respondent commentsVirus sources and excessive users
Application use Up time speed
Uptime and malware Users consuming bandwidth
User activity
Network usage Bandwidth utilization Network utilization
Bandwidth consumptionApplication performance End user activity
Report to customers Manager requests reports only when issues arise
Information requested by managersAre you asked to report to your manager on network information on a regular basis? What specifically are you asked to report on?
www.netfort.comSlide 11
Respondent commentsBandwidth usage by host Browsed sites
Bandwidth and usage monitoring
When issues arise
User and activity consuming bandwidth
Periodic report, general use
Up time
I would like my staff pull reports on a regular basis
Bandwidth usage and slowness
Bandwidth utilization
Utilization and NetFlow stats
Information requested by managersAre you asked to report to your manager on network information on a regular basis? What specifically are you asked to report on?
www.netfort.comSlide 12
Nice to have
Necessity
0% 10% 20% 30% 40% 50% 60% 70% 80%
29%
71%
Importance of usernames in reportsDo you think associating network activity, including bandwidth, traffic, Internet usage with IP address and username is a necessity or just nice to have
www.netfort.comSlide 13
Respondent commentsWe can better understand true bandwidth needs if we can identify the bandwidth hogs.
Being able to not only simultaneously monitor each computer a student is on but to also be able to monitor everything they did on that computer, I feel would prevent students from going to sites (by hacking) that are not appropriate.
On several occasions I have wished I had a tool which would easily show me all the traffic coming to a particular IP, with source IP and packet contents.
IP addresses change. Associating activity with a user (or a user's system) is most helpful.
Required to verify problems.
Importance of usernames in reportsDo you think associating network activity, including bandwidth, traffic, Internet usage with IP address and username is a necessity or just nice to have
www.netfort.comSlide 14
30.43%
17.39%
8.69%
43.47%
WiresharkFirewallSo-lar-WindsOther
Use of DPI toolsDo you use any deep packet inspection tools? If yes what do you use?
Most respondents are not using deep packet inspection tools at the moment but plan to in future.
www.net for t .com