{"id":4947,"date":"2016-11-15T09:45:39","date_gmt":"2016-11-15T15:45:39","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=4947"},"modified":"2016-11-01T17:02:15","modified_gmt":"2016-11-01T22:02:15","slug":"application-monitoring-beyond-the-data-center","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/application-monitoring-beyond-the-data-center\/","title":{"rendered":"Application Monitoring Beyond The Data Center"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/11\/network-monitoring.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-4949 size-full\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/11\/network-monitoring.jpg\" alt=\"network and server monitoring\" width=\"300\" height=\"225\"><\/a>The closed environment of a traditional on-premises data center with hardware and software owned and controlled by the enterprise is now a thing of the past. Private, public and hybrid cloud deployments are empowering organizations to use the resources and capabilities of the cloud to drive business efficiency, self-service on demand, resource pooling, enhanced data storage, analytics, and other benefits.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">But migrating resources to the cloud and\/or surrendering control of management and provisioning tasks to third parties means that businesses can lose sight of how their networks are actually being used, and even of what\u2019s being used. So it\u2019s essential to regain the initiative in determining and governing how applications and infrastructure are utilized.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Cloud and Shadow<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">While infrastructure and application provision may be part of an officially sanctioned cloud deployment, even this may not be enough for some within an organization. A perceived lack of efficiency or responsiveness on the part of IT, or a failure to appreciate the intricacies of other people\u2019s jobs still drives many to seek out online tools and applications beyond the enterprise firewalls.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u201cShadow IT\u201d remains an issue, with a Blue Coat Shadow Data Report of 2016 concluding that a typical organization may use <a href=\"http:\/\/www.computerworld.com\/article\/3130222\/cloud-computing\/7-ways-to-take-back-control-of-your-cloud-strategy.html\" target=\"_blank\" rel=\"nofollow\">up to 840 separate cloud applications<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> \u2013 the vast majority of which are unsanctioned and often <a title=\"The NSA Spying Fiasco and Your Network\" href=\"https:\/\/www.poweradmin.com\/blog\/the-nsa-spying-fiasco-and-your-network\/\">unsecured software<\/a> used without the knowledge or oversight of internal IT divisions. That\u2019s a lot of unmonitored applications.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Gaining Visibility<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The challenge for administrators is to gain visibility into all aspects of the <a href=\"https:\/\/www.poweradmin.com\/products\/server-monitoring\/?ref=blog\">enterprise network<\/a> \u2013 both within and outside the corporate data center and its formal security policies, protections, and controls \u2013 and to bring all applications and resources used by its members within a single administrative and security umbrella. This entails looking beyond <a href=\"https:\/\/www.poweradmin.com\/help\/latestsmhelp.aspx?page=monitor_event_log.aspx&amp;ref=blog\">SIEM<\/a> and firewall logs to gain a fuller picture of application usage, cloud and network traffic and their implications.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Insight is required into all aspects of on-premises and cloud application usage, so input must be sought from stakeholders in all departments, and at all levels.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Automated Discovery<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">It can be a mammoth task, and one beyond the capabilities of even the most dedicated IT monitoring teams. So there needs to be some degree of automation \u2013 a cloud monitoring and security platform that automates the processes of analyzing log data from firewalls, network proxies, and SIEMs to detect the presence of all applications being used on the network, how they\u2019re being used, and who is using them.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Cloud Policies<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">An enterprise-wide policy governing application and cloud usage needs to be put in place \u2013 a comprehensive regime that takes in security and guidelines for selecting applications, policies on data loss, incident response workflows, analytics, reporting metrics, and how these rhyme with an organization\u2019s compliance status and overall business objectives.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Reducing Complexity And Redundancy<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/11\/network-usage.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4950 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/11\/network-usage.jpg\" alt=\"Monitoring networks\" width=\"300\" height=\"200\"><\/a><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Though redundancy is normally a good thing in networking terms, when it comes to the needless proliferation of unwanted software, duplication or even multiplications of functionality can quickly become a problem. So part of the network discovery and visibility process should involve locating instances where multiple applications or tools on the network are performing the same function \u2013 and which one(s) simultaneously perform their required function to within the parameters set by the enterprise and its mission, and conform to its policy-based security, compliance, and operational criteria.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">This enables administrators to draw up a white-list of approved applications that may be deployed across the enterprise \u2013 and to exclude and\/or penalize the use of superfluous others.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Widening The Risk Assessment<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The porting of applications, user credentials, and potentially sensitive data beyond the network\u2019s perimeter defenses opens these elements to the possibility of attack and infiltration. So a monitoring risk assessment for the enterprise needs to take in all aspects of cloud and mobile usage, account validation and activities, and the behavior of the users themselves.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Monitoring platforms incorporating machine learning algorithms and data analytics may be configured to spot anomalies in user activity that might indicate suspicious action or account compromise, and used to generate alert triggers or automatic suspensions of user accounts.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Analysis And Reporting<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The evolution of the market has made available monitoring platforms that combine cloud application performance management (cloud APM or CAPM), behavioral and transactional analysis of user activity, network integrity, security monitoring and reporting functionality in a single portal. On the more sophisticated platforms, administrators can pull in feeds from cloud-based sources such as Microsoft Azure, IBM Bluemix and Amazon Web Services (AWS).<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The caveat for <a href=\"https:\/\/www.poweradmin.com\/products\/server-montioring\/?ref=blog\">network administrators<\/a> is that these metrics should be compatible with those obtained from an organization\u2019s physical network infrastructure, via standard protocols like IP SLA, or SNMP.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Some Things To Watch For<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/11\/robust-monitoring-lets-you-relax.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4951 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/11\/robust-monitoring-lets-you-relax.jpg\" alt=\"monitoring application performance lets you relax\" width=\"300\" height=\"180\"><\/a><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Some Key Performance Indicators (KPIs) worth monitoring would include:<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Amounts of data sent or received across network interfaces<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Processor utilization within given time periods<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 Credit usage, balances and charges accrued within specific billing periods<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 System integrity checks concerning customer instances, system instances and system performance<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 The length and number of Write operations for storage volumes<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Administrators should be able to baseline and alert the metrics gleaned from all monitoring sources, and provide regular reports in formats compatible with the operational practices of the enterprise.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The closed environment of a traditional on-premises data center with hardware and software owned and controlled by the enterprise is now a thing of the past. Private, public and hybrid cloud deployments are empowering organizations to use the resources and capabilities of the cloud to drive business efficiency, self-service on demand, resource pooling, enhanced data [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":4949,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,6],"tags":[],"class_list":["post-4947","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-tech"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=4947"}],"version-history":[{"count":4,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4947\/revisions"}],"predecessor-version":[{"id":4953,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4947\/revisions\/4953"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/4949"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=4947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=4947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=4947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}