SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
| @ema_research
DDI Directions:
DNS, DHCP, and IP
Address Management
in the Multi-Cloud Era
Shamus McGillicuddy
Vice President of Research
Network Infrastructure and Operations
Enterprise Management Associates (EMA)
SMcGillicuddy@enterprisemanagement.com
Sponsored by
| @ema_research 2
Watch the On-Demand Webinar
• DDI Directions: DNS, DHCP and IP Address Management Strategies for
the Multi-Cloud Era On-Demand Webinar:
https://info.enterprisemanagement.com/ddi-directions-research-
webinar-ss
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
© 2023 Enterprise Management Associates, Inc.
| @ema_research
| @ema_research
Featured Speaker
Shamus McGillicuddy is a Vice President of Research
at Enterprise Management Associates (EMA), where
he leads the network infrastructure and operations
practice. He has nearly two decades of experience
in the IT industry. His research focuses on all aspects
of managing enterprise networks, including network
automation, AIOps-driven network operations, multi-
cloud networking, and WAN transformation.
© 2023 Enterprise Management Associates, Inc. 3
Shamus McGillicuddy
Vice President of Research
Network Infrastructure and Operations
| @ema_research
| @ema_research
Sponsors
© 2023 Enterprise Management Associates, Inc. 4
| @ema_research
| @ema_research
Agenda
© 2023 Enterprise Management Associates, Inc. 5
Why DDI
Research?
1 2 3
Essential DDI
Capabilities
DDI and
Network
Automation
4
DDI and the
Cloud
4
DDI Security
| @ema_research
Research Goals and
Methodology
| @ema_research
| @ema_research
A suite of services DNS DHCP IP address management
DDI is More Than IP Address Space and Domain Names
© 2023 Enterprise Management Associates, Inc. 7
Just technology, not a product
Get by with spreadsheets & free/open source
software
Traditional view
Only 40% of IT organizations are fully successful with DDI
Engineers and architects are more pessimistic than
CIOs/CISOs
Investment in enterprise DDI solutions typically leads to:
44% Improved network resilience
44% Enhanced IT productivity/agility
40% Reduced security risk
Reality
| @ema_research
| @ema_research
Strategic Importance of DDI
© 2023 Enterprise Management Associates, Inc. 8
Top Drivers of DDI Investment
“It unifies everything.”
Network engineer
Fortune 500 consulting company
Research Goal: How do IT organizations establish modern DDI services to support this?
40%
Hybrid cloud
37%
Network/IT
automation
34%
Public cloud/
multi-cloud
| @ema_research
| @ema_research
Job Titles
47.4% Technical personnel
(admin/engineer/architect)
36.3% IT middle management
(manager/supervisor/director)
16.2% IT executives (CIO/CTO/CISO)
Top IT Groups
28.2% Network engineering
15.6% CIO suite
11.7% Cybersecurity
10.8% Cloud operations
9.0% IT project management
8.1% Network operations
7.8% IT architecture
Top Industries
21.0% Financial services
19.2% Manufacturing
15.0% Media/Entertainment/Content Provider
10.8% Retail
9.3% Professional services
7.8% Health care
4.5% Energy
Region
63.1% North America
36.9% Europe
Annual Revenue
28.2% $100 million to <$250 million
32.7% $500 million <$1 billion
25.2% $1 billion to <$5 billion
12.0.% $5 billion+
1.8% Unknown/Not applicable
Company Size (Employees)
18.0% Small enterprise (500 to 999)
49.8% Midmarket enterprise (1,000 to 4,999)
32.1% Large enterprise (5,000+)
Demographic Overview: Survey of 333 DDI Experts
© 2023 Enterprise Management Associates, Inc. 9
| @ema_research
Essential DDI
Capabilities
| @ema_research
| @ema_research
Core Requirements
© 2023 Enterprise Management Associates, Inc. 11
High priority for successful
organizations:
• Security features
• Network discovery
Security features 35%
Scalability/performance 31%
Fully integrated DNS/DHCP/IPAM functionality 30%
Ease of use 26%
Multi-cloud support 23%
Resiliency/High availability 20%
Customer support 20%
Network discovery 17%
1
2
3
4
5
6
7
8
Technical personnel:
• More interested in discovery
• Less interested in fully
integrated DDI stack
| @ema_research
| @ema_research
More on the Value of Network Discovery
© 2023 Enterprise Management Associates, Inc. 12
“It would be great to have more robust discovery tools within whatever IPAM and
full-stack DDI solution I am using. I don’t want to go in and homebrew a solution to
get the data I need. I want to have it all in one place.”
Network engineer
Fortune 500 financial services company
“I have a feeling that our IPAM is not as up-to-date as we would like it to be. It’s
hard to find a person who owns an IP address sometimes. Vendors could help by
providing good discovery tools that can go out, find devices, identify their
addresses, and correlate that with our IPAM. IPAM should not be a passive tool. It
should collect information from a live network and discover what’s happening.”
Network engineer
Fortune 500 consulting company
| @ema_research
| @ema_research
IPAM overlay integration
Changes in IPAM are orchestrated across third-party services
IPAM Integration with Third-Party DNS & DHCP Services
© 2023 Enterprise Management Associates, Inc. 13
“DNS is an internal struggle.
We don’t have a set
owner. It’s in this gray area
where it is touched by
multiple groups owning
services for their own
needs.”
Successful DDI teams
• Prioritize overlay integration across DNS and DHCP
• Integrate more of these third-party services
• Most critical to CloudOps and cybersecurity teams
Third-party DNS/DHCP is pervasive,
despite full-stack DDI solutions
Project manager
Fortune 500 oil/gas/chemical
company
| @ema_research
| @ema_research
API satisfaction = DDI success
DDI APIs are Essential
© 2023 Enterprise Management Associates, Inc. 14
How satisfied are you with the APIs your DDI solution offers?
API use cases
33% Automation/orchestration
31% Security/compliance enforcement
23% Network monitoring/observability
22% DNS-based service discovery
20% Integration with third-party systems
Essential
integrations
44% Network security
systems
41% ITSM
37% SIEM
API challenges
30% Quality
30% Complexity
25% Documentation
25% Extra licenses
25% Performance
| @ema_research
DDI and Network
Automation
| @ema_research
| @ema_research
First Tier of Automation: DDI Workflows
© 2022 Enterprise Management Associates, Inc. 16
99% of DDI teams leverage
automated workflows within DDI
solutions
49% completely trust these
automated workflows
Network/cloud discovery
DNS/DHCP server config/deploy
IP address allocation/provisioning
DNS record management
Address sync across DNS/DHCP/IPAM
IP address reclamation
35%
32%
28%
24%
24%
Top use cases
23%
| @ema_research
| @ema_research
88% of Organizations: DDI is our Network Source of Truth
© 2023 Enterprise Management Associates, Inc. 17
Network intent and state data
Used by network automation
tools to configure & manage
infrastructure
IP addresses
VLAN to subnet mapping
Interface configs
Device adjacencies
Security policies
Etc.
What is it? What’s in it?
Effective = DDI success
Pessimists: Network engineering
& IT architecture
Optimists: CIO’s suite,
CloudOps, DevOps
39% “DDI is a completely
effective source of truth”
| @ema_research
| @ema_research
Most Valuable Use Cases for a DDI-Based Network Source of Truth
© 2023 Enterprise Management Associates, Inc. 18
Priority for cybersecurity
| @ema_research
DDI and the Cloud
| @ema_research
| @ema_research
Integrating On-Premises IPAM with Multi-Cloud Architecture
© 2023 Enterprise Management Associates, Inc. 20
79% of organizations integrate their
on-prem IPAM tool with cloud IPAM for a
unified approach to IP address space
Multi-cloud enterprises are more aggressive
with IPAM integration
How consistent and effective is the integration of on-premises
IPAM with IPAM in the cloud across all your cloud providers?
Nearly 66% have effective
integration across multi-cloud
Confidence drops with MORE cloud
providers in production
| @ema_research
| @ema_research
DDI Cloud Requirements
© 2023 Enterprise Management Associates, Inc. 21
IPAM
48% Centralized visibility/control over IP assignments
45% Enhanced security measures for IPAM
45% Streamlined address tracking
44% Automated IP address allocation/provisioning
DNS
39% Enhanced DNS security measures
38% Scalability to handle increasing DNS traffic
35% Easy management/updating DNS records
34% Seamless integration with other cloud services/apps
| @ema_research
| @ema_research
EMA Recommendations for Multi-Cloud DDI
© 2023 Enterprise Management Associates, Inc. 22
Expect to support overlay
management of multiple DNS services
DDI data quality/governance will be
tested
Position DDI as a source of truth Security
• Integrate DDI with SIEM solution
• Implement DNSSEC
• Monitor DHCP for unauthorized
leases, exhaustion attacks
APIs
• Pay close attention to API quality
• Leverage SDKs
| @ema_research
DDI Security
| @ema_research
| @ema_research
Job titles
• IT executives and middle management
reported high adoption rates
• Technical personnel reported low
adoption
IT silos
• CIO’s suite and CloudOps reported high
adoption
• Network engineering, NetOps, and
cybersecurity reported low adoption
47% Report Using DNS Firewalls Today: Possibly Driven by Knowledge Gaps
© 2023 Enterprise Management Associates, Inc. 24
Current engagement with DNS firewall solutions
| @ema_research
| @ema_research
Only 31% Fully Confident in DNS Security
© 2023 Enterprise Management Associates, Inc. 25
Confidence gaps
• IT executives are twice as confident as technical
personnel and middle management
• CIO’s suite and CloudOps are more confident than
network engineering, NetOps, and cybersecurity
Potential best practices
• DDI team must have influence over cloud strategy
• Stay away from Microsoft DNS
• Extensive integration of IPAM with DNS
• API quality impacts security
• Look for DDI vendors with strong network and cloud
discovery
• Deploy a DNS firewall
• Implement DNSSEC
How confident are you that all your organization’s DNS
infrastructure is sufficiently secure?
Confidence with DNS security correlates with
overall DDI success
| @ema_research
| @ema_research
24% take no steps to secure DHCP
Top DHCP security concerns
34% DHCP-based network reconnaissance
31% Exhaustion attacks
30% Unauthorized DHCP leases/IP address assignments
22% take no steps to secure IPAM
Top IPAM security concerns
40% Unauthorized IP address allocation
34% Inadequate authentication/access control
32% Poor visibility into address assignments
Don’t Neglect IPAM and DHCP Security
© 2023 Enterprise Management Associates, Inc. 26
Recommendations
Integrate with NAC and use other
authentication/authorization methods
Isolate servers via segmentation
Monitor logs/events
Harden servers
Consider encrypting traffic between
servers and endpoints
| @ema_research
| @ema_research
Final Thoughts
© 2023 Enterprise Management Associates, Inc. 27
DDI teams must:
Fight for influence over cloud strategy
Partner closely with cybersecurity
Lead network automation strategy
Watch out for these issues
that can sink a DDI strategy
Network complexity
IT culture/resistance to change
Data quality/governance
Lack of skilled personnel
Cloud transformation and network automation drive DDI investments
| @ema_research
| @ema_research
The DDI Directions Report is Now Available!
Learn more and download:
https://bit.ly/48fe14g
© 2023 Enterprise Management Associates, Inc. 28

Más contenido relacionado

Similar a DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-Cloud Era

Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsNetwork Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsEnterprise Management Associates
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessEnterprise Management Associates
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...Enterprise Management Associates
 
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...Enterprise Management Associates
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Enterprise Management Associates
 
Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud EnterprisesEnterprise Management Associates
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyVISIHOSTING
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersEnterprise Management Associates
 
2016 Cloud Unbound Briefing
2016 Cloud Unbound Briefing2016 Cloud Unbound Briefing
2016 Cloud Unbound BriefingScott Cameron
 
The Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldThe Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldEnterprise Management Associates
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...Enterprise Management Associates
 
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...ThousandEyes
 
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...Enterprise Management Associates
 
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...Enterprise Management Associates
 
Multi-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud Strategy
Multi-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud StrategyMulti-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud Strategy
Multi-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud StrategyThousandEyes
 

Similar a DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-Cloud Era (20)

Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsNetwork Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network Operations
 
The Cloudification of the Data Center Network
The Cloudification of the Data Center NetworkThe Cloudification of the Data Center Network
The Cloudification of the Data Center Network
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud Enterprises
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT Strategy
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet Brokers
 
2016 Cloud Unbound Briefing
2016 Cloud Unbound Briefing2016 Cloud Unbound Briefing
2016 Cloud Unbound Briefing
 
The Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldThe Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud World
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
 
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
 
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...
 
Multi-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud Strategy
Multi-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud StrategyMulti-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud Strategy
Multi-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud Strategy
 

Más de Enterprise Management Associates

Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryEnterprise Management Associates
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsEnterprise Management Associates
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...Enterprise Management Associates
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Enterprise Management Associates
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityEnterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesEnterprise Management Associates
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Enterprise Management Associates
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...Enterprise Management Associates
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...Enterprise Management Associates
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceEnterprise Management Associates
 
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Enterprise Management Associates
 

Más de Enterprise Management Associates (20)

Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
Automation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOpsAutomation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOps
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
 
Debunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research SlidesDebunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research Slides
 
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
 
Modern ITAM in the Digitally-Transformed Enterprise
Modern ITAM in the Digitally-Transformed EnterpriseModern ITAM in the Digitally-Transformed Enterprise
Modern ITAM in the Digitally-Transformed Enterprise
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-Cloud Era

  • 1. | @ema_research DDI Directions: DNS, DHCP, and IP Address Management in the Multi-Cloud Era Shamus McGillicuddy Vice President of Research Network Infrastructure and Operations Enterprise Management Associates (EMA) SMcGillicuddy@enterprisemanagement.com Sponsored by
  • 2. | @ema_research 2 Watch the On-Demand Webinar • DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-Cloud Era On-Demand Webinar: https://info.enterprisemanagement.com/ddi-directions-research- webinar-ss • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch © 2023 Enterprise Management Associates, Inc.
  • 3. | @ema_research | @ema_research Featured Speaker Shamus McGillicuddy is a Vice President of Research at Enterprise Management Associates (EMA), where he leads the network infrastructure and operations practice. He has nearly two decades of experience in the IT industry. His research focuses on all aspects of managing enterprise networks, including network automation, AIOps-driven network operations, multi- cloud networking, and WAN transformation. © 2023 Enterprise Management Associates, Inc. 3 Shamus McGillicuddy Vice President of Research Network Infrastructure and Operations
  • 4. | @ema_research | @ema_research Sponsors © 2023 Enterprise Management Associates, Inc. 4
  • 5. | @ema_research | @ema_research Agenda © 2023 Enterprise Management Associates, Inc. 5 Why DDI Research? 1 2 3 Essential DDI Capabilities DDI and Network Automation 4 DDI and the Cloud 4 DDI Security
  • 7. | @ema_research | @ema_research A suite of services DNS DHCP IP address management DDI is More Than IP Address Space and Domain Names © 2023 Enterprise Management Associates, Inc. 7 Just technology, not a product Get by with spreadsheets & free/open source software Traditional view Only 40% of IT organizations are fully successful with DDI Engineers and architects are more pessimistic than CIOs/CISOs Investment in enterprise DDI solutions typically leads to: 44% Improved network resilience 44% Enhanced IT productivity/agility 40% Reduced security risk Reality
  • 8. | @ema_research | @ema_research Strategic Importance of DDI © 2023 Enterprise Management Associates, Inc. 8 Top Drivers of DDI Investment “It unifies everything.” Network engineer Fortune 500 consulting company Research Goal: How do IT organizations establish modern DDI services to support this? 40% Hybrid cloud 37% Network/IT automation 34% Public cloud/ multi-cloud
  • 9. | @ema_research | @ema_research Job Titles 47.4% Technical personnel (admin/engineer/architect) 36.3% IT middle management (manager/supervisor/director) 16.2% IT executives (CIO/CTO/CISO) Top IT Groups 28.2% Network engineering 15.6% CIO suite 11.7% Cybersecurity 10.8% Cloud operations 9.0% IT project management 8.1% Network operations 7.8% IT architecture Top Industries 21.0% Financial services 19.2% Manufacturing 15.0% Media/Entertainment/Content Provider 10.8% Retail 9.3% Professional services 7.8% Health care 4.5% Energy Region 63.1% North America 36.9% Europe Annual Revenue 28.2% $100 million to <$250 million 32.7% $500 million <$1 billion 25.2% $1 billion to <$5 billion 12.0.% $5 billion+ 1.8% Unknown/Not applicable Company Size (Employees) 18.0% Small enterprise (500 to 999) 49.8% Midmarket enterprise (1,000 to 4,999) 32.1% Large enterprise (5,000+) Demographic Overview: Survey of 333 DDI Experts © 2023 Enterprise Management Associates, Inc. 9
  • 11. | @ema_research | @ema_research Core Requirements © 2023 Enterprise Management Associates, Inc. 11 High priority for successful organizations: • Security features • Network discovery Security features 35% Scalability/performance 31% Fully integrated DNS/DHCP/IPAM functionality 30% Ease of use 26% Multi-cloud support 23% Resiliency/High availability 20% Customer support 20% Network discovery 17% 1 2 3 4 5 6 7 8 Technical personnel: • More interested in discovery • Less interested in fully integrated DDI stack
  • 12. | @ema_research | @ema_research More on the Value of Network Discovery © 2023 Enterprise Management Associates, Inc. 12 “It would be great to have more robust discovery tools within whatever IPAM and full-stack DDI solution I am using. I don’t want to go in and homebrew a solution to get the data I need. I want to have it all in one place.” Network engineer Fortune 500 financial services company “I have a feeling that our IPAM is not as up-to-date as we would like it to be. It’s hard to find a person who owns an IP address sometimes. Vendors could help by providing good discovery tools that can go out, find devices, identify their addresses, and correlate that with our IPAM. IPAM should not be a passive tool. It should collect information from a live network and discover what’s happening.” Network engineer Fortune 500 consulting company
  • 13. | @ema_research | @ema_research IPAM overlay integration Changes in IPAM are orchestrated across third-party services IPAM Integration with Third-Party DNS & DHCP Services © 2023 Enterprise Management Associates, Inc. 13 “DNS is an internal struggle. We don’t have a set owner. It’s in this gray area where it is touched by multiple groups owning services for their own needs.” Successful DDI teams • Prioritize overlay integration across DNS and DHCP • Integrate more of these third-party services • Most critical to CloudOps and cybersecurity teams Third-party DNS/DHCP is pervasive, despite full-stack DDI solutions Project manager Fortune 500 oil/gas/chemical company
  • 14. | @ema_research | @ema_research API satisfaction = DDI success DDI APIs are Essential © 2023 Enterprise Management Associates, Inc. 14 How satisfied are you with the APIs your DDI solution offers? API use cases 33% Automation/orchestration 31% Security/compliance enforcement 23% Network monitoring/observability 22% DNS-based service discovery 20% Integration with third-party systems Essential integrations 44% Network security systems 41% ITSM 37% SIEM API challenges 30% Quality 30% Complexity 25% Documentation 25% Extra licenses 25% Performance
  • 15. | @ema_research DDI and Network Automation
  • 16. | @ema_research | @ema_research First Tier of Automation: DDI Workflows © 2022 Enterprise Management Associates, Inc. 16 99% of DDI teams leverage automated workflows within DDI solutions 49% completely trust these automated workflows Network/cloud discovery DNS/DHCP server config/deploy IP address allocation/provisioning DNS record management Address sync across DNS/DHCP/IPAM IP address reclamation 35% 32% 28% 24% 24% Top use cases 23%
  • 17. | @ema_research | @ema_research 88% of Organizations: DDI is our Network Source of Truth © 2023 Enterprise Management Associates, Inc. 17 Network intent and state data Used by network automation tools to configure & manage infrastructure IP addresses VLAN to subnet mapping Interface configs Device adjacencies Security policies Etc. What is it? What’s in it? Effective = DDI success Pessimists: Network engineering & IT architecture Optimists: CIO’s suite, CloudOps, DevOps 39% “DDI is a completely effective source of truth”
  • 18. | @ema_research | @ema_research Most Valuable Use Cases for a DDI-Based Network Source of Truth © 2023 Enterprise Management Associates, Inc. 18 Priority for cybersecurity
  • 20. | @ema_research | @ema_research Integrating On-Premises IPAM with Multi-Cloud Architecture © 2023 Enterprise Management Associates, Inc. 20 79% of organizations integrate their on-prem IPAM tool with cloud IPAM for a unified approach to IP address space Multi-cloud enterprises are more aggressive with IPAM integration How consistent and effective is the integration of on-premises IPAM with IPAM in the cloud across all your cloud providers? Nearly 66% have effective integration across multi-cloud Confidence drops with MORE cloud providers in production
  • 21. | @ema_research | @ema_research DDI Cloud Requirements © 2023 Enterprise Management Associates, Inc. 21 IPAM 48% Centralized visibility/control over IP assignments 45% Enhanced security measures for IPAM 45% Streamlined address tracking 44% Automated IP address allocation/provisioning DNS 39% Enhanced DNS security measures 38% Scalability to handle increasing DNS traffic 35% Easy management/updating DNS records 34% Seamless integration with other cloud services/apps
  • 22. | @ema_research | @ema_research EMA Recommendations for Multi-Cloud DDI © 2023 Enterprise Management Associates, Inc. 22 Expect to support overlay management of multiple DNS services DDI data quality/governance will be tested Position DDI as a source of truth Security • Integrate DDI with SIEM solution • Implement DNSSEC • Monitor DHCP for unauthorized leases, exhaustion attacks APIs • Pay close attention to API quality • Leverage SDKs
  • 24. | @ema_research | @ema_research Job titles • IT executives and middle management reported high adoption rates • Technical personnel reported low adoption IT silos • CIO’s suite and CloudOps reported high adoption • Network engineering, NetOps, and cybersecurity reported low adoption 47% Report Using DNS Firewalls Today: Possibly Driven by Knowledge Gaps © 2023 Enterprise Management Associates, Inc. 24 Current engagement with DNS firewall solutions
  • 25. | @ema_research | @ema_research Only 31% Fully Confident in DNS Security © 2023 Enterprise Management Associates, Inc. 25 Confidence gaps • IT executives are twice as confident as technical personnel and middle management • CIO’s suite and CloudOps are more confident than network engineering, NetOps, and cybersecurity Potential best practices • DDI team must have influence over cloud strategy • Stay away from Microsoft DNS • Extensive integration of IPAM with DNS • API quality impacts security • Look for DDI vendors with strong network and cloud discovery • Deploy a DNS firewall • Implement DNSSEC How confident are you that all your organization’s DNS infrastructure is sufficiently secure? Confidence with DNS security correlates with overall DDI success
  • 26. | @ema_research | @ema_research 24% take no steps to secure DHCP Top DHCP security concerns 34% DHCP-based network reconnaissance 31% Exhaustion attacks 30% Unauthorized DHCP leases/IP address assignments 22% take no steps to secure IPAM Top IPAM security concerns 40% Unauthorized IP address allocation 34% Inadequate authentication/access control 32% Poor visibility into address assignments Don’t Neglect IPAM and DHCP Security © 2023 Enterprise Management Associates, Inc. 26 Recommendations Integrate with NAC and use other authentication/authorization methods Isolate servers via segmentation Monitor logs/events Harden servers Consider encrypting traffic between servers and endpoints
  • 27. | @ema_research | @ema_research Final Thoughts © 2023 Enterprise Management Associates, Inc. 27 DDI teams must: Fight for influence over cloud strategy Partner closely with cybersecurity Lead network automation strategy Watch out for these issues that can sink a DDI strategy Network complexity IT culture/resistance to change Data quality/governance Lack of skilled personnel Cloud transformation and network automation drive DDI investments
  • 28. | @ema_research | @ema_research The DDI Directions Report is Now Available! Learn more and download: https://bit.ly/48fe14g © 2023 Enterprise Management Associates, Inc. 28