SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
| @ema_research
NetSecOps: How Network
and Security Teams
Collaborate for a Better
Digital Future
Shamus McGillicuddy
Vice President of Research
Network Infrastructure and Operations
Enterprise Management Associates (EMA)
smcgillicuddy@enterprisemanagement.com
Sponsored by . . .
| @ema_research 2
Watch the On-Demand Webinar
• NetSecOps: Examining How Network and Security Teams Collaborate
for a Better Digital Future On-Demand Webinar:
https://info.enterprisemanagement.com/netsecops-2024-webinar-ss
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
© 2023 Enterprise Management Associates, Inc.
| @ema_research
| @ema_research
Featured Speaker
Shamus is a Vice President of Research at EMA,
where he leads the network infrastructure and
operations practice. He has nearly two decades of
experience in the IT industry. His research focuses on
all aspects of managing enterprise networks,
including network automation, AIOps-driven network
operations, multi-cloud networking, and WAN
transformation.
© 2024 Enterprise Management Associates, Inc. 3
Shamus McGillicuddy
Vice President of Research
Network Infrastructure and Operations
Enterprise Management Associates (EMA)
| @ema_research
| @ema_research
Sponsors
© 2024 Enterprise Management Associates, Inc. 4
| @ema_research
| @ema_research
Agenda
© 2024 Enterprise Management Associates, Inc. 5
Research
Goals and
Methodology
Drivers of
NetSecOps
Convergence
Challenges
and Benefits
Network
Data: The
Foundation of
Collaboration
Tools for
NetSecOps
Collaboration
Final Thoughts
and Q&A
1 2 3 4 5 6
| @ema_research
Research Goals and
Methodology
| @ema_research
| @ema_research
NetSecOps Alignment is Expanding
© 2024 Enterprise Management Associates, Inc. 7
COLLABORATION BETWEEN NETWORK AND SECURITY
TEAMS IS INTENSIFYING
MANY NETWORK AND SECURITY SILOS ARE COLLAPSING
| @ema_research
| @ema_research
Research Goals
© 2024 Enterprise Management Associates, Inc. 8
Why are network and security teams coming together?
What are the best ways for them to collaborate?
| @ema_research
| @ema_research
Job Titles
61.5% Technical personnel
21.1% IT middle management
17.4% IT executives
IT Groups
36.2% IT executive suite
28.3% Network engineering
14.5% Cybersecurity/IT security
7.2% Network operations/NOC
6.6% IT architecture
8.3% Cloud architecture/engineering
3.0% Security operations/SOC
Top Industries
23.0% Online services/software as a service
18.4% Finance/Insurance/Banking
16.8% Retail/Wholesales/Distribution
13.8% Manufacturing
7.9% Health care/Hospitals
3.6% Professional services not related to IT
3.3% Construction
2.4% Transportation
Region
67.1% North America
32.9% Europe
Annual Revenue
3.9% $100 million to <$250 million
8.6% $250 million <$500 million
24.0% $500 million to <$1 billion
46.1% $1 billion to <$5 billion
16.4% $5 billion or more
2.0% Unknown/Not applicable
Company Size (by Employee)
45.7% Small enterprise (1,000 to 4,999)
37.5% Medium enterprise (5,000 to 19,999)
16.8% Large enterprise (20,000+)
Methodology: Survey of 304 IT Professionals
© 2024 Enterprise Management Associates, Inc. 9
| @ema_research
Drivers of NetSecOps
Convergence
| @ema_research
| @ema_research
Why are These Teams Coming Together?
© 2024 Enterprise Management Associates, Inc. 11
Technologies and initiatives most responsible for collaboration:
40% IT/network automation strategy
31% Hybrid cloud
29% Secure access service edge
28% Internet of Things/operational technology
28% Multi-cloud architecture
24% Remote/Hybrid work
Business issues that
encourage collaboration:
30% IT labor issues/skills gaps
29% New regulatory
requirements
27% Recent cybersecurity
incidents
25% Budget challenges
| @ema_research
| @ema_research
SASE Unifies Network and Security Architecture
© 2024 Enterprise Management Associates, Inc. 12
Multi-vendor SASE drives more collaboration
SASE IMPACTS ON COLLABORATION BETWEEN
NETWORKING AND SECURITY PERSONNEL
WHO HAS RESPONSIBILITY FOR EACH OF THE FOLLOWING ASPECTS
OF YOUR ORGANIZATION’S ENGAGEMENT WITH SASE
TECHNOLOGY?
| @ema_research
| @ema_research
Establishing guardrails, integrating
operations
Cloud Takes Away IT Control; Network and Security Teams are Taking it Back
© 2024 Enterprise Management Associates, Inc. 13
PUBLIC CLOUD ADOPTION’S IMPACT ON COLLABORATION
BETWEEN NETWORKING AND SECURITY PERSONNEL
Cloud network traffic is a key issue
88% say it is at least somewhat valuable for
network and security teams to have access to
cloud traffic data
Top areas of cloud collaboration:
38% Technology implementation
36% Security incident response
32% Network troubleshooting
31% Infrastructure planning/design
| @ema_research
Challenges and
Benefits
| @ema_research
| @ema_research
Only 45% report complete success
with collaboration
Most IT Organizations Think Network and Security Could Improve Collaboration
© 2024 Enterprise Management Associates, Inc. 15
Key challenges:
35% Data quality/authority issues
35% Budget conflicts/shortfalls
30% Architectural complexity
29% Skills gaps
26% Cultural resistance/conflicts
IT execs boost collaboration by:
48% Implementing shared best practices and workflows
45% Reorganizing groups or consolidating middle management
45% Increase budgets
42% Deploying shared tools
Admins, engineers, and architects are least confident in these measures
| @ema_research
| @ema_research
Outcomes: More Secure, More Efficient, Faster to Solve Problems
© 2024 Enterprise Management Associates, Inc. 16
Benefits of success:
43% Reduced security risk
40% Operational efficiency
40% Accelerated MTTR of network
trouble
39% Faster detection/resolution
of security issues
“My team now has exposure to the [security teams’]
environment. It helps us troubleshoot a lot of issues,
but it also helps us make the right decisions for the
business, We know each other’s environments and
we’re eliminating knowledge gaps.”
Network engineering manager
Midmarket travel and hospitality enterprise
| @ema_research
Network Data:
The Foundation
of Collaboration
| @ema_research
| @ema_research
83% of network teams have at least
partial ownership of infrastructure used
to collect packets
Network Teams Must Deliver Packets to Security
© 2024 Enterprise Management Associates, Inc. 18
HOW VALUABLE IS IT FOR YOUR SECURITY TEAM TO HAVE ACCESS TO
FULL PACKET DATA ASSOCIATED WITH THE TRAFFIC THAT TRAVERSES
YOUR ORGANIZATION’S NETWORK?
Security team’s top use cases for
packet data
40% Investigating endpoint security tool
alerts
35% Investigating network security tool alerts
33% Investigating SIEM/XDR alerts
30% Investigating exfiltration
| @ema_research
| @ema_research
Network teams own most, but not all, DNS
DNS Data is Critical to Cybersecurity
© 2024 Enterprise Management Associates, Inc. 19
HOW VALUABLE IS IT FOR YOUR NETWORK AND SECURITY TEAMS
TO HAVE ACCESS TO NETWORK TRAFFIC DATA IN YOUR
ORGANIZATION’S PUBLIC CLOUD ENVIRONMENTS?
“We’ve had a lot of projects around DNS to make sure that there aren’t any unapproved DNS
queries and that there is less risk of random DNS servers being used.”
Security architect
Fortune 500 software and services enterprise
Only 50% of network teams can provide
logs and query data from all DNS
infrastructure to security
38% ”We can provide most DNS data, but
some remains inaccessible.”
11% “We can provide some DNS data, but
most is inaccessible.”
| @ema_research
Tools for NetSecOps
Collaboration
| @ema_research
| @ema_research
Network Automation
© 2024 Enterprise Management Associates, Inc. 21
91% believe network automation tools are valuable
collaboration facilitators
Successful collaborators say automation is critical
94% want to enable self-service orchestration of networking
and security resources by DevOps and app teams
• Establishes guardrails in hybrid, multi-cloud
Key automation use cases:
48% Security incident response
44% Threat isolation/remediation
39% Network trouble
remediation  best practice
32% Compliance reporting
29% Infrastructure provisioning
| @ema_research
| @ema_research
58% say both network and security teams consume these insights
86% of organizations have network performance management
solutions that provide security insights
Network Monitoring Tools that Deliver Security Insights
© 2024 Enterprise Management Associates, Inc. 22
Most valuable insights:
52% Network detection and response/traffic analysis
43% Health/performance monitoring of security infrastructure
40% Correlations of abnormal network health/performance with
suspicious activity
32% Inventory assessments
| @ema_research
| @ema_research
88% believe it would be valuable for network and security
teams to deploy a shared monitoring tool
Shared Monitoring Tools
© 2024 Enterprise Management Associates, Inc. 23
Factors that correlate with enthusiasm for shared
monitoring:
Deploying multi-cloud architecture
SASE adoption
Interest in actively monitoring network infrastructure for product
vulnerabilities
Need for network monitoring tools that can reveal application
security and application performance
| @ema_research
Final Thoughts
© 2024 Enterprise Management Associates, Inc.
86% of companies see
growing NetSecOps
collaboration
Multiple paths
Both siloed network and security
teams and newly converged
NetSecOps teams report
successful collaborations
Multi-cloud and SASE are
key areas of collaboration
Organizations should examine how network automation and
network monitoring tools can facilitate partnerships
Network data is collaboration’s currency,
especially packets and DNS data
Successful partnerships drive:
Reduced security risk
Operational efficiency
Faster resolution of problems
| @ema_research 24
| @ema_research
| @ema_research
The NetSecOps report is now available!
Learn more and download:
https://bit.ly/3RKsEoD
© 2024 Enterprise Management Associates, Inc. 25

Más contenido relacionado

Similar a NetSecOps: Examining How Network and Security Teams Collaborate for a Better Digital Future

Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessEnterprise Management Associates
 
Making AIOps-Driven Network Performance Management a Reality
Making AIOps-Driven Network Performance Management a RealityMaking AIOps-Driven Network Performance Management a Reality
Making AIOps-Driven Network Performance Management a RealityEnterprise Management Associates
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...Enterprise Management Associates
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceEnterprise Management Associates
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterAlgoSec
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Enterprise Management Associates
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...Enterprise Management Associates
 
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Enterprise Management Associates
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...Enterprise Management Associates
 
Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud EnterprisesEnterprise Management Associates
 
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the CloudThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the CloudThousandEyes
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...Enterprise Management Associates
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise Management Associates
 

Similar a NetSecOps: Examining How Network and Security Teams Collaborate for a Better Digital Future (20)

AI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network ManagementAI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network Management
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
Making AIOps-Driven Network Performance Management a Reality
Making AIOps-Driven Network Performance Management a RealityMaking AIOps-Driven Network Performance Management a Reality
Making AIOps-Driven Network Performance Management a Reality
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
The Cloudification of the Data Center Network
The Cloudification of the Data Center NetworkThe Cloudification of the Data Center Network
The Cloudification of the Data Center Network
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
 
Network Engineering and Operations in a Multi-Cloud World
Network Engineering and Operations in a Multi-Cloud WorldNetwork Engineering and Operations in a Multi-Cloud World
Network Engineering and Operations in a Multi-Cloud World
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
 
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
 
Network Management Megatrends 2020
Network Management Megatrends 2020Network Management Megatrends 2020
Network Management Megatrends 2020
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Enterprise Network Automation for 2020 and Beyond
Enterprise Network Automation for 2020 and BeyondEnterprise Network Automation for 2020 and Beyond
Enterprise Network Automation for 2020 and Beyond
 
Big Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and ManagementBig Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and Management
 
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
 
Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud Enterprises
 
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the CloudThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
 

Más de Enterprise Management Associates

Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryEnterprise Management Associates
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsEnterprise Management Associates
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...Enterprise Management Associates
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Enterprise Management Associates
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityEnterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesEnterprise Management Associates
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Enterprise Management Associates
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...Enterprise Management Associates
 
2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost Data
2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost Data2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost Data
2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost DataEnterprise Management Associates
 

Más de Enterprise Management Associates (19)

Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
Automation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOpsAutomation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOps
 
Debunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research SlidesDebunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research Slides
 
Modern ITAM in the Digitally-Transformed Enterprise
Modern ITAM in the Digitally-Transformed EnterpriseModern ITAM in the Digitally-Transformed Enterprise
Modern ITAM in the Digitally-Transformed Enterprise
 
2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost Data
2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost Data2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost Data
2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost Data
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

NetSecOps: Examining How Network and Security Teams Collaborate for a Better Digital Future

  • 1. | @ema_research NetSecOps: How Network and Security Teams Collaborate for a Better Digital Future Shamus McGillicuddy Vice President of Research Network Infrastructure and Operations Enterprise Management Associates (EMA) smcgillicuddy@enterprisemanagement.com Sponsored by . . .
  • 2. | @ema_research 2 Watch the On-Demand Webinar • NetSecOps: Examining How Network and Security Teams Collaborate for a Better Digital Future On-Demand Webinar: https://info.enterprisemanagement.com/netsecops-2024-webinar-ss • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch © 2023 Enterprise Management Associates, Inc.
  • 3. | @ema_research | @ema_research Featured Speaker Shamus is a Vice President of Research at EMA, where he leads the network infrastructure and operations practice. He has nearly two decades of experience in the IT industry. His research focuses on all aspects of managing enterprise networks, including network automation, AIOps-driven network operations, multi-cloud networking, and WAN transformation. © 2024 Enterprise Management Associates, Inc. 3 Shamus McGillicuddy Vice President of Research Network Infrastructure and Operations Enterprise Management Associates (EMA)
  • 4. | @ema_research | @ema_research Sponsors © 2024 Enterprise Management Associates, Inc. 4
  • 5. | @ema_research | @ema_research Agenda © 2024 Enterprise Management Associates, Inc. 5 Research Goals and Methodology Drivers of NetSecOps Convergence Challenges and Benefits Network Data: The Foundation of Collaboration Tools for NetSecOps Collaboration Final Thoughts and Q&A 1 2 3 4 5 6
  • 7. | @ema_research | @ema_research NetSecOps Alignment is Expanding © 2024 Enterprise Management Associates, Inc. 7 COLLABORATION BETWEEN NETWORK AND SECURITY TEAMS IS INTENSIFYING MANY NETWORK AND SECURITY SILOS ARE COLLAPSING
  • 8. | @ema_research | @ema_research Research Goals © 2024 Enterprise Management Associates, Inc. 8 Why are network and security teams coming together? What are the best ways for them to collaborate?
  • 9. | @ema_research | @ema_research Job Titles 61.5% Technical personnel 21.1% IT middle management 17.4% IT executives IT Groups 36.2% IT executive suite 28.3% Network engineering 14.5% Cybersecurity/IT security 7.2% Network operations/NOC 6.6% IT architecture 8.3% Cloud architecture/engineering 3.0% Security operations/SOC Top Industries 23.0% Online services/software as a service 18.4% Finance/Insurance/Banking 16.8% Retail/Wholesales/Distribution 13.8% Manufacturing 7.9% Health care/Hospitals 3.6% Professional services not related to IT 3.3% Construction 2.4% Transportation Region 67.1% North America 32.9% Europe Annual Revenue 3.9% $100 million to <$250 million 8.6% $250 million <$500 million 24.0% $500 million to <$1 billion 46.1% $1 billion to <$5 billion 16.4% $5 billion or more 2.0% Unknown/Not applicable Company Size (by Employee) 45.7% Small enterprise (1,000 to 4,999) 37.5% Medium enterprise (5,000 to 19,999) 16.8% Large enterprise (20,000+) Methodology: Survey of 304 IT Professionals © 2024 Enterprise Management Associates, Inc. 9
  • 10. | @ema_research Drivers of NetSecOps Convergence
  • 11. | @ema_research | @ema_research Why are These Teams Coming Together? © 2024 Enterprise Management Associates, Inc. 11 Technologies and initiatives most responsible for collaboration: 40% IT/network automation strategy 31% Hybrid cloud 29% Secure access service edge 28% Internet of Things/operational technology 28% Multi-cloud architecture 24% Remote/Hybrid work Business issues that encourage collaboration: 30% IT labor issues/skills gaps 29% New regulatory requirements 27% Recent cybersecurity incidents 25% Budget challenges
  • 12. | @ema_research | @ema_research SASE Unifies Network and Security Architecture © 2024 Enterprise Management Associates, Inc. 12 Multi-vendor SASE drives more collaboration SASE IMPACTS ON COLLABORATION BETWEEN NETWORKING AND SECURITY PERSONNEL WHO HAS RESPONSIBILITY FOR EACH OF THE FOLLOWING ASPECTS OF YOUR ORGANIZATION’S ENGAGEMENT WITH SASE TECHNOLOGY?
  • 13. | @ema_research | @ema_research Establishing guardrails, integrating operations Cloud Takes Away IT Control; Network and Security Teams are Taking it Back © 2024 Enterprise Management Associates, Inc. 13 PUBLIC CLOUD ADOPTION’S IMPACT ON COLLABORATION BETWEEN NETWORKING AND SECURITY PERSONNEL Cloud network traffic is a key issue 88% say it is at least somewhat valuable for network and security teams to have access to cloud traffic data Top areas of cloud collaboration: 38% Technology implementation 36% Security incident response 32% Network troubleshooting 31% Infrastructure planning/design
  • 15. | @ema_research | @ema_research Only 45% report complete success with collaboration Most IT Organizations Think Network and Security Could Improve Collaboration © 2024 Enterprise Management Associates, Inc. 15 Key challenges: 35% Data quality/authority issues 35% Budget conflicts/shortfalls 30% Architectural complexity 29% Skills gaps 26% Cultural resistance/conflicts IT execs boost collaboration by: 48% Implementing shared best practices and workflows 45% Reorganizing groups or consolidating middle management 45% Increase budgets 42% Deploying shared tools Admins, engineers, and architects are least confident in these measures
  • 16. | @ema_research | @ema_research Outcomes: More Secure, More Efficient, Faster to Solve Problems © 2024 Enterprise Management Associates, Inc. 16 Benefits of success: 43% Reduced security risk 40% Operational efficiency 40% Accelerated MTTR of network trouble 39% Faster detection/resolution of security issues “My team now has exposure to the [security teams’] environment. It helps us troubleshoot a lot of issues, but it also helps us make the right decisions for the business, We know each other’s environments and we’re eliminating knowledge gaps.” Network engineering manager Midmarket travel and hospitality enterprise
  • 17. | @ema_research Network Data: The Foundation of Collaboration
  • 18. | @ema_research | @ema_research 83% of network teams have at least partial ownership of infrastructure used to collect packets Network Teams Must Deliver Packets to Security © 2024 Enterprise Management Associates, Inc. 18 HOW VALUABLE IS IT FOR YOUR SECURITY TEAM TO HAVE ACCESS TO FULL PACKET DATA ASSOCIATED WITH THE TRAFFIC THAT TRAVERSES YOUR ORGANIZATION’S NETWORK? Security team’s top use cases for packet data 40% Investigating endpoint security tool alerts 35% Investigating network security tool alerts 33% Investigating SIEM/XDR alerts 30% Investigating exfiltration
  • 19. | @ema_research | @ema_research Network teams own most, but not all, DNS DNS Data is Critical to Cybersecurity © 2024 Enterprise Management Associates, Inc. 19 HOW VALUABLE IS IT FOR YOUR NETWORK AND SECURITY TEAMS TO HAVE ACCESS TO NETWORK TRAFFIC DATA IN YOUR ORGANIZATION’S PUBLIC CLOUD ENVIRONMENTS? “We’ve had a lot of projects around DNS to make sure that there aren’t any unapproved DNS queries and that there is less risk of random DNS servers being used.” Security architect Fortune 500 software and services enterprise Only 50% of network teams can provide logs and query data from all DNS infrastructure to security 38% ”We can provide most DNS data, but some remains inaccessible.” 11% “We can provide some DNS data, but most is inaccessible.”
  • 20. | @ema_research Tools for NetSecOps Collaboration
  • 21. | @ema_research | @ema_research Network Automation © 2024 Enterprise Management Associates, Inc. 21 91% believe network automation tools are valuable collaboration facilitators Successful collaborators say automation is critical 94% want to enable self-service orchestration of networking and security resources by DevOps and app teams • Establishes guardrails in hybrid, multi-cloud Key automation use cases: 48% Security incident response 44% Threat isolation/remediation 39% Network trouble remediation  best practice 32% Compliance reporting 29% Infrastructure provisioning
  • 22. | @ema_research | @ema_research 58% say both network and security teams consume these insights 86% of organizations have network performance management solutions that provide security insights Network Monitoring Tools that Deliver Security Insights © 2024 Enterprise Management Associates, Inc. 22 Most valuable insights: 52% Network detection and response/traffic analysis 43% Health/performance monitoring of security infrastructure 40% Correlations of abnormal network health/performance with suspicious activity 32% Inventory assessments
  • 23. | @ema_research | @ema_research 88% believe it would be valuable for network and security teams to deploy a shared monitoring tool Shared Monitoring Tools © 2024 Enterprise Management Associates, Inc. 23 Factors that correlate with enthusiasm for shared monitoring: Deploying multi-cloud architecture SASE adoption Interest in actively monitoring network infrastructure for product vulnerabilities Need for network monitoring tools that can reveal application security and application performance
  • 24. | @ema_research Final Thoughts © 2024 Enterprise Management Associates, Inc. 86% of companies see growing NetSecOps collaboration Multiple paths Both siloed network and security teams and newly converged NetSecOps teams report successful collaborations Multi-cloud and SASE are key areas of collaboration Organizations should examine how network automation and network monitoring tools can facilitate partnerships Network data is collaboration’s currency, especially packets and DNS data Successful partnerships drive: Reduced security risk Operational efficiency Faster resolution of problems | @ema_research 24
  • 25. | @ema_research | @ema_research The NetSecOps report is now available! Learn more and download: https://bit.ly/3RKsEoD © 2024 Enterprise Management Associates, Inc. 25