Professional Documents
Culture Documents
7 Myths
about NetworK
Management in
a Digital World
In todays digitally driven, 24/7 world, how well you thrive as
a business depends, more than ever, on your network. Its the
central nervous system that drives business innovation, customer
satisfaction, and market expansion. Its no overstatement to say that
2
Think any of the following statements are true?
Think again.
MYTH 1
The problem todays data centers face is that performance demands for
DDI are escalating astronomically. In addition, DDI platforms are becoming
more diverse, and yet the tools used to manage these core services are still
heavily dependent on manual processes and siloed, patchwork solutions.
These methods are often managed using separate tools, which degrades
efficiency, hinders visibility, and increases the risk of configuration errors and
deployment delays.
3
Bring Automation and Next-Generation Agility to
Your Data Center.
Infoblox Actionable Network Intelligence puts you in control of your data
center by automating key functions, including application deployment
and the provisioning of virtual machines. It automates and optimizes core
network services, enabling you to quickly launch applications and provision
and decommission virtual machines dynamically and on demand to meet
fluctuating business requirements, and without having to wait for manual
intervention.
You also get a unified view that displays the entire network landscapevirtual
and physicalso you can efficiently track current and historical resources for
troubleshooting, compliance, optimization, and audit requirements.
4
MYTH 2
Shadow IT, the use of technology solutions without the knowledge or support
of IT, is on the rise. Most companies know it exists. But few are aware of its
extent. In fact, most CIOs believe there are about 50 unauthorized cloud
services running inside their companies; the actual number is more than 700,
according to research from Cisco.*
Shadow IT has become pervasive for the simple reason that business
users need new tools and solutions faster than IT can provide them.
The consumerization of IT is in full swing. Powerful cloud-powered business
apps are coming online every day. Its folly to assume you can put the genie
back in the bottle by simply ramping up your enforcement efforts using your
existing procedures and network management tools.
The reality is, when business users reach for the latest cloud app without
approval, theyre not out to sabotage your security or compliance. They
just want to do their jobs as quickly and effectively as possible. Rather than
fight shadow IT, your enterprise would be wise to find ways to identify its
presence, and then embrace it, safely and efficiently.
*Corbin, K. (2015, August 10). CIOs vastly underestimate extent of shadow IT. Retrieved August 19, 2016,
from CIO: http://www.cio.com/article/2968281/cio-role/cios-vastly-underestimate-extent-of-shadow-it.html
5
Embrace the Benefits of Shadow IT by Bringing It into
the Light, Automatically.
With Infoblox Actionable Network Intelligence, you can automatically detect
and secure shadow IT applications and devices. By doing so, you can free
your business users to gain valuable new capabilities at the pace they
demand, while minimizing your risks.
From its unique position within the core of your network, the Infoblox platform
continuously monitors all traffic. It analyzes data as it crosses the network
grid, so you can see which systems are sharing data with your enterprise.
It automatically detects the presence of unauthorized applications and
devices and automatically triggers policy enforcement.
Using Infoblox, you can embrace the benefits of shadow IT, such as self-
service, speed to market, and business innovation, while ensuring that every
application your employees and colleagues use is secure, within policy,
and compliant.
Lack of Patience
Your staff may anticipate that IT will not authorize a request
or respond in the time they feel they need.
Individual Preference
Your co-workers are eager for apps they believe will be
easiest for them to use, regardless of where they originate.
6
MYTH 3
7
Automate Data Gathering for Compliance
With automated data gathering and policy enforcement from Infoblox,
you can take command of your compliance efforts while freeing your staff
to focus on core business objectives. With Infoblox Actionable Network
Intelligence, administrators can assess and ensure the compliance of devices,
applications, and network infrastructure without manual intervention.
Perhaps best of all, with Infoblox, you gain a single source of truth for
network and device data across the enterprise. It brings unparalleled visibility,
certainty, and clarity to your compliance program. Youll always know what is
out of compliance and where corrective action needs to take place.
8
MYTH 4
DNS is a top attack pathway for several reasons. First, it plays a unique role
in connectivity. Every device, every virtual machine relies on DNS to connect
to your network. In addition, the open nature of the protocol makes it a
ripe target.
9
Comprehensively Defend Your Network from
DNS-based Threats
Infoblox Actionable Network Intelligence automatically and comprehensively
defends your DNS server from the widest range of DNS-based attacks,
including DNS DDoS, while enabling you to maintain service availability and
business continuity. Its able to distinguish between legitimate and malicious
DNS traffic in real time, enabling your DNS server to respond only to valid
queries, even during DDoS events.
With Infoblox, you can continuously monitor malware threats in real time
based on machine-readable threat intelligence. The platforms firewall
capabilities stop malware in its tracks by automatically identifying, isolating,
and remediating compromised devices, preventing them from communicating
with malicious C&C servers and botnets. The platform also gives you the
ability to speed remediation by seeing threat information in context and in
real time, and then automatically share that data with security personnel and
third-party systems.
10
MYTH 5
Organizations REALITY
should hold off on
IoT initiatives until You can safely deploy
security improves. IoT in many scenarios by
shoring up DNS defenses.
As it turns out, a chief pathway for attacks against IoT devices is, you guessed
it, DNS. IoT increases DNS-based attack surfaces by orders of magnitude.
For example, as more and more data is exchanged through smart grids, the
more damage security breaches can cause. The prospect of hackers gaining
entry to connected systems prevents many companies from launching game-
changing IoT deployments in the near term.
By securing DNS, however, companies can move forward with many IoT
scenarios right now.
11
Secure IoT Devices in Real Time by Shutting Down
DNS Pathways
Infoblox Actionable Network Intelligence enables you to overcome many
IoT-related security threats that prey on DNS connectivity. The platform
combines advanced automation, centralized policy management, enhanced
visibility, and unique actionable intelligence drawn from telemetry streaming
through IoT devices, applications and systems.
In addition, using its powerful reporting and analytics capabilities, you can
analyze IoT device access patterns, capacity trends, and the evolution of
threats to proactively manage network capacity, improve application design,
and bolster security.
12
MYTH 6
Around the clock, hackers and their bots are attempting to gain entry to your
network. Their activity creates a relentless stream of alerts from security tools
that your security teams have to ingest and process in order to prioritize
responses. Even the best-equipped security teams struggle to identify
genuine threats in the gushing torrent of threat data coursing through their
systems. Without knowing which threats are most urgent and can cause
the most damage, security personnel waste valuable time and resources
chasing down the wrong issues.
13
Prioritize and Remediate Threats with Advanced
Threat Intelligence and Insight
With Infoblox Actionable Network Intelligence, your organization can
automatically identify, prioritize, and remediate threats using advanced threat
intelligence and context awareness.
Using the Infoblox platform you can cut through the noise and take
immediate action on threats that truly matter, automatically and in real time.
Infoblox integrates curated and verified threat intelligence on the latest attack
techniques, enabling you to anticipate emerging DNS-based threats and
proactively defend against them.
Moreover, with Infoblox, you can see security incidents in context from a
single, unified console. You always know where infected devices are located,
who owns them, the attack methods involved, and how many times theyve
accessed malicious destinations. With such insights, you can better assess
your security risks, identify high value assets that are infected, conduct
further investigations, and pre-empt future threats.
14
MYTH 7
15
Automatically Detect New Devices and Make
Them Compliant
With Infoblox Actionable Network Intelligence, you gain a real-time view
of all devices across your diverse, multi-vendor infrastructure, including
newly activated devices. Residing at the core of your network, Infoblox
automatically detects new devices and notifies vulnerability scanners to
initiate compliance activities.
The platform provides complete details about your devices, including their
configurations, where they reside, and how they interconnect with one
another. It also enables you to harden security by providing the ability to
find and fix rogue devices and identify compromised devices in real time
using rich contextual data, including associated switch ports, IP and MAC
addresses, location, and user information.
Infoblox helps you manage more than devices. It brings advanced automation
and insight to all network management activities. For example, you can
enhance network efficiency by proactively monitoring and analyzing network
configurations, enabling you to flag problems early. Reduce waste and avoid
downtime from configuration errors by automatically reclaiming unused
resources. And always be ready to accommodate explosive growth in new
devices and virtual machines with predictive insights into capacity needs
while avoiding IP address and switch port exhaustion.
16
One Final Reality You Cant Ignore
Its no myth that networks drive business strategy today. Improved efficiency,
capacity, and security arent just nice to havetheyre critical characteristics
of a successful organization in todays increasingly competitive, always-on
world. Actionable Network Intelligence helps your business excel by putting
the data inside your network to work for you, gathering insights that ease
management and security while revealing new capabilities and capacities.
About Infoblox
Infoblox, headquartered in Santa Clara, California, delivers critical network services that protect Domain
Name System (DNS) infrastructure, automate cloud deployments, and increase the reliability of enterprise
and service provider networks around the world. As the industry leader in DNS, DHCP, and IP address
management, the category known as DDI, Infoblox (www.infoblox.com) reduces the risk and complexity
of networking.