SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
The Borderless Enterprise:
Adapting Network Management to
Mobility, Cloud and Shadow IT
August 6, 2015
Shamus McGillicuddy
Senior Analyst
EMA
Doug Roberts
Director of Products
Fluke Networks
Mike Pennacchi
Owner
Network Protocol
Specialists
Today’s Presenters
Slide 2
Shamus McGillicuddy, Senior Analyst, EMA
Shamus has more than nine years of experience in the IT industry, primarily as a
journalist covering the network infrastructure market. At Enterprise Management
Associates (EMA), he is the senior analyst for the network management practice.
Doug Roberts, Director of Products, Fluke Networks
Doug has worked in the IT industry for over 19 years in various business development,
product management and innovation roles. Currently he oversees the product strategy
across enterprise, cloud and service provider landscapes.
Mike Pennacchi, Owner & Lead Network Analyst, Network Protocol Specialists
Mike is the owner and lead network analyst for Network Protocol Specialists, LLC. He
has over 16 years experience as a full time troubleshooting consultant and trainer.
Slide 3
Logistics for Today’s Webinar
• An archived version of the event
recording will be available at
www.enterprisemanagement.com
• Log questions in the Q&A panel located
on the lower right corner of your screen
• Questions will be addressed during the
Q&A session of the event
• A PDF of the PowerPoint
presentation will be available
Questions
Event recording
Event presentation
The Borderless Enterprise:
Adapting Network Management to
Mobility, Cloud and Shadow IT
August 6, 2015
Shamus McGillicuddy
Senior Analyst
EMA
Doug Roberts
Director of Products
Fluke Networks
Mike Pennacchi
Owner
Network Protocol
Specialists
Agenda
• What is the Borderless Enterprise?
• What’s at Stake? Application Performance Impacts
• Cloud Adoption and Performance Challenges
• Losing Control: Shadow IT, Mobility and Beyond
• What’s Next?
• Q&A
Slide 5 © 2015 Enterprise Management Associates, Inc.
What is the Borderless Enterprise?
• The Borderless Enterprise
• IT no longer controls 100% of infrastructure and services
• The cloud flipped enterprise architecture
 Many critical applications reside in the cloud
 Many cloud services accessed via the public Internet
• Mobility has blurred control over remote access
• Line of business managers and users adopt technology without IT
involvement
 This is known as “Shadow IT”
 Cloud services, mobile devices and consumer applications require IT to:
 Discover these technologies
 Create and enforce new usage policies
 Optimize IT infrastructure, security controls and management tools
Slide 6 © 2015 Enterprise Management Associates, Inc.
What’s at Stake: Application Performance Impacts
• Poor application performance has a negative impact on enterprises
• The majority of enterprises are experiencing the following adverse
effects of poor application performance at least occasionally
Slide 7 © 2015 Enterprise Management Associates, Inc.
60%
64%
67%
68%
77%
79%
Brand Image
Customer Loyalty
Revenue
SLOs/SLAs
User Productivity
Customer Experience
Have application performance problems affected any of the
following within your organization?
Cloud Adoption and Performance Challenges
• Cloud Adoption is real
• 49% of enterprises have migrated 20% to 30% of their application
workloads to the public cloud
• Cloud adoption presents new management hurdles
• 42% of enterprises say performance management is harder in the
cloud
• Only 14% say cloud performance management is easier
Slide 8 © 2015 Enterprise Management Associates, Inc.
Cloud Adoption and Performance Challenges
Slide 9 © 2015 Enterprise Management Associates, Inc.
21%
29%
41%
26%
22%
17%
28%
Poor visibility into application performance
Poor visibility into network performance
Difficulty troubleshooting performance issues
Lack of control over cloud workloads
Lack of SLA in cloud services
Finger pointing between cloud provider and
internal IT
None of the above
Which issues have you had with managing performance in cloud environments?
Cloud visibility and troubleshooting are challenging IT operations
Losing Control: Shadow IT, Mobility and Beyond
• Business leaders and end users are adopting technology without
the IT organization’s knowledge
Slide 10 © 2015 Enterprise Management Associates, Inc.
38%
34%
30%
28% 28%
24%
Mobile
Devices
Cloud-based
storage
VoIP, video
and other UC
Mobile apps SaaS apps PaaS
How many enterprises have identified shadow IT adoption of
these technologies?
Losing Control: Shadow IT, Mobility and Beyond
• How do IT organizations discover shadow IT?
• Security incidents are the most common means of discovery (38%)
• Other sources of information:
 Network monitoring (37%)
 Support requests (37%)
 Simple human interaction with business units (34%)
• What changes are IT organizations making for shadow IT?
• Increasing Internet & WAN bandwidth (48%)
• New security for cloud access (45%)
• Allowing direct Internet access from remote sites (26%)
• Adding site-to-site VPNs (22%)
• New wireless LAN security tools (44%)
• Expansion of wireless LAN (33%)
• New UC/VoIP/Video monitoring tools (27%)
Slide 11 © 2015 Enterprise Management Associates, Inc.
Borderless Enterprise: What’s Next?
• What should IT do now?
• Talk to business leaders and align IT with business needs
• Optimize the WAN for the cloud
• Optimize the LAN for mobility and UC
• Monitor the network for shadow IT
• Adapt network security and network policies
• Extend performance management tools for managing the Borderless
Enterprise
Slide 12 © 2015 Enterprise Management Associates, Inc.
Q&A – Please Log Questions in the Q&A Panel
Slide 13 © 2015 Enterprise Management Associates, Inc.
• Learn more about the Borderless Enterprise from Fluke Networks at:
www.flukenetworks.com/content/borderless-enterprise
• Learn more about leading IT analyst firm Enterprise Management
Associates at: www.enterprisemanagement.com

Más contenido relacionado

La actualidad más candente

Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
Chris Pepin
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints
Symantec
 

La actualidad más candente (20)

Achieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network MonitoringAchieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network Monitoring
 
Successful Strategies for Secure, Private and Reliable Wireless Networks
Successful Strategies for Secure, Private and Reliable Wireless NetworksSuccessful Strategies for Secure, Private and Reliable Wireless Networks
Successful Strategies for Secure, Private and Reliable Wireless Networks
 
State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights
 
Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT Directors
 
Fast Track AIOps Automation with Prebuilt Databots
Fast Track AIOps Automation with Prebuilt DatabotsFast Track AIOps Automation with Prebuilt Databots
Fast Track AIOps Automation with Prebuilt Databots
 
Enterprise Network Automation for 2020 and Beyond
Enterprise Network Automation for 2020 and BeyondEnterprise Network Automation for 2020 and Beyond
Enterprise Network Automation for 2020 and Beyond
 
Consumer Identity and Access Management (CIAM)
Consumer Identity and Access Management (CIAM)Consumer Identity and Access Management (CIAM)
Consumer Identity and Access Management (CIAM)
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
The State of Modern Application Development: From Speed to Awareness
The State of Modern Application Development: From Speed to AwarenessThe State of Modern Application Development: From Speed to Awareness
The State of Modern Application Development: From Speed to Awareness
 
State of Application Delivery 2017 - DevOps Insights
State of Application Delivery 2017 - DevOps Insights State of Application Delivery 2017 - DevOps Insights
State of Application Delivery 2017 - DevOps Insights
 
Optimizing the Network for Reliable Application Delivery Across the Cloud
Optimizing the Network for Reliable Application Delivery Across the CloudOptimizing the Network for Reliable Application Delivery Across the Cloud
Optimizing the Network for Reliable Application Delivery Across the Cloud
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
 
Andy chatha - arc advisory group - rethinking it and automation solutions
Andy chatha - arc advisory group - rethinking it and automation solutionsAndy chatha - arc advisory group - rethinking it and automation solutions
Andy chatha - arc advisory group - rethinking it and automation solutions
 
ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints
 
The Future of Technology Operations
The Future of Technology OperationsThe Future of Technology Operations
The Future of Technology Operations
 
36 Benefits: The Reasons to Enable Mobile Access to Central Systems via Termi...
36 Benefits: The Reasons to Enable Mobile Access to Central Systems via Termi...36 Benefits: The Reasons to Enable Mobile Access to Central Systems via Termi...
36 Benefits: The Reasons to Enable Mobile Access to Central Systems via Termi...
 
2014 Cloud Computing Trends: End-User Perspectives
2014 Cloud Computing Trends: End-User Perspectives2014 Cloud Computing Trends: End-User Perspectives
2014 Cloud Computing Trends: End-User Perspectives
 
Service Delivery Beyond IT - Customer Case Study Webinar
Service Delivery Beyond IT - Customer Case Study WebinarService Delivery Beyond IT - Customer Case Study Webinar
Service Delivery Beyond IT - Customer Case Study Webinar
 

Similar a The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & Shadow IT

Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
Dipesh Mukerji
 
Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010
Ness Technologies
 

Similar a The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & Shadow IT (20)

Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud Enterprises
 
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...
Enabling Digital Transformation with Alcatel-Lucent Enterprise’s Network-as-a...
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer
 
Building a Foundation for NetSecOps Partnerships with Network Automation
Building a Foundation for NetSecOps Partnerships with Network AutomationBuilding a Foundation for NetSecOps Partnerships with Network Automation
Building a Foundation for NetSecOps Partnerships with Network Automation
 
The Future of Data Center Network Automation
The Future of Data Center Network AutomationThe Future of Data Center Network Automation
The Future of Data Center Network Automation
 
Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsNetwork Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network Operations
 
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
 
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the CloudThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
 
The Cloudification of the Data Center Network
The Cloudification of the Data Center NetworkThe Cloudification of the Data Center Network
The Cloudification of the Data Center Network
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
 
Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?
 
Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010
 
Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise
Network Visibility Architecture for the Hybrid, Multi-Cloud EnterpriseNetwork Visibility Architecture for the Hybrid, Multi-Cloud Enterprise
Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise
 
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
 
AI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network ManagementAI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network Management
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Multi-Cloud Networking: Connecting and Securing the Future
Multi-Cloud Networking: Connecting and Securing the FutureMulti-Cloud Networking: Connecting and Securing the Future
Multi-Cloud Networking: Connecting and Securing the Future
 

Más de Enterprise Management Associates

Más de Enterprise Management Associates (20)

Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & Shadow IT

  • 1. The Borderless Enterprise: Adapting Network Management to Mobility, Cloud and Shadow IT August 6, 2015 Shamus McGillicuddy Senior Analyst EMA Doug Roberts Director of Products Fluke Networks Mike Pennacchi Owner Network Protocol Specialists
  • 2. Today’s Presenters Slide 2 Shamus McGillicuddy, Senior Analyst, EMA Shamus has more than nine years of experience in the IT industry, primarily as a journalist covering the network infrastructure market. At Enterprise Management Associates (EMA), he is the senior analyst for the network management practice. Doug Roberts, Director of Products, Fluke Networks Doug has worked in the IT industry for over 19 years in various business development, product management and innovation roles. Currently he oversees the product strategy across enterprise, cloud and service provider landscapes. Mike Pennacchi, Owner & Lead Network Analyst, Network Protocol Specialists Mike is the owner and lead network analyst for Network Protocol Specialists, LLC. He has over 16 years experience as a full time troubleshooting consultant and trainer.
  • 3. Slide 3 Logistics for Today’s Webinar • An archived version of the event recording will be available at www.enterprisemanagement.com • Log questions in the Q&A panel located on the lower right corner of your screen • Questions will be addressed during the Q&A session of the event • A PDF of the PowerPoint presentation will be available Questions Event recording Event presentation
  • 4. The Borderless Enterprise: Adapting Network Management to Mobility, Cloud and Shadow IT August 6, 2015 Shamus McGillicuddy Senior Analyst EMA Doug Roberts Director of Products Fluke Networks Mike Pennacchi Owner Network Protocol Specialists
  • 5. Agenda • What is the Borderless Enterprise? • What’s at Stake? Application Performance Impacts • Cloud Adoption and Performance Challenges • Losing Control: Shadow IT, Mobility and Beyond • What’s Next? • Q&A Slide 5 © 2015 Enterprise Management Associates, Inc.
  • 6. What is the Borderless Enterprise? • The Borderless Enterprise • IT no longer controls 100% of infrastructure and services • The cloud flipped enterprise architecture  Many critical applications reside in the cloud  Many cloud services accessed via the public Internet • Mobility has blurred control over remote access • Line of business managers and users adopt technology without IT involvement  This is known as “Shadow IT”  Cloud services, mobile devices and consumer applications require IT to:  Discover these technologies  Create and enforce new usage policies  Optimize IT infrastructure, security controls and management tools Slide 6 © 2015 Enterprise Management Associates, Inc.
  • 7. What’s at Stake: Application Performance Impacts • Poor application performance has a negative impact on enterprises • The majority of enterprises are experiencing the following adverse effects of poor application performance at least occasionally Slide 7 © 2015 Enterprise Management Associates, Inc. 60% 64% 67% 68% 77% 79% Brand Image Customer Loyalty Revenue SLOs/SLAs User Productivity Customer Experience Have application performance problems affected any of the following within your organization?
  • 8. Cloud Adoption and Performance Challenges • Cloud Adoption is real • 49% of enterprises have migrated 20% to 30% of their application workloads to the public cloud • Cloud adoption presents new management hurdles • 42% of enterprises say performance management is harder in the cloud • Only 14% say cloud performance management is easier Slide 8 © 2015 Enterprise Management Associates, Inc.
  • 9. Cloud Adoption and Performance Challenges Slide 9 © 2015 Enterprise Management Associates, Inc. 21% 29% 41% 26% 22% 17% 28% Poor visibility into application performance Poor visibility into network performance Difficulty troubleshooting performance issues Lack of control over cloud workloads Lack of SLA in cloud services Finger pointing between cloud provider and internal IT None of the above Which issues have you had with managing performance in cloud environments? Cloud visibility and troubleshooting are challenging IT operations
  • 10. Losing Control: Shadow IT, Mobility and Beyond • Business leaders and end users are adopting technology without the IT organization’s knowledge Slide 10 © 2015 Enterprise Management Associates, Inc. 38% 34% 30% 28% 28% 24% Mobile Devices Cloud-based storage VoIP, video and other UC Mobile apps SaaS apps PaaS How many enterprises have identified shadow IT adoption of these technologies?
  • 11. Losing Control: Shadow IT, Mobility and Beyond • How do IT organizations discover shadow IT? • Security incidents are the most common means of discovery (38%) • Other sources of information:  Network monitoring (37%)  Support requests (37%)  Simple human interaction with business units (34%) • What changes are IT organizations making for shadow IT? • Increasing Internet & WAN bandwidth (48%) • New security for cloud access (45%) • Allowing direct Internet access from remote sites (26%) • Adding site-to-site VPNs (22%) • New wireless LAN security tools (44%) • Expansion of wireless LAN (33%) • New UC/VoIP/Video monitoring tools (27%) Slide 11 © 2015 Enterprise Management Associates, Inc.
  • 12. Borderless Enterprise: What’s Next? • What should IT do now? • Talk to business leaders and align IT with business needs • Optimize the WAN for the cloud • Optimize the LAN for mobility and UC • Monitor the network for shadow IT • Adapt network security and network policies • Extend performance management tools for managing the Borderless Enterprise Slide 12 © 2015 Enterprise Management Associates, Inc.
  • 13. Q&A – Please Log Questions in the Q&A Panel Slide 13 © 2015 Enterprise Management Associates, Inc. • Learn more about the Borderless Enterprise from Fluke Networks at: www.flukenetworks.com/content/borderless-enterprise • Learn more about leading IT analyst firm Enterprise Management Associates at: www.enterprisemanagement.com