Network Barometer Report 2015

advertisement
Network Barometer Report 2015
A gauge of global networks’ readiness to accelerate business
The Network Barometer Report 2015 can be downloaded at:
dimensiondata.com/networkbarometer
A
b
o
u
t
Dimension Data
Founded in 1983, Dimension Data plc is a global ICT services and solutions
provider that uses its technology expertise, global service delivery capability, and
entrepreneurial spirit to accelerate the business ambitions of its clients. Dimension
Data is a member of the NTT Group. It has designed, built, and manages over
9,000 networks worldwide to enable more than 13 million users to connect to
their organisations’ networks. Dimension Data has delivered over 2,000 Technology
Lifecycle Management Assessments to date.
Visit dimensiondata.com
Copyright notice and disclaimer
© Dimension Data 2009–2015
Copyright and rights in databases subsist in this work. Any unauthorised copying, reproduction, or other dealing in this work, or any part
thereof, without the prior written consent of the copyright owner, is an act of copyright infringement. Copying of certain portions of
this work, such as tables, graphs, and certain extracts, is permissible subject to the conditions that (1) such portions do not constitute a
substantial reproduction of the work (or a section) as a whole and (2) the following notice accompanies all such portions: ‘Dimension Data
Network Barometer Report 2015, © Dimension Data 2009–2015’. Any unauthorised copying, communication to the public, reproduction, or
other dealings in this work, or any part thereof, renders the person who is responsible for such acts liable for civil law copyright infringement
and, under certain circumstances, liable for criminal prosecution. All rights of the copyright owner are reserved.
The data and information contained in the Network Barometer Report are for information purposes only. While the commentary and
hypotheses in this Report are based on rigorous data analysis and market experience, the Report also contains opinion. Furthermore, while
reasonable steps are taken to ensure the accuracy and integrity of the data and information provided, Dimension Data accepts no liability
or responsibility whatsoever if such data or information is incorrect or inaccurate, for whatsoever reason. Dimension Data does not accept
liability for any claims, loss, or damages of any nature arising as a result of the reliance on, or use of, such data or information by any
individual or organisation.
network barometer report 2015
Executive summary
7
Results
Dimension 1: Technology lifecycle management – How old are today’s networks?
14
This year’s results
How we interpret the results
Summary
15
19
20
Dimension 2: Support services – What causes today’s networks to fail
and how well are those incidents handled?
22
This year’s results
How we interpret the results
Summary
23
28
30
Dimension 3: Security – How vulnerable are today’s networks?
32
This year’s results
How we interpret the results
Summary
33
36
38
Dimension 4: Architecture – Are organisations preparing their networks for
enterprise mobility and the Internet of Things?
40
This year’s results
How we interpret the results
Summary
42
45
46
Recommendations
48
Appendix A: Sample distribution
54
Appendix A.1: Technology lifecycle, type, and vulnerability data
54
Appendix A.2: Services data
57
Appendix B: Top 10 PSIRTs
58
List of figures and tables
59
Executive
summary
5
About
the 2015 Network
Barometer Report
Technology data gathered from
technology
assessments
discovered
devices
5 regions
11 industries
Support services data gathered from
Global
Service
Centres:
A sample of
more than
175,000
service
incidents
Boston
Frankfurt
Bangalore
Johannesburg
A sample
size of
105
countries
We investigated 4 dimensions
technology lifecycle
management
support
services
* See Appendix A for a detailed breakdown
security
architecture
network barometer report 2015
Executive summary
Remote monitoring and automated
management drastically reduce
network support time
The Network Barometer Report 2015 gauges the readiness of today’s networks to support
business. The Report is based on network discovery data gathered from Dimension Data’s
Technology Lifecycle Management Assessments conducted for organisations around the
world. We combined this with information from our Global Service Centres, which relate
to support service requests, or ‘incidents’, logged against organisations’ devices managed
by us. The result is a multidimensional view of today’s networks.
This year, we added four new aspects to
our enquiry:
• services data to compare how devices managed
on Dimension Data’s remote infrastructure
management platform fare in terms of the average time they take to troubleshoot and repair when they fail, compared with devices not managed by us
• an analysis of the configuration errors that
occur most commonly on network devices
across the categories of access management,
intrusion management, network services, session
management, and system settings
• a detailed breakdown of the number of network devices across different models to gain
a better view of organisations’ readiness for
enterprise mobility
Our overall conclusion:
Overall, our data suggests that there’s a growing
need for more effective day-to-day network
management across all corporate infrastructures.
Remote monitoring and automated management
are the most effective ways to improve network
service levels by drastically reducing support time.
We reached this conclusion by investigating and
comparing four dimensions of network management
and strategy:
1. technology lifecycle management
2. support services
3. security
4. architecture
• an analysis of IPv6 adoption across networks in order to determine how well prepared corporate
infrastructures are to accommodate the Internet of Things
Our interpretation of the results is influenced by our
strategic focus on ICT services, and our extensive
experience in monitoring, maintaining, supporting,
managing, and outsourcing our clients’ networks.
7
network barometer report 2015
Remote monitoring and automated management
drastically reduced the time to troubleshoot and
repair all devices, compared with devices that
weren’t managed in this way.
Dimension 1: Technology lifecycle
management – How old are today’s networks?
Networks have aged for the fifth year in a row.
Organisations tend to focus technology refresh
initiatives on obsolete devices, and sweating
ageing equipment.
Our results show that:
• Of all devices, 53% are now ageing or obsolete – up
from 51% in our last Report.
• The percentage of ageing devices has grown by four
points, while the percentage of obsolete devices has
dropped marginally by two points.
Over the past few years, the percentage of ageing
and obsolete devices has steadily increased. The
conventional assumption was that a technology refresh
cycle was imminent. However, our data shows that
organisations are refreshing mostly obsolete devices,
and are clearly willing to sweat ageing devices for
longer than expected.
Possible causes of this strategy are:
• a sustained focus on cost savings, particularly evident
in reduced capex budgets, which may have disrupted
normal refresh patterns
• the growing availability and uptake of as-a-service ICT consumption models which reduce
the need for organisations to invest in their own IT
infrastructure
• the introduction of programmable, software-defined
networks which may be causing organisations to
‘wait and see’ before selecting and implementing
new technology – a factor we expect will become
more influential in the next 18 to 36 months (also
see About software-defined networking in our
Recommendations section.)
8
Dimension 2: Support services
– What causes network devices
to fail and how well are such
incidents handled?
There’s been a sharp increase in the proportions
of both hardware and software failures across
devices since last year. However, most incidents
are still caused by factors that would fall outside the terms of a conventional support
services contract.
Current devices again took longer to repair
than both ageing and obsolete devices. Remote
monitoring and automated management
drastically reduced the time to troubleshoot and
repair all devices, compared with devices that
weren’t managed in this way.
Our results show that:
• The largest proportion of service incidents (55%)
aren’t device-related, but are caused by factors that
fall outside the remit of a conventional support
contract. Organisations would have to handle these
incidents by themselves.
• Avoidable human error causes almost one-third of
all incidents.
• Dimension Data’s remote network monitoring
and automated management reduce the time to
troubleshoot faulty devices by a massive 75%, and
the time they take to repair by 32%, compared
with devices not managed by us.
network barometer report 2015
Dimension 3: Security – How vulnerable are today’s networks?
While networks are marginally less vulnerable than last year, the percentage of devices with security
vulnerabilities has remained relatively stable over the last four years. Networks are therefore not
improving their security status significantly.
Ageing devices are more vulnerable than current or obsolete devices. In addition, the highest number
of security advisories were published for data centre switches and edge/branch office devices. However,
security advisories affected a larger proportion of wireless access points and data centre switches, which
makes them the most vulnerable parts of networks today.
Our results show that:
• Of all devices, 60% have at least one security vulnerability – down from last year’s 74%.
• Over the last four years, the average percentage of devices with at least one security vulnerability has remained
relatively stable at 60%.
• Ageing devices are more prone to having vulnerabilities than current or obsolete devices.
• Data centre switches and edge/branch office routers had the most published security advisories. However, security advisories for data centre switches and wireless access points had the highest penetration rate across all
device types.
Dimension 4: Architecture – How well are networks prepared for
enterprise mobility and the Internet of Things?
Despite the general tendency to sweat assets, organisations are slowly expanding the wireless capabilities
of their network access points.
However, 74% of wireless access points are still older models (802.11g and older) that don’t support a
sound mobility strategy. In addition, the majority of devices are not IPv6-capable yet, many of which
require a simple software upgrade to be so.
Combined, these factors point to organisations not giving the impact of enterprise mobility and the
Internet of Things on the network due strategic consideration yet.
Enterprise mobility requires pervasive wireless connectivity which, in turn, requires at least three basic features in access ports: power-over-Ethernet, gigabit Ethernet on the client side, and 10-gigabit uplinks. This year, we found that:
• 65% of all ports support power-over-Ethernet – up by 14 percentage points since last year
• 25% of switches support 10-gigabit uplinks – up by 2 percentage points
• 37% of ports support gigabit Ethernet – down by 8 percentage points
We maintain that this slight improvement is a reaction to the increased number of mobile devices used in the
workplace, rather than the result of a planned and proactive strategy to prepare for enterprise mobility.
9
network barometer report 2015
Only 21% of all network devices are currently IPv6enabled, while 48% need a simple software upgrade
to become IPv6-ready.
In addition to the impact of enterprise mobility on corporate networks, The Internet of Things will see an
increasing number and variety of business-enabling and –enhancing technologies interconnecting via networks.
Non-human objects will be able to gather data from their environment, interact with one another, and make
intelligent decisions, all without human intervention. To leverage the benefits this will offer, organisations will
need to adopt IPv6 more broadly across their infrastructures, as the number of potentially connected devices will
increase exponentially. Public IPv4 addresses are becoming a rare commodity; in fact, in some parts of the world
they’re already depleted. Here too, we’re seeing strong adoption of public IPv6 address space, especially driven
by legislation in certain regions and proactive architectural changes in others.
Organisations with mostly IPv4-based networks, which haven’t architected the underlying environment with IPv6
in mind, have limited visibility of, and control over, IPv6-enabled technologies. This exposes them to unnecessary
risk, as they won’t be able to monitor and manage those devices, nor control the traffic flow, as well as in an
IPv4-based environment.
We found that:
Only 21% of all network devices are currently IPv6-enabled, while 48% need a simple software upgrade to
become IPv6-ready.
What we recommend
To ensure their networks are able to support business in the most effective, efficient, and secure way possible,
organisations should consider four steps to raise the maturity of their operational support environments:
1. Achieve visibility of the entire networking estate through an accurate and well-maintained inventory.
2. S tandardise the types of technologies used in the network and their configurations as much as possible.
This will shorten the time to repair and reduce support costs, when devices fail.
3. A
utomate as many of day-to-day management tasks as possible through outsourced managed services or
software-defined networking.
4. M
onitor networking devices more closely, either in-house or through remote monitoring services, to reduce
the time it takes to troubleshoot and repair faulty devices.
For more detailed advice, see our Recommendations section.
10
network barometer report 2015
About the Network Barometer Report
The Network Barometer Report 2015 presents the aggregate data gathered from Dimension
Data’s Technology Lifecycle Management Assessments conducted for clients around the
world in 2014. It also contains data relating to service incidents, logged at our Global
Service Centres, for client networks that we support. Dimension Data compiles, analyses,
compares, and interprets the data in order to gauge the readiness of today’s networks to
support business.
About the Technology Lifecycle
Management Assessment
This ICT assessment service from Dimension Data discovers installed assets on the
network, identifies their lifecycle statuses, determines maintenance coverage, and flags
potential security vulnerabilities. The Assessment assists organisations to align their IT
infrastructure with best practices for configuration, security, and patch management,
thereby ensuring that they’re not exposing themselves to unnecessary risk. The
technology lifecycle data used in this Report comes from these automated Assessments,
not from a survey. Click here for more information.
11
Results
13
network barometer report 2015
Dimension 1: Technology lifecycle
management – How old are
today’s networks?
About technology lifecycles
In order to establish the age and viability of technology assets, most vendors have standardised milestones
through which they progress their products towards obsolescence. For example, Cisco uses six technology
lifecycle milestones. These run from future-end-of-sale, the announcement of the lifecycle milestone dates; to
last-day-of-support, the date after which Cisco’s Technical Assistance Center will no longer support the product.
Common to all vendors are end-of-sale and end-of-support.
To normalise the data for this Report, we’ve defined three lifecycle categories:
• Current – These devices are presently shipping and have full access to vendor support services.
• Ageing – Vendors have announced that these devices are past end-of-sale. The devices haven’t passed end-ofsupport yet, but vendor support decreases gradually as the device ages further.
• Obsolete – These devices are past end-of-support.
Table 1 lists these three categories, and the maintenance and support requirements typical of each.
Table 1: Technology lifecycle stages, associated risk levels, and required support environment maturity
Lifecycle
status
Time
(years)
Risks
Required support
environment maturity
Current
0–3
• settling period during which product
• controlled introduction into the environment,
bugs and hardware stability issues
are identified
• organisation’s support teams learn
new features of the device
requiring mature release and
deployment processes
• new and/or advanced technology requires
updated, technology-specific training
• mature change management processes needed
to handle updates and patches, as required
Ageing
3–5
• increased support costs with some
vendors
• all business-as-usual processes apply, including
• decreasing support later in this stage
• some local sparing might be required for later-
(for example, no more software
bug fixes)
Obsolete
5+
• no, or limited, access to spares
• no, or limited, vendor support for
complex issues
14
capacity and change management
stage equipment
• logistics and change management relating to
local spares warehousing
network barometer report 2015
This year’s results
Figure 1: Percentage of ageing and obsolete devices, global average
45
53
51
48
38
Global
2010
2011
2012
2013
2014
For the fifth consecutive year, the devices in today’s networks have aged slightly in terms of their lifecycle status.
Of all devices, 53% are now ageing or obsolete – up by a marginal two percentage points from last year.
Figure 2: Percentage of ageing and obsolete devices by region
60
54
53
50
44
38
37
44
51
52
40
55
55
53
52
48
45
44
40
59
56
38
41
48
51
53
38
38
34
22
Americas
Asia Pacific
2010
Australia
2011
Europe
2012
Middle East & Africa
2013
Global
2014
15
network barometer report 2015
In Asia Pacific, Australia, and Middle East &
Africa, there are slightly fewer ageing and
obsolete devices than last year.
The global increase is mainly due to higher percentages of ageing and obsolete devices in two regions: the Americas,
which rose by a significant 16 percentage points; and Europe, which increased modestly by two percentage points. In Asia Pacific, Australia, and Middle East & Africa, there are slightly fewer ageing and obsolete devices than last year.
A closer analysis of the data gathered from the Americas revealed that the 16-point increase in ageing and obsolete
devices in that region came from a single assessment conducted for a large organisation in the government sector.
However, normalising the data by removing this assessment from this region’s sample set didn’t make a significant
difference: the percentage of ageing and obsolete devices still showed a 9-point increase. This highlights the trend
we’ve seen in relation to the lack of, or delay in, spending on technology refresh in the public sector of the Americas,
attributable to widespread budget cuts and a delayed reaction to the global economic crisis.
Figure 3: Percentage of ageing and obsolete devices by industry
79
77
67
61
60
55
4140
39
40
54 54
50
49
43
34
56
50
48
43
44
32
35 35
38
46
50
38
34
66
61
59
57
51 51
44
54
48
44
48
40
40
44
37
35
34
49
47
47
37
41
48
45
51
53
38
29
2827
22
Automotive
and
manufacturing
Business
services
Construction
and real estate
Consumer
goods
and retail
2010
16
Financial
services
2011
Government
health care
and
education
Mediaentertainment
and
hospitality
2012
Resources
utilities
and enegy
2013
Service
Technology
providers
and
telecommunications
2014
Travel and
transportation
Overall
network barometer report 2015
This indicates that organisations
focus their refresh initiatives
mostly on technology that has
reached critical lifecycle stages
when vendor support is no
longer available.
Figure 4: Percentage of devices by lifecycle
stage, 2012–2014
2012
8
52
Current
40
Ageing
Obsolete
2013
11
49
Current
40
Ageing
Obsolete
Figure 4 compares the percentage of discovered devices
by lifecycle category over the last three years. While
we’ve seen a slight drop in the percentage of obsolete
devices – down to 9% from last year’s 11% – the
percentage of ageing devices has increased by 4 points.
This indicates that organisations focus their refresh
initiatives mostly on technology that has reached critical
lifecycle stages when vendor support is no longer
available. In general, organisations are ‘sweating’
ageing assets, while the percentage of current devices is
at its lowest in three years.
During the seven-year history of the Network Barometer
Report, organisations’ average tolerance level for
obsolete devices in their networks has always been in
the region of 10%. Rarely do organisations allow this to
increase beyond 11% before they refresh the relevant
devices. Historically, there’s been a greater degree of
yearly fluctuation in the percentages of current and
ageing devices, than in obsolete devices.
We’ve correlated this figure with services information
gathered from devices under Dimension Data’s
management to investigate these tolerance levels in
networks monitored and managed by us.
2014
9
47
44
Current
Ageing
Obsolete
17
network barometer report 2015
Figure 5: Percentage of devices by lifecycle stage, when Dimension Data manages the devices, 2013–2014
2013
2014
5
9
46
49
Current
45
Current
46
Ageing
Ageing
Obsolete
Obsolete
Figure 6: Percentage of devices by lifecycle stage, per region, when Dimension Data manages the devices
57
46
47
46
49
49
49
46
46
37
7.4
Americas
5.5
5.7
5.3
Asia Pacific
Europe
Current
Ageing
Middle East & Africa
5.4
Global
Obsolete
Of the more than 1.5 million devices managed by Dimension Data on behalf of its clients, only 5% were obsolete this
year – a significant decrease from last year’s 9%.This reduction correlates with the emphasis organisations have placed
on refreshing mainly obsolete devices over the last year. Although Dimension Data may be managing the devices on
behalf of its client, the decision to purchase replacement technology remains with the client.
The smaller proportion of obsolete devices also shows that Dimension Data has a lower tolerance for these devices
in the networks it manages than client organisations would have if they manage their networks themselves. This is
because Dimension Data is familiar with the risks involved in managing obsolete devices which are no longer subject
to vendor support.
However, at 46%, the proportion of ageing devices is larger in networks managed by Dimension Data than in clientmanaged environments. This indicates a stronger tendency to sweat assets for which vendor support is limited. The
combination of maintenance best practices and available, if limited, vendor support allows Dimension Data a greater
degree of confidence in its ability to manage ageing devices.
18
network barometer report 2015
How we interpret the results
Today’s networks are again marginally ‘older’ than in previous years. In last year’s
Network Barometer Report, we argued that it’s a sound strategy to sweat ageing
assets for as long as possible and not to refresh technology simply for the sake of doing so.
The caveats to this approach are still that the organisation should:
• h
ave an accurate inventory of its entire network estate including each device’s product lifecycle stage, which
is often not the case
• u
nderstand the function of each device and how critical it is to the network’s uptime – the more critical the
device, the more urgent the need to keep it up to date
• h
ave the appropriate operational support strategy in place to resolve any performance issues or outages
that may occur, as vendor support will be either limited or unavailable during later lifecycle stages
• e nsure that the device’s capabilities aren’t constraining architectural changes, which have driven upgrades in
other areas of the network
This year’s results show that organisations are following this approach but, although they’re focusing refresh
efforts mostly on obsolete devices, they still have a greater appetite for the risks involved in keeping such
devices in the network.
Mature monitoring, support, and maintenance
processes would allow for a higher tolerance of ageing
devices in the network.
As seen from the data gathered from devices managed by Dimension Data, mature monitoring, support, and
maintenance processes would allow for a higher tolerance of ageing devices in the network. This proves the viability of managing an older network overall. That is, provided that there’s sufficient visibility of the lifecycle status of all devices, an understanding of their risk profile depending on their criticality to the infrastructure
as a whole, and the proactive management of that risk.
These questions remain, though: Why and when do devices most often fail, and how well are those incidents handled?
19
network barometer report 2015
How
old are today’s
networks?
Networks have aged for 5 consecutive years.
53%
of devices are now ageing
or obsolete
(-2
BUT more are ageing (+4
fewer are obsolete
than last year
percentage
points
)
percentage
points
)
Organisations have a higher tolerance of
obsolete devices than Dimension Data has
when managing networks on clients’ behalf.
We recommend...
Sweating your assets is okay, BUT ...
Know your
devices and their
lifecycle stages
20
Understand potential
network impacts if
devices fail
Manage the risk
of device failure
proactively
network barometer report 2015
Today’s networks are again marginally
‘older’ than in previous years
In last year’s Network Barometer Report, we argued that it’s a sound strategy to sweat
ageing assets for as long as possible and not to refresh technology simply for the sake of doing so.
This year’s results show that organisations are following this approach but, although
they’re focusing refresh efforts mostly on obsolete devices, they still have a greater
appetite for the risks involved in keeping such devices in the network.
21
Dimension 2: Support services – What
causes today’s networks to fail and how
well are those incidents handled?
This year, we analysed over 175,000 service incidents – or ‘trouble tickets’ – handled by Dimension
Data’s Global Service Centres. While the number of devices under our management has grown since
last year, we also had access to a greater data set, which contributed to the increase in the number of
incidents analysed. We wanted to understand the types of incidents encountered while maintaining
our clients’ networks and how these relate to device lifecycle data. (Please refer to Appendix A for
detailed information and commentary on the sample size of our services data.)
About Dimension Data’s Global Service Centres
Dimension Data’s Global Service Centres are organisational
hubs situated at eight central locations in five regions around
the world:
• Americas: Boston, US; and Santiago, Chile
• Asia Pacific: Auckland, New Zealand; Bangalore, India; and Singapore
• Australia: Melbourne, Australia
• Europe: Frankfurt, Germany
• Middle East & Africa: Johannesburg, South Africa
At these Centres, Dimension Data’s service delivery and
technical support experts receive calls from clients and resolve
technical service tickets, requests, and problems in 13 local
languages (depending on location). The Centres receive over
a million such requests from 10,000 clients every year, which
translates to more than 2,500 incidents each day.
22
Dimension Data’s Global Service
Centres are organisational hubs
situated at eight central locations
in five regions around the world.
network barometer report 2015
This year’s results
Figure 7: Root causes of incidents, 2013 – 2014
2013
2014
1
5
0
2 10
3
14
11
Application issue
28
18
Application issue
3
Asset capacity
7
1
Cable fault
Configuration error
Environmental
Environmental
Other human error
3
16
Cable fault
Configuration error
Hardware failure
1
Asset capacity
Hardware failure
19
Other human error
Scheduled outage
Scheduled outage
Software bug
Software bug
Telco failure
Telco failure
42
25
Table 2: Root causes of incidents
Root cause
What it means
Application issue
The device failed due to an error in an application that runs on the device itself, other than
the core operating system, or due to an error in relaying information from an application that
runs remotely.
Asset capacity
The device failed due to network traffic requiring a higher capacity than device is able to handle.
Cable fault
Failure owing to damage to the cable of some kind, for example, the cable was severed between
floorboards or cut by mistake.
Configuration error
The device failed owing to an incorrect or sub-optimal configuration.
Environmental
This includes failures due to power cuts, cooling problems, flooding, and so on, either within the
immediate or wider environment of the device.
Hardware failure
This includes all failures related to the device chassis itself, or to modules added to it to extend or
change its functionality.
Other human error
Mistakes made by people, such as incidents logged incorrectly, duplication of support calls,
incidents logged against devices not managed by Dimension Data, and so on.
Scheduled outage
This includes all planned and predictable routine maintenance downtime.
Software bug
The device failed due to an error in its core operating system, excluding application software.
Telco failure
Failures due to outages in the wide area network that connects the corporate network to telecom
service provider networks.
23
network barometer report 2015
The largest percentage
of incidents – a total of
55% across all networks – would need to be handled
and remedied by organisations themselves.
Figure 7 shows the breakdown of incidents by
resolution category. The most obvious change from our
last results is the dramatic increase in the proportion of
hardware failures compared to other root causes, which
rose by 26 percentage points. The larger proportion
of hardware incidents is due to a general increase in
devices managed by Dimension Data, in combination
with an overall reduction in obsolete devices, which are
less prone to failure. However, when comparing only
the number of incidents per device on a like-for-like
basis, the number of hardware failures has remained
relatively stable compared to our last Report.
Adding to the larger proportion of hardware failures
we’ve seen this year, are the decreases in the proportion
of telco failures (-14 percentage points), environmental
factors (-11 percentage points), and other human errors (-6 percentage points). However, the proportion
of incidents caused by configuration errors and
software bugs has increased by eight and two
percentage points respectively. The larger proportion
of incidents caused by software bugs may be due
to a slight increase in current devices managed by
Dimension Data. The earlier the device is in its lifecycle,
the more prone it would be to software problems that haven’t been identified and solved yet during its
shorter lifespan.
Counting together other human errors and
configuration errors, mistakes made by people account
for 30% of all failures, which shows that nearly onethird of incidents are still potentially avoidable. Of all
root causes, only software bugs (3%) and hardware
errors (42%) would fall within the terms of a basic
support contract, adding up to a total of 45%. This
implies that the largest percentage of incidents – a total
of 55% across all networks – would need to be handled
and remedied by organisations themselves. That is,
if they don’t have network monitoring, support, and
management services in place.
24
Delving deeper into the types of configuration errors
over the last year, we noted a slight increase in critical
errors in voice gateways and industrial switches.
This is concerning, as voice gateways are often
exposed to external parties and therefore more open
to attack. Given the criticality of keeping industrial
manufacturing environments up and running without
interruption, we’d also expect to see more rigorous
controls in relation to the configuration of underlying
infrastructures in this type of environment.
We also analysed the most common configuration
errors seen in networks today. These can be broadly
grouped into two categories of device configuration:
network services and system settings; and access management.
Network services and system settings allow for
the remote management and basic functioning of the
device. Of all discovered wireless devices, routers, and
switches, 31% had critical configuration violations,
which will allow a malicious user to gain unauthorised
access to the device, or misuse or bypass security
controls for network traffic.
As far as access management configurations are
concerned, over 49% of analysed networks don’t have
a centralised authentication strategy in place. System
administrators would have to manually maintain
authentication details for each device, as there’s no
central policy to manage and audit configuration
changes. This, in turn, hinders the organisation’s ability to maintain visibility of changes in the network and secure the environment against
unauthorised configuration changes that may cause
downtime. In almost all cases, a lack of centralised
access management increases the cost of managing the network.
There's a strong correlation between the application
of configuration standards and best practices in the
network and an organisation’s ability to reduce the
duration and impact of network device outages.
The combination of organisations allowing critical
configuration violations to remain within a productive
environment, and not centrally managing network
assets, points towards a broader concern: networks
aren’t as well maintained as they ought to be.
There’s also a correlation between the failures caused by
devices and their lifecycle stage.
network barometer report 2015
Figure 8: Percentage difference in failure rate by lifecycle stage, in relation to current devices
0.41
0
-0.36
Current
Obsolete devices failed least
of all, which supports the
argument for sweating assets
as long as possible, as long
as the organisation has a
thorough operational support
strategy in place.
Ageing
Obsolete
For the purposes of this analysis, we filtered the data
to show only hardware and software failures. All other
incidents are caused by factors that can’t be regarded
as device-related.
Figure 8 shows that obsolete devices failed 0.36%
less often than current devices, while ageing devices
failed 0.41% more often than current devices. This
emphasises the need for advanced monitoring and
management of ageing devices in particular. While the
percentage differences may seem small, the impact that
these failures may have on a large network containing
hundreds of devices in each category can be significant.
Obsolete devices failed least of all, which supports the
argument for sweating assets as long as possible, as
long as the organisation has a thorough operational
support strategy in place to repair or replace such
devices promptly should they fail, as there will be no
vendor support.
25
network barometer report 2015
Figure 9: Average mean-time-to-repair by lifecycle stage, 2013–2014
2013
4.2
3.3
3.4
Obsolete
Average
2.7
Current
Ageing
Lifecycle stage
2014
3.8
2.3
2.1
1.8
Current
Ageing
Obsolete
Average
Lifecycle stage
Looking only at hardware and software failures combined, we’ve seen an overall improvement in the average time
it takes to repair devices: from an average of 3.4 hours last year to 2.1 hours this year. Current devices still take
the longest to repair at 3.8 hours, followed by ageing devices at 2.3 hours, and obsolete devices at 1.8 hours. This
represents a change from last year’s results, when ageing devices took less time to repair than obsolete devices.
In summary, current devices fail more often than obsolete devices and, when they do fail, they take the longest to
repair out of all devices.
However, a crucial finding this year indicates a massive difference in the time it takes to troubleshoot and
repair devices, across all lifecycle stages, when the devices are managed by Dimension Data, versus devices
not managed by us.
26
network barometer report 2015
Figure 10: Average time to troubleshoot and repair non-managed versus managed devices
Non-managed
Managed
Average time to troubleshoot
62.9 minutes
-75.83%
15.2 minutes
Average time to repair
165 minutes
Devices managed via
Dimension Data’s remote
infrastructure management
platform took an average
of 75% less time to
troubleshoot when they fail
than devices not managed
on this platform.
-32.78%
110.9 minutes
In Figure 10, the time indicated for ‘repairing’ a faulty
device includes the full support process: from when
the incident is first logged to when it’s resolved,
including troubleshooting. Our data shows that devices
managed via Dimension Data’s remote infrastructure
management platform took an average of 75% less
time to troubleshoot when they fail than devices not
managed on this platform. Consequently, managed
devices then took 32% less time to repair overall.
The implications of this finding is far-reaching.
It indicates an opportunity for organisations to
save massively on both support time and costs
by making use of professionally delivered remote
monitoring and automated management services
as an integral part of their support contracts.
27
network barometer report 2015
How we interpret the results
The technology lifecycle information we gathered this year shows
that organisations are concentrating their technology refresh efforts
on obsolete, rather than ageing or current, devices. In spite of this,
networks overall have continued to age for the fifth consecutive year.
However, this doesn’t imply that these networks necessarily run a greater risk of downtime, because:
• Our data proves that obsolete devices are still less likely to fail than devices that are either current or ageing.
• It took, on average, two hours less to resolve issues on obsolete devices than on current devices.
Most importantly, this year’s analysis showed that devices of all lifecycle stages that are
managed by Dimension Data take on average 75% less time to troubleshoot when they fail
than devices not managed by us. Consequently, these devices take 32% less time to repair.
Our conclusion is thus the same as, if not stronger than, last year: a refreshed network places a
heavier burden on an organisation’s support services than an ageing network does, particularly
given that current devices take longer to repair than both ageing and obsolete devices. This raises support time and costs. If an organisation therefore decides to refresh a large portion
of its infrastructure, we highly recommend that it considers remote monitoring and automated
management to augment its proactive incident prevention and/or resolution capabilities.
However, it’s also crucial to consider the root causes of service incidents. While our data indicates
that 45% of all failures were device-related – more so than last year – 55% of incidents are still due
to factors outside of a support provider’s traditional remit. These problems would therefore be up to
the organisation itself to resolve, unless it makes use of advanced managed services provided by an
external service provider.
In addition, a significant 30% of service incidents are caused by human error, which means they were
entirely preventable through more effective day-to-day network management. This is compounded
by the fact that devices that aren’t monitored would take longer to troubleshoot and repair.
28
network barometer report 2015
Should organisations choose to continue managing their own
infrastructures, we recommend that they standardise device
models where possible, as well as configuration baselines.
They should also frequently test for, and remedy, any
deviations from the corporate device configuration policies.
The sharp increase in hardware failures we’ve seen this year can be explained by the growth in the overall
number of devices managed by Dimension Data, as well as the slight rise in the percentage of current devices
managed by us. Current devices are more prone to failure and therefore need more support than obsolete
devices. This explains the higher number of configuration errors and software bugs also seen this year, because
the complexity of devices increases in newer iterations. A current device is usually more complex, more difficult to
configure, and more likely to suffer software failures. This places a heavier burden on the general time, skills, and
expertise required of the organisation to manage and maintain an increasingly complex network. Again, remote
monitoring can dramatically reduce the time to diagnose and resolve a problem, while automated configuration
and/or change management can lower the number of incidents related to human error, which currently
represents 30% of all incidents.
Should organisations choose to continue managing their own infrastructures, we recommend that they
standardise device models where possible, as well as configuration baselines. They should also frequently test for,
and remedy, any deviations from the corporate device configuration policies.
Why do current devices fail more and take longer to repair than
obsolete devices?
In our experience, current devices are subject to a ‘burn-in’ period in which software bugs and operating system
problems are still prevalent. Generally speaking, a new device is most likely to fail during the first 90 to 180
days after installation. Any issues related to the first version of a device or operating system, or arising from
manufacturing or shipping the device to site, will manifest shortly after it was installed. Once a device is past this
‘burn-in’ period, fewer incidents occur.
Later, when the device is obsolete, there’s usually only one remediation plan if it fails: to immediately be swapped
with a spare. This reduces mean-time-to-repair, as it’s generally quicker to replace a device than diagnose and
troubleshoot the particular software bug or hardware problem. This, however, requires a mature sparing strategy
on the part of the support organisation, such as those offered by Dimension Data. Without such programmes,
obsolete devices would take much longer to repair.
29
network barometer report 2015
What
causes today’s
networks to fail?
Of all incidents...
Almost
45%
= device
failures
55%
= factors outside
of a support
contract’s terms
1/3
of incidents are caused by
human error, therefore
avoidable through proper
configuration and change
management tools
and processes.
Devices managed by Dimension Data took …
75%
less time to troubleshoot
and, consequently,
32%
less time
to repair.
We recommend...
Conduct a thorough audit to understand the maturity
and suitability of your support systems and processes.
Partner with a support services expert to fill any
support gaps you may have.
Investigate automated management and remote
monitoring capabilities of managed services providers.
30
network barometer report 2015
The technology lifecycle information we
gathered this year shows that organisations are
concentrating their technology refresh efforts on
obsolete, rather than ageing or current, devices. In spite of this, networks overall have continued
to age for the fifth consecutive year.
31
network barometer report 2015
Dimension 3: Security – How vulnerable
are today’s networks?
What are security vulnerabilities and why are they important?
One indication of a network’s vulnerability is the number and degree of criticality of
device software vulnerabilities it contains. As vulnerabilities become known, and following
extensive lab testing and research, original equipment manufacturers publish related
notifications to alert the wider market.
Cisco, for example, has named its vulnerability
announcements PSIRTs (referring to its Product Security
Incident Response Team), while F5, Riverbed, and Arista
publishes ‘Security Advisories’, and Juniper publishes
‘SIRT Advisories’.
Each vulnerability denotes a particular operating system
weakness that may also pose a security risk. Hackers
may discover and exploit such vulnerabilities in a
network, which can lead to a denial of service attack
or allow the hacker to gain access to sensitive data.
The more vulnerabilities identified on a device or in a
network, the higher the risk of a security breach due to
the increased ‘attack surface’ available to exploit.
In all security publications, the manufacturer discloses
the minimum amount of information required for an
end user to assess the impact of a vulnerability and any
potential steps needed to protect the environment.
Manufacturers don’t provide vulnerability details that
could enable someone to craft an exploit.
The more vulnerabilities
identified on a device or in a
network, the higher the risk
of a security breach due to
the increased ‘attack surface’
available to exploit.
Types of security vulnerabilities
The risk posed to your network by a particular
vulnerability depends on the type of vulnerability and
where in the network the devices are positioned that
have that vulnerability. Also, the longer a vulnerability
has been known, the higher the risk, as it gives
attackers more time to learn how to exploit it. See Table
3 in Appendix B for more information about the 10
most prevalent Cisco PSIRTs in 2014.
Patches shouldn’t be applied only for the sake of doing
so. Rather, patch devices based on a calculated risk. For
example, if a device is vulnerable, but it doesn’t support
critical systems or interconnect with an important part
of the network, the priority to patch might be lower
than for a device that does.
32
network barometer report 2015
This year’s results
Figure 11: Percentage of devices with at least one vulnerability, global average
73
75
74
67
60
2010
2011
There’s been a slight improvement in the security
status of networks this year: the percentage of devices
with at least one vulnerability is down to 60% from
74% last year. This change may be mostly attributable
to the trend we’ve seen in organisations refreshing
obsolete devices which generally have more identified
vulnerabilities because of their age. Replacing them
would naturally lead to fewer vulnerabilities in the
network overall.
However, in spite of this improvement, the percentage
of devices with at least one vulnerability has remained
relatively stable over the last four years at an average
of 60%.
2012
2013
2014
There’s been a slight
improvement in the security
status of networks this
year: the percentage of
devices with at least one
vulnerability is down to 60%
from 74% last year.
33
network barometer report 2015
Number of security advisories
Figure 12: Number and penetration rate of security advisories by device type
Data centre switches
Edge routers
Aggregation routers
Voice gateways
Access switches
Other
Wireless
Device category
Delving deeper into the vulnerability of specific device types helps to draw a more compelling picture. Figure 11 shows
the number of security advisories per device type (represented by the height of each circle above the X-axis), as well as
the penetration rate of security vulnerabilities within each device type (represented by the relative size of each circle).
The highest number of security advisories were published for data centre switches, at 190, with the fewest for
wireless devices, at 20. This, however, doesn’t accurately reflect the risk that these devices may pose for a network
and the impact it could have if these vulnerabilities were to be exploited. Although the number of security advisories
for wireless devices may be low, their penetration rate within this device category is high. This means that a large
proportion of wireless devices would have these vulnerabilities. Hence, this device category has the largest circle on
the chart and may pose a bigger risk to networks overall.
Both data centres and wireless infrastructures are critical in any organisation. The data centre network typically
interconnects the application servers that support important business applications. An incident in the data centre
switching infrastructure could have a serious and detrimental effect on the organisation’s ability to operate effectively,
should the data centre stop functioning.
Wireless access points are also crucial because wireless signals aren’t often confined to the physical boundaries of
a building. When exploited, security vulnerabilities in the wireless infrastructure could lead to a security breach and
associated risks of reputational damage, and/or data loss. In deciding which devices with vulnerabilities to patch,
organisation should therefore consider the criticality of the relevant device to the overall functionality of the network.
34
network barometer report 2015
While the obsolete devices may therefore be more secure, the
risk is that vendors won’t provide assistance with any new
vulnerabilities discovered on these devices, as the technology
has passed its last day of support.
Figure 13: Percentage difference in vulnerabilities in devices by lifecycle stage, in relation to current devices
5
0
-2
Current
Ageing
Obsolete
Considering the vulnerability of devices by lifecycle stage, Figure 13 shows that obsolete devices have 2% fewer
security advisories than current devices, while ageing devices have a 5% more security advisories than current devices.
Current devices haven’t been in the market long enough to be tested comprehensively by security researchers. But as time passes, devices are exposed to more testing, and even attacks, which would increase their number of known vulnerabilities.
As these devices age further, organisations often patch their vulnerabilities so that, by the time a device reaches
obsolescence, its operating system achieves its optimal age in terms of security. While the obsolete devices may
therefore be more secure, the risk is that vendors won’t provide assistance with any new vulnerabilities discovered on
these devices, as the technology has passed its last day of support. So, more published advisories for ageing devices
don’t necessarily mean this device lifecyle stage carries more risk. Their vulnerabilities are usually fixed in updated
software releases issued by the vendor. The differences in the numbers are more indicative of organisations not
patching/updating the device software in line with the updates provided by the vendor, which shows a lack of basic,
day-to-day network maintenance.
35
network barometer report 2015
How we interpret the results
The constant vulnerability we’ve seen in networks over the last few years
isn’t surprising, given that organisations are still sweating their assets in
general. There’s a correlation between the higher number of ageing devices
and the percentage of devices with vulnerabilities. Also, as more services
are added to the network, more software is required to effectively operate
the infrastructure. This increases the overall operational risk of owning an
unmaintained network.
While it’s not possible to know about every security threat in advance, it’s best to build the relevant
security capabilities in your organisation to minimise exposure to vulnerabilities.
Key security capabilities to consider:
• visibility and discovery tools – both network- and application-based
• incident response plans and automated workflow
• vulnerability and remediation management
• risk profiling appropriate to business context
• network-, application-, and data-centric protection controls that can be rapidly applied when risks
are discovered and assessed
While the findings of the Network Barometer Report 2015 show that organisations’ networks
remain vulnerable, the NTT Group’s 2015 Global Threat Intelligence Report, based on the Group’s
observations of security attacks, vulnerabilities, and related responses in 2014, shows that ‘most
organisations are not adequately prepared to handle major [security] incidents in their environment.’
Even more telling is that, ‘during 2014, 76% of identified vulnerabilities throughout all systems in
the enterprise were more than two years old, and almost 9% of them were over 10 years old.’ (Also
see ‘Key Findings of the NTT Group’s 2015 Global Threat Intelligence Report’ for more detail, or read
the full report.)
These findings are supported by our data relating to the top 10 identified Cisco PSIRTs across all
networks, and their respective release dates (see Table 4 in Appendix B).With only one exception,
all of the most common vulnerabilities have been known for two years or more but haven’t been
patched. This proves that organisations in general aren’t paying enough attention to managing
known vulnerabilities in their infrastructure and are exposing themselves to unnecessary risk.
We recommend that it’s best to standardise on hardware and software as much as possible, as this
reduces both risk and operational complexity in the long run. The more software and hardware
versions used on the network, the higher the risk and the harder it becomes to maintain. Operational
efficiency is also hampered due to feature disparity.
36
network barometer report 2015
Key findings of
the NTT Group’s
2015 Global Threat
Intelligence Report
Geographic and vertical market trends
Throughout its Report, NTT Group provides insight into the different threats it observed against its clients,
both by geographic location and business sector. It
found the following:
• Financial services continues to represent the number one targeted sector representing 18% of all detected attacks.
• Attacks against business and professional services
moved from 9% to 15%.
• Malware-related events in the education sector
dropped from 42% to 35%.
• Of all attacks, 56% originated from IP addresses
within the US.
Vulnerabilities, attacks, and exploitation
An exploit kit is a malicious toolkit which bundles
exploits so that those exploits can be more readily and
consistently executed against the targeted end-user
systems. The NTT Group’s vulnerability data and analysis
brought into view the impact that exploit kits can have
in attacks against organisations:
• Exploit kits were published in 2013 and 2014 for over
80% of vulnerabilities in 2014.
• There’s been an increase in Adobe Flash exploit usage
in exploit kits from 2012 to 2014.
• DDoS amplification attacks using User Datagram
Protocol (UDP) accounted for 63% of all DDoS
attacks observed by NTT Group.
• During 2014, 76% of identified vulnerabilities
throughout all systems in the enterprise were more
than two years old, and almost 9% of them were
over 10 years old.
• Of observed web application attacks in 2014, 26%
were injection-based – up from 9% in 2014.
Incident response
An organisation’s ability to identify attacks isn’t always
equal to its ability to respond to an attack. Detailed
findings are:
• Incident response efforts were focused in three core
areas: malware, DDoS, and breach investigations.
• Support for DDoS attack response sharply decreased
from 31% in 2013 to 18% in 2014.
• Incident response engagements involving malware
threats increased from 43% to 52%.
• Basic controls are still not implemented in all cases
– 75% of organisations don’t have formal incident
response plans.
Read the full NTT Group 2015 Global Threat
Intelligence Report.
• Network Time Protocol (NTP) amplification attacks
contributed to 32% of all distributed denial-of-service
(DDoS) attacks observed by NTT Group in 2014.
37
network barometer report 2015
How
vulnerable are
today’s networks?
60% =
devices with at
least one security
vulnerability
Slight improvement
from last year
BUT
vulnerability
has remained fairly constant
over last 4 years.
Ageing devices = more vulnerable
than current or obsolete devices.
Data centre switches and edge/branch office routers
= most published security advisories.
Data centre switches and wireless access points
= highest penetration rate = most at risk.
We recommend...
Standardise on hardware and software
as much as possible.
Don’t patch every vulnerability.
BUT
Build security and incident response
capabilities to minimise exposure.
38
network barometer report 2015
The constant vulnerability we’ve seen in networks
over the last few years isn’t surprising, given that
organisations are still sweating their assets in
general. There’s a correlation between the higher
number of ageing devices and the percentage of
devices with vulnerabilities. Also, as more services
are added to the network, more software is
required to effectively operate the infrastructure.
This increases the overall operational risk of
owning an unmaintained network.
39
network barometer report 2015
Dimension 4: Architecture – Are organisations
preparing their networks for enterprise mobility
and the Internet of Things?
In previous Reports, we argued that the move to enterprise mobility would necessitate
an evolution in the access switching network architecture from largely wired to mostly
wireless infrastructures. In an environment where the great majority of end users connect
to the network wirelessly, the traditional campus access-switching network must evolve
because users simply don’t want to be tethered to their desks any longer.
In the old model, 80% of switch ports were for dedicated, wired users while 20% were for shared, wireless
users. This ratio will need to change: 80% of switch ports will have to be for shared, wireless users, and 20% for
dedicated, wired users. This ‘80/20 flip’ is described in Figure 14.
Figure 14: From wired to wireless – the architecture of current versus future networks
Current – traditional wired and wireless access networks
• wireless networks (100–200 devices)
• cabling (1 point per access point)
Wireless LAN
controller
48-port LAN
switches
• wired network (100 users)
• cabling (140 points)
• smartphones
• IP phones
• tablets
• printers
• laptops
• video endpoints
• security systems
Future – predominantly wireless access networks
• wireless networks (100–300 devices)
• cabling (1 point per access point)
• smartphones
• tablets
48-port LAN
switch with built
-in controller
40
• laptops
• printers
• video, etc.
• wired network (10 users)
• cabling (20 points)
• video endpoints (some could be wireless)
• security systems
network barometer report 2015
The type of technology that organisations choose to refresh
can therefore indicate whether they’re preparing for this
change to pervasive wireless connectivity.
For this change to occur, network devices in the access layer require at least three wireless-supporting features:
•
power-over-Ethernet to power the access points
•
gigabit Ethernet ports on the client side to enable the 300–800MB speeds of 802.11n/ac
•
0-gigabit uplinks – as more users access the network via fewer ports, uplinks need greater capacity in order
1
to avoid congestion
The type of technology that organisations choose to refresh can therefore indicate whether they’re preparing for
this change to pervasive wireless connectivity.
41
network barometer report 2015
This year’s results
Organisations continue to expand the wireless capabilities of their network access
points. This is evidenced by increases in two of the three key device requirements
for mobile connectivity.
Figure 15: Network access point wireless capabilities
65%
25%
37%
of all access switches
support powerover-Ethernet
14-percentage point increase from
2013. 65% of the port support PoE
(compared to 51% in 2013).
of all access switches
support 10GB
uplinks
2-percentage point increase on
the previous year.
of all access switches
support gigabit
Ethernet
Decreased to 37% of all ports compared
to 45% the previous year. This is a
8-percentage point decline.
14.5% growth in wireless bookings
Of all access switches analysed, 65% now support
power-over-Ethernet – up by 14 percentage points since
last year. Another improvement was in the percentage
of access switches able to support 10-gigabit uplinks,
which rose to 25% – up by two percentage points.
However, the percentage of access switches able to
support gigabit Ethernet has dropped to 37% this year,
representing a 8-percentage point decrease since our last Report.
42
Another improvement was
in the percentage of access
switches able to support
10-gigabit uplinks, which
rose to 25% – up by two
percentage points.
network barometer report 2015
The most important indicator that organisations are growing their networks’ mobile capabilities, however, is the
increase in access switches able to support power-over-Ethernet. While all new devices come with 10-gigabit uplink
speeds, there’s an active choice to be made between more cost-effective devices that don’t support power-overEthernet and more expensive devices that do. This choice of a more sophisticated, more expensive device indicates a
conscious decision on the part of the organisation to opt for expanded functionality.
However, whether this forms part of a broader architectural strategy to transform the network in its entirety to reach
the 80/20 wireless/wired split remains an open question, especially since we didn’t see an improvement in gigabit
Ethernet ports. This is highlighted by the data that indicates the overall number of discovered devices, according to
model number, that can support mobility.
Figure 16: Percentage of devices that support mobility
0
11
26
802.11g (LDoS)
802.11g
802.11n
802.11ac
63
Only devices with the later model numbers 802.11n and 802.11ac can fully support wireless connectivity. However,
there were no 802.11ac devices discovered this year, and only 26% of discovered devices were of the 802.11n type.
This implies that the vast majority of network devices (74%) are still not able to support advanced wireless and
mobility requirements. This data also explains why there’s still so much access switching infrastructure that doesn’t
support power-over-Ethernet, gigabit Ethernet, and 10-gigabit uplinks: most access points are still of the 802.11g
variety, which only delivers a theoretical maximum throughput of 54Mbps.
While not strictly an architectural trend like enterprise mobility, the Internet of Things is also predicted to have an
influence on corporate infrastructures, particularly in the adoption of the new Internet protocol, IPv6, across network devices.
43
network barometer report 2015
Figure 17: Percentage of devices that support IPv6
21
26
Further analysis
Not supported
5
Requires upgrade
Supported
48
IPv6 is the most recent version of the Internet Protocol (IP) which provides an identification and location system for
devices on networks, and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force
to deal with the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to replace IPv4.
Our results show that only 21% of devices currently support IPv6. The largest proportion of devices (48%) can be
switched to IPv6 through a simple software upgrade, but currently remain as is, which again indicates a lack of basic
network maintenance.
The Internet of Things will see an increasing number and variety of business-enabling technologies interconnecting via
networks, including over the Internet. Non-human objects will be able to gather data from their environment, interact
with one another, and make intelligent decisions, all without human intervention.
This evolution in networking is projected to have many business benefits: from generating useful big data that
will enable better decision-making, to increasing visibility and control of systems and processes, which will reduce
management time and cost. However, the challenge is that the rise in the number of interconnected devices will
lead to a scarcity and, eventually, unavailability of IPv4 addresses. This will compel organisations to adopt the new
standard, IPv6.
In addition, organisations with mostly IPv4-based networks, which haven’t architected the underlying environment
with IPv6 in mind, have limited visibility of, and control over, IPv6-enabled technologies. This exposes them to
unnecessary risk, as they won’t be able to monitor and manage those devices, nor control the traffic flow, as well as
in an IPv4-based environment. Typically, between 4% and 9% of data traffic within modern data centres is IPv6based. We derived these figures from data generated by Dimension Data’s Network Optimisation Assessment. In these
data centres, the organisation is typically early in the architectural phase and has either not started monitoring, or
remains unaware of the percentage of IPv6 traffic within the environment. The primary source of IPv6 traffic is intermachine communication for Microsoft software, and various other vendors’ software.
The lack of visibility of this traffic, and its associated communications profile, introduces a significant security risk, as
these controls are developed based on device profiles, risk tolerance, and visibility required to maintain the device.
Older controls may not be IPv6 compliant, nor able to provide the required visibility and control to effectively protect the data.
44
network barometer report 2015
How we interpret the results
Organisations tend to sweat their network assets for as long as
possible to save costs, unless the need for specific new features
becomes pressing. For example, if an organisation requires greater
bandwidth to support pervasive wireless connectivity thanks to a
host of new mobile devices brought to work by employees, it would
have no choice but to refresh those devices sooner.
Our data is evidence of this approach. Organisations approach mobility more reactively
than strategically by focusing more on the access layer of the infrastructure – possibly to
accommodate an influx of new smartphones, laptops, and tablets into the organisation.
The rest of the infrastructure, however, lags behind.
Similarly, the adoption IPv6 across all networks is slow, even though in many cases it
would require a simple software upgrade on a large portion of devices. This lack of basic
network management exposes organisations to unnecessary risk, particularly given the
dawn of the Internet of Things and the demands this will place on corporate networks to
adopt the new standard.
Our recommendation is that preparing the infrastructure for enterprise mobility and
the Internet of Things should form part of a coherent network architecture strategy. It
shouldn’t be handled reactively, but approached in a more planned and organised way by
creating and implementing a comprehensive roadmap for development.
45
network barometer report 2015
Are today’s
networks prepared for
enterprise mobility and
the Internet of Things?
Organisations are expanding two wirelesssupporting capabilities in their access switches:
65% 25% 37%
Power-over-Ethernet
up by
14
percentage
points
10GB uplink speed
up by
2
Gigabit Ethernet
down by
percentage
points
8
percentage
points
74% of all wireless access points are older models that can’t support advanced enterprise mobility requirements.
Only 21% of devices support IPv6.
48% of devices can be switched to IPv6 through a simple software upgrade.
We recommend...
Have an accurate inventory of your network
estate and its associated lifecycle status.
Regularly review your long-term enterprise
mobility requirements.
Understand your ‘as-is’ state, define your ‘to-be’ state,
and plan the steps to get there by creating a comprehensive
architecture roadmap.
46
network barometer report 2015
Organisations tend to sweat their network assets
for as long as possible to save costs, unless
the need for specific new features becomes
pressing. For example, if an organisation requires
greater bandwidth to support pervasive wireless
connectivity thanks to a host of new mobile
devices brought to work by employees, it would
have no choice but to refresh those devices sooner.
47
network barometer report 2015
Recommendations
48
network barometer report 2015
49
network barometer report 2015
Dimension Data maintains that the most effective way to improve your
network’s ability to support your business is to invest in maturing your
organisation’s network monitoring, support, and management systems
and processes, rather than refreshing technology simply for the sake
of avoiding obsolescence. It makes sense to sweat assets for longer,
as long as the risks are known and properly managed, which places a
heavier burden on your operational support environment.
Based on our experience in evaluating organisations’ operational support maturity, the vast majority (90%) of
organisations are still at the first or second level of maturity. These levels are characterised by a lack of standard
processes, ad hoc troubleshooting tools, and ambiguous roles and responsibilities for IT employees, resulting in
extended network downtime and increased operational costs. Undoubtedly, this is also the reason that 30% of
all service incidents are still related to human error.
Figure 18: Dimension Data’s operational support maturity model
Whether an organisation chooses to sweat its network assets as long as possible or decides to refresh some or all
of its network, robust and mature operational support processes will ensure maximum availability.
50
Initial •ad hoc
•undocumented
•unpredictable
•poorly controlled
•reactive
•no automation
•roles and
responsibilities
undefined
Repeatable
•some documented
processes
•processes not uniformly used
•some automation
•limited definition
of roles and
responsibilities
Defined
•processes are
proactive
•automation exists for defined processes
•roles are well defined
•mature asset and
change management
processes
Managed
•set quality goals
•guaranteed SLAs
•monitoring and
reporting
•processes are
integrated
•automation tools
are integrated
•capacity planning
Optimised
•IT and business metric linkage
•continuous
service
improvement
•IT improves business process
•business
planning
Complete lack of
organisation
Holding down
the fort
Well-run
cost centre
Business
alignment
Business
driver
network barometer report 2015
Moving towards the ‘optimised’ level doesn’t necessarily require you to have all capabilities in-house. In
many cases, it’s best to partner with an expert provider of network managed or outsourcing services. This will free up your own IT resources to focus on strategic projects that substantially build your competitive advantage.
You can improve your operational support maturity level by considering the following four steps:
1. Achieve maximum visibility of your entire networking estate.
Create and maintain an accurate inventory of all networking devices in your estate, their lifecycle stage,
position within the network, known security vulnerabilities, and criticality to the network’s overall uptime.
2.Standardise the types of technologies used in your network, as well as their
configurations, as much as possible.
A greater degree of standardisation will reduce not only risk in terms of fewer possible operating system
vulnerabilities and configuration errors, but also reduced support costs and average time to repair, should
devices fail.
3. Automate as many of your day-to-day management tasks as possible.
Automation is dependent on standardisation. Automating simple tasks such as configuration management,
password change management, configuration backups, or other scheduled maintenance tasks will help
to reduce human error, thereby increasing the efficiency with which your network is maintained and
supported. Investigate various options such as managed services delivered by a competent services partner,
or even moving to a software-defined network.
4. Monitor your network devices more closely and proactively.
This could be achieved through either internal or outsourced remote monitoring services. Proactive
monitoring of devices can help predict when devices may fail, and reduces the time it takes to troubleshoot
and repair faulty devices. Consider allowing your support provider to monitor the devices it supports.
51
network barometer report 2015
To help you with all your network assessment, maintenance, and support requirements,
Dimension Data offers the following
Figure 19: Dimension Data’s networking services portfolio
plan
build
support
manage
Technology
assessments
Development models
and roadmaps
Technology Lifecycle Management
Assessment
Software-defined Networking
Development Model
Network Optimisation
Assessment
Data Centre Development Model
End-user Computing
Development Model
Best practice project design
Turnkey project management
Asset-based services
Maintenance Services
Premium Support Services
Outcomes-based services
Infrastructure Managed
Services
52
Network-as-a-Service
Carrier Managed
Services
network barometer report 2015
About software-defined networking
Software-defined networking makes networks more intelligent, programmable, and
automated. It’s brought about by changes at the networking device level. The intelligent,
programmable part of each device – the software that determines how the device
controls and directs data – is split from the packet-forwarding engine, and centralised.
Software-defined networks therefore use networking devices configured by a central,
software-based controller. Hence the term ‘software-defined’: the network is no longer
configured by manually adjusting individual devices, but controlled by software.
Read more about Dimension Data’s Software-defined Networking Development Model,
which can help you take the first step in preparing your network for the future of networking.
53
network barometer report 2015
Appendix A
Sample distribution
This appendix provides details about the sample data sets used for the information in this Report.
Appendix A.1
Technology lifecycle, type, and vulnerability data
The technology lifecycle information published in this Report was gathered during the 2014 calendar year
through 354 Technology Lifecycle Management Assessments conducted for clients around the world, covering
over 70,000 devices.
Dimension Data’s Technology Lifecycle Management Assessment is a highly automated service that uses
technology tools to scan our clients’ networks. The information gathered from these scans is analysed on a
centralised portal, using a standardised process and framework.
Figure 20: Percentage of devices by organisation size
2 0
13
Enterprise
Large
Medium
Small
85
The majority of our data came from enterprise and large organisations, reflecting Dimension Data’s
traditional client base.
54
network barometer report 2015
Figure 21: Percentage of assessments by region
11
17
16
Americas
Asia Pacific
Australia
Europe
Middle East & Africa
18
38
Figure 22: Percentage of devices by vertical
5
3
5
Automotive and manufacturing
28
6
Business services
Construction and real estate
0
Consumer goods and retail
8
Financial services
1
2
Government health care and education
Media-entertainment and hospitality
Resources utilities and enegy
8
Service providers and telecommunications
Technology
34
Travel and transportation
55
network barometer report 2015
Figure 23: Percentage of assessments by vertical
4
2
6
Automotive and manufacturing
28
Business services
11
Construction and real estate
Consumer goods and retail
1
Financial services
Government health care and education
9
Media-entertainment and hospitality
3
Resources utilities and enegy
4
Service providers and telecommunications
Technology
12
20
Travel and transportation
The top three contributing sectors to this year’s data sample (both in terms of discovered devices and assessments
conducted) were financial services, automotive and manufacturing, consumer goods and retail, and government –
healthcare and education. This, again, represents Dimension Data’s strong presence in these particular industries.
Figure 24: Number of assessments by country
84
34
1
3
19
3
4
E
1
UK
1
UA
4
ico
rla
nd
s
w
Ze
ala
nd
Ni
ge
ria
Po
rtu
Sa
ga
ud
l
iA
ra
bi
Sin
a
ga
po
So
re
ut
h
Af
ric
a
Sp
Sw
ain
itz
er
lan
d
Th
ail
an
d
th
e
Ne
M
ex
ia
9
This year’s technology data covered 28 countries in five regions.
56
31
15
10
Ne
ur
g
ys
bo
ala
M
em
Ko
re
a
13
4
2
ny
a
ly
8
Lu
x
Re
h
ec
Cz
4
lic
Fr
an
ce
Ge
rm
an
y
In
di
a
il
ile
az
Ch
Br
Au
17
15
Ita
5
1
pu
b
6
str
ali
a
Au
str
ia
Be
lg
iu
m
1
Ke
20
27
US
30
network barometer report 2015
Appendix A.2
Services data
We used a service incident data set to corroborate the assessment results with helpdesk data. Our aim is to review the
business impact of obsolescence on network failures and downtime. We analysed over 175,000 service incidents – or
‘trouble tickets’ – handled by four of our Global Service Centres, to understand the types of incidents we’ve handled in
maintaining our clients’ networks, and the relationship of these incidents to the lifecycle data.
The analysis of the incident data was based on a subset of Dimension Data's total maintenance base. We chose a
selected set of network asset types in order to align with the technology aspects of this report, and account for the
unification of systems following mergers and acquisitions.
With 1.5 million devices creating an incident volume of over 175,000 across 105 countries, this represents a statistically
relevant sample.
Figure 25: Percentage of service incidents by region
7
28
Americas
Asia Pacific
37
Australia
Europe
Middle East & Africa
28
0
57
network barometer report 2015
Appendix B
Top 10 PSIRTs
Table 3: Top 10 Cisco PSIRTs and their penetration rates
Title
Cisco IOS Software DHCP Denial of Service Vulnerability
58
Distinct
count of
device ID
(psirt.csv)
Penetration
rate
Last year’s
rank
Published
12547
43%
–
25 Sep 13
Cisco IOS Software Command Authorization Bypass
9693
33%
5
28 Mar 12
Cisco IOS Software Multicast Network Time Protocol
Denial of Service Vulnerability
9503
33%
–
25 Sep 13
TCP State Manipulation Denial of Service Vulnerabilities
in Multiple Cisco Products – IOS & IOS-XE – 109444
9338
32%
–
08 Sep 09
Cisco IOS Software Network Address Translation
Vulnerabilities
9293
32%
–
26 Mar 14
Cisco IOS Software Multiple Features Crafted UDP
Packet Vulnerability – 108558
8967
31%
2
25-Mar-09
Cisco IOS Software Network Address Translation
Vulnerability
7363
25%
–
27 Mar 13
Cisco IOS Software Network Address Translation
Vulnerabilities – 112253
7211
25%
1
28 Sep 11
OSPF LSA Manipulation Vulnerability in Multiple Cisco
Products – IOS/IOS-XE
6649
23%
–
01 Aug 13
Cisco VLAN Trunking Protocol Vulnerability – 108203
6129
21%
3
05 Nov 08
Cisco IOS Cross-Site Scripting Vulnerabilities – 98605
6061
21%
6
14 Jan 09
Cisco IOS Software Multicast Source Discovery
Protocol Vulnerability
5424
19%
7
28 Mar 12
network barometer report 2015
List of figures
Figure 1:
Percentage of ageing and obsolete devices, global average
15
Figure 2:
Percentage of ageing and obsolete devices by region
15
Figure 3:
Percentage of ageing and obsolete devices by industry
16
Figure 4:
Percentage of devices by lifecycle stage, 2012–2014
17
Figure 5:
Percentage of devices by lifecycle stage, when Dimension Data manages the devices,
2013–2014
18
Figure 6:
Percentage of devices by lifecycle stage, per region, when Dimension Data manages
the devices
18
Figure 7:
Root causes of incidents, 2013–2014
23
Figure 8:
Percentage difference in failure rate by lifecycle stage, in relation to current devices
25
Figure 9:
Average mean-time-to-repair by lifecycle stage, 2013–2014
26
Figure 10:
Average time to troubleshoot and repair non-managed versus managed devices
27
Figure 11:
Percentage of devices with at least one vulnerability, global average
33
Figure 12:
Number and penetration rate of security advisories by device type
34
Figure 13:
Percentage difference in vulnerabilities in devices by lifecycle stage, in relation to
current devices
35
Figure 14:
From wired to wireless – the architecture of current versus future networks
40
Figure 15:
Network access point wireless capabilities
42
Figure 16:
Percentage of devices that support mobility
43
Figure 17:
Percentage of devices that support IPv6
44
Figure 18:
Dimension Data's operational support maturity model
50
Figure 19:
Dimension Data's networking services portfolio
52
Figure 20:
Percentage of devices by organisation size
54
Figure 21:
Percentage of assessments by region
55
Figure 22:
Percentage of devices by vertical
55
Figure 23:
Percentage of assessments by vertical
56
Figure 24:
Number of assessments by country
56
Figure 25:
Percentage of service incidents by region
57
List of tables
Table 1:
Technology lifecycle stages, associated risk levels, and required support environment
maturity
14
Table 2:
Root causes of incidents
23
Table 3:
Cisco PSIRTs and their penetration rates
58
59
network barometer report 2015
60
Download