What and When to Monitor? Skip to main content

Gartner Forecasts Security and Risk Management Spending in India to Grow 12% in 2024

  GenAI-Driven Attacks Require Changes to Application and Data Security Practices and User Monitoring End-user spending on security and risk management (SRM) in India is forecast to total $2.9 billion in 2024, an increase of 12.4% from 2023, according to a new forecast from Gartner, Inc. Indian organizations will continue to increase their security spending through 2024 due to legacy IT modernization using cloud technology, industry demand for digital platforms, updated regulatory environment, and continuous remote/hybrid work. “In 2024, chief information and security officers (CISOs) in India will prioritize their spending on SRM to improve organizational resilience and compliance,” said  Shailendra Upadhyay , Sr Principal at Gartner. “With the introduction of stringent government measures mandating security breach reporting and digital  data protection , CISOs are facing heightened responsibility in safeguarding critical assets against evolving cyber threats.” Gartner a...

What and When to Monitor?


When it comes to network monitoring, there is no one simple answer. The trick to successfully monitoring a network is matching monitoring strategy with operational goals. However, there are several considerations at play including economic ones, according to Accanto Systems.
thought-man

For instance what are the parts of the network where maximum visibility can be obtained with minimum investment? What do I lose if I don’t monitor a particular part of the network? Can I start small and if so, which are the things I should pick first? For operators with a large international presence, roaming is the obvious choice.

Optimising the roaming experience for both inbound and outbound traffic can easily increase real revenue by 50% in some cases. This will only require a small amount of monitoring infrastructure. However investing in monitoring tools won't transform the business over night.

Internal systems need to change. There has to be a  pro-active approach to solving issues, operating 24/7 network operations center (NOC) dedicated to roaming are just some examples. Most of all, a monitoring strategy needs to take into account the fact that useful information may be spread across different parts of the network, says Accanto Systems.

Therefore, it is essential to have the ability to efficiently correlate information from different monitoring points. For example, in order to monitor the S1-MME interface, it is necessary to decipher the NAS (Non Access Stratum) layer messages, which are exchanged directly between the mobile phone and the core network.

In order to perform deciphering on the S1-MME interface, a monitoring system needs to recover the deciphering keys on yet another interface, the S6a interface. For this reason, the best approach is to select a single monitoring vendor, which either has complete coverage or has a roadmap commit to provide complete coverage for end to end correlation.

Another important element in defining a monitoring strategy for LTE is the correlation of control plane and user plane. The control plane carries control/ signaling information, where the user plane (sometimes called the data or bearer plane) carries the actual user traffic. In LTE, the control and user plane may come from different physical locations (for example the MME for the control plane [S1-MME] and the SGW for the user plane [S1-U]).

These correlation capabilities are essential for a monitoring system to be effective. Probing systems are uniquely qualified to capture information around service quality and customer experience due to the fact that they get information on subscriber’s sessions directly from the actual user and signaling traffic.

Correlated xDR (data records) provided by probe based systems are key inputs for monitoring and customer service assurance. Although there is a huge amount of data exchanged, a probing system can’t simply monitor and decode whatever passes through a network. It is impractical to manage everything in real time.

That said, it is essential to know the signaling messages related to a particular session in order to properly filter and analyse the IP user plane. Thus, starting from control plane analysis, it is possible to perform a specific analysis on the data exchanged and the quality of the transaction.

By Angela Sutherland

Comments

Popular posts from this blog

Mobile Phones Sales Plummet

Details Published on Thursday, 16 August 2012 06:34 Worldwide sales of mobile phones reached 419 million units in the second quarter of 2012, a 2.3 percent decline from the second quarter of 2011, according to Gartner. Smartphone sales accounted for 36.7 percent of total mobile phone sales and grew 42.7 percent in the second quarter of 2012. "Demand slowed further in the second quarter of 2012," says Anshul Gupta, principal research analyst at Gartner. "The challenging economic environment and users postponing upgrades to take advantage of high-profile device launches and promotions available later in the year slowed demand across markets. Demand of feature phones continued to decline, weakening the overall mobile phone market. "High-profile smartphone launches from key manufacturers such as the anticipated Apple iPhone 5, along with Chinese manufacturers pushing 3G and preparing for major device launches in the second half of 2012, will drive the smartpho...

Now facebook hit with international class action privacy suit

An Austrian privacy activist has launched a wide-reaching class action suit against Facebook Ireland for breaching European data protection law. Anyone outside of the US and Canada can join activist and law student Max Schrems' suit via the website fbclaim.com, since they will have signed up to Facebook's terms and conditions via the Dublin-based European subsidiary. That amounts to around 82 percent of all Facebook users. After being live for just one hour, the site has collected 100 participants. The suit is seeking damages of €500 ($537) per user, and injunctions to be levied on the company for the following breaches:     Failing to get "effective consent" for using data     Implementing a legally invalid data use policy     Tracking users online outside of Facebook via "Like" buttons     Using big data to monitor users     Failing to make Graph Search opt-in     The unauthorized passing of use...

Board Directors Prioritise IT

Details Published on Wednesday, 25 July 2012 07:25 Board directors are prioritizing customers, core competencies and competitive advantage, according to Gartner-Forbes 2012  survey. They are willing to invest in IT as a means to change the rules of competition. Also, they have IT as the highest priority for investment in 2012, tied with investments in sales. "Board directors clearly have a top priority to invest in IT and leverage IT for competitive advantage," says Jorge Lopez, vice president at Gartner. "These forward-looking attitudes are being made although more than half of the survey respondents replied they are preparing for a market recession. It underlines the fact that investments they plan to make are essential to growth and even survival, and they are willing to throw the investment gauntlet down now, rather than later." The priorities of the board directors are directly centered on customers, building better ways to drive the business forwa...