The Eureka Moment: Discovering Application Traffic Observability

If you've been part of a network segmentation or Zero Trust architecture planning project or a data center or application migration initiative, the following scenario probably rings true.
You start by asking the application owners about the traffic going to and from their applications.
It's simply not on the application owner's radar because what they do on a daily basis doesn't require that level of technical detail.
If you find an architecture diagram from when the application was deployed several years ago, you can bet it's no longer accurate.
You've learned from past painful lessons that -if you implement a network policy based on old information, applications are going to start to break.
Because application owners don't have granular observability into application traffic, communication is often more open than it needs to be.
Understanding your application traffic lets you know to what extent network segmentation rules are overly permissive, creating lateral movement risks, if you need more granular access policies to limit that access.
A similar problem exists for data center and application migration projects.
Whether you're migrating from one data center to another or moving an application from a data center to the cloud, you need to understand the behavior of the application traffic.
Organizations traditionally have had no good way to gain application traffic observability across their entire multi-cloud and hybrid network.
The NetOps, SecOps, and CloudOps teams each have access to different tools and views of data, but the application owner is still in the dark.
Another strategy I've seen is to try to gather the raw data, put it into a data lake, and write queries to pull out data for individual application owners.
The network team then sends spreadsheets to the application owners who annotate the spreadsheet and send it back to the operations team.
At a foundational level, the Netography Fusion platform presents a holistic and reliable picture of all the network communication related to your applications in your multi-cloud and on-prem environments that your cloud, network, security operations, and application teams can use.
Context transforms the metadata in your network from a table of IP addresses, ports, and protocols into context-rich descriptions of the activities of your applications and devices.
In our self-service SaaS model, application owners can log in, see the actual application traffic, both inbound and outbound, and use that information to understand and define the communication flows required for their application to work.
Application owners get real-time awareness of actual application traffic enriched with context from your tech stack.
Post-migration, your NetOps and CloudOps teams can use Fusion's real-time observability for troubleshooting application networking issues.
Equally important, there are no more blank stares from your application owners.
It's that Eureka moment when you discover how applications actually operate versus how they should operate so you can move forward on your segmentation or migration project with confidence.


This Cyber News was published on securityboulevard.com. Publication date: Fri, 28 Jun 2024 17:13:04 +0000


Cyber News related to The Eureka Moment: Discovering Application Traffic Observability

9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
6 months ago Esecurityplanet.com
The Eureka Moment: Discovering Application Traffic Observability - If you've been part of a network segmentation or Zero Trust architecture planning project or a data center or application migration initiative, the following scenario probably rings true. You start by asking the application owners about the traffic ...
4 days ago Securityboulevard.com
A prescription for insights: Cisco Full-Stack Observability supercharges healthcare - The National Institutes of Health indicates that AI applications will cut annual US healthcare costs by $150 billion - about $460 per person the US - in 2026. Digital transformation among healthcare organizations, and the chronic lack of resources to ...
3 months ago Feedpress.me
Navigating Retail Disruption: Maximize Customer Centricity and Business Performance with Observability - Cisco Full-Stack Observability solutions help optimize and secure the applications that underpinonline and in-store experiences from the customer to the warehouse to economies of scale. Retailers can become more customer centric by taking action that ...
6 months ago Feedpress.me
Cisco AppDynamics observability solutions help partners expand their business - Only Cisco offers a unified solution to address full-stack observability use cases across all major industries. At Cisco AppDynamics, we believe enabling observability across the entire stack of IT services is essential to ensuring a safe and ...
5 months ago Feedpress.me
Full-stack application and data security with business risk observability - Cisco Full-Stack Observability brings application observability together with security intelligence and risk assessment for comprehensive business-focused oversight. Businesses in all sectors and industries report feeling more exposed to security ...
2 months ago Feedpress.me
Empowering Exceptional Digital Experiences at Cisco Live EMEA - Cisco Live EMEA is right around the corner, happening 5 February - 9 February 2024 in Amsterdam. It's shaping up to be a big year for Cisco Full-Stack Observability solutions and we're excited to showcase all of the latest innovations and updates. ...
5 months ago Feedpress.me
Hijacking Your Bandwidth How Proxyware Apps Open You Up to Risk - Is this true? To examine and understand the kind of risks a potential user might be exposed to by joining such programs, we recorded and analyzed network traffic from a large number of exit nodes of several different network bandwidth sharing ...
1 year ago Trendmicro.com
Optimizing business velocity with Cisco Full-Stack Observability - Fueling digital transformation success with cost and resource optimization over applications, workloads, and components. Applications and the digital experiences they enable require cloud-based resources for which costs can easily spiral out of ...
1 month ago Feedpress.me
CVE-2023-25570 - Apollo is a configuration management system. Prior to version 2.1.0, there are potential security issues if users expose apollo-configservice to the internet, which is not recommended. This is because there is no authentication feature enabled for ...
1 year ago
New Relic CEO sets observability strategy for the AI age - The executive that replaced Gary Steele as CEO at Proofpoint when Steele left for Splunk has now followed Steele's path from cybersecurity to the helm of an observability company. Ashan Willy was appointed CEO at New Relic in December, a month after ...
5 days ago Techtarget.com
Calling Home, Get Your Callbacks Through RBI - Following a brief introduction to the technology, we share our firsthand experiences when encountering RBI solutions and techniques the SpecterOps team have employed for establishing command and control to systems that proxy traffic through RBI ...
5 months ago Securityboulevard.com
Using the Knowledge Store on Cisco Observability Platform - Cisco Observability Platform enables developers to build custom observability solutions to gain valuable insights across their technology and business stack. While storage and query of Metric, Event, Log, and Trace data is a key platform capability, ...
5 months ago Feedpress.me
Kasada Embraces Machine Learning to Reduce Bot Traffic - Kasada has updated its bot defense platform to add hundreds of sensors and machine learning algorithms that detect, in real-time, code that might otherwise bypass legacy approaches to detecting machine-generated traffic rather than that generated by ...
5 months ago Securityboulevard.com
3 security best practices for all DevSecOps teams - It's been over 10 years since Shannon Lietz introduced the term DevSecOps, aiming to get security a seat at the table with IT developers and operators. More organizations are looking to shift-left security to ensure that security is prominent in ...
6 months ago Infoworld.com
Identify Weak Links in Your Application Stack - In the Part 1 blog , we talked about the importance of application observability and how the application stack is more complex than ever with multi cloud deployments. We saw how the FSO solution, Cisco Cloud Observability , can be used to identify ...
4 months ago Feedpress.me
Why Bot Management Should Be a Crucial Element of Your Marketing Strategy - Marketing teams need a comprehensive bot management solution to address the challenges posed by bot traffic and protect marketing analytics. Bot management is designed to protect marketing efforts from bot-generated invalid traffic by accurately and ...
1 month ago Imperva.com
Part 2: Smart Shift Left - In my previous blog post, we discussed the state of the union for shift left and and how many organizations are not implementing correctly. Recognizing the consequences of a poor shift left model. Many of the high friction points with a poor shift ...
3 months ago Feedpress.me
Dashify: Solving Data Wrangling for Dashboards - Dashboards are data-driven user interfaces that are designed to be viewed, edited, and even created by product users. Product screens themselves are also built with dashboards. Here are just a few examples of the rapidly expanding use of Dashify ...
3 months ago Feedpress.me
How to secure on-prem apps with Entra Application Proxy - If your internal web applications are still internet-facing, then it's time to move away from turning your firewall into Swiss cheese just to externalize apps for your users. To reduce the attack surface, a traditional method, such as a VPN, has its ...
3 months ago Techtarget.com
5 Security Benefits of Application Mapping - Performance optimization: Application mapping can help identify performance bottlenecks and inefficiencies within an application's architecture, leading to more efficient and responsive software systems. Beyond all these benefits, application mapping ...
6 months ago Securityboulevard.com
CVE-2022-31129 - moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically ...
11 months ago
CVE-2022-24785 - Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string ...
1 year ago
Bad Bots Drive 10% Annual Surge in Account Takeover Attacks - Internet traffic associated with malicious bots now accounts for a third of the total, driving a 10% year-on-year increase in account takeover attacks last year, according to Imperva. The Thales-owned company's 2024 Imperva Bad Bot Report is a ...
2 months ago Infosecurity-magazine.com
InfoWorld's 2023 Technology of the Year Award winners - The arrival of ChatGPT in late 2022 and the ensuing cascade of large language models ensured that 2023 will forever be known as the year of generative AI. With amazing speed, generative AI has rippled across the entire information technology ...
6 months ago Infoworld.com

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)