SlideShare a Scribd company logo
1 of 17
Network Monitoring Survey

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

2
Network Monitoring Survey
• Completed in Q3 of 2013
• Provides insight network monitoring and
management trends
• 257 respondents from across a range of
sectors and business sizes

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

3
Summary of results
• 68% of respondents using SNMP traps. 157 out of
157 using SNMPv2
• 88 using *Flow protocols, 81% of those using Cisco
NetFlow
• ¾ of respondents indicated Cisco as preferred
vendor
• 77% of respondents using monitoring for network
stability
• 67% of respondents back-up network configurations

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

4
Summary of results
• 82% of respondents using some form of
network monitoring
• 60% monitoring both core and access layers.
• Immediate alerting of network issues
highlighted as most important function of
monitoring
• 41% not monitoring wi-fi

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

5
Do you currently use traps in your environment?

No
32%

Yes
68%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

6
What version of SNMP are you using?
v1
19%

v3
24%

v2
57%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

7
What *Flow technology are you using?
sFlow
18%

jFlow
10%

Netflow
72%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

8
Do you monitor syslog from your devices?

No
41%

Yes
59%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

9
What is your preferred vendor for your network equipment?
200
180
160
140
120
100
80
60
40
20
0
Cisco

Thursday, 17 October 2013

HP

Juniper

Dell

Brocade

© Opsview Ltd. Commercial in Confidence

Arista
10
Approximately what % of your environment is manufactured by this vendor?
60.00%

50.00%

40.00%

30.00%

20.00%

10.00%

0.00%
0-10

Thursday, 17 October 2013

11-25

26-50

51-75

75+

© Opsview Ltd. Commercial in Confidence

11
What is the main purpose of monitoring your network?
User Misuse
2%
Performance
21%

Stability
77%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

12
Do you backup your network device configurations?

No
33%

Yes
67%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

13
Are you currently using a monitoring tool to monitor your network?
No
18%

Yes
82%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

14
Do you monitor Wi-Fi in your environment?

Yes
41%

No
59%

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

15
Please rate the importance of the following functions (1 lowest, 5 highest)

Immediate alerting of network issues

Visualize performance of your network

Historical performance data for trend analysis

Generate reports on network performance

0

Thursday, 17 October 2013

0.5

1

1.5

2

© Opsview Ltd. Commercial in Confidence

2.5

3

3.5

4

4.5

5
16
www.opsview.com

Thursday, 17 October 2013

© Opsview Ltd. Commercial in Confidence

17

More Related Content

Similar to Opsview Network Monitoring Survey

2013 06-27-securecoding-en - jug pch
2013 06-27-securecoding-en - jug pch2013 06-27-securecoding-en - jug pch
2013 06-27-securecoding-en - jug pch
Sébastien GIORIA
 
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
Nur Shiqim Chok
 

Similar to Opsview Network Monitoring Survey (20)

Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
PRTG NETWORK MONITORING
PRTG NETWORK MONITORINGPRTG NETWORK MONITORING
PRTG NETWORK MONITORING
 
Secure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An Introduction
 
Secure Coding for Java - An introduction
Secure Coding for Java - An introductionSecure Coding for Java - An introduction
Secure Coding for Java - An introduction
 
2013 06-27-securecoding-en - jug pch
2013 06-27-securecoding-en - jug pch2013 06-27-securecoding-en - jug pch
2013 06-27-securecoding-en - jug pch
 
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility Architectures
 
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
 
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
Improve Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft Te...
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assurance
 
Using NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application PerformanceUsing NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application Performance
 
NetScout Systems corporate overview
NetScout Systems corporate overviewNetScout Systems corporate overview
NetScout Systems corporate overview
 
A Wireless Data Acquisition System for Induction Motors
A Wireless Data Acquisition System for Induction MotorsA Wireless Data Acquisition System for Induction Motors
A Wireless Data Acquisition System for Induction Motors
 
Applying Big Data Analytics on the Manufacturing Industry
Applying Big Data Analytics on the Manufacturing IndustryApplying Big Data Analytics on the Manufacturing Industry
Applying Big Data Analytics on the Manufacturing Industry
 
IoT based attendance system
IoT based attendance systemIoT based attendance system
IoT based attendance system
 
DEVNET-1180 Security from the Cloud
DEVNET-1180	Security from the CloudDEVNET-1180	Security from the Cloud
DEVNET-1180 Security from the Cloud
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Transpeye Overview V1 (1)
Transpeye Overview V1 (1)Transpeye Overview V1 (1)
Transpeye Overview V1 (1)
 
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
 
Impact of network analytics in it ops
Impact of network analytics in it opsImpact of network analytics in it ops
Impact of network analytics in it ops
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 

More from Opsview

More from Opsview (8)

Infographic: Managing Network Technologies and Network Monitoring
Infographic: Managing Network Technologies and Network MonitoringInfographic: Managing Network Technologies and Network Monitoring
Infographic: Managing Network Technologies and Network Monitoring
 
Infographic: Opsview Cloud, Virtualization & IaaS Survey
Infographic: Opsview Cloud, Virtualization & IaaS SurveyInfographic: Opsview Cloud, Virtualization & IaaS Survey
Infographic: Opsview Cloud, Virtualization & IaaS Survey
 
Monitoring Server Temperature with Opsview
Monitoring Server Temperature with OpsviewMonitoring Server Temperature with Opsview
Monitoring Server Temperature with Opsview
 
End to End Monitoring using Nested Keywords
End to End Monitoring using Nested KeywordsEnd to End Monitoring using Nested Keywords
End to End Monitoring using Nested Keywords
 
Advanced reporting with Opsview
Advanced reporting with OpsviewAdvanced reporting with Opsview
Advanced reporting with Opsview
 
Monitoring Microsoft SQL Server 2008 with Opsview
Monitoring Microsoft SQL Server 2008 with OpsviewMonitoring Microsoft SQL Server 2008 with Opsview
Monitoring Microsoft SQL Server 2008 with Opsview
 
Monitoring Oracle Databases with Opsview
Monitoring Oracle Databases with OpsviewMonitoring Oracle Databases with Opsview
Monitoring Oracle Databases with Opsview
 
Creating Custom Notifications in Opsview
Creating Custom Notifications in OpsviewCreating Custom Notifications in Opsview
Creating Custom Notifications in Opsview
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 

Opsview Network Monitoring Survey

  • 1.
  • 2. Network Monitoring Survey Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 2
  • 3. Network Monitoring Survey • Completed in Q3 of 2013 • Provides insight network monitoring and management trends • 257 respondents from across a range of sectors and business sizes Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 3
  • 4. Summary of results • 68% of respondents using SNMP traps. 157 out of 157 using SNMPv2 • 88 using *Flow protocols, 81% of those using Cisco NetFlow • ¾ of respondents indicated Cisco as preferred vendor • 77% of respondents using monitoring for network stability • 67% of respondents back-up network configurations Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 4
  • 5. Summary of results • 82% of respondents using some form of network monitoring • 60% monitoring both core and access layers. • Immediate alerting of network issues highlighted as most important function of monitoring • 41% not monitoring wi-fi Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 5
  • 6. Do you currently use traps in your environment? No 32% Yes 68% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 6
  • 7. What version of SNMP are you using? v1 19% v3 24% v2 57% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 7
  • 8. What *Flow technology are you using? sFlow 18% jFlow 10% Netflow 72% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 8
  • 9. Do you monitor syslog from your devices? No 41% Yes 59% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 9
  • 10. What is your preferred vendor for your network equipment? 200 180 160 140 120 100 80 60 40 20 0 Cisco Thursday, 17 October 2013 HP Juniper Dell Brocade © Opsview Ltd. Commercial in Confidence Arista 10
  • 11. Approximately what % of your environment is manufactured by this vendor? 60.00% 50.00% 40.00% 30.00% 20.00% 10.00% 0.00% 0-10 Thursday, 17 October 2013 11-25 26-50 51-75 75+ © Opsview Ltd. Commercial in Confidence 11
  • 12. What is the main purpose of monitoring your network? User Misuse 2% Performance 21% Stability 77% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 12
  • 13. Do you backup your network device configurations? No 33% Yes 67% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 13
  • 14. Are you currently using a monitoring tool to monitor your network? No 18% Yes 82% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 14
  • 15. Do you monitor Wi-Fi in your environment? Yes 41% No 59% Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 15
  • 16. Please rate the importance of the following functions (1 lowest, 5 highest) Immediate alerting of network issues Visualize performance of your network Historical performance data for trend analysis Generate reports on network performance 0 Thursday, 17 October 2013 0.5 1 1.5 2 © Opsview Ltd. Commercial in Confidence 2.5 3 3.5 4 4.5 5 16
  • 17. www.opsview.com Thursday, 17 October 2013 © Opsview Ltd. Commercial in Confidence 17