What is Network Intelligence?

A look at the technology enabling businesses to analyse data packets in real-time

Brain, network, network intelligence, AI, computing, connected, artificial intelligence, machine learning

Network Intelligence (NI) encompasses the data, technology, algorithms, and techniques used to collect, analyse and visualise network information in a connected business. NI represents the capacity of the network to combine active and passive techniques to monitor the links between cloud apps and service performance, drawing together processes from packet capture, deep packet inspection (DPI) and business intelligence.

It is primarily used to examine IP data packets going through a network in real-time, giving visibility of user demand in order to manage usage, as well as enable a business to use more sophisticated audience measurement, behavioural analysis, customer segmentation and personalisation tools.

NI aims to optimise digital experiences everywhere, by understanding global network topologies, dependencies and behaviour, and to aid improved IT decision making.

Network Intelligence is different to traditional network monitoring, which was built for pre-cloud, internally-owned and controlled networks and services. The key is being able to extend this into internet and cloud services, which is where network intelligence comes in.

How is Network Intelligence used?

Network Intelligence can be used wherever there are applications or services being provided over a network, such as cloud computing, communications, traffic shaping and more.

NI is particularly useful when it comes to cloud migration projects, where service performance challenges can arise more frequently both internally and externally. Being able to establish whether the network issue is due to problems inside the business or from the external cloud provider is key to being able to take swift action on the root cause of underwhelming cloud performance.

Advertisement
Advertisement - Article continues below

It can also be used to get information like page load and web transaction timing performance, and links it together with network performance metrics. Most NI providers will have a comprehensive dashboard for operations teams to be able to pinpoint service problems.

Businesses that implement NI are ensuring they are ready for enhancements such as WAN optimisation, Network Performance Management and other next-generation techniques that rely on network visibility. For companies which rely on having the best customer experience, for example mobile network providers, NI is increasingly being used to offer a deeper understanding of audience measurement, customer segmentation, personalisation, and how customers are using a particular service.

Network Intelligence for security

Network Intelligence can also play a key role in an organisation's security by recording information about who is accessing a network, where they're accessing it from and how. When this information is captured in real-time, it helps IT departments and security teams understand what is happening and take appropriate measures either to stop the attack or reduce the damage.

As businesses increasingly move applications and services into the cloud, there is a need to have robust authentication and authorisation procedures in place. Having a way to monitor baseline measurements of network performance around the authentication process will mean IT departments are able to set proper expectations for latency and paths, and find service providers for both network and applications who can deliver the best results.

Cloud vendors can also use NI to prevent data leaks or attempts to steal data with an overview of all transactions across a network, providing a solid audit trail. This also helps both vendors and clients remain compliant with regulations.

With enterprises increasingly making use of hybrid multi-cloud environments, NI tools which can monitor end-to-end application performance and give visibility into network infrastructure across multiple layers and domains will be increasingly valuable.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019
Visit/business/business-strategy/354195/where-modernisation-and-sustainability-meet-a-tale-of-two
Sponsored

Where modernisation and sustainability meet: A tale of two benefits

25 Nov 2019