Kedron UK has reached the grand old age of 21 and will be celebrating this milestone with the team at the Henley Royal Regatta in July! We find it hard to believe we are marking over two decades of success in the ever-evolving IT industry, so we wanted to take a look back and share with our customers where it started, what has changed and where we think we will be going next!

Starting out as a provider of network management tools in 2003, Kedron UK quickly expanded its services to include application performance and end-to-end service visibility.

As the industry continued to shift and evolve, so did we.

On Prem – Cloud – Hybrid
One of the most significant technology trends has been the shift towards cloud computing and virtualisation. As more businesses have moved their data and applications to the cloud, traditional IT management and monitoring tools faced challenges. However, we found it was important not jump into cloud monitoring specific tools only, as users still accessed services within their own networks and as we deal with predominately large and secure customers, often critical / sensitive applications and data would remain on premise. We needed to ensure we provided the best possible solutions for Hybrid environments using as few monitoring tools as possible.

We Entered the Cyber Security Market
Finally, the growing importance of cybersecurity has also impacted IT operation management and monitoring. With the increasing number of cyber threats and attacks, businesses need to be able to monitor their networks and systems for potential breaches and respond quickly when a threat is detected.

This has led to the development of new security-focused tools and platforms that are integrated with IT management and monitoring systems to provide end-to-end visibility and protection.

This is why, in 2017, KedronUK expanded its services to include cybersecurity. This move reflected the growing focus on cybersecurity threats in the industry and the need for businesses to protect their networks and data from malicious actors. We also ensured we stayed close to what we are we good at which is fundamentally getting our customers the right kind of visibility from the complex environments. By providing technologies like Network Detection and Response, Threat intelligence, SIEM, and SOAR we have been able to broaden on product portfolio, whilst ensuring we stay true to our quality design and delivery process.

Machine Learning and AI
Currently topical with our customer base is obviously the rise of artificial intelligence (AI) and machine learning (ML).

With the increasing amount of data generated by IT infrastructure, AI and ML have become useful tools for analysing and interpreting data to identify potential issues and optimise performance.

In many ways this is only just begun, but we have found again the importance of a pragmatic and balanced approach. From our works so far reviewing capabilities and their implications for the system we provide that as important as this technology is, it should not be seen as the magic answer to all challenges. In fact, the best outcomes seem to come when it this tech is layered on top of already functional and mature monitoring platforms.

Whats Next?
Here we have a look at a couple of areas where we think will be busy next, Phil Swainson our Head of technology plans to review each of these areas in more detail in a series of future posts celebrating our big birthday. Each edition will come with a special offer so keep your eye out!

  • Unification of SOC and NOC – Maybe because of our background and development we have seen within our own portfolio, or because of the increased expectation of shared data via APIs and open standards we see that there will an increased awareness that multiple technology teams have very similar technologies running in parallels. More and more there are vendor solutions that cover multiple domains offering opportunity for cost saving and technical efficiencies. An example here would perhaps be Network Detection and Response and Network Performance Management, both solutions collecting network traffic from Taps, Packet brokers or SPAN ports for analysis.

 

  • CMDB Comeback – Sometimes CMDB is a dirty word, many have tried to build and maintain an accurate solution that meets individual business operational, and compliance needs but many organisations we speak to are still left frustrated. For this reason, we have seen vendors move away from the term and start using other terms to describe similar functionality or narrow their focus into security and other niche’s, you could argue AIOPs is one of those to some extent. We think the concept is still correct and we just need better tools and process to achieve a reliable way of getting to the end goal that stakeholders can then learnt to trust. We think this is one area where AI and ML is extremely interesting and can complement but also assure best practice and process. However again we think AI on its own won’t solve the total problem. We’ve got some interesting ideas about what will so watch out for Phil’s upcoming blog post.

 

  • IoT/OT and IT Convergence – Like or hate it these worlds are coming together and end to end views of performance and security are critical, bridging the gap between these two technology areas and cultures is surely a challenge that needs addressing with a unified approach.

We’d love to know what you think, both about how things have changes in the areas of performance and security visibility and what you think will be next!

Chris Booth

Chris Booth

Solutions Architect

Listens to your problems then identifies the best tools and products to build solutions.

Call us today on 01782 752 369
KedronUK, Kern House, Stone Business Park, Stone, Staffordshire ST15 0TL