Note: this post originally appeared in the Riverbed blog, but due to strong interest in cloud visibility we are reposting.
Many organizations, even those not typically associated with technology, are migrating application workloads to the cloud. This trend is growing because of benefits such as increased flexibility, agility and availability. In most cases, the migration process is in hybrid mode, with some workloads moving to public cloud providers such as Amazon Web Services (AWS), others using private cloud software, and still others running on traditional physical hardware.
Lawful Intercept isn’t a new concept but it is becoming a topic of increasing importance to Service Providers and Enterprises worldwide. A couple of new laws, like the 2016 Japanese Act on Communications Interception During Criminal Investigations that went into effect December 1, 2016 and the Malaysia National Security Council Act which went into effect on August 1, 2016, have made it easier for some Asian governments to perform wiretapping.
In the case of the Japanese law, wiretapping scope capabilities were expanded to cover fraud, theft, murder, and arson. In addition, the telecom agencies can now send the data electronically to the law enforcement agency (LEA). Previously, LEA personnel were required to personally visit the service provider’s location to perform the tapping of the target communications. With respect to Malaysia, the new law appears to remove the need for wiretap warrants so that the government can fight terrorism.
Have you ever come across the term "network visibility" and wondered what it refers to—and what it means to you? Find out now with this engaging new ebook, Network Visibility for Dummies, which covers the concept from the ground up.
This insightful guide, produced by Ixia Solutions Group, covers using visibility to: