Visibility for Security. A Security Delivery Platform: See More. Secure More.

Size: px
Start display at page:

Download "Visibility for Security. A Security Delivery Platform: See More. Secure More."

Transcription

1 Visibility for Security A Security Delivery Platform: See More. Secure More.

2 Our Vision 2

3 Gigamon Customers Today AS OF Q Enterprise Service Providers TECHNOLOGY INDUSTRIAL RETAIL FINANCE HEALTHCARE & INSURANCE GOVERNMENT End Customers 75+ of the Fortune of the Top 100 Global SPs A broad spectrum of brand-name customers. 3

4 Ecosystem Partners Network Security and Vulnerability Management Customer Experience Management Network Performance Management Application Performance Management Network Forensics/Big Data Analytics 4

5 The Security Operations Challenge THE ATTACKER-DEFENDER ASYMMETRY BYOD, mobility increase attack surface Virtualization increases security blind spots Rising use of encryption to embed malware and hide threats Volume, variance and velocity of today s network data Attacker sophistication and low-and-slow network movement Security analytics impossible with legacy means 5

6 Legacy Approaches Have Limited Visibility THERE IS SO MUCH TO PROTECT AND SO MANY PATHS TO MONITOR Intrusion Intrusion System Intrusion System System Data Loss Prevention Data Loss Prevention Data Loss Prevention Threat Threat Threat Leaf Switches Virtualized Server Farm Internet Routers Spine Switches IPS (Inline) IPS (Inline) IPS (Inline) Anti-Malware (Inline) Anti-Malware Anti-Malware (Inline) (Inline) Forensics Forensics Forensics The Security Ops Challenge: How do all these security tools gain pervasive visibility? Where should these security tools be placed? How does one rapidly investigate a new threat source? 6

7 The Challenge with Legacy Approaches Security Tool Security Tool Security Tool Security Tool Irrelevant Traffic Relevant Traffic Partial infrastructure view No control on traffic selected Reduced efficiency of security tool Enterprise LAN 7

8 Security Delivery Platform: See Everything A FOUNDATIONAL BUILDING BLOCK TO EFFECTIVE SECURITY Intrusion Intrusion System Intrusion System System Internet IPS IPS (Inline) IPS IPS (Inline) (Inline) (Inline) Anti-Malware (Inline) Data Loss Prevention Intrusion System Forensics Threat Data Loss Prevention Data Loss Prevention Data Loss Prevention Routers Spine Switches Anti-Malware (Inline) Anti-Malware Anti-Malware (Inline) (Inline) Security Delivery Platform Threat Threat Threat Leaf Switches Virtualized Server Farm A complete network-wide Forensics reach: physical and virtual Forensics Forensics Scalable metadata extraction for improved forensics All tools still connected Fewer network touch points Isolation of applications for targeted inspection Visibility to encrypted traffic for threat detection Enhanced tool efficiency Decreased OPEX costs Inline bypass for connected security applications 8

9 GigaSECURE from Gigamon THE INDUSTRY S FIRST SECURITY DELIVERY PLATFORM Internet IPS (Inline) Anti-Malware (Inline) Data Loss Prevention Intrusion System Forensics Threat Routers Spine Switches Security Delivery Platform Leaf Switches GigaVUE-VM A complete and network-wide GIgaVUE Nodes reach: physical and virtual Scalable NetFlow metadata / IPFIX extraction Generation for improved forensics Application Isolation of Session applications Filtering for targeted inspection Visibility SSL to encrypted Decryption traffic for threat detection Inline Inline bypass for connected Bypass security applications Virtualized Server Farm All tools still connected Fewer network touch points Enhanced tool efficiency Decreased OPEX costs 9

10 Benefit for Security Operations Legacy Approach Without Gigamon Security Tool Security Tool Security Tool Security Tool With Gigamon Security Delivery Platform Security Tool Security Tool Security Tool Security Tool Irrelevant Traffic Relevant Traffic Relevant Traffic Enterprise LAN Enterprise LAN Partial infrastructure view No control on traffic selected Reduced tool efficiency Pervasive infrastructure visibility Granular traffic selection controls Enhanced tool efficiency Run multiple POCs in parallel 10

11 Gigamon GigaSECURE: Supported by the Industry GIGAMON ECOSYSTEM PARTNERS our joint customers will benefit from some of the most advanced security technology available. Even the best security appliance will fail to deliver if it does not get the right traffic, Gigamon s high performance security delivery platform is the right match a robust and systematic framework to deliver pervasive network visibility to security appliances critical manageability and control to traffic and flow visibility. To be effective, a security appliance needs to be able to access the right network traffic a security delivery platform addresses the real need for pervasive, high fidelity visibility Together, Lancope and Gigamon enable customers to solve today s tough security challenges." much needed operational efficiency to the task of ensuring pervasive visibility for security tools. allows joint customers to leverage Gigamon's Security Delivery Platform to effectively extend and access the critical data flows efficient access to traffic flows and high fidelity meta-data from anywhere in the network significantly increasing the efficiency and effectiveness of [business] security teams GigaSECURE Security Delivery Platform sheds light on insider initiated threats, it can provide complementary visibility to the network traffic that Palo Alto Networks sees access to high fidelity network traffic is a vital step in the implementation of advanced protections " Gigamon s Security Delivery Platform will allow Savvius's products to continue to provide the insight our customers depend on... 11

12 Bridging the Gap 12

13 Benefits FASTER DETECTION, FASTER CONTAINMENT Consistent network-wide traffic view for all security appliances, all of the time Eliminate departmental and appliance level contention for access to data No disruption to network traffic as security solutions get deployed or upgraded, or when moving from out-of-band to inline deployments Eliminate blind spots associated with encrypted traffic, mobility Significantly offload security appliances through full session offload and full flow metadata Faster identification of malware movement, faster time to containment 13

14 Unified Visibility Fabric Applications Gigamon Applications FabricVUE Traffic Analyzer API 3 rd Party Apps (e.g. Splunk, Viavi) Applications & Tools Infrastructure, User Community API Fabric Control (Management) GigaVUE-FM Fabric Services Flow Mapping API Traffic Intelligence De-duplication Header Stripping Masking Tunneling NetFlow Generation FlowVUE API SSL Decryption Adaptive Packet Filtering Clustering Inline Bypass Slicing Time Stamping GTP Correlation Application Session Filtering Visibility Fabric Nodes (Pervasive visibility across physical, virtual, remote sites, and future SDN production networks) H Series GigaVUE-HD8 GigaVUE-HD4 GigaVUE-HC2 GigaVUE-HB1 TA Series GigaVUE-TA1 / TA10 GigaVUE-TA40 GigaVUE-OS on white box Virtual Visibility GigaVUE-VM TAPs G-TAP M Series G-TAP G-TAP BiDi G-TAP A Series Embedded TAPs G Series GigaVUE-2404 GigaVUE-420 G-SECURE

15 Visibility Fabric Architecture SIMPLE IN CONCEPT DIFFICULT IN EXECUTION A Revolutionary Way to Distribute Critical Packet Data at a Fraction of the Cost Enables the Visibility of Packet-Based Data from Anywhere on the Network Lowers the Total Cost of Network Monitoring, Security and Compliance Tool Farm Physical Flow Mapping (Packet Identification, Filtering, and Forwarding) Security Application Performance Management (APM) APM Virtual GigaVUE- VM GigaVUE- VM GigaSMART (Packet Modification and Transformation) Network Performance Management (NPM) Customer Experience Management (CEM) 15

16 Case Study: Global Manufacturer SECURITY MONITORING USING THE SECURITY DELIVERY PLATFORM Background & Challenge Solution Inline Tools: Sourcefire IPS, Imperva WAF Out-of-Band tools: FireEye, ExtraHop Needed many-to-one inline inspection, APP aware intelligence and capture the same traffic for out-of-band security functions like FireEye and ExtraHop GigaSECURE : Inline bypass technology to provide many-to-one (1x10Gb and 3x1Gb links) inline inspection APP aware capability only delivers WEB traffic to Imperva for inspection Capture same Internet traffic and send to out-of-band FireEye, ExtraHop Results & Key Benefits Use one Sourcefire appliance to protect 4 different physical links with different media/speed Feed same Internet traffic to both inline and out-of-band tools Significantly simplified security operations: upgrade any security tool at will 16

17 Case Study: Global Manufacturer SECURITY MONITORING USING THE SECURITY DELIVERY PLATFORM 17

18 Technical Benefits

19 Why Gigamon? PROVEN ACROSS MORE THAN 1700 GLOBAL CUSTOMERS INCLUDING 75+ FORTUNE 100 Industry s first Security Delivery Platform One Architecture, One Software, One Management Platform for all Visibility Holistic Physical + Virtual Visibility for any network including SDN (Cisco ACI, VMware NSX) Zero Packet Loss through Patented Flow Mapping Clustering: Extend Scale beyond a Single Node GigaSMART : Common Platform for Advanced Traffic Intelligence, Service Chaining Only Vendor with Advanced Visibility: SSL Decryption, Application Session Filtering High-fidelity NetFlow for Advanced Traffic Insight Advanced Traffic Visualization and Automation with GigaVUE-FM 100% Focused on Success of our Customers and Partners Customer numbers FY15Q2. 19

20 Eliminate SPAN Port Contention FEW SPAN PORTS, MANY TOOLS Without Gigamon With Gigamon Switch with two SPAN session limitation Intrusion System (IDS) Application Performance Management VoIP Analyzer Intrusion System (IDS) Application Performance Management VoIP Analyzer Packet Capture Packet Capture Customer is unable to use all tools! Customer has complete visibility for all tools! 20

21 Limited Access to Environment FEW TOOL PORTS, MANY SWITCHES Without Gigamon With Gigamon Switch 1 Switch 1 Switch 2 Switch 2 Switch 3 Switch 3 Switch 4 Analysis tool with only 2 NICs Switch 4 Analysis tool with only 2 NICs Switch 5 n Switch 5 n Limited connectivity to full environment Pervasive access Can connect to all points in the environment 21

22 Change Media and Speed 10, 40 OR 100GB TRAFFIC TO 1 OR 10GB TOOLS Without Gigamon With Gigamon 10Gb 1Gb Intrusion System (IDS) GigaVUE Matches Your Network to Your Tools 10Gb 1Gb Application Performance Management VoIP Analyzer Packet Capture Intrusion System Application Performance Management VoIP Monitor Packet Capture Customer migrates to a 10Gb network and 1Gb monitoring tools become useless Customer able to extend the life of their 1Gb network and security tools 22

23 Run Multiple POCs in Parallel ACCELERATE CERTIFICATION OF NEW TOOLS Without Gigamon With Gigamon POC #1 Vendor X Tool POC #2 Vendor Y Tool POC #3 Vendor Z Tool POC #1 Vendor X Tool Tool tested w/ NW Segment 4 weeks Tool tested w/ same NW Segment 4 weeks Tool tested w/ same NW Segment 4 weeks POC #2 Vendor Y Tool POC #3 Vendor Z Tool 1 month 2 month 3 month Customer performs each Proof-of-Concept (POC) serially at different times using different data 1 month 2 month 3 month Customer is able to run multiple POCs concurrently using same data 23

24 VISIBILITY MATTERS 24

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA Active Visibility for Multi-Tiered Security Juergen Kirchmann Director Enterprise Sales EMEA Billions are Spent on Security Annually $18.4B SPENT BY ENTERPRISES WORLD-WIDE ON SECURITY IN 2014 ENTERPRISE

More information

Whitepaper Unified Visibility Fabric A New Approach to Visibility

Whitepaper Unified Visibility Fabric A New Approach to Visibility Whitepaper Unified Visibility Fabric A New Approach to Visibility Trends Networks continually change and evolve. Many trends such as virtualization and cloud computing have been ongoing for some time.

More information

Solution Overview Active Visibility for Multi-Tiered Security

Solution Overview Active Visibility for Multi-Tiered Security Solution Overview Active Visibility for Multi-Tiered Security Introduction Cyber threats are becoming ever more sophisticated and prevalent. Traditional edge and endpoint security approaches such as firewalls

More information

Active Visibility for Multi-Tiered Security // Solutions Overview

Active Visibility for Multi-Tiered Security // Solutions Overview Introduction Cyber threats are becoming ever more sophisticated and prevalent. Traditional security approaches such as firewalls and anti-virus protection are not equipped to mitigate and manage modern

More information

Solutions Guide End-to-End Visibility and Security for Your Cisco Infrastructure

Solutions Guide End-to-End Visibility and Security for Your Cisco Infrastructure Solutions Guide End-to-End Visibility and Security for Your Cisco Infrastructure Table of Contents Introduction 3 Overview of Cisco Technologies 3 Monitoring Cisco Centric Infrastructure (ACI) 3 CISCO

More information

Enhancing Cisco Networks with Gigamon // White Paper

Enhancing Cisco Networks with Gigamon // White Paper Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,

More information

Visibility in the Modern Data Center // Solution Overview

Visibility in the Modern Data Center // Solution Overview Introduction The past two decades have seen dramatic shifts in data center design. As application complexity grew, server sprawl pushed out the walls of the data center, expanding both the physical square

More information

Solutions Guide End-to-End Visibility for Your Cisco Infrastructure

Solutions Guide End-to-End Visibility for Your Cisco Infrastructure Solutions Guide End-to-End Visibility for Your Cisco Infrastructure Table of Contents Introduction 3 Overview of Cisco Technologies 3 Monitoring Cisco Centric Infrastructure (ACI) 3 CISCO 40Gb BiDi Links

More information

Whitepaper Active Visibility into SSL Traffic for Multi-tiered Security

Whitepaper Active Visibility into SSL Traffic for Multi-tiered Security Whitepaper Active Visibility into SSL Traffic for Multi-tiered Security Faced with a landscape of dynamic and expanding threats, many organizations today are compelled to take a multi-tiered approach to

More information

End-to-End Visibility

End-to-End Visibility End-to-End Visibility for Your Cisco Infrastructure SOLUTIONS GUIDE GIGAMON TABLE OF Contents Introduction... 1 Overview of Cisco Technologies... 1.Monitoring Cisco Application Centric Infrastructure (ACI)...

More information

In-Band Security Solution // Solutions Overview

In-Band Security Solution // Solutions Overview Introduction The strategy and architecture to establish and maintain infrastructure and network security is in a rapid state of change new tools, greater intelligence and managed services are being used

More information

Live traffic feeds are increasingly being used by the modern enterprise to gain visibility for security and operations management

Live traffic feeds are increasingly being used by the modern enterprise to gain visibility for security and operations management Overview The transition from an age of systems of record to an age of systems of engagement has led to profound changes in the way information is used in an organization. These changes have now become

More information

Whitepaper SSL Decryption: Uncovering The New Infrastructure Blind Spot

Whitepaper SSL Decryption: Uncovering The New Infrastructure Blind Spot Whitepaper SSL Decryption: Uncovering The New Infrastructure Blind Spot Since the mid-90 s, users transacting on the internet have been assured of security by the lock icon displayed on their browser and

More information

VSS - Game Changing Technology

VSS - Game Changing Technology VSS - Game Changing Technology Dean Beaver Vice President of Sales Danaher Business Platforms Test & Measurement $3.0B Environmental $3.3B Dental $2.1B Life Sciences & Diagnostics $6.8B Industrial Technologies

More information

Enabling Visibility for Wireshark across Physical, Virtual and SDN. Patrick Leong, CTO Gigamon

Enabling Visibility for Wireshark across Physical, Virtual and SDN. Patrick Leong, CTO Gigamon Enabling Visibility for Wireshark across Physical, Virtual and SDN Patrick Leong, CTO Gigamon 1 Agenda A review of the network then and now Challenges in network monitoring and security Introduction to

More information

Intelligent Data Access Networking TM

Intelligent Data Access Networking TM Gigamon TM delivers intelligent data access solutions to enhance monitoring of service provider and enterprise data centers. The company s world-renowned GigaVUE orange boxes aggregate, filter and replicate

More information

Whitepaper Addressing the Threat Within: Rethinking Network Security Deployment

Whitepaper Addressing the Threat Within: Rethinking Network Security Deployment Whitepaper Addressing the Threat Within: Rethinking Network Security Deployment Introduction Cyber security breaches are happening at an industrial scale. The unabated volume of cyber breaches along with

More information

Whitepaper Software-Defined Visibility (SDV): The New Paradigm for IT

Whitepaper Software-Defined Visibility (SDV): The New Paradigm for IT Whitepaper Software-Defined Visibility (SDV): The New Paradigm for IT We live in a world evolving to require any machine-to-any machine communication. All parts of today s digital business infrastructure

More information

Secure Access Complete Visibility

Secure Access Complete Visibility PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE Intrusion Detection Switch TAP Data Recorder VoIP Analyzer Switch Secure Access Complete Visibility Web

More information

Pervasive Security Enabled by Next Generation Monitoring Fabric

Pervasive Security Enabled by Next Generation Monitoring Fabric Pervasive Security Enabled by Next Generation Monitoring Fabric By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Big Switch Networks Executive Summary Enterprise networks have become ever

More information

Visibility into the Cloud and Virtualized Data Center // White Paper

Visibility into the Cloud and Virtualized Data Center // White Paper Executive Summary IT organizations today face unprecedented challenges. Internal business customers continue to demand rapid delivery of innovative services to respond to outside threats and opportunities.

More information

Out-of-Band Security Solution // Solutions Overview

Out-of-Band Security Solution // Solutions Overview Introduction A few years ago, IT managed security using the hard outer shell approach and established walls where traffic entered and departed the network assuming that the risks originated outside of

More information

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved. Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security

More information

Market Update Intelligent Network Packet Brokers

Market Update Intelligent Network Packet Brokers Market Update Report Intelligent Network Packet Brokers Explaining a New Network Infrastructure Category By Bob Laliberte, Senior Analyst July 2012 2012, The Enterprise Strategy Group, Inc. All Rights

More information

Whitepaper The Road to SDN is Paved with Visibility and Many Good Intentions

Whitepaper The Road to SDN is Paved with Visibility and Many Good Intentions Whitepaper The Road to SDN is Paved with Visibility and Many Good Intentions Introduction Network architectures are in the midst of massive transformation. Not too long ago traditional network designs

More information

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Five Steps For Securing The Data Center: Why Traditional Security May Not Work White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center

More information

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery

More information

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Five Steps For Securing The Data Center: Why Traditional Security May Not Work White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center

More information

Blind as a Bat? Supporting Packet Decryption for Security Scanning

Blind as a Bat? Supporting Packet Decryption for Security Scanning Sponsored by VSS Monitoring Blind as a Bat? Supporting Packet Decryption for Security Scanning November 2012 A SANS Whitepaper Written by: Dave Shackleford Options for SSL Inspection Page 2 Implementing

More information

Monitoring, Managing, and Securing SDN Deployments // White Paper

Monitoring, Managing, and Securing SDN Deployments // White Paper Introduction Mobility, cloud, and consumerization of IT are all major themes playing out in the IT industry today all of which are fundamentally changing the way we think about managing IT infrastructure.

More information

Visibility into the Cloud and Virtualized Data Center // White Paper

Visibility into the Cloud and Virtualized Data Center // White Paper Executive Summary IT organizations today face unprecedented challenges. Internal business customers continue to demand rapid delivery of innovative services to respond to outside threats and opportunities.

More information

The Visibility Fabric Architecture A New Approach to Traffic Visibility // White Paper

The Visibility Fabric Architecture A New Approach to Traffic Visibility // White Paper The Smart Route To Visibility We live in exciting times with business and society embracing Virtualization and Cloud Computing work and lifestyles that are enhanced and enabled through Organizations are

More information

Packet Optimization & Visibility with Wireshark and PCAPs. Gordon Beith Director of Product Management VSS Monitoring

Packet Optimization & Visibility with Wireshark and PCAPs. Gordon Beith Director of Product Management VSS Monitoring Packet Optimization & Visibility with Wireshark and PCAPs Gordon Beith Director of Product Management VSS Monitoring 1 Market Trends - Innovation MOBILE LTE INFRASTRUCTURE COMPLEXITY BIG DATA BUSINESS

More information

Enhancing Cisco Networks with Gigamon // White Paper

Enhancing Cisco Networks with Gigamon // White Paper The Smart Route To Visibility Enhancing Cisco s with Many Fortune 000 companies and beyond implement a Cisco switching architecture. When implementing a large scale Cisco network, the infrastructure to

More information

QRadar SIEM and FireEye MPS Integration

QRadar SIEM and FireEye MPS Integration QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving

More information

Network Packet Monitoring Optimizations in Data Centre

Network Packet Monitoring Optimizations in Data Centre March 2014, HAPPIEST MINDS TECHNOLOGIES Network Packet Monitoring Optimizations in Data Centre Author Dharmraj B Jhatakia 1 Copyright Information This document is an exclusive property of Happiest Minds

More information

SOFTWARE DEFINED NETWORKING

SOFTWARE DEFINED NETWORKING SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology

More information

Open SDN for Network Visibility

Open SDN for Network Visibility SOLUTION GUIDE Open SDN for Network Visibility Simplifying large scale network monitoring systems with Big Tap 1 This solution guide describes how Big Tap, a network monitoring application from Big Switch

More information

Network Monitoring Fabrics Are Key to Scaling IT

Network Monitoring Fabrics Are Key to Scaling IT Network Monitoring Fabrics Are Key to Scaling IT September 2014 Prepared by: Zeus Kerravala Network Monitoring Fabrics Are Key to Scaling IT by Zeus Kerravala September 2014 º º º º º º º º º º º º º º

More information

TechPartner Program Enables Full Network Visibility Across Complex Health Care Delivery System

TechPartner Program Enables Full Network Visibility Across Complex Health Care Delivery System PARTNER CASE STUDY: IXIA 2016 TechPartner Program Enables Full Network Visibility Across Complex Health Care Delivery System Ixia helps hospital group extend network monitoring capabilities while leveraging

More information

Traffic Visibility Fabric for Revenue and Differentiation in the Cloud Provider Market // White Paper

Traffic Visibility Fabric for Revenue and Differentiation in the Cloud Provider Market // White Paper Traffic Visibility Fabric for Revenue and Differentiation in the Cloud Market Cloud provider landscape and challenge As a Cloud Service (CSP) there are many services that you can offer. Based on your core

More information

Solving Monitoring Challenges in the Data Center

Solving Monitoring Challenges in the Data Center Solving Monitoring Challenges in the Data Center How a network monitoring switch helps IT teams stay proactive White Paper IT teams are under big pressure to improve the performance and security of corporate

More information

Affording the Upgrade to Higher Speed & Density

Affording the Upgrade to Higher Speed & Density Affording the Upgrade to Higher Speed & Density Ethernet Summit February 22, 2012 Agenda VSS Overview Technology Q&A 2 Corporate Overview World Leader in Network Intelligence Optimization Deployed in 80%

More information

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Wilfried van Haeren CTO Edgeworx Solutions Inc. www.edgeworx.solutions Topics Intro Edgeworx Past-Present-Future

More information

An Application-Centric Infrastructure Will Enable Business Agility

An Application-Centric Infrastructure Will Enable Business Agility An Application-Centric Infrastructure Will Enable Business Agility March 2014 Prepared by: Zeus Kerravala An Application-Centric Infrastructure Will Enable Business Agility by Zeus Kerravala March 2014

More information

Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain

Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain SESSION ID: ANF-T08 Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain Sean Doherty VP Technology Partnerships and Alliances Symantec @SeandDInfo Deb Banerjee Chief Architect,

More information

QRadar Security Intelligence Platform Appliances

QRadar Security Intelligence Platform Appliances DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management

More information

STEALTHWATCH MANAGEMENT CONSOLE

STEALTHWATCH MANAGEMENT CONSOLE STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations

More information

Riverbed SteelCentral. Product Family Brochure

Riverbed SteelCentral. Product Family Brochure Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL

RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL Pascal Geenens CONSULTING ENGINEER, JUNIPER NETWORKS pgeenens@juniper.net BUSINESS AGILITY Need to create and deliver new revenue opportunities faster Services

More information

Scalable Network Monitoring with SDN-Based Ethernet Fabrics

Scalable Network Monitoring with SDN-Based Ethernet Fabrics Scalable Network Monitoring with SDN-Based Ethernet Fabrics Prashant Gandhi VP, Product Management & Strategy Big Switch Networks 1 Agenda Trends in Network Monitoring SDN s Role in Network Monitoring

More information

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

More information

Bold Move Further Builds Blue Coat Portfolio

Bold Move Further Builds Blue Coat Portfolio ANALYST BRIEF Bold Move Further Builds Blue Coat Portfolio SOLERA ACQUISITION PROVIDES BLUE COAT ABILITY TO LEVERAGE BIG DATA ANALYTICS Author John W. Pirc Overview On May 23, 2013, security vendor Blue

More information

What is Security Intelligence?

What is Security Intelligence? 2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the

More information

STEALTHWATCH MANAGEMENT CONSOLE

STEALTHWATCH MANAGEMENT CONSOLE System STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations

More information

Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive

Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive White Paper Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com

More information

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats Eva Chen CEO and Co-Founder Consistent Vision for 25 Years A world safe for exchanging

More information

Overcoming The Blind Spots in Your Virtualized Data Center

Overcoming The Blind Spots in Your Virtualized Data Center Overcoming The Blind Spots in Your Virtualized Data Center Matt Percival Sales Manager Northern Europe Stand C4 2014 Ixia Inc. Outline Virtualization Overview Network Monitoring Basics Implementing a Monitoring

More information

Deploying Advanced Firewalls in Dynamic Virtual Networks

Deploying Advanced Firewalls in Dynamic Virtual Networks SOLUTION GUIDE Deploying Advanced Firewalls in Dynamic Virtual Networks Enterprise-Ready Security for Network Virtualization 1 This solution guide describes how to simplify deploying virtualization security

More information

Whitepaper Gigamon Intelligent Flow Mapping

Whitepaper Gigamon Intelligent Flow Mapping Whitepaper Gigamon Intelligent Flow Mapping In today s competitive world where more and more business-critical applications are moving from the physical confines of the corporate organization to the Internet,

More information

Agile Cyber Security Security for the Real World, Architectural Approach

Agile Cyber Security Security for the Real World, Architectural Approach Agile Cyber Security Security for the Real World, Architectural Approach Osama Al-Zoubi Senior Manger, Systems Engineering Fahad Aljutaily Senior Solution Architect, Security Market Trends Welcome to the

More information

Riverbed SteelCentral. Product Family Brochure

Riverbed SteelCentral. Product Family Brochure Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,

More information

FROM PRODUCT TO PLATFORM

FROM PRODUCT TO PLATFORM FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really

More information

Network Performance + Security Monitoring

Network Performance + Security Monitoring Network Performance + Security Monitoring Gain actionable insight through flow-based security and network performance monitoring across physical and virtual environments. Uncover the root cause of performance

More information

Q1 Labs Corporate Overview

Q1 Labs Corporate Overview Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,

More information

Cisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015

Cisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015 Cisco Security Strategy Update Integrated Threat Defense Oct 28, 2015 Breaches are the New Normal FDA Wards of Security Flaw in Infusion Pump Cisco Confidential Cisco s Covers the Threat-Centric Entire

More information

Cisco Network Analysis Module Software 4.0

Cisco Network Analysis Module Software 4.0 Cisco Network Analysis Module Software 4.0 Overview Presentation Improve Operational Efficiency with Increased Network and Application Visibility 1 Enhancing Operational Manageability Optimize Application

More information

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A What is NetFlow? Network protocol originally developed by Cisco

More information

Data Center Infrastructure of the future. Alexei Agueev, Systems Engineer

Data Center Infrastructure of the future. Alexei Agueev, Systems Engineer Data Center Infrastructure of the future Alexei Agueev, Systems Engineer Traditional DC Architecture Limitations Legacy 3 Tier DC Model Layer 2 Layer 2 Domain Layer 2 Layer 2 Domain Oversubscription Ports

More information

Remote Management Services Portfolio Overview

Remote Management Services Portfolio Overview Enterprise environments today have various technologies and concerns in their network environment; from telephony, Internet, video, compute, and infrastructure, to regulatory and security management. On

More information

McAfee Network Security Platform

McAfee Network Security Platform McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking

More information

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015 Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera rbarrera@grupo-dice.com VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?

More information

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure

More information

Cisco ONE Enterprise Networks Architecture: An Automated, Application-Aware Foundation for the Modern Enterprise

Cisco ONE Enterprise Networks Architecture: An Automated, Application-Aware Foundation for the Modern Enterprise White Paper Cisco ONE Enterprise Networks Architecture: An Automated, Application-Aware Foundation for the Modern Enterprise The Challenge Enterprises have seen massive change over the last decade, but

More information

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

2016 Firewall Management Trends Report

2016 Firewall Management Trends Report 2016 Firewall Management Trends Report A survey of trends in firewall use and satisfaction with firewall management JANUARY 2016 Copyright 2016 Skybox Security, Inc. All rights reserved. Skybox is a trademark

More information

AVI NETWORKS CLOUD APPLICATION DELIVERY PLATFORM INTEGRATION WITH CISCO APPLICATION CENTRIC INFRASTRUCTURE

AVI NETWORKS CLOUD APPLICATION DELIVERY PLATFORM INTEGRATION WITH CISCO APPLICATION CENTRIC INFRASTRUCTURE TECH BRIEF AVI NETWORKS CLOUD APPLICATION DELIVERY PLATFORM INTEGRATION WITH CISCO APPLICATION CENTRIC INFRASTRUCTURE Application Centric Infrastructure The Cisco Application Centric Infrastructure (ACI)

More information

REV: 0.1.1 (July 2011) McAfee Security: Intrusion Prevention System

REV: 0.1.1 (July 2011) McAfee Security: Intrusion Prevention System McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud

Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches

More information

Cisco Nexus Family Delivers Data Center Transformation

Cisco Nexus Family Delivers Data Center Transformation Cisco Nexus Family Delivers Data Center Transformation Data Center-Class Family of Switches Built to Help Customers Evolve Their Data Centers What You Will Learn As organizations increasingly rely on IT

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

50. DFN Betriebstagung

50. DFN Betriebstagung 50. DFN Betriebstagung IPS Serial Clustering in 10GbE Environment Tuukka Helander, Stonesoft Germany GmbH Frank Brüggemann, RWTH Aachen Slide 1 Agenda Introduction Stonesoft clustering Firewall parallel

More information

Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure

Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure August 2015 Table of Contents 1 Introduction... 3 Purpose... 3 Products... 3

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

The Evolving Data Center. Past, Present and Future Scott Manson CISCO SYSTEMS

The Evolving Data Center. Past, Present and Future Scott Manson CISCO SYSTEMS The Evolving Data Center Past, Present and Future Scott Manson CISCO SYSTEMS Physical» Virtual» Cloud Journey in Compute Physical Workload Virtual Workload Cloud Workload HYPERVISOR 1 VDC- VDC- 2 One App

More information

Security Implications of Migrating to IPv6

Security Implications of Migrating to IPv6 Security Implications of Migrating to IPv6 Patrick Bedwell VP, Product Marketing 1 December 14, 2011 Agenda 1. Why It s Important 2. Network Security Vendors & IPv6 Readiness 3. IPv6 Threats 4. Planning

More information

Observer Probe Family

Observer Probe Family Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software

More information

Gecontroleerde grip op uw netwerk security en netwerk beheer

Gecontroleerde grip op uw netwerk security en netwerk beheer Gecontroleerde grip op uw netwerk security en netwerk beheer 19 11-2015 Marcel Golverdingen Who is Tucana en what are our activities? Pan-European supplier with offices in Belgium, France, Germany and

More information

Network Performance Management Solutions Architecture

Network Performance Management Solutions Architecture Network Performance Management Solutions Architecture agility made possible Network Performance Management solutions from CA Technologies compliment your services to deliver easily implemented and maintained

More information

Innovative, High-Density, Massively Scalable Packet Capture and Cyber Analytics Cluster for Enterprise Customers

Innovative, High-Density, Massively Scalable Packet Capture and Cyber Analytics Cluster for Enterprise Customers Innovative, High-Density, Massively Scalable Packet Capture and Cyber Analytics Cluster for Enterprise Customers The Enterprise Packet Capture Cluster Platform is a complete solution based on a unique

More information

The Purview Solution Integration With Splunk

The Purview Solution Integration With Splunk The Purview Solution Integration With Splunk Integrating Application Management and Business Analytics With Other IT Management Systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview Integration

More information

Scalable Network Monitoring with SDN-Based Ethernet Fabrics

Scalable Network Monitoring with SDN-Based Ethernet Fabrics Scalable Network Monitoring with SDN-Based Ethernet Fabrics Prashant Gandhi VP, Products & Strategy Big Switch Networks gandhi@bigswitch.com 1 Agenda Trends in Network Monitoring SDN s Role in Network

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information