Bringing Enterprise-class Network Performance and Security Management Together using NetFlow
|
|
- Herbert Ford
- 8 years ago
- Views:
Transcription
1 Bringing Enterprise-class Network Performance and Security Management Together using NetFlow An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Lancope November 2009 IT MANAGEMENT RESEARCH,
2 Table of Contents Executive Summary...1 The Emergence of Application-Aware Network Performance Management...1 Application Awareness in Security Management...2 Two Worlds Collide, or Combine?...2 Finding the One Plus One Equals Three Answer...3 The StealthWatch Approach...4 EMA Perspective...4 About Lancope...5
3 Executive Summary The drive towards application-aware approaches for monitoring the network infrastructure has resulted in the emergence of management data sources which can be used for multiple purposes. For instance, while there are different ends to network security and network performance monitoring, the means can very much be the same. With the current increased focus on protecting business process-enabling applications and services as opposed to mere infrastructure management, IT operations teams must pay attention to the opportunity in front of them to better leverage available management technologies, share the results, and form a more collaborative, proactive, and effective support regime for the businesses and organizations which they serve. This paper addresses the convergence of network management and network security technologies around NetFlow, and a solution built on this basis now available from Lancope. The StealthWatch System has long spanned both functional areas, and with the November 2009 release of the FlowSensor AE, a new packet inspection-based instrumentation option, is significantly expanded in its capabilities to deliver definitive, proactive security and performance management. The StealthWatch System has significantly expanded capabilities to deliver definitive, proactive security and performance management. The Emergence of Application-Aware Network Performance Management Network management technologies historically have been very much focused on making sure that the network infrastructure is available and working efficiently. Originally this meant assuring availability as well as interoperability between network elements that often times were geographically far-flung and sourced from multiple vendors. As networking technologies have matured and network architecture best practices have advanced, availability is no longer the primary concern for most network operations teams. What is now of more importance is establishing an understanding of the efficiency that the network infrastructure delivers. This is a performance management issue, and is most readily recognized by measuring the volume, quality of service, and end-user experience for applications and services as they traverse the network infrastructure. In order to become application-aware, network management teams need to take advantage of new sources of performance monitoring data, most often available directly from the infrastructure itself, but also drawn by adding instrumentation which can recognize, measure, and report application activity and user experience. It is with this new source of data that the network team has the opportunity to assume a more proactive position and role within their organizations. By gathering performance metrics in real time and tracking end-user experience, operators have the opportunity to find early indications of problems and take preventative actions before the end users or the business processes that rely on them takes notice or are substantially impacted. The technologies which provide application awareness for network teams fall into three categories: 1. Flow-based records produced by infrastructure equipment or management tools which record and report application session details. Most common in this category are NetFlow records, and the many variants and versions thereof.
4 2. Synthetic agents which are installed at key points around the distributed network infrastructure to artificially test and measure application responsiveness. 3. Packet-based monitors which use deep inspection techniques to recognize and track application sessions and report key performance metrics as well as provide a rich basis for detailed troubleshooting. The first two types are purely passive in nature; however, the third may also be delivered as part of an active solution, most commonly in the form of application delivery controllers or WAN optimization controllers. Experience dictates that a balance of all three of these types has proven to be the best answer for complete instrumentation coverage, facilitated troubleshooting, and optimal flexibility while fulfilling both reactive and proactive task needs. Application Awareness in Security Management Current security management and monitoring tools also utilize a mix of these three types of application-aware measurement techniques. For instance, packet inspection is the basis of firewall and network intrusion detection system (NIDS) technologies, as well as intrusion prevention systems (IPS). While NIDS is passive, firewalls and IPSs are active. Synthetic agents have a lesser role, but can be used as part of vulnerability assessment approaches. Network flow data is currently considered one of the most powerful sources for network security monitoring, and is used to recognize and track unusual patterns of activity as well as unexpected network participants and applications. The goal here of course is to identify threats, whether they originate inside or outside the organization, and provide enough information to the security operations team to allow protective actions to be taken. Use of NetFlow, as the most common format of network flow data records, is the most heavily adopted approach of this type. Two Worlds Collide, or Combine? For many years, providers of network-based security monitoring solutions have recognized that the data they are collecting could also be used for performance management. Similarly, providers of application aware network performance monitoring solutions have recognized that in addition to monitoring legitimate business traffic, they also commonly see illegitimate activities. And as a result, many solution providers for one camp or the other have tried to adapt their products to meet both sets of needs. For many years, providers of network-based security monitoring solutions have recognized that the data they are collecting could also be used for performance management. To be clear, there are very different objectives between the two practice areas of network management and security management. The data analysis activities focus on quite different indicators and results, as well as audiences. But what are remarkably similar are the techniques in which network-based security technologies gather data as compared to network performance monitoring technologies. And the key to creating a solution which can address both spaces successfully requires a clear understanding of the different purposes and constituencies involved.
5 If we consider which underlying data collection technologies hold the most promise as a common basis for security and network management, the conversation must naturally turn towards Flow-based sources, and there are two primary categories of those as mentioned above. Flow data can be drawn from flow records generated by infrastructure devices or from packet monitoring technologies. Flow data is the most powerful option because it includes not only a record of activity, but information on the source and destination addresses, as well as an indication of what applications or services were in use. And if packet-based sources are used, that information can be augmented with quality of experience measurements. Finding the One Plus One Equals Three Answer As mentioned earlier, technology providers have attempted in the past to span the two domains of security management and network management. The rationale is strong to provide additional functionality based on a common platform, thus realizing more value and returns on investments made in tools and training. And yet few of these solutions have found significant success or broad market adoption. What has been lacking in many of these attempts in the past has been a viable model and architecture for adequately addressing the full range of functional needs for both security and network operations teams. In particular, delivering the capability to present summarized and analyzed results in a way that adequately supports the full spectrum of operational processes and workflows has proven difficult. What has been lacking has been a viable model and architecture for addressing the full needs for both security and network operations teams. And there are differences in data needs. While NetFlow has proved a great common ground, additional measurements or metrics are required in order to fill out each practice area. For instance, network managers need to augment NetFlow with expanded application recognition and response time measurements in order to understand and track user quality of experience, and security professionals need to augment NetFlow with log file data and signature recognition to fully address points of vulnerability. Further, the political barriers resisting the sharing of data, and more specifically, control of the data have often proven insurmountable. A solution that has strong adoption and use within one constituent base but little or no recognition within the other will have little advantage versus other best-ofbreed options. So how do we get past the political and technological barriers? How do we find a way to build rather than oppose, and how can we reach out to capture the potential advantages of an integrated solution? The answer very well may be to identify a solution that can truly be considered best-of-breed by each constituent group. This means not settling for 80% capabilities on one side of the house just because you get 100% on the other side.
6 The StealthWatch Approach Lancope is a well established provider of network security products, and has been delivering solutions to organizations worldwide for years. Their StealthWatch product has evolved from roots in early threat detection to become a highly scalable, enterprise-class real-time network security monitoring platform complete with extensive reporting, alerting, trending, and broad multivendor support. In addition to the historical strength in security management, Lancope has achieved steadily growing success in addressing network performance monitoring and management goals with the same core system, and has achieved adoption for these purposes within a substantial number of customer environments. At heart of Lancope s StealthWatch platform is the use of NetFlow both as a data acquisition technique as well as a means for transferring data from its instrumentation devices in the data collection layer to its centralized data stores, where analysis and reporting take place. Lancope s solution has long had the ability to directly harvest NetFlow records from capable devices directly within the StealthWatch Xe platform. This is augmented by the StealthWatch FlowReplicator, which can gather flow records remotely as well as create NetFlow records from non-netflow data sources, such as syslog and SNMP. Lancope recently introduced the StealthWatch FlowSensor VE, which extends NetFlow-based visibility into VMware ESX virtualized servers, providing visibility into traffic flowing between guest VMs which reside on a common host. These approaches have all utilized traditional NetFlow data structures as a means for communicating data between the collection and analysis tiers. The StealthWatch FlowSensor AE fills the key response-time metrics gap which exists with NetFlow-exclusive monitoring solutions. Brand-new to the Lancope product portfolio with the StealthWatch 5.10 release is the StealthWatch FlowSensor AE. This new instrumentation device attaches directly to network links and adds an important additional set of measurements to what is traditionally available and transmitted using NetFlow. The FlowSensor AE can recognize and measure response times based on the packet sequences it inspects, and uses custom fields within the NetFlow V9 format to forward both round-trip time (RTT) and server response time (SRT) to the StealthWatch XE server. Such response time data fills the key gap which exists with NetFlow-exclusive monitoring solutions. Lancope has also gone further in their efforts, adding specific views and reports that would be of interest to differing audiences. For instance, their logical, system-wide reports, which focus primarily on individual or groups of IP addresses, are tuned towards security and server managers, who often are not directly concerned about physical location. Network managers, on the other hand, benefit from their physical perspective reports, due to their concern with understanding topological relationships for traffic engineering and root cause determination. EMA Perspective ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) analysts have long been advocates for integrated management technologies and practices. This is a growing priority for organizations that seek to turn IT into a strategic asset, and make the shift for reactive practices to proactive service orientations. As part of this evolution, both rigorous security and compliance management and infrastructure performance management are considered indispensable. Lancope s StealthWatch embodies a practical solution for leveraging the technological similarities between network security and network performance management while addressing the unique needs of both functional areas from a common platform.
7 Lancope has been pursuing this combined solution for several years, and with this latest iteration has closed key gaps in particular the addition of response time metrics via the new packet-based FlowSensor AE. This is not the end of the road, however, and EMA foresees continued opportunities for improvement to the StealthWatch solution. One area would be the addition of real-time views and reports using business-oriented data presentations to better collaborate and communicate with other groups inside and outside IT. Further development of performance troubleshooting workflows which can reach down to the packet level would also be a big plus, as this is often an essential capability for addressing the most difficult and subtle performance degradation issues. Where many have failed before, Lancope s StealthWatch solution may just hold the elusive answers to combining security and performance management for networks. Lancope s approach demonstrates significant savvy and holds great promise for improving operations, both from a total cost as well as total effectiveness and impact perspectives. About Lancope Lancope, Inc. is the leader in NetFlow Analysis and the provider of the StealthWatch System for flow-based network performance and security monitoring. Delivering unified visibility across physical and virtual networks, StealthWatch eliminates network blind spots and reduces total network and security management costs. Both OPSEC and Common Criteria-certified, StealthWatch monitors the networks of Global 2000 organizations, academic institutions and government entities worldwide. Lancope also partners with fellow best-of-breed solution providers through its Technology Alliance Program, which includes Cisco Systems, Brocade, Blue Coat, VMware, IBM Tivoli, Check Point, TippingPoint, ArcSight and A10 Networks. Lancope is a privately held, venture-backed company headquartered in Atlanta, Georgia. For more information, visit
8 About Enterprise Management Associates, Inc. Founded in 1996, Enterprise Management Associates (EMA) is a leading industry analyst firm that specializes in going beyond the surface to provide deep insight across the full spectrum of IT management technologies. EMA analysts leverage a unique combination of practical experience, insight into industry best practices, and in-depth knowledge of current and planned vendor solutions to help its clients achieve their goals. Learn more about EMA research, analysis, and consulting services for enterprise IT professionals and IT vendors at or follow EMA on Twitter. This report in whole or in part may not be duplicated, reproduced, stored in a retrieval system or retransmitted without prior written permission of Enterprise Management Associates, Inc. All opinions and estimates herein constitute our judgement as of this date and are subject to change without notice. Product names mentioned herein may be trademarks and/or registered trademarks of their respective companies. EMA and Enterprise Management Associates are trademarks of Enterprise Management Associates, Inc. in the United States and other countries. EMA, ENTERPRISE MANAGEMENT ASSOCIATES, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc. Corporate Headquarters: 5777 Central Avenue, Suite 105 Boulder, CO Phone: Fax:
Essential Ingredients for Optimizing End User Experience Monitoring
Essential Ingredients for Optimizing End User Experience Monitoring An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Neustar IT MANAGEMENT RESEARCH, Table of Contents Executive Summary...1
More informationEMA Radar for Application Performance Management (APM) for Cloud Services: Q1 2012
EMA Radar for Application Performance Management (APM) for Cloud Services: Q1 2012 Compuware Profile By Julie Craig, Research Director Enterprise Management Associates (EMA) January 2012 Table of Contents
More informationEssentials for Assuring Network and Application Performance
Essentials for Assuring Network and Application Performance An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for WildPackets February 2009 IT MANAGEMENT RESEARCH, Table of Contents Executive
More informationBeyond the Hypervisor: Optimizing Virtualization Management
Beyond the Hypervisor: Optimizing Virtualization Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for ASG Software Solutions August 2009 IT MANAGEMENT RESEARCH, Table of Contents
More informationEMA Radar for Application Performance Management (APM) for Cloud Services: Q1 2012
EMA Radar for Application Performance Management (APM) for Cloud Services: Q1 2012 eg Innovations Profile By Julie Craig, Research Director Enterprise Management Associates (EMA) January 2012 Table of
More informationEMA Radar for Enterprise Network Management Systems (ENMS): Q4 2012
EMA Radar for Enterprise Network Management Systems (ENMS): Q4 2012 By Tracy Corbo and Jim Frey ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Radar Report October 2012 Ipswitch Network Management Division Introduction
More informationAssuring Converged Infrastructure: Converged Management Strategies for Cisco UCS
Converged Management Strategies for Cisco UCS An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for CA Technologies April 2012 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
More informationEMA Service Catalog Assessment Service
MORE INFORMATION: To learn more about the EMA Service Catalog, please contact the EMA Business Development team at +1.303.543.9500 or enterpriseit@enterprisemanagement.com The IT Service Catalog Aligning
More informationNetwork Performance + Security Monitoring
Network Performance + Security Monitoring Gain actionable insight through flow-based security and network performance monitoring across physical and virtual environments. Uncover the root cause of performance
More informationEMA Radar for Application Discovery and Dependency Mapping (ADDM): Q4 2013. AppEnsure Profile
EMA Radar for Application Discovery and Dependency Mapping (ADDM): Q4 2013 By Dennis Drogseth, VP of Research ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Radar Report December 2013 AppEnsure Introduction Santa
More informationREVOLUTIONIZE THE WAY YOU VIEW YOUR NETWORK GAIN A UNIFIED VIEW OF SECURITY AND NETWORK OPERATIONS ACROSS PHYSICAL AND VIRTUAL NETWORKS
REVOLUTIONIZE THE WAY YOU VIEW YOUR NETWORK GAIN A UNIFIED VIEW OF SECURITY AND NETWORK OPERATIONS ACROSS PHYSICAL AND VIRTUAL NETWORKS STEALTHWATCH BY LANCOPE Lancope expertly provides flow-based visibility
More informationOptimizing Cloud for Service Delivery
Optimizing Cloud for Service Delivery Report Highlights An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Survey-based Research Report Written by Dennis Drogseth, Vice President of Research February 2012 Sponsored
More informationEMA Radar for Advanced Performance Analytics (APA) Use Cases: Q4 2012
EMA Radar for Advanced Performance Analytics (APA) Use Cases: Q4 2012 BMC Software Profile By Dennis Drogseth ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Radar Report December 2012 BMC Software Profile Introduction
More informationThe SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
More informationSecure Administration of Virtualization - A Checklist ofVRATECH
Securing the Administration of Virtualization An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Market Research Report Prepared for RSA, The Security Division of EMC March 2010 IT MANAGEMENT RESEARCH, Table of
More informationTHE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT
WHITE PAPER: CONVERGED NPM/APM THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT Today, enterprises rely heavily on applications for nearly all business-critical
More informationSeven Priorities for Integrated Network Management
Seven Priorities for Integrated Network Management How HP Intelligent Management Center Delivers an Enterprise-class Solution An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Hewlett-Packard
More informationCustomer Satisfaction with Application Delivery Controller Vendors
Customer Satisfaction with Application Delivery Controller Vendors An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Market Research Report Prepared for Citrix March 2010 IT MANAGEMENT RESEARCH, Table of Contents
More informationBuilding on a Foundation for Growth: Integrating DLP with Message Security Infrastructure
Building on a Foundation for Growth: Integrating DLP with Message Security Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for RSA, The Security Division of EMC April 2010
More informationPragmatic Approach to Data Center Management Control and Manageability
Pragmatic Approach to Data Center Management Control and Manageability An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Emerson Network Power September 2010 IT & DATA MANAGEMENT RESEARCH,
More informationEMA Radar For Business Service Management (BSM): Service Impact Q3 2010 Interlink Vendor Profile
EMA Radar For Business Service Management (BSM): Service Impact Q3 2010 Interlink Vendor Profile by Dennis Drogseth, Vice President Enterprise Management Associates (EMA) June 2010 IT & DATA MANAGEMENT
More informationEMA/CXP Research Report: The Changing Role of the Service Desk in the Age of Cloud and Agile
EMA/CXP Research Report: The Changing Role of the Service Desk in the Age of Cloud and Agile Report Summary By Dennis Drogseth, Dominique Dupuis, Pascal Paysant An ENTERPRISE MANAGEMENT ASSOCIATES (EMA
More informationSMART Steps Toward Consolidated Workload Automation
An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for BMC Software June 2008 IT Management Research, Industry Analysis, and Consulting Table of Contents Executive Summary... 1 Introduction...
More informationBig Data Comes of Age: Shifting to a Real-time Data Platform
An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SAP April 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Table of Contents Introduction... 1 Drivers of Change...
More informationEMA Radar for Private Cloud Platforms: Q1 2013
EMA Radar for Private Cloud Platforms: Q1 2013 By Torsten Volk ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Radar Report March 2013 BMC Software EMA Radar for Private Cloud Platforms: Q1 2013 (IaaS, PaaS, SaaS)
More informationHow Foglight Makes User Experience Management a Reality: Three Case Studies
How Foglight Makes User Experience Management a Reality: Three Case Studies An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Dell Software August 2012 IT & DATA MANAGEMENT RESEARCH,
More informationEssential IT Monitoring: Five Priorities for Cross- Domain Management
Five Priorities for Cross- Domain Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SolarWinds October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Table
More informationService Management and Operations: A Data Center Perspective
Service Management and Operations: A Data Center Perspective An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for LANDesk Software March 2010 IT MANAGEMENT RESEARCH, Table of Contents Executive
More informationEssential IT Monitoring: Seven Priorities for Network Management
Seven Priorities for Network Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SolarWinds September 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Table
More informationCloud Architecture and Strategy: Critical Success Factors
Cloud Architecture and Strategy: Critical Success Factors An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for ASG March 2012 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
More informationNetwork Visibility in the Data Center: Best Practices for Staying Ahead
Network Visibility in the Data Center: Best Practices for Staying Ahead An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Cisco Systems April 2014 IT & DATA MANAGEMENT RESEARCH, INDUSTRY
More informationFour Priorities for Integrated, Service-Centric Performance Management
Service-Centric Performance Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Watch4net May 2011 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Table of Contents
More informationNetwork Performance Management Solutions Architecture
Network Performance Management Solutions Architecture agility made possible Network Performance Management solutions from CA Technologies compliment your services to deliver easily implemented and maintained
More informationEffective Systems Management for Healthcare
Effective Systems Management for Healthcare An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SolarWinds January 2014 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Table
More informationITIL V3: Making Business Services Serve the Business
ITIL V3: Making Business Services Serve the Business An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for ASG October 2008 IT Management Research, Industry Analysis, and Consulting Table
More informationEcora More Attractive to Large Enterprises with Auditor Pro 4.5
Large Enterprises with Auditor Pro 4.5 An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Ecora March 2008 IT Management Research, Industry Analysis, and Consulting Table of Contents Executive
More informationEMA Radar for Workload Automation (WLA): Q2 2012
EMA Radar for Workload Automation (WLA): Q2 2012 Cisco Software Profile By Torsten Volk, Senior Analyst Enterprise Management Associates (EMA) June 2012 Cisco Systems Profile Introduction Cisco Systems
More informationDesktop Automation: Effective Desktop Operations & Management with Cloud Orchestration
Desktop Automation: Effective Desktop Operations & Management with Cloud Orchestration An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Citrix August 2014 IT & DATA MANAGEMENT RESEARCH,
More informationHelp Desk Demands in the Mid-Market: Pragmatic Requirements and Solutions
Help Desk Demands in the Mid-Market: Pragmatic Requirements and Solutions An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for ScriptLogic June 2010 IT & DATA MANAGEMENT RESEARCH, Table
More informationHow To Manage A Network With Ccomtechnique
SOLUTION BRIEF CA Technologies Application-driven Network Performance Management How do you gain the network-level visibility you need to optimize the performance of your mission-critical applications?
More informationWhite Paper: Application and network performance alignment to IT best practices
Unpublished White Paper: Application and network performance alignment to IT best practices This white paper briefly describes best practices; highlights IT best practices; and discusses in detail IT business
More informationSTEALTHWATCH MANAGEMENT CONSOLE
STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations
More informationThree Asset Lifecycle Management Fundamentals for Optimizing Cloud and Hybrid Environments
Three Asset Lifecycle Management Fundamentals for Optimizing Cloud and Hybrid Environments An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for BMC April 2011 IT & DATA MANAGEMENT RESEARCH,
More informationWorkload Automation: The Heart of Enterprise Operations
An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Skybot Software October 2011 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Table of Contents Executive Summary...1 Introduction...1
More informationFaster, Cheaper, Safer: Improving Agility, TCO, and Security with Agentless Job Scheduling. A White Paper Prepared for BMC Software August 2006
A White Paper Prepared for BMC Software August 2006 Table of Contents Executive Summary...1 Introduction...1 The Current Standard Agent-Based Scheduling...1 The Revolution Agentless Job Scheduling...1
More informationService Catalog: Dramatically Improving the IT/Business Relationship
Service Catalog: Dramatically Improving the IT/Business Relationship An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Numara Software February 2009 IT MANAGEMENT RESEARCH, Table of Contents
More informationEMA Radar for Private Cloud Platforms: Q1 2013
EMA Radar for Private Cloud Platforms: Q1 2013 By Torsten Volk ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Radar Report March 2013 Citrix EMA Radar for Private Cloud Platforms: Q1 2013 (IaaS-centric) Citrix
More informationMaking Your Investment in an Executive Dashboard Count: What to Look for and Why
Making Your Investment in an Executive Dashboard Count: An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for CA Technologies May 2012 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
More informationCisco Remote Management Services for Security
Cisco Remote Management Services for Security Innovation: Many Take Advantage of It, Some Strive for It, Cisco Delivers It. Cisco Remote Management Services (RMS) for Security provide around the clock
More informationManaging Business Service Performance in Complex Distributed Environments
Managing Business Service Performance in Complex Distributed Environments An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for ASG Software Solutions May 2008 IT Management Research, Industry
More informationStreamlining the Process of Business Intelligence with JReport
Streamlining the Process of Business Intelligence with JReport An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Product Summary from 2014 EMA Radar for Business Intelligence Platforms for Mid-Sized Organizations
More informationSTEALTHWATCH MANAGEMENT CONSOLE
System STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations
More informationConsolidating IT Infrastructure Management: Unifying Data Center Hardware and Software Administration
Consolidating IT Infrastructure Management: Unifying Data Center Hardware and Software Administration An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Emerson Network Power October 2014
More informationEMA Radar for Private Cloud Platforms: Q1 2013
EMA Radar for Private Cloud Platforms: Q1 2013 By Torsten Volk ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Radar Report March 2013 ASG Software Solutions EMA Radar for Private Cloud Platforms: Q1 2013 (IaaS,
More informationIT Optimization through Predictive Capacity Management
IT Optimization through Predictive Capacity Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for CA Technologies March 2012 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS &
More informationEMA Radar for Workload Automation (WLA): Q2 2012
EMA Radar for Workload Automation (WLA): Q2 2012 By Torsten Volk, Senior Analyst Enterprise Management Associates (EMA) June 2012 Introduction Founded in 2000 in Las Vegas, Nevada, Flux offers a lightweight,
More informationSupport the Era of the App with End-to-End Network and Application Performance Visibility
Support the Era of the App with End-to-End Network and Application Performance Visibility Traditional Performance Management Is Not Enough The realities of the modern IT landscape are daunting. Your business-critical
More informationNext-Generation Asset Management and IT Financial Analytics: Optimizing IT Value in a World of Change
Next-Generation Asset Management and IT Financial Analytics: Optimizing IT Value in a World of Change An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Research Report Written by Dennis Drogseth May 2014 Sponsored
More informationARE AGENTS NECESSARY FOR ACCURATE MONITORING?
ARE AGENTS NECESSARY FOR ACCURATE MONITORING? In managing network performance, user experience takes priority. Being proactive in managing performance means not only tracking the network and application,
More informationCompuware, Gomez and the New Application Dynamic: Managing Application Performance in the Internet Era
Compuware, Gomez and the New Application Dynamic: Managing Application Performance in the Internet Era An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Compuware November 2009 IT MANAGEMENT
More informationRouting & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management
Routing & Traffic Analysis for Converged Networks Filling the Layer 3 Gap in VoIP Management Executive Summary Voice over Internet Protocol (VoIP) is transforming corporate and consumer communications
More informationChoosing the Right Enterprise Network Management Solution
Choosing the Right Enterprise Network Management Solution An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SolarWinds November 2009 IT MANAGEMENT RESEARCH, Table of Contents Executive
More informationHow to Get NetFlow from Cisco 3750s. Joe Buchanan System Engineer Manager www.lancope.com
How to Get NetFlow from Cisco 3750s and Other Non-NetFlow NetFlow Enabled Devices Joe Buchanan System Engineer Manager www.lancope.com Network Flow Collection Internet NetFlow Fields src and dst IP src
More informationQRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
More informationNetwork as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats
Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats Dragan Novaković Consulting Systems Engineer Security November 2015. New Networks Mean New Security Challenges
More informationOverview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A
Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A What is NetFlow? Network protocol originally developed by Cisco
More informationEMA Radar for Workload Automation (WLA): Q2 2012
EMA Radar for Workload Automation (WLA): Q2 2012 By Torsten Volk, Senior Analyst Enterprise Management Associates (EMA) June 2012 Introduction Founded in 2004, Network Automation focuses on automating
More informationCisco Systems Network Analysis Module Software 5.0
Cisco Systems Network Analysis Module Software 5.0 Enterprise-Class Performance Monitoring and Analysis for Modern IP Networks An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Cisco
More informationEffective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
More informationEnterprise-Class Management Success with SolarWinds Solutions: Five Case Studies
Enterprise-Class Management Success with SolarWinds Solutions: Five Case Studies An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SolarWinds December 2010 IT & DATA MANAGEMENT RESEARCH,
More informationTechPartner Program Enables Full Network Visibility Across Complex Health Care Delivery System
PARTNER CASE STUDY: IXIA 2016 TechPartner Program Enables Full Network Visibility Across Complex Health Care Delivery System Ixia helps hospital group extend network monitoring capabilities while leveraging
More informationHP and netforensics Security Information Management solutions. Business blueprint
HP and netforensics Security Information Management solutions Business blueprint Executive Summary Every day there are new destructive cyber-threats and vulnerabilities that may limit your organization
More informationNext-Gen BSM: A New Path to Integrated, Service-Centric IT Availability and Performance Monitoring
Next-Gen BSM: A New Path to Integrated, Service-Centric IT Availability and Performance Monitoring An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Centerity September 2012 IT & DATA
More informationCA Virtual Assurance for Infrastructure Managers
DATA SHEET CA Virtual Assurance for Infrastructure Managers (Includes CA Systems Performance for Infrastructure Managers) CA Virtual Assurance for Infrastructure Managers (formerly CA Virtual Performance
More informationCisco Cyber Threat Defense - Visibility and Network Prevention
White Paper Advanced Threat Detection: Gain Network Visibility and Stop Malware What You Will Learn The Cisco Cyber Threat Defense (CTD) solution brings visibility to all the points of your extended network,
More informationEndpoint Virtualization Explained:
: Methods, Benefits, Challenges, and Recommendations for Desktop Virtualization and Application Virtualization An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Symantec April 2009 IT
More informationNetwork Application Performance Alignment to IT Best Practices
Network Application Performance Alignment to IT Best Practices This white paper briefly describes best practices, highlights IT best practices and discusses in detail; IT business service management, the
More informationAutomating ITIL v3 Event Management with IT Process Automation: Improving Quality while Reducing Expense
Automating ITIL v3 Event Management with IT Process Automation: Improving Quality while Reducing Expense An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for NetIQ November 2008 IT Management
More informationAternity Virtual Desktop Monitoring. Complete Visibility Ensures Successful VDI Outcomes
Aternity Virtual Desktop Monitoring Complete Visibility Ensures Successful VDI Outcomes Realizing the Benefits of VDI Requires Illuminating Four Performance Blind Spots Without comprehensive visibility
More informationUsing Converged Infrastructure Management to Optimize the Planning and Operations of Cisco Environments
Using Converged Infrastructure Management to Optimize the Planning and Operations of Cisco Environments An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for CA Technologies January 2013
More informationEMA Advisory Note: Virtualization and Management Trends, Forecasts, and Recommendations (Summary)
EMA Advisory Note: Virtualization and Management Trends, Forecasts, and Recommendations (Summary) Sponsored by: Virtualization is clearly a mission-critical production technology Written by Andi Mann Enterprise
More informationRiverbed SteelCentral. Product Family Brochure
Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,
More informationOracle s Unified Communications Infrastructure Solution. Delivering Secure, Reliable, and Scalable Unified Communications Services
Oracle s Unified Communications Infrastructure Solution Delivering Secure, Reliable, and Scalable Unified Communications Services Oracle s UC infrastructure solution combines tightly coupled session management,
More informationImplement a unified approach to service quality management.
Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional
More informationGETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
More informationAchieving IT Operational Reliability and Cost Effectiveness with ITIL and other Best Practices
Achieving IT Operational Reliability and Cost Effectiveness with ITIL and other Best Practices An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Kaseya Updated April 2010 IT MANAGEMENT
More informationEvolution to Revolution: Big Data 2.0
Evolution to Revolution: Big Data 2.0 An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Actian March 2014 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Table of Contents
More informationRiverbed SteelCentral. Product Family Brochure
Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,
More informationIBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!
IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM can provide unmatched global coverage and security awareness! 4,300 Strategic outsourcing security delivery resources 1,200
More informationSupporting Workforce Mobility: Best Practices in Enterprise Mobility Management
Best Practices in Enterprise Mobility Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
More informationNetwork Performance Monitoring at Minimal Capex
Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer About ManageEngine Network Servers
More informationThe Power and Payback of Unified IT Monitoring
The Power and Payback of Unified IT Monitoring An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for CA Technologies June 2014 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
More informationAssuring Global Reference Data Distribution on a Virtual Appliance
White Paper Assuring Global Reference Data Distribution on a Virtual Appliance Predictive Analytics for IT in Action January 2012 Introduction Reference data has always been critical to the trading workflow
More informationMeeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
More informationFlow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
More informationSapphireIMS 4.0 BSM Feature Specification
SapphireIMS 4.0 BSM Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams
More informationWHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective
WHITE PAPER OCTOBER 2014 Unified Monitoring A Business Perspective 2 WHITE PAPER: UNIFIED MONITORING ca.com Table of Contents Introduction 3 Section 1: Today s Emerging Computing Environments 4 Section
More informationAchieving Data Center Optimization with Visual Modeling
Achieving Data Center Optimization with Visual Modeling An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Avocent April 2009 IT MANAGEMENT RESEARCH, Table of Contents Executive Summary...1
More informationEnhancing Cisco Networks with Gigamon // White Paper
Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,
More information