Market Update Intelligent Network Packet Brokers
|
|
- Leslie Malone
- 8 years ago
- Views:
Transcription
1 Market Update Report Intelligent Network Packet Brokers Explaining a New Network Infrastructure Category By Bob Laliberte, Senior Analyst July , The Enterprise Strategy Group, Inc. All Rights Reserved.
2 Market Report: Intelligent Network Packet Brokers 2 Contents Managing Networks at Scale is Becoming More Difficult... 3 Need to Take a Different Approach... 4 Market Applicability... 6 Buying Considerations... 8 Compelling Economics and Agility... 9 The Bigger Truth... 10
3 Market Report: Intelligent Network Packet Brokers 3 Managing Networks at Scale is Becoming More Difficult Enterprise organizations are dealing with several IT trends that have a dramatic impact on the character and volume of network traffic. On the infrastructure side, enterprise organizations are consolidating data centers, with those new, consolidated data centers required to service multi-tenant environments for different business units. This results in larger and more complex data center environments. At the same time, organizations continue to increase their use of server virtualization technologies, driving up the ratio of virtual machines (VMs) to physical hosts and subsequently the demand for increased bandwidth, resulting in many organizations upgrading to 10Gb networks. At the same time, applications are growing more sophisticated, leveraging richer content, utilizing service-oriented architectures, and becoming mobile device-accessible. This places additional strain on the organization to provide more granular security, accommodate bursty communications protocols, and react quickly to a highly dynamic environment. Large organizations are attempting to address this evolving set of performance, security, and operational requirements but it is becoming difficult for existing network monitoring and security tools to keep up with these trends and provide adequate coverage. Figure 1 illustrates the treadmill that many enterprise organizations face. Figure 1. Existing Network Tools Scenario Source: Enterprise Strategy Group, In the scenario illustrated in Figure 1, organizations connected security and monitoring tools directly to SPAN/mirror ports and external taps, but this approach is beginning to reach its limits of scalability, as the number of SPAN ports is limited and simply adding more security and monitoring tools to provide coverage over a rapidly expanding network is costly and only serves to increase the complexity. Plus the tools themselves are rapidly
4 Market Report: Intelligent Network Packet Brokers 4 running out of capacity due to increased traffic volumes and the need to process unnecessary packets. A better approach is needed with more intelligence that provides the ability to aggregate or broker actionable network traffic destined for monitoring or security tools. To that end, a number of enterprise organizations are beginning to adopt a particular approach to address these issues. Need to Take a Different Approach The technology, while proven in large scale service providers, is still in need of a commonly accepted industry category. It has gone by several monikers matrix switch, network monitoring switch, network intelligence optimization fabric, and intelligent management aggregation networking (iman) and most recently network packet broker (NPB). In previous ESG publications, we have used iman but Google searches for that term have a tendency to turn up pictures of the Somali fashion model, actress, and businesswoman (and wife of David Bowie) of that same name. Appealing as that may be, it contributes little to an understanding of the effective management of a network. Whatever it ends up being consistently called (in this report, we ve opted for intelligent network packet brokers or INPB), the technology addresses the aforementioned problems by providing an overlay management network. The technology connects network monitoring and security tools to the underlying network, usually via SPAN/mirror ports or network taps, but it can also be placed in-band (typically for security applications). This technology captures network behavior, provides packet processing services (e.g., filtering/grooming/packet fragment reassembly and de-duplication) for tools, and distributes actionable data to monitoring and security tools such as application performance management (APM), network performance management (NPM), intrusion detection/prevention (IDS/IPS), and advanced malware protection systems. As data centers and networks continue to scale, it will be increasingly critical for organizations to have a complete view of their network environments. Intelligent Network Packet Brokers enable organizations to leverage existing network monitoring and security tools to manage larger and more complex environments more effectively and efficiently (See Figure 2).
5 Market Report: Intelligent Network Packet Brokers 5 Figure 2. Technology to Improve Management Source: Enterprise Strategy Group, ESG believes that regardless of what it is called, intelligent is an important modifier to include in its designation. The intelligent network packet broker (INPB) does not merely shuttle packets from here to there. Rather it provides a layer of intelligence much in the same way an application delivery controller provides more than mere load balancing for web servers. The INPB extracts only the necessary information e.g., stripping out unwanted packets or providing time and port stamps for forensic work accelerating network and security intelligence to facilitate smart decisions on the part of the network, security, and monitoring tools. These systems when deployed strategically across the network, also allow for a much more accurate attribution when performing incident analysis and response activities, particularly in environments where analyzing big data is either the norm or the strategic direction going forward. Software Defined Networking or SDN also holds some promise in enabling this technology but it is still very new. Essentially, in an SDN-enabled network, services could be centralized leveraging network APIs or a centralized controller that has access to all the network devices. So an INPB technology could be used to connect via APIs or into a controller and collect all the requisite information to send to management tools. As mentioned previously, this is a future technology, however, worth watching to see whether it develops as promised. The reality today is that organizations need solutions to help them regain visibility and control now.
6 Market Applicability Market Report: Intelligent Network Packet Brokers 6 There are a number of tools that organizations are interested in using to better monitor their networks. Previously conducted ESG research 1 revealed that the tools most commonly used by organizations are performance and security monitoring devices (see Figure 3). Figure 3. Use of Network Monitoring or Security Tools Is your organization using any of the following types of network monitoring and/or security tools that require access to the network? (Percent of respondents, N=160) Currently use Do not use, but we plan to do so Do not use, but we are interested in doing so Do not use, and we have no plans or interest in doing so Don't know Network performance monitoring 86% 9% 4% 1% IPS/IDS (intrusion prevention software/intrusion detection software) 69% 16% 14% 1% Application performance 61% 25% 13% 1% Packet capture/network 58% 22% 16% 4% 1% Other types of tools 38% 12% 16% 9% 25% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Source: Enterprise Strategy Group, Until now, this space has largely been the domain of service providers. However, given the speed and scope of the aforementioned trends, the technology is rapidly expanding into the enterprise as data centers take on a decidedly more service or cloud provider feel to them. ESG expects that INPBs will become far more important in the near future. Indeed, recent ESG research 2 indicates that enterprise data centers are experiencing dramatic changes in traffic volume and complexity, which make it increasingly difficult to effectively use traditional traffic management and monitoring techniques. Those changes include: Data center consolidation. Some 63% of organizations with more than 1,000 employees are actively engaged in or have recently completed data center consolidation, typically reducing the number of data centers by 25% to 50%. And 48% of organizations have implemented multi-tenant facilities to support independent business units, resulting in IT environments that begin to resemble those of service providers. Server virtualization technologies. Virtualization technologies are being almost universally adopted, with deployment of virtual machines (VM) expected to double over the next few years and typical VM densities to increase from 5-10 per physical server to more than 25 VMs per physical server over the next two years. 1 Source: ESG Research Survey, Intelligent Management Aggregation Networks, December Source: ESG Research Report, Data Center Networking Trends, January 2012.
7 Market Report: Intelligent Network Packet Brokers 7 Web application deployment. SOA or web-based applications have been adopted extensively by 24% of large organizations and somewhat by another 60%. Based on multiple x86 server tiers and horizontal scaling, these applications add significantly to server deployment and VM mobility. Geographical distribution. In addition, approximately 40% of organizations are implementing applications over geographically distributed data centers. In ESG s view, this trend presages the need for cloud computing with workloads nimbly utilizing the different data center capacities as performance needs dictate. BYOD/BYO3. IT consumerization and increasing mobility are also affecting campus networks, which are growing in use and complexity as a result of Bring Your Own Device (BYOD) trends or, more accurately, Bring Your Own Three Devices (BYO3) the three referring to smartphones, tablet computers, and laptops. Here the challenge is ensuring the scaling of wireless networks. This increase in the number of mobile devices and associated applications creates additional traffic and complexity to challenge the network operations personnel and network management applications. At some point, existing tools and techniques can no longer cope with business requirements, leading to a condition that ESG terms network discontinuity. At this point, organizations are forced to hire more staff to accommodate the increasingly complex environment and manual collection and correlation tasks that result from deploying a number of different tools. This is just a band-aid, however, not a permanent solution. Most large organizations surveyed by ESG reported that they regularly monitor a large number of hosts, networking devices, applications, and network services (see Figure 4). In fact, nearly half (47%) monitor more than 500 such entities and 11% even monitor in excess of 5,000. This trend also presents organizations with massive storage requirements as all data from the collection points can easily result in hundreds of GBs of management data per week. Large organizations are deploying additional tools and consuming larger numbers of SPAN/mirror ports, leading to problems with performance e.g., dropped packets or the inability of the tools to keep up with throughput or just causing the administrator to run out of available ports. In addition, the time required to provision the additional ports can lead to unacceptable downtime. All of these issues limit visibility into the network. Figure 4. Number of Monitoring Points Approximately how many hosts, networking devices, applications, and network services does your organization monitor regularly (i.e., for network health, performance or security reasons)? (Percent of respondents, N=160) Between 1,001 and 2,500, 9% Greater than 5,000, 11% Between 2,501 and 5,000, 13% Less than 25, 2% Between 26 and 50, 5% Between 51 and 100, 12% Between 101 and 250, 18% Between 501 and 1,000, 14% Between 251 and 500, 18% Source: Enterprise Strategy Group, 2012.
8 Buying Considerations Market Report: Intelligent Network Packet Brokers 8 Vendors providing INPB solutions include Anue (now Ixia), APCON, Gigamon, NetOptics, Netscout (Simena) and VSS Monitoring, and it is probable that more will appear as this market continues to gain acceptance. As the market segment grows, users should address the following issues when considering their purchase options: Full Featured Product: Most vendors offer a range of solutions based on need and environment. In general, it makes sense to look for full featured products with: o o Multiple Ethernet interface speeds (1Gb, 10Gb, expandable to address 40 or 100Gb). o Support for a wide range of analysis tools, including but not limited to: network performance monitoring, application performance management, out-of-band and inline security, and application acceleration. o Forensic capabilities, including time and port stamping. o Load balancing, i.e., the ability to distribute traffic effectively among network monitoring and/or security tools. o Intelligent tool offloading, i.e., the ability to offload many of the core packet processing tasks required, and often performed, by monitoring and security tools (e.g., packet filtering, grooming, fragment reassembly, and deduplication) o In-band or out-of-band access, as required: In-band security puts the security application directly in the flow of traffic. It tends to support a richer set of security features than out-of-band, provides direct visibility into the network traffic, and is relatively easy to install without any significant network reconfiguration. Its disadvantages include required network outages upon installation, potential for traffic delays or disruption in the case of equipment malfunction. Look for inband solutions with bypass technologies, flow-based load-balancing for asymmetric routing and health check capabilities. Out-of-band security places the application outside the flow of traffic, e.g., through a SPAN/mirror port attachment. It is less disruptive to network traffic than in-band and can scale more easily. However, it comes with the downside of some potential delay between detection and correction of a problem (during which the offending traffic continues to flow) and the need for some degree of network reconfiguration upon installation. Seamless Scalability: The product offering should be capable of graceful upgrades and capacity expansion as needs evolve, offering a scalable product architecture that adapts to increases in traffic volume and complexity, and avoids network discontinuity problems. Credibility: References, proof of concept, and other indications of vendor and product maturity should be readily available. Overall Integration: The intelligent network packet broker should be viewed in the context of overall network monitoring and security operations. Whatever product is purchased, it should dovetail with existing operational scenarios. Existing applications or operational procedures should not have to change significantly. Purchasing Model: Given that much of the network scale and growth is driven by the creation of private clouds capable of rapid growth (or contraction), organizations may want to investigate the ability to consume this technology on a pay as you grow model. This may make sense if you are evolving your network from 1GbE to 10 or 40GbE solutions.
9 Market Report: Intelligent Network Packet Brokers 9 Compelling Economics and Agility Network operations teams are typically cost constrained and looking to make more effective use of people, space, and equipment. INPBs have the ability to help them reduce the number of monitoring tools and probes needed, centralize monitoring and management, economize on the use of SPAN/mirror ports, extend the lifecylce of existing tools, and make more effective use of operations personnel. More specifically: INPBs can reduce the number of monitoring tools and probes by connecting to a network location once, but distributing that data to multiple monitoring tools. Because SPAN/mirror ports are limited, organizations need to make the best use of them. INPBs eliminate the need to have to decide what monitoring tool needs to be connected to what device. Intelligently filtering and grooming the data collected from each network location can dramatically reduce the amount of data ingested by the monitoring and security tools, resulting in fewer tools being required. This is especially true in 10Gb network environments where 1Gb monitoring/security tools are deployed. Operations staff can more efficiently manage their environment as there are fewer monitoring screens to view and less manual correlation that needs to be done. Troubleshooting and resolution of problems is accelerated. By having greater visibility into an end-to-end network environment and processing only the required and more granular information coupled with more detailed forensic capabilities like time and port stamping, organizations are able to find and fix smaller problems more proactively, thus dramatically reducing the number of service impacting events. New devices can be easily added. Simply plug in the SPAN/Mirror port to the INPB, adjust the INPB configuration, and begin monitoring the network segment across all relevant monitoring/security tools.
10 The Bigger Truth Market Report: Intelligent Network Packet Brokers 10 Trends toward increasing data center consolidation, VM-to-physical server ratios, web application deployment, networking of mobile devices, use of network monitoring tools, and SPAN/mirror port availability all point to a growing need for intelligent network packet brokers to process, consolidate, and filter monitored traffic and provide increased visibility into the network. Large enterprises and service providers are in the forefront of these trends and many have already deployed INPBs or are planning to do so in the near future. The market drivers described in this report demonstrate the need for INPBs through the network visibility process flow illustrated in Figure 5. Figure 5. Network Visibility Process Flow IT trends drive scale and complexity Network discontinuity impacts network operations Enterprises deploy more network management and security tools Network management and security tools need network visibility Visibility requirements lead to greater use of SPAN/mirror ports and taps Greater use of SPAN/mirror ports and taps leads to scaling/visibility issues INPB address scaling/visibilty issues with SPAN ports and taps and enable increase management tool capacity Source: Enterprise Strategy Group, Organizations looking to purchase INPBs need to evaluate them in terms of the available features i.e., support for existing network monitoring/security tools, the desired type of security data flow, appropriate interface speeds as well as speed and media conversion support and necessary filtering, forwarding, and load balancing capabilities the ability to upgrade and scale as load and complexity increases, the credibility of the vendor and product, and the ability to fit seamlessly (or nearly so) into existing operations. It is ESG s belief that the INPB market will continue to grow into a best practices adoption in large scale data centers and networks. As more organizations consolidate data centers and build out increasingly larger and more complex environments, the existing players, including Anue, APCON, Gigamon, NetOptics, and VSS Monitoring, will experience considerable opportunity for growth. Earlier this year, ESG predicted consolidation in this market and to date the industry has witnessed the acquisition of Anue, Simena and VSS Monitoring by Ixia, NetScout and Danaher respectively. We expect that this market will continue to be hot as larger companies look to capitalize on opportunities in this space.
11 20 Asylum Street Milford, MA Tel: Fax:
Product Brief. Overview. Analysis
Product Brief NetScout Expands ngenius Monitoring Switch Portfolio Date: January 2013 Author: Bob Laliberte, Senior Analyst and Perry Laberis, Senior Research Associate Abstract: NetScout has announced
More informationHow To Understand The Needs Of The Network
White Paper The Modern Network Monitoring Mandate By Bob Laliberte, Senior Analyst April 2014 This ESG White Paper was commissioned by Emulex and is distributed under license from ESG. White Paper: The
More informationWhite. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments.
White Paper The Rise of Network Functions Virtualization Implications for I/O Strategies in Service Provider Environments By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned
More informationEnhancing Cisco Networks with Gigamon // White Paper
Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,
More informationWhitepaper Unified Visibility Fabric A New Approach to Visibility
Whitepaper Unified Visibility Fabric A New Approach to Visibility Trends Networks continually change and evolve. Many trends such as virtualization and cloud computing have been ongoing for some time.
More informationMonitoring, Managing, and Securing SDN Deployments // White Paper
Introduction Mobility, cloud, and consumerization of IT are all major themes playing out in the IT industry today all of which are fundamentally changing the way we think about managing IT infrastructure.
More informationWhite. Paper. The Converged Network. November, 2009. By Bob Laliberte. 2009, Enterprise Strategy Group, Inc. All Rights Reserved
White Paper The Converged Network By Bob Laliberte November, 2009 2009, Enterprise Strategy Group, Inc. All Rights Reserved White Paper: The Converged Network 2 Contents Introduction... 3 What s Needed...
More informationVSS - Game Changing Technology
VSS - Game Changing Technology Dean Beaver Vice President of Sales Danaher Business Platforms Test & Measurement $3.0B Environmental $3.3B Dental $2.1B Life Sciences & Diagnostics $6.8B Industrial Technologies
More informationThis ESG White Paper was commissioned by Extreme Networks and is distributed under license from ESG.
White Paper Network Solutions for Modern Data Centers By Bob Laliberte, Senior Analyst October 2013 This ESG White Paper was commissioned by Extreme Networks and is distributed under license from ESG.
More informationGetting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions
White Paper Getting on the Road to SDN Attacking DMZ Security Issues with Advanced Networking Solutions By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by NEC and is distributed
More informationOpen SDN for Network Visibility
SOLUTION GUIDE Open SDN for Network Visibility Simplifying large scale network monitoring systems with Big Tap 1 This solution guide describes how Big Tap, a network monitoring application from Big Switch
More informationLive traffic feeds are increasingly being used by the modern enterprise to gain visibility for security and operations management
Overview The transition from an age of systems of record to an age of systems of engagement has led to profound changes in the way information is used in an organization. These changes have now become
More informationGetting on the Path to SDN:
White Paper Getting on the Path to SDN: Leveraging Juniper Networks Virtual Chassis Technology on Juniper EX Series Switches to Improve SDN Adoption in Your Network By Bob Laliberte, Senior Analyst September
More informationWHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business
WHITE PAPER Data Center Fabrics Why the Right Choice is so Important to Your Business Introduction Data center fabrics are emerging as the preferred architecture for next-generation virtualized data centers,
More informationWhite Paper. Simplify Network Monitoring
White Paper Simplify Network Monitoring 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com 915-6599-01 Rev. B, June 2013 2 Table of Contents Executive Summary...
More informationEfficient Network Monitoring Access
Abstract Organizations that rely on the reliability, security, and performance of their networks can no longer afford to wait for outages or security breaches to occur before installing test access points.
More informationWhite. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications
White Paper The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications By Bob Laliberte, Senior Analyst November 2013 This ESG White Paper
More informationEnabling Visibility for Wireshark across Physical, Virtual and SDN. Patrick Leong, CTO Gigamon
Enabling Visibility for Wireshark across Physical, Virtual and SDN Patrick Leong, CTO Gigamon 1 Agenda A review of the network then and now Challenges in network monitoring and security Introduction to
More informationPacket Optimization & Visibility with Wireshark and PCAPs. Gordon Beith Director of Product Management VSS Monitoring
Packet Optimization & Visibility with Wireshark and PCAPs Gordon Beith Director of Product Management VSS Monitoring 1 Market Trends - Innovation MOBILE LTE INFRASTRUCTURE COMPLEXITY BIG DATA BUSINESS
More informationBest Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive
White Paper Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com
More informationActive Visibility for Multi-Tiered Security // Solutions Overview
Introduction Cyber threats are becoming ever more sophisticated and prevalent. Traditional security approaches such as firewalls and anti-virus protection are not equipped to mitigate and manage modern
More informationOptimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
More informationOut-of-Band Security Solution // Solutions Overview
Introduction A few years ago, IT managed security using the hard outer shell approach and established walls where traffic entered and departed the network assuming that the risks originated outside of
More informationNetwork Monitoring Fabrics Are Key to Scaling IT
Network Monitoring Fabrics Are Key to Scaling IT September 2014 Prepared by: Zeus Kerravala Network Monitoring Fabrics Are Key to Scaling IT by Zeus Kerravala September 2014 º º º º º º º º º º º º º º
More informationAffording the Upgrade to Higher Speed & Density
Affording the Upgrade to Higher Speed & Density Ethernet Summit February 22, 2012 Agenda VSS Overview Technology Q&A 2 Corporate Overview World Leader in Network Intelligence Optimization Deployed in 80%
More informationIn-Band Security Solution // Solutions Overview
Introduction The strategy and architecture to establish and maintain infrastructure and network security is in a rapid state of change new tools, greater intelligence and managed services are being used
More informationSolving Monitoring Challenges in the Data Center
Solving Monitoring Challenges in the Data Center How a network monitoring switch helps IT teams stay proactive White Paper IT teams are under big pressure to improve the performance and security of corporate
More informationARISTA WHITE PAPER Cloudifying Data Center Monitoring
ARISTA WHITE PAPER Cloudifying Data Center Monitoring The shift in the approach to networking driven by the emergence of cloud networks, rapidly evolving merchant silicon system on chip (SoC) and purpose
More informationWhite. Paper. Optimizing the Virtual Data Center with Data Path Pools. EMC PowerPath/VE. February, 2011
White Paper Optimizing the Virtual Data Center with Data Path Pools EMC PowerPath/VE By Bob Laliberte February, 2011 This ESG White Paper was commissioned by EMC and is distributed under license from ESG.
More informationSecure Access Complete Visibility
PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE Intrusion Detection Switch TAP Data Recorder VoIP Analyzer Switch Secure Access Complete Visibility Web
More informationAccelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters Date: June 2016 Author: Jack Poller, Senior
More informationWhite. Paper. Building Next Generation Data Centers. Implications for I/O Strategies. August 2014
White Paper Building Next Generation Data Centers Implications for I/O Strategies By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned by Emulex and is distributed under license
More informationCloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES
Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES Meeting the 7 Challenges in Testing and Performance Management Introduction With advent of the cloud paradigm, organizations are transitioning
More informationVXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure
W h i t e p a p e r VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure Table of Contents Executive Summary.... 3 Cloud Computing Growth.... 3 Cloud Computing Infrastructure
More informationNetwork Packet Monitoring Optimizations in Data Centre
March 2014, HAPPIEST MINDS TECHNOLOGIES Network Packet Monitoring Optimizations in Data Centre Author Dharmraj B Jhatakia 1 Copyright Information This document is an exclusive property of Happiest Minds
More informationCisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments
Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments What You Will Learn Deploying network services in virtual data centers is extremely challenging. Traditionally, such Layer
More informationVirtualized Security: The Next Generation of Consolidation
Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the
More informationEnd-to-End Visibility
End-to-End Visibility for Your Cisco Infrastructure SOLUTIONS GUIDE GIGAMON TABLE OF Contents Introduction... 1 Overview of Cisco Technologies... 1.Monitoring Cisco Application Centric Infrastructure (ACI)...
More informationFabrics that Fit Matching the Network to Today s Data Center Traffic Conditions
Sponsored by Fabrics that Fit Matching the Network to Today s Data Center Traffic Conditions In This Paper Traditional network infrastructures are often costly and hard to administer Today s workloads
More informationVisibility into the Cloud and Virtualized Data Center // White Paper
Executive Summary IT organizations today face unprecedented challenges. Internal business customers continue to demand rapid delivery of innovative services to respond to outside threats and opportunities.
More informationTraffic Visibility Fabric for Revenue and Differentiation in the Cloud Provider Market // White Paper
Traffic Visibility Fabric for Revenue and Differentiation in the Cloud Market Cloud provider landscape and challenge As a Cloud Service (CSP) there are many services that you can offer. Based on your core
More informationThe Purview Solution Integration With Splunk
The Purview Solution Integration With Splunk Integrating Application Management and Business Analytics With Other IT Management Systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview Integration
More informationVisibility in the Modern Data Center // Solution Overview
Introduction The past two decades have seen dramatic shifts in data center design. As application complexity grew, server sprawl pushed out the walls of the data center, expanding both the physical square
More informationPervasive Security Enabled by Next Generation Monitoring Fabric
Pervasive Security Enabled by Next Generation Monitoring Fabric By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Big Switch Networks Executive Summary Enterprise networks have become ever
More informationREMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION
REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network
More informationTotal year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80%
Research Brief 2012 Networking Spending Trends Date: March 2012 Author: Jon Oltsik, Senior Principal Analyst; Bob Laliberte, Senior Analyst; and Bill Lundell, Senior Research Analyst Abstract: According
More informationApplication Performance Management: New Challenges Demand a New Approach
Application Performance Management: New Challenges Demand a New Approach Introduction Historically IT management has focused on individual technology domains; e.g., LAN, WAN, servers, firewalls, operating
More informationWhite. Paper. Closing the Storage Virtualization Gap with EMC Isilon. May, 2011
White Paper Closing the Storage Virtualization Gap with EMC Isilon By Terri McClure May, 2011 This ESG White Paper was commissioned by Isilon and is distributed under license from ESG. 2011, Enterprise
More informationMERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable
MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable Version 1.0, August 2009 This white paper discusses how a cloud-based architecture makes wireless LAN easier and more affordable for organizations
More informationPluribus Netvisor Solution Brief
Pluribus Netvisor Solution Brief Freedom Architecture Overview The Pluribus Freedom architecture presents a unique combination of switch, compute, storage and bare- metal hypervisor OS technologies, and
More informationGecontroleerde grip op uw netwerk security en netwerk beheer
Gecontroleerde grip op uw netwerk security en netwerk beheer 19 11-2015 Marcel Golverdingen Who is Tucana en what are our activities? Pan-European supplier with offices in Belgium, France, Germany and
More informationData Center Networking Designing Today s Data Center
Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability
More informationOvercoming The Blind Spots in Your Virtualized Data Center
Overcoming The Blind Spots in Your Virtualized Data Center Matt Percival Sales Manager Northern Europe Stand C4 2014 Ixia Inc. Outline Virtualization Overview Network Monitoring Basics Implementing a Monitoring
More informationWhite Paper. Optimizing Visibility, Control and Performance of Network Traffic
White Paper Optimizing Visibility, Control and Performance of Network Traffic 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com 915-6598-01 Rev. B, June 2013 2
More informationTop 10 Reasons Enterprises are Moving Security to the Cloud
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
More informationI/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain
More informationNetwork Performance Channel
Network Performance Channel Net Optics Products Overview MIHAJLO PRERAD, Network Performance Channel GmbH Who we are Network Performance Channel GmbH Leading global value added distributor specialized
More informationHow Solace Message Routers Reduce the Cost of IT Infrastructure
How Message Routers Reduce the Cost of IT Infrastructure This paper explains how s innovative solution can significantly reduce the total cost of ownership of your messaging middleware platform and IT
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK SOFTWARE DEFINED NETWORKING A NEW ARCHETYPE PARNAL P. PAWADE 1, ANIKET A. KATHALKAR
More informationRedefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance
White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,
More informationCisco NetFlow Generation Appliance (NGA) 3140
Q&A Cisco NetFlow Generation Appliance (NGA) 3140 General Overview Q. What is Cisco NetFlow Generation Appliance (NGA) 3140? A. Cisco NetFlow Generation Appliance 3140 is purpose-built, high-performance
More informationActive Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA
Active Visibility for Multi-Tiered Security Juergen Kirchmann Director Enterprise Sales EMEA Billions are Spent on Security Annually $18.4B SPENT BY ENTERPRISES WORLD-WIDE ON SECURITY IN 2014 ENTERPRISE
More informationRadware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical
Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation
More informationCisco Unified Data Center
Solution Overview Cisco Unified Data Center Simplified, Efficient, and Agile Infrastructure for the Data Center What You Will Learn The data center is critical to the way that IT generates and delivers
More informationProduct Line Strategy Network Recorder and Traffic Visibility Market: A Case Study
2013 Frost & Sullivan 1 We Accelerate Growth Product Line Strategy Award Network Recorder and Traffic Visibility Global, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th
More informationSolving I/O Bottlenecks to Enable Superior Cloud Efficiency
WHITE PAPER Solving I/O Bottlenecks to Enable Superior Cloud Efficiency Overview...1 Mellanox I/O Virtualization Features and Benefits...2 Summary...6 Overview We already have 8 or even 16 cores on one
More informationOverview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A
Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A What is NetFlow? Network protocol originally developed by Cisco
More informationNetwork Monitoring and Security in Hybrid Networks. Jason Echols
Network Monitoring and Security in Hybrid Networks Jason Echols The MOST TRUSTED names in networking trust Test Security Visibility Enterprises trust IXIA to: Assess vendor equipment and applications Improve
More informationHow To Connect Virtual Fibre Channel To A Virtual Box On A Hyperv Virtual Machine
Virtual Fibre Channel for Hyper-V Virtual Fibre Channel for Hyper-V, a new technology available in Microsoft Windows Server 2012, allows direct access to Fibre Channel (FC) shared storage by multiple guest
More informationScalable Network Monitoring with SDN-Based Ethernet Fabrics
Scalable Network Monitoring with SDN-Based Ethernet Fabrics Prashant Gandhi VP, Product Management & Strategy Big Switch Networks 1 Agenda Trends in Network Monitoring SDN s Role in Network Monitoring
More informationMicrosoft Private Cloud Fast Track
Microsoft Private Cloud Fast Track Microsoft Private Cloud Fast Track is a reference architecture designed to help build private clouds by combining Microsoft software with Nutanix technology to decrease
More informationScalable Approaches for Multitenant Cloud Data Centers
WHITE PAPER www.brocade.com DATA CENTER Scalable Approaches for Multitenant Cloud Data Centers Brocade VCS Fabric technology is the ideal Ethernet infrastructure for cloud computing. It is manageable,
More informationSoftware-Defined Networks Powered by VellOS
WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible
More informationWhy I/O Is Strategic Software- defined Networking Date: April 2013 Author: Bob Laliberte, Senior Analyst
Book Project Why I/O Is Strategic Software- defined Networking Date: April 2013 Author: Bob Laliberte, Senior Analyst What Is Software- defined Networking? The emergence of software- defined networking
More informationThe Promise and the Reality of a Software Defined Data Center
The Promise and the Reality of a Software Defined Data Center Authored by Sponsored by Introduction The traditional IT operational model is highly manual and very hardware centric. As a result, IT infrastructure
More informationWHITE PAPER. Addressing Monitoring, Access, and Control Challenges in a Virtualized Environment
WHITE PAPER Addressing Monitoring, Access, and Control Challenges in a Virtualized Environment www.ixiacom.com 915-6892-01 Rev. A, July 2014 2 Table of Contents The Challenge of the Virtual Environment...
More informationEvolution from the Traditional Data Center to Exalogic: An Operational Perspective
An Oracle White Paper July, 2012 Evolution from the Traditional Data Center to Exalogic: 1 Disclaimer The following is intended to outline our general product capabilities. It is intended for information
More informationSoftware Defined Networking (SDN)
Software Defined Networking (SDN) Your Route to Agility, Accuracy and Availability Bob Shaw, President and CEO, Net Optics, Inc. About the Author Bob Shaw, President and CEO, Net Optics Inc. As President
More informationBrocade One Data Center Cloud-Optimized Networks
POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c
More informationI D C M A R K E T S P O T L I G H T
I D C M A R K E T S P O T L I G H T E n t r y- L e ve l E n t e r p r ise Storage: Stepping Up t o B i g C h a l lenges October 2012 Adapted from The Appliance-ization of the Datacenter and Its Impact
More informationSecuring the Intelligent Network
WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.
More informationCENTER I S Y O U R D ATA
I S Y O U R D ATA CENTER R E A DY F O R S D N? C R I T I C A L D ATA C E N T E R C O N S I D E R AT I O N S FOR SOFT WARE-DEFINED NET WORKING Data center operators are being challenged to be more agile
More informationESG Brief. Modern Data Centers: Massive Scale and Complexity. Data Center Networking Discontinuity
ESG Brief IBM and NEC Bring SDN/OpenFlow to Enterprise Data Center Networks Date: January, 2012 Author: Jon Oltsik, Senior Principal Analyst, and Bob Laliberte, Senior Analyst Abstract: Enterprise data
More informationNVGRE Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure
W h i t e p a p e r NVGRE Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure Table of contents Executive Summary.... 3 Cloud Computing Growth.... 3 Cloud Computing Infrastructure
More informationSelecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events
Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events Often, the only way to get to the root cause of unwelcome or intermittent events that occur on
More informationBusiness Case for Brocade Network Analytics for Mobile Network Operators
Business Case for Brocade Network Analytics for Mobile Network Operators Executive Summary Mobile operators are experiencing large cost increases as they build out their networks to keep pace with rising
More informationSDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility
WHITEPAPER SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility Copyright 2014 Meru Networks, Inc. All rights reserved. Table of Contents Executive summary... 3 Introduction...
More informationJunos Space Virtual Control
Proiduct Overview The proliferation of virtual switches in the data center has presented data center operators with a significant challenge namely, how to manage these virtual network elements in conjunction
More informationIntelligent Data Access Networking TM
Gigamon TM delivers intelligent data access solutions to enhance monitoring of service provider and enterprise data centers. The company s world-renowned GigaVUE orange boxes aggregate, filter and replicate
More informationEconomic Value Validation. June 2 0 1 3
Economic Value Validation Riverb ed Pe rf ormance Management - Cascade June 2 0 1 3 EVV REPORT: Riverbed Cascade 2 Contents List of Figures... 2 List of Tables... 2 Market Overview... 3 Riverbed Cascade:
More informationThe Next Phase of Datacenter Network Resource Management and Automation March 2011
I D C T E C H N O L O G Y S P O T L I G H T The Next Phase of Datacenter Network Resource Management and Automation March 2011 Adapted from Worldwide Datacenter Network 2010 2015 Forecast and Analysis
More informationEnterprise Buyer Guide
Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight
More informationKey Strategies for Long-Term Success
WHITE PAPER Security in the Next- Generation Data Center Key Strategies for Long-Term Success Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................
More informationFive Steps to Building Visibility and Security Into Your Network
Five Steps to Building Visibility and Security Into Your Network You can t secure what you don t know about Contents Introduction.........................................................1 Step 1: Don t
More informationThe Impact of Cloud Computing to Data Network Cabling White Paper
Into the Clouds A Look into What Cloud Computing is and How it May Affect Data Network Cabling White Paper June 2010 Contents BACKGROUND 3 IMPACT ON IT 4 SCALABILITY/FLEXIBILITY/ADAPTABILITY/AGILITY -
More informationI D C M A R K E T S P O T L I G H T
I D C M A R K E T S P O T L I G H T The New IP: Building the Foundation of Datacenter Network Automation March 2015 Adapted from Worldwide Enterprise Communications and Datacenter Network Infrastructure
More informationCOMMAND YOUR DATA CENTER
Best Practices Guide I Data Center COMMAND YOUR DATA CENTER How to Thrive In the Changing Landscape The demands to virtualize, scale, and implement new applications while conducting security, forensics,
More informationTIME TO RETHINK PERFORMANCE MONITORING
TIME TO RETHINK PERFORMANCE MONITORING New requirements for application awareness and support for unified communications are challenging performance monitoring appliance vendors to reconsider their approach.
More information