Market Update Intelligent Network Packet Brokers

Size: px
Start display at page:

Download "Market Update Intelligent Network Packet Brokers"

Transcription

1 Market Update Report Intelligent Network Packet Brokers Explaining a New Network Infrastructure Category By Bob Laliberte, Senior Analyst July , The Enterprise Strategy Group, Inc. All Rights Reserved.

2 Market Report: Intelligent Network Packet Brokers 2 Contents Managing Networks at Scale is Becoming More Difficult... 3 Need to Take a Different Approach... 4 Market Applicability... 6 Buying Considerations... 8 Compelling Economics and Agility... 9 The Bigger Truth... 10

3 Market Report: Intelligent Network Packet Brokers 3 Managing Networks at Scale is Becoming More Difficult Enterprise organizations are dealing with several IT trends that have a dramatic impact on the character and volume of network traffic. On the infrastructure side, enterprise organizations are consolidating data centers, with those new, consolidated data centers required to service multi-tenant environments for different business units. This results in larger and more complex data center environments. At the same time, organizations continue to increase their use of server virtualization technologies, driving up the ratio of virtual machines (VMs) to physical hosts and subsequently the demand for increased bandwidth, resulting in many organizations upgrading to 10Gb networks. At the same time, applications are growing more sophisticated, leveraging richer content, utilizing service-oriented architectures, and becoming mobile device-accessible. This places additional strain on the organization to provide more granular security, accommodate bursty communications protocols, and react quickly to a highly dynamic environment. Large organizations are attempting to address this evolving set of performance, security, and operational requirements but it is becoming difficult for existing network monitoring and security tools to keep up with these trends and provide adequate coverage. Figure 1 illustrates the treadmill that many enterprise organizations face. Figure 1. Existing Network Tools Scenario Source: Enterprise Strategy Group, In the scenario illustrated in Figure 1, organizations connected security and monitoring tools directly to SPAN/mirror ports and external taps, but this approach is beginning to reach its limits of scalability, as the number of SPAN ports is limited and simply adding more security and monitoring tools to provide coverage over a rapidly expanding network is costly and only serves to increase the complexity. Plus the tools themselves are rapidly

4 Market Report: Intelligent Network Packet Brokers 4 running out of capacity due to increased traffic volumes and the need to process unnecessary packets. A better approach is needed with more intelligence that provides the ability to aggregate or broker actionable network traffic destined for monitoring or security tools. To that end, a number of enterprise organizations are beginning to adopt a particular approach to address these issues. Need to Take a Different Approach The technology, while proven in large scale service providers, is still in need of a commonly accepted industry category. It has gone by several monikers matrix switch, network monitoring switch, network intelligence optimization fabric, and intelligent management aggregation networking (iman) and most recently network packet broker (NPB). In previous ESG publications, we have used iman but Google searches for that term have a tendency to turn up pictures of the Somali fashion model, actress, and businesswoman (and wife of David Bowie) of that same name. Appealing as that may be, it contributes little to an understanding of the effective management of a network. Whatever it ends up being consistently called (in this report, we ve opted for intelligent network packet brokers or INPB), the technology addresses the aforementioned problems by providing an overlay management network. The technology connects network monitoring and security tools to the underlying network, usually via SPAN/mirror ports or network taps, but it can also be placed in-band (typically for security applications). This technology captures network behavior, provides packet processing services (e.g., filtering/grooming/packet fragment reassembly and de-duplication) for tools, and distributes actionable data to monitoring and security tools such as application performance management (APM), network performance management (NPM), intrusion detection/prevention (IDS/IPS), and advanced malware protection systems. As data centers and networks continue to scale, it will be increasingly critical for organizations to have a complete view of their network environments. Intelligent Network Packet Brokers enable organizations to leverage existing network monitoring and security tools to manage larger and more complex environments more effectively and efficiently (See Figure 2).

5 Market Report: Intelligent Network Packet Brokers 5 Figure 2. Technology to Improve Management Source: Enterprise Strategy Group, ESG believes that regardless of what it is called, intelligent is an important modifier to include in its designation. The intelligent network packet broker (INPB) does not merely shuttle packets from here to there. Rather it provides a layer of intelligence much in the same way an application delivery controller provides more than mere load balancing for web servers. The INPB extracts only the necessary information e.g., stripping out unwanted packets or providing time and port stamps for forensic work accelerating network and security intelligence to facilitate smart decisions on the part of the network, security, and monitoring tools. These systems when deployed strategically across the network, also allow for a much more accurate attribution when performing incident analysis and response activities, particularly in environments where analyzing big data is either the norm or the strategic direction going forward. Software Defined Networking or SDN also holds some promise in enabling this technology but it is still very new. Essentially, in an SDN-enabled network, services could be centralized leveraging network APIs or a centralized controller that has access to all the network devices. So an INPB technology could be used to connect via APIs or into a controller and collect all the requisite information to send to management tools. As mentioned previously, this is a future technology, however, worth watching to see whether it develops as promised. The reality today is that organizations need solutions to help them regain visibility and control now.

6 Market Applicability Market Report: Intelligent Network Packet Brokers 6 There are a number of tools that organizations are interested in using to better monitor their networks. Previously conducted ESG research 1 revealed that the tools most commonly used by organizations are performance and security monitoring devices (see Figure 3). Figure 3. Use of Network Monitoring or Security Tools Is your organization using any of the following types of network monitoring and/or security tools that require access to the network? (Percent of respondents, N=160) Currently use Do not use, but we plan to do so Do not use, but we are interested in doing so Do not use, and we have no plans or interest in doing so Don't know Network performance monitoring 86% 9% 4% 1% IPS/IDS (intrusion prevention software/intrusion detection software) 69% 16% 14% 1% Application performance 61% 25% 13% 1% Packet capture/network 58% 22% 16% 4% 1% Other types of tools 38% 12% 16% 9% 25% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Source: Enterprise Strategy Group, Until now, this space has largely been the domain of service providers. However, given the speed and scope of the aforementioned trends, the technology is rapidly expanding into the enterprise as data centers take on a decidedly more service or cloud provider feel to them. ESG expects that INPBs will become far more important in the near future. Indeed, recent ESG research 2 indicates that enterprise data centers are experiencing dramatic changes in traffic volume and complexity, which make it increasingly difficult to effectively use traditional traffic management and monitoring techniques. Those changes include: Data center consolidation. Some 63% of organizations with more than 1,000 employees are actively engaged in or have recently completed data center consolidation, typically reducing the number of data centers by 25% to 50%. And 48% of organizations have implemented multi-tenant facilities to support independent business units, resulting in IT environments that begin to resemble those of service providers. Server virtualization technologies. Virtualization technologies are being almost universally adopted, with deployment of virtual machines (VM) expected to double over the next few years and typical VM densities to increase from 5-10 per physical server to more than 25 VMs per physical server over the next two years. 1 Source: ESG Research Survey, Intelligent Management Aggregation Networks, December Source: ESG Research Report, Data Center Networking Trends, January 2012.

7 Market Report: Intelligent Network Packet Brokers 7 Web application deployment. SOA or web-based applications have been adopted extensively by 24% of large organizations and somewhat by another 60%. Based on multiple x86 server tiers and horizontal scaling, these applications add significantly to server deployment and VM mobility. Geographical distribution. In addition, approximately 40% of organizations are implementing applications over geographically distributed data centers. In ESG s view, this trend presages the need for cloud computing with workloads nimbly utilizing the different data center capacities as performance needs dictate. BYOD/BYO3. IT consumerization and increasing mobility are also affecting campus networks, which are growing in use and complexity as a result of Bring Your Own Device (BYOD) trends or, more accurately, Bring Your Own Three Devices (BYO3) the three referring to smartphones, tablet computers, and laptops. Here the challenge is ensuring the scaling of wireless networks. This increase in the number of mobile devices and associated applications creates additional traffic and complexity to challenge the network operations personnel and network management applications. At some point, existing tools and techniques can no longer cope with business requirements, leading to a condition that ESG terms network discontinuity. At this point, organizations are forced to hire more staff to accommodate the increasingly complex environment and manual collection and correlation tasks that result from deploying a number of different tools. This is just a band-aid, however, not a permanent solution. Most large organizations surveyed by ESG reported that they regularly monitor a large number of hosts, networking devices, applications, and network services (see Figure 4). In fact, nearly half (47%) monitor more than 500 such entities and 11% even monitor in excess of 5,000. This trend also presents organizations with massive storage requirements as all data from the collection points can easily result in hundreds of GBs of management data per week. Large organizations are deploying additional tools and consuming larger numbers of SPAN/mirror ports, leading to problems with performance e.g., dropped packets or the inability of the tools to keep up with throughput or just causing the administrator to run out of available ports. In addition, the time required to provision the additional ports can lead to unacceptable downtime. All of these issues limit visibility into the network. Figure 4. Number of Monitoring Points Approximately how many hosts, networking devices, applications, and network services does your organization monitor regularly (i.e., for network health, performance or security reasons)? (Percent of respondents, N=160) Between 1,001 and 2,500, 9% Greater than 5,000, 11% Between 2,501 and 5,000, 13% Less than 25, 2% Between 26 and 50, 5% Between 51 and 100, 12% Between 101 and 250, 18% Between 501 and 1,000, 14% Between 251 and 500, 18% Source: Enterprise Strategy Group, 2012.

8 Buying Considerations Market Report: Intelligent Network Packet Brokers 8 Vendors providing INPB solutions include Anue (now Ixia), APCON, Gigamon, NetOptics, Netscout (Simena) and VSS Monitoring, and it is probable that more will appear as this market continues to gain acceptance. As the market segment grows, users should address the following issues when considering their purchase options: Full Featured Product: Most vendors offer a range of solutions based on need and environment. In general, it makes sense to look for full featured products with: o o Multiple Ethernet interface speeds (1Gb, 10Gb, expandable to address 40 or 100Gb). o Support for a wide range of analysis tools, including but not limited to: network performance monitoring, application performance management, out-of-band and inline security, and application acceleration. o Forensic capabilities, including time and port stamping. o Load balancing, i.e., the ability to distribute traffic effectively among network monitoring and/or security tools. o Intelligent tool offloading, i.e., the ability to offload many of the core packet processing tasks required, and often performed, by monitoring and security tools (e.g., packet filtering, grooming, fragment reassembly, and deduplication) o In-band or out-of-band access, as required: In-band security puts the security application directly in the flow of traffic. It tends to support a richer set of security features than out-of-band, provides direct visibility into the network traffic, and is relatively easy to install without any significant network reconfiguration. Its disadvantages include required network outages upon installation, potential for traffic delays or disruption in the case of equipment malfunction. Look for inband solutions with bypass technologies, flow-based load-balancing for asymmetric routing and health check capabilities. Out-of-band security places the application outside the flow of traffic, e.g., through a SPAN/mirror port attachment. It is less disruptive to network traffic than in-band and can scale more easily. However, it comes with the downside of some potential delay between detection and correction of a problem (during which the offending traffic continues to flow) and the need for some degree of network reconfiguration upon installation. Seamless Scalability: The product offering should be capable of graceful upgrades and capacity expansion as needs evolve, offering a scalable product architecture that adapts to increases in traffic volume and complexity, and avoids network discontinuity problems. Credibility: References, proof of concept, and other indications of vendor and product maturity should be readily available. Overall Integration: The intelligent network packet broker should be viewed in the context of overall network monitoring and security operations. Whatever product is purchased, it should dovetail with existing operational scenarios. Existing applications or operational procedures should not have to change significantly. Purchasing Model: Given that much of the network scale and growth is driven by the creation of private clouds capable of rapid growth (or contraction), organizations may want to investigate the ability to consume this technology on a pay as you grow model. This may make sense if you are evolving your network from 1GbE to 10 or 40GbE solutions.

9 Market Report: Intelligent Network Packet Brokers 9 Compelling Economics and Agility Network operations teams are typically cost constrained and looking to make more effective use of people, space, and equipment. INPBs have the ability to help them reduce the number of monitoring tools and probes needed, centralize monitoring and management, economize on the use of SPAN/mirror ports, extend the lifecylce of existing tools, and make more effective use of operations personnel. More specifically: INPBs can reduce the number of monitoring tools and probes by connecting to a network location once, but distributing that data to multiple monitoring tools. Because SPAN/mirror ports are limited, organizations need to make the best use of them. INPBs eliminate the need to have to decide what monitoring tool needs to be connected to what device. Intelligently filtering and grooming the data collected from each network location can dramatically reduce the amount of data ingested by the monitoring and security tools, resulting in fewer tools being required. This is especially true in 10Gb network environments where 1Gb monitoring/security tools are deployed. Operations staff can more efficiently manage their environment as there are fewer monitoring screens to view and less manual correlation that needs to be done. Troubleshooting and resolution of problems is accelerated. By having greater visibility into an end-to-end network environment and processing only the required and more granular information coupled with more detailed forensic capabilities like time and port stamping, organizations are able to find and fix smaller problems more proactively, thus dramatically reducing the number of service impacting events. New devices can be easily added. Simply plug in the SPAN/Mirror port to the INPB, adjust the INPB configuration, and begin monitoring the network segment across all relevant monitoring/security tools.

10 The Bigger Truth Market Report: Intelligent Network Packet Brokers 10 Trends toward increasing data center consolidation, VM-to-physical server ratios, web application deployment, networking of mobile devices, use of network monitoring tools, and SPAN/mirror port availability all point to a growing need for intelligent network packet brokers to process, consolidate, and filter monitored traffic and provide increased visibility into the network. Large enterprises and service providers are in the forefront of these trends and many have already deployed INPBs or are planning to do so in the near future. The market drivers described in this report demonstrate the need for INPBs through the network visibility process flow illustrated in Figure 5. Figure 5. Network Visibility Process Flow IT trends drive scale and complexity Network discontinuity impacts network operations Enterprises deploy more network management and security tools Network management and security tools need network visibility Visibility requirements lead to greater use of SPAN/mirror ports and taps Greater use of SPAN/mirror ports and taps leads to scaling/visibility issues INPB address scaling/visibilty issues with SPAN ports and taps and enable increase management tool capacity Source: Enterprise Strategy Group, Organizations looking to purchase INPBs need to evaluate them in terms of the available features i.e., support for existing network monitoring/security tools, the desired type of security data flow, appropriate interface speeds as well as speed and media conversion support and necessary filtering, forwarding, and load balancing capabilities the ability to upgrade and scale as load and complexity increases, the credibility of the vendor and product, and the ability to fit seamlessly (or nearly so) into existing operations. It is ESG s belief that the INPB market will continue to grow into a best practices adoption in large scale data centers and networks. As more organizations consolidate data centers and build out increasingly larger and more complex environments, the existing players, including Anue, APCON, Gigamon, NetOptics, and VSS Monitoring, will experience considerable opportunity for growth. Earlier this year, ESG predicted consolidation in this market and to date the industry has witnessed the acquisition of Anue, Simena and VSS Monitoring by Ixia, NetScout and Danaher respectively. We expect that this market will continue to be hot as larger companies look to capitalize on opportunities in this space.

11 20 Asylum Street Milford, MA Tel: Fax:

Product Brief. Overview. Analysis

Product Brief. Overview. Analysis Product Brief NetScout Expands ngenius Monitoring Switch Portfolio Date: January 2013 Author: Bob Laliberte, Senior Analyst and Perry Laberis, Senior Research Associate Abstract: NetScout has announced

More information

How To Understand The Needs Of The Network

How To Understand The Needs Of The Network White Paper The Modern Network Monitoring Mandate By Bob Laliberte, Senior Analyst April 2014 This ESG White Paper was commissioned by Emulex and is distributed under license from ESG. White Paper: The

More information

White. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments.

White. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments. White Paper The Rise of Network Functions Virtualization Implications for I/O Strategies in Service Provider Environments By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned

More information

Enhancing Cisco Networks with Gigamon // White Paper

Enhancing Cisco Networks with Gigamon // White Paper Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,

More information

Whitepaper Unified Visibility Fabric A New Approach to Visibility

Whitepaper Unified Visibility Fabric A New Approach to Visibility Whitepaper Unified Visibility Fabric A New Approach to Visibility Trends Networks continually change and evolve. Many trends such as virtualization and cloud computing have been ongoing for some time.

More information

Monitoring, Managing, and Securing SDN Deployments // White Paper

Monitoring, Managing, and Securing SDN Deployments // White Paper Introduction Mobility, cloud, and consumerization of IT are all major themes playing out in the IT industry today all of which are fundamentally changing the way we think about managing IT infrastructure.

More information

White. Paper. The Converged Network. November, 2009. By Bob Laliberte. 2009, Enterprise Strategy Group, Inc. All Rights Reserved

White. Paper. The Converged Network. November, 2009. By Bob Laliberte. 2009, Enterprise Strategy Group, Inc. All Rights Reserved White Paper The Converged Network By Bob Laliberte November, 2009 2009, Enterprise Strategy Group, Inc. All Rights Reserved White Paper: The Converged Network 2 Contents Introduction... 3 What s Needed...

More information

VSS - Game Changing Technology

VSS - Game Changing Technology VSS - Game Changing Technology Dean Beaver Vice President of Sales Danaher Business Platforms Test & Measurement $3.0B Environmental $3.3B Dental $2.1B Life Sciences & Diagnostics $6.8B Industrial Technologies

More information

This ESG White Paper was commissioned by Extreme Networks and is distributed under license from ESG.

This ESG White Paper was commissioned by Extreme Networks and is distributed under license from ESG. White Paper Network Solutions for Modern Data Centers By Bob Laliberte, Senior Analyst October 2013 This ESG White Paper was commissioned by Extreme Networks and is distributed under license from ESG.

More information

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions White Paper Getting on the Road to SDN Attacking DMZ Security Issues with Advanced Networking Solutions By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by NEC and is distributed

More information

Open SDN for Network Visibility

Open SDN for Network Visibility SOLUTION GUIDE Open SDN for Network Visibility Simplifying large scale network monitoring systems with Big Tap 1 This solution guide describes how Big Tap, a network monitoring application from Big Switch

More information

Live traffic feeds are increasingly being used by the modern enterprise to gain visibility for security and operations management

Live traffic feeds are increasingly being used by the modern enterprise to gain visibility for security and operations management Overview The transition from an age of systems of record to an age of systems of engagement has led to profound changes in the way information is used in an organization. These changes have now become

More information

Getting on the Path to SDN:

Getting on the Path to SDN: White Paper Getting on the Path to SDN: Leveraging Juniper Networks Virtual Chassis Technology on Juniper EX Series Switches to Improve SDN Adoption in Your Network By Bob Laliberte, Senior Analyst September

More information

WHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business

WHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business WHITE PAPER Data Center Fabrics Why the Right Choice is so Important to Your Business Introduction Data center fabrics are emerging as the preferred architecture for next-generation virtualized data centers,

More information

White Paper. Simplify Network Monitoring

White Paper. Simplify Network Monitoring White Paper Simplify Network Monitoring 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com 915-6599-01 Rev. B, June 2013 2 Table of Contents Executive Summary...

More information

Efficient Network Monitoring Access

Efficient Network Monitoring Access Abstract Organizations that rely on the reliability, security, and performance of their networks can no longer afford to wait for outages or security breaches to occur before installing test access points.

More information

White. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications

White. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications White Paper The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications By Bob Laliberte, Senior Analyst November 2013 This ESG White Paper

More information

Enabling Visibility for Wireshark across Physical, Virtual and SDN. Patrick Leong, CTO Gigamon

Enabling Visibility for Wireshark across Physical, Virtual and SDN. Patrick Leong, CTO Gigamon Enabling Visibility for Wireshark across Physical, Virtual and SDN Patrick Leong, CTO Gigamon 1 Agenda A review of the network then and now Challenges in network monitoring and security Introduction to

More information

Packet Optimization & Visibility with Wireshark and PCAPs. Gordon Beith Director of Product Management VSS Monitoring

Packet Optimization & Visibility with Wireshark and PCAPs. Gordon Beith Director of Product Management VSS Monitoring Packet Optimization & Visibility with Wireshark and PCAPs Gordon Beith Director of Product Management VSS Monitoring 1 Market Trends - Innovation MOBILE LTE INFRASTRUCTURE COMPLEXITY BIG DATA BUSINESS

More information

Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive

Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive White Paper Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com

More information

Active Visibility for Multi-Tiered Security // Solutions Overview

Active Visibility for Multi-Tiered Security // Solutions Overview Introduction Cyber threats are becoming ever more sophisticated and prevalent. Traditional security approaches such as firewalls and anti-virus protection are not equipped to mitigate and manage modern

More information

Optimizing Data Center Networks for Cloud Computing

Optimizing Data Center Networks for Cloud Computing PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,

More information

Out-of-Band Security Solution // Solutions Overview

Out-of-Band Security Solution // Solutions Overview Introduction A few years ago, IT managed security using the hard outer shell approach and established walls where traffic entered and departed the network assuming that the risks originated outside of

More information

Network Monitoring Fabrics Are Key to Scaling IT

Network Monitoring Fabrics Are Key to Scaling IT Network Monitoring Fabrics Are Key to Scaling IT September 2014 Prepared by: Zeus Kerravala Network Monitoring Fabrics Are Key to Scaling IT by Zeus Kerravala September 2014 º º º º º º º º º º º º º º

More information

Affording the Upgrade to Higher Speed & Density

Affording the Upgrade to Higher Speed & Density Affording the Upgrade to Higher Speed & Density Ethernet Summit February 22, 2012 Agenda VSS Overview Technology Q&A 2 Corporate Overview World Leader in Network Intelligence Optimization Deployed in 80%

More information

In-Band Security Solution // Solutions Overview

In-Band Security Solution // Solutions Overview Introduction The strategy and architecture to establish and maintain infrastructure and network security is in a rapid state of change new tools, greater intelligence and managed services are being used

More information

Solving Monitoring Challenges in the Data Center

Solving Monitoring Challenges in the Data Center Solving Monitoring Challenges in the Data Center How a network monitoring switch helps IT teams stay proactive White Paper IT teams are under big pressure to improve the performance and security of corporate

More information

ARISTA WHITE PAPER Cloudifying Data Center Monitoring

ARISTA WHITE PAPER Cloudifying Data Center Monitoring ARISTA WHITE PAPER Cloudifying Data Center Monitoring The shift in the approach to networking driven by the emergence of cloud networks, rapidly evolving merchant silicon system on chip (SoC) and purpose

More information

White. Paper. Optimizing the Virtual Data Center with Data Path Pools. EMC PowerPath/VE. February, 2011

White. Paper. Optimizing the Virtual Data Center with Data Path Pools. EMC PowerPath/VE. February, 2011 White Paper Optimizing the Virtual Data Center with Data Path Pools EMC PowerPath/VE By Bob Laliberte February, 2011 This ESG White Paper was commissioned by EMC and is distributed under license from ESG.

More information

Secure Access Complete Visibility

Secure Access Complete Visibility PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE Intrusion Detection Switch TAP Data Recorder VoIP Analyzer Switch Secure Access Complete Visibility Web

More information

Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters

Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters Date: June 2016 Author: Jack Poller, Senior

More information

White. Paper. Building Next Generation Data Centers. Implications for I/O Strategies. August 2014

White. Paper. Building Next Generation Data Centers. Implications for I/O Strategies. August 2014 White Paper Building Next Generation Data Centers Implications for I/O Strategies By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned by Emulex and is distributed under license

More information

Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES

Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES Meeting the 7 Challenges in Testing and Performance Management Introduction With advent of the cloud paradigm, organizations are transitioning

More information

VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure

VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure W h i t e p a p e r VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure Table of Contents Executive Summary.... 3 Cloud Computing Growth.... 3 Cloud Computing Infrastructure

More information

Network Packet Monitoring Optimizations in Data Centre

Network Packet Monitoring Optimizations in Data Centre March 2014, HAPPIEST MINDS TECHNOLOGIES Network Packet Monitoring Optimizations in Data Centre Author Dharmraj B Jhatakia 1 Copyright Information This document is an exclusive property of Happiest Minds

More information

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments What You Will Learn Deploying network services in virtual data centers is extremely challenging. Traditionally, such Layer

More information

Virtualized Security: The Next Generation of Consolidation

Virtualized Security: The Next Generation of Consolidation Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the

More information

End-to-End Visibility

End-to-End Visibility End-to-End Visibility for Your Cisco Infrastructure SOLUTIONS GUIDE GIGAMON TABLE OF Contents Introduction... 1 Overview of Cisco Technologies... 1.Monitoring Cisco Application Centric Infrastructure (ACI)...

More information

Fabrics that Fit Matching the Network to Today s Data Center Traffic Conditions

Fabrics that Fit Matching the Network to Today s Data Center Traffic Conditions Sponsored by Fabrics that Fit Matching the Network to Today s Data Center Traffic Conditions In This Paper Traditional network infrastructures are often costly and hard to administer Today s workloads

More information

Visibility into the Cloud and Virtualized Data Center // White Paper

Visibility into the Cloud and Virtualized Data Center // White Paper Executive Summary IT organizations today face unprecedented challenges. Internal business customers continue to demand rapid delivery of innovative services to respond to outside threats and opportunities.

More information

Traffic Visibility Fabric for Revenue and Differentiation in the Cloud Provider Market // White Paper

Traffic Visibility Fabric for Revenue and Differentiation in the Cloud Provider Market // White Paper Traffic Visibility Fabric for Revenue and Differentiation in the Cloud Market Cloud provider landscape and challenge As a Cloud Service (CSP) there are many services that you can offer. Based on your core

More information

The Purview Solution Integration With Splunk

The Purview Solution Integration With Splunk The Purview Solution Integration With Splunk Integrating Application Management and Business Analytics With Other IT Management Systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview Integration

More information

Visibility in the Modern Data Center // Solution Overview

Visibility in the Modern Data Center // Solution Overview Introduction The past two decades have seen dramatic shifts in data center design. As application complexity grew, server sprawl pushed out the walls of the data center, expanding both the physical square

More information

Pervasive Security Enabled by Next Generation Monitoring Fabric

Pervasive Security Enabled by Next Generation Monitoring Fabric Pervasive Security Enabled by Next Generation Monitoring Fabric By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Big Switch Networks Executive Summary Enterprise networks have become ever

More information

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network

More information

Total year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80%

Total year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80% Research Brief 2012 Networking Spending Trends Date: March 2012 Author: Jon Oltsik, Senior Principal Analyst; Bob Laliberte, Senior Analyst; and Bill Lundell, Senior Research Analyst Abstract: According

More information

Application Performance Management: New Challenges Demand a New Approach

Application Performance Management: New Challenges Demand a New Approach Application Performance Management: New Challenges Demand a New Approach Introduction Historically IT management has focused on individual technology domains; e.g., LAN, WAN, servers, firewalls, operating

More information

White. Paper. Closing the Storage Virtualization Gap with EMC Isilon. May, 2011

White. Paper. Closing the Storage Virtualization Gap with EMC Isilon. May, 2011 White Paper Closing the Storage Virtualization Gap with EMC Isilon By Terri McClure May, 2011 This ESG White Paper was commissioned by Isilon and is distributed under license from ESG. 2011, Enterprise

More information

MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable

MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable Version 1.0, August 2009 This white paper discusses how a cloud-based architecture makes wireless LAN easier and more affordable for organizations

More information

Pluribus Netvisor Solution Brief

Pluribus Netvisor Solution Brief Pluribus Netvisor Solution Brief Freedom Architecture Overview The Pluribus Freedom architecture presents a unique combination of switch, compute, storage and bare- metal hypervisor OS technologies, and

More information

Gecontroleerde grip op uw netwerk security en netwerk beheer

Gecontroleerde grip op uw netwerk security en netwerk beheer Gecontroleerde grip op uw netwerk security en netwerk beheer 19 11-2015 Marcel Golverdingen Who is Tucana en what are our activities? Pan-European supplier with offices in Belgium, France, Germany and

More information

Data Center Networking Designing Today s Data Center

Data Center Networking Designing Today s Data Center Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability

More information

Overcoming The Blind Spots in Your Virtualized Data Center

Overcoming The Blind Spots in Your Virtualized Data Center Overcoming The Blind Spots in Your Virtualized Data Center Matt Percival Sales Manager Northern Europe Stand C4 2014 Ixia Inc. Outline Virtualization Overview Network Monitoring Basics Implementing a Monitoring

More information

White Paper. Optimizing Visibility, Control and Performance of Network Traffic

White Paper. Optimizing Visibility, Control and Performance of Network Traffic White Paper Optimizing Visibility, Control and Performance of Network Traffic 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com 915-6598-01 Rev. B, June 2013 2

More information

Top 10 Reasons Enterprises are Moving Security to the Cloud

Top 10 Reasons Enterprises are Moving Security to the Cloud ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different

More information

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain

More information

Network Performance Channel

Network Performance Channel Network Performance Channel Net Optics Products Overview MIHAJLO PRERAD, Network Performance Channel GmbH Who we are Network Performance Channel GmbH Leading global value added distributor specialized

More information

How Solace Message Routers Reduce the Cost of IT Infrastructure

How Solace Message Routers Reduce the Cost of IT Infrastructure How Message Routers Reduce the Cost of IT Infrastructure This paper explains how s innovative solution can significantly reduce the total cost of ownership of your messaging middleware platform and IT

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK SOFTWARE DEFINED NETWORKING A NEW ARCHETYPE PARNAL P. PAWADE 1, ANIKET A. KATHALKAR

More information

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,

More information

Cisco NetFlow Generation Appliance (NGA) 3140

Cisco NetFlow Generation Appliance (NGA) 3140 Q&A Cisco NetFlow Generation Appliance (NGA) 3140 General Overview Q. What is Cisco NetFlow Generation Appliance (NGA) 3140? A. Cisco NetFlow Generation Appliance 3140 is purpose-built, high-performance

More information

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA Active Visibility for Multi-Tiered Security Juergen Kirchmann Director Enterprise Sales EMEA Billions are Spent on Security Annually $18.4B SPENT BY ENTERPRISES WORLD-WIDE ON SECURITY IN 2014 ENTERPRISE

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

Cisco Unified Data Center

Cisco Unified Data Center Solution Overview Cisco Unified Data Center Simplified, Efficient, and Agile Infrastructure for the Data Center What You Will Learn The data center is critical to the way that IT generates and delivers

More information

Product Line Strategy Network Recorder and Traffic Visibility Market: A Case Study

Product Line Strategy Network Recorder and Traffic Visibility Market: A Case Study 2013 Frost & Sullivan 1 We Accelerate Growth Product Line Strategy Award Network Recorder and Traffic Visibility Global, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th

More information

Solving I/O Bottlenecks to Enable Superior Cloud Efficiency

Solving I/O Bottlenecks to Enable Superior Cloud Efficiency WHITE PAPER Solving I/O Bottlenecks to Enable Superior Cloud Efficiency Overview...1 Mellanox I/O Virtualization Features and Benefits...2 Summary...6 Overview We already have 8 or even 16 cores on one

More information

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A What is NetFlow? Network protocol originally developed by Cisco

More information

Network Monitoring and Security in Hybrid Networks. Jason Echols

Network Monitoring and Security in Hybrid Networks. Jason Echols Network Monitoring and Security in Hybrid Networks Jason Echols The MOST TRUSTED names in networking trust Test Security Visibility Enterprises trust IXIA to: Assess vendor equipment and applications Improve

More information

How To Connect Virtual Fibre Channel To A Virtual Box On A Hyperv Virtual Machine

How To Connect Virtual Fibre Channel To A Virtual Box On A Hyperv Virtual Machine Virtual Fibre Channel for Hyper-V Virtual Fibre Channel for Hyper-V, a new technology available in Microsoft Windows Server 2012, allows direct access to Fibre Channel (FC) shared storage by multiple guest

More information

Scalable Network Monitoring with SDN-Based Ethernet Fabrics

Scalable Network Monitoring with SDN-Based Ethernet Fabrics Scalable Network Monitoring with SDN-Based Ethernet Fabrics Prashant Gandhi VP, Product Management & Strategy Big Switch Networks 1 Agenda Trends in Network Monitoring SDN s Role in Network Monitoring

More information

Microsoft Private Cloud Fast Track

Microsoft Private Cloud Fast Track Microsoft Private Cloud Fast Track Microsoft Private Cloud Fast Track is a reference architecture designed to help build private clouds by combining Microsoft software with Nutanix technology to decrease

More information

Scalable Approaches for Multitenant Cloud Data Centers

Scalable Approaches for Multitenant Cloud Data Centers WHITE PAPER www.brocade.com DATA CENTER Scalable Approaches for Multitenant Cloud Data Centers Brocade VCS Fabric technology is the ideal Ethernet infrastructure for cloud computing. It is manageable,

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

Why I/O Is Strategic Software- defined Networking Date: April 2013 Author: Bob Laliberte, Senior Analyst

Why I/O Is Strategic Software- defined Networking Date: April 2013 Author: Bob Laliberte, Senior Analyst Book Project Why I/O Is Strategic Software- defined Networking Date: April 2013 Author: Bob Laliberte, Senior Analyst What Is Software- defined Networking? The emergence of software- defined networking

More information

The Promise and the Reality of a Software Defined Data Center

The Promise and the Reality of a Software Defined Data Center The Promise and the Reality of a Software Defined Data Center Authored by Sponsored by Introduction The traditional IT operational model is highly manual and very hardware centric. As a result, IT infrastructure

More information

WHITE PAPER. Addressing Monitoring, Access, and Control Challenges in a Virtualized Environment

WHITE PAPER. Addressing Monitoring, Access, and Control Challenges in a Virtualized Environment WHITE PAPER Addressing Monitoring, Access, and Control Challenges in a Virtualized Environment www.ixiacom.com 915-6892-01 Rev. A, July 2014 2 Table of Contents The Challenge of the Virtual Environment...

More information

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective An Oracle White Paper July, 2012 Evolution from the Traditional Data Center to Exalogic: 1 Disclaimer The following is intended to outline our general product capabilities. It is intended for information

More information

Software Defined Networking (SDN)

Software Defined Networking (SDN) Software Defined Networking (SDN) Your Route to Agility, Accuracy and Availability Bob Shaw, President and CEO, Net Optics, Inc. About the Author Bob Shaw, President and CEO, Net Optics Inc. As President

More information

Brocade One Data Center Cloud-Optimized Networks

Brocade One Data Center Cloud-Optimized Networks POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c

More information

I D C M A R K E T S P O T L I G H T

I D C M A R K E T S P O T L I G H T I D C M A R K E T S P O T L I G H T E n t r y- L e ve l E n t e r p r ise Storage: Stepping Up t o B i g C h a l lenges October 2012 Adapted from The Appliance-ization of the Datacenter and Its Impact

More information

Securing the Intelligent Network

Securing the Intelligent Network WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.

More information

CENTER I S Y O U R D ATA

CENTER I S Y O U R D ATA I S Y O U R D ATA CENTER R E A DY F O R S D N? C R I T I C A L D ATA C E N T E R C O N S I D E R AT I O N S FOR SOFT WARE-DEFINED NET WORKING Data center operators are being challenged to be more agile

More information

ESG Brief. Modern Data Centers: Massive Scale and Complexity. Data Center Networking Discontinuity

ESG Brief. Modern Data Centers: Massive Scale and Complexity. Data Center Networking Discontinuity ESG Brief IBM and NEC Bring SDN/OpenFlow to Enterprise Data Center Networks Date: January, 2012 Author: Jon Oltsik, Senior Principal Analyst, and Bob Laliberte, Senior Analyst Abstract: Enterprise data

More information

NVGRE Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure

NVGRE Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure W h i t e p a p e r NVGRE Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure Table of contents Executive Summary.... 3 Cloud Computing Growth.... 3 Cloud Computing Infrastructure

More information

Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events

Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events Often, the only way to get to the root cause of unwelcome or intermittent events that occur on

More information

Business Case for Brocade Network Analytics for Mobile Network Operators

Business Case for Brocade Network Analytics for Mobile Network Operators Business Case for Brocade Network Analytics for Mobile Network Operators Executive Summary Mobile operators are experiencing large cost increases as they build out their networks to keep pace with rising

More information

SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility

SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility WHITEPAPER SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility Copyright 2014 Meru Networks, Inc. All rights reserved. Table of Contents Executive summary... 3 Introduction...

More information

Junos Space Virtual Control

Junos Space Virtual Control Proiduct Overview The proliferation of virtual switches in the data center has presented data center operators with a significant challenge namely, how to manage these virtual network elements in conjunction

More information

Intelligent Data Access Networking TM

Intelligent Data Access Networking TM Gigamon TM delivers intelligent data access solutions to enhance monitoring of service provider and enterprise data centers. The company s world-renowned GigaVUE orange boxes aggregate, filter and replicate

More information

Economic Value Validation. June 2 0 1 3

Economic Value Validation. June 2 0 1 3 Economic Value Validation Riverb ed Pe rf ormance Management - Cascade June 2 0 1 3 EVV REPORT: Riverbed Cascade 2 Contents List of Figures... 2 List of Tables... 2 Market Overview... 3 Riverbed Cascade:

More information

The Next Phase of Datacenter Network Resource Management and Automation March 2011

The Next Phase of Datacenter Network Resource Management and Automation March 2011 I D C T E C H N O L O G Y S P O T L I G H T The Next Phase of Datacenter Network Resource Management and Automation March 2011 Adapted from Worldwide Datacenter Network 2010 2015 Forecast and Analysis

More information

Enterprise Buyer Guide

Enterprise Buyer Guide Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight

More information

Key Strategies for Long-Term Success

Key Strategies for Long-Term Success WHITE PAPER Security in the Next- Generation Data Center Key Strategies for Long-Term Success Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................

More information

Five Steps to Building Visibility and Security Into Your Network

Five Steps to Building Visibility and Security Into Your Network Five Steps to Building Visibility and Security Into Your Network You can t secure what you don t know about Contents Introduction.........................................................1 Step 1: Don t

More information

The Impact of Cloud Computing to Data Network Cabling White Paper

The Impact of Cloud Computing to Data Network Cabling White Paper Into the Clouds A Look into What Cloud Computing is and How it May Affect Data Network Cabling White Paper June 2010 Contents BACKGROUND 3 IMPACT ON IT 4 SCALABILITY/FLEXIBILITY/ADAPTABILITY/AGILITY -

More information

I D C M A R K E T S P O T L I G H T

I D C M A R K E T S P O T L I G H T I D C M A R K E T S P O T L I G H T The New IP: Building the Foundation of Datacenter Network Automation March 2015 Adapted from Worldwide Enterprise Communications and Datacenter Network Infrastructure

More information

COMMAND YOUR DATA CENTER

COMMAND YOUR DATA CENTER Best Practices Guide I Data Center COMMAND YOUR DATA CENTER How to Thrive In the Changing Landscape The demands to virtualize, scale, and implement new applications while conducting security, forensics,

More information

TIME TO RETHINK PERFORMANCE MONITORING

TIME TO RETHINK PERFORMANCE MONITORING TIME TO RETHINK PERFORMANCE MONITORING New requirements for application awareness and support for unified communications are challenging performance monitoring appliance vendors to reconsider their approach.

More information