How It Works and Real-World Results
|
|
|
- Rebecca Booker
- 10 years ago
- Views:
Transcription
1 WHITE PAPER The ExtraHop IT Operational Intelligence Platform: By Tyson Supasatit Technical Marketing Manager Abstract ExtraHop accelerates IT transformation with real-time IT operations analytics. The ExtraHop platform equips all IT teams with correlated, cross-tier visibility so they can answer the question, What is happening in my environment right now? With this operational intelligence, organizations in all industries have built a sustainable competitive advantage by running their IT more efficiently and with greater agility. This white paper explains the technology that powers the ExtraHop platform and how IT organizations use ExtraHop to accomplish critical IT tasks and add significant value to the business.
2 Table of Contents Introduction Wire Data Can Transform IT Operations Wire Data: Unlocking the Potential of Data on the Wire How ExtraHop Works 4 Simple, Non-Invasive Deployment 5 Full-Stream Reassembly and Full-Content Analysis 5 Streaming Datastore and Intelligent Alerting Engine 6 Open, Extensible, and Shareable Platform 6 ExtraHop in Action End-User Intelligence 7 7 Proactive Remediation 7 Infrastructure Optimization 8 Application Optimization 9 IT Decision Management 9 IT and Business Intelligence 10 Security and Compliance 11 Conclusion 12
3 Introduction ExtraHop enables companies to achieve a sustainable competitive advantage through more proactive and agile IT Operations. Organizations that have adopted the ExtraHop operational intelligence platform have transformed their IT Operations so that they are making informed decisions regarding IT infrastructure, answering questions that impact millions of dollars in revenue, and preventing problems instead of reacting to them. In short, the ExtraHop platform is helping these IT organizations become a strategic asset to the business. Wire Data Can Transform IT Operations Technology is not a panacea, but the right set of solutions is essential to help IT Operations respond faster to changing business needs. Most IT organizations purchase monitoring tools to meet narrow departmental requirements, not according to a strategic, overarching plan. This behavior results in an ad hoc accumulation of niche products that exist in siloes, not the cohesive IT operational intelligence framework that will equip these organizations to accelerate IT maturity. ExtraHop is part of a set of next-generation technologies that together equip IT teams with holistic operational intelligence. Fundamentally, there are only four key sources of data available for IT operations management. Each data source is necessary, although the role and importance of each is evolving. Machine data, including logging provided by vendors, SNMP, and WMI. This information about system internals helps IT teams identify overburdened machines, plan capacity, and perform forensic analysis of past events. New distributed log-file analysis solutions enable IT organizations to address a broader set of tasks, including answering business-related questions. Agent data from byte-code instrumentation, call-stack sampling, and custom logging. Code diagnostic tools have traditionally been the purview of Development and QA teams, helping to identify hotspots or errors in the software code. New SaaS vendors have dramatically simplified the deployment of agent-based products. External data from synthetic transactions and service checks. This data enables IT teams to test common transactions from locations around the globe. Wire data, which has traditionally included NetFlow, HTTP traffic analysis, and packet capture. The information available off the wire historically has been used for measuring, mapping, and forensics. ExtraHop unlocks the tremendous potential of real-time wire data, opening up vastly greater opportunities and serving as the lynchpin of IT operational intelligence. Wire Data: Unlocking the Potential of Data on the Wire The information needed for operational intelligence has always existed on the wire, but previously was not available in real time or in a way that was meaningful to all IT teams. The ExtraHop platform introduces revolutionary new high-speed packet processing capabilities that make it possible for the first time to fully analyze the wealth of data passing over the wire in real time and present it in a way that makes sense for network engineers, security professionals, DBAs, storage administrators, application architects, application owners, and others. ExtraHop extracts this real-time wire data without the use of agents.
4 ExtraHop provides value to all IT teams, equipping them with real-time operational intelligence needed to answer the question, What s happening in my IT environment right now? The traditional approach to obtaining visibility across all the tiers of an IT environment would be to pull as many discrete metrics as possible from each tier and then try to make sense of the collected data with analysis and reporting servers. This bottom-up approach provides information that is often hours old, uncorrelated, and frequently unreliable because of poor integration between various tools. Worse still, these legacy tools become more expensive and require more effort to manage as the environment grows in complexity, leaving IT organizations paying more and getting less in return. ExtraHop takes a radically different approach, using wire data as the source for cross-tier insight. The network is the common element that ties all components of the application delivery chain together, even as those components become more numerous and distributed. Each component communicates with others using transport and application protocols. These protocols definitively describe what is happening in the IT environment. The networking adage, packets don t lie, applies here. Moreover, these protocols seldom change, making the network the ideal instrumentation point in increasingly heterogeneous and fluid environments. How ExtraHop Works The ExtraHop platform performs full-stream reassembly and full-content analysis of network traffic to extract IT and business insights. ExtraHop analyzes application transactions continuously and in real time, at speeds up to a sustained 20Gbps. An open and extensible platform, ExtraHop enables IT teams to define and implement new metrics within minutes, and integrates seamlessly with manager of managers (MOM) systems and other next-generation monitoring products such as Keynote, New Relic, SevOne, and Splunk.
5 Simple, Non-Invasive Deployment The ExtraHop platform is a completely passive, out-of-line network appliance that is easy to deploy and manage. Deployed using a network tap, SPAN, or other data-access technology, ExtraHop analyzes every application transaction, not just a sample portion of network traffic as with synthetic transactions. Where a tap or SPAN are not available, ExtraHop offers a high-speed packet forwarder that can be packaged in automated configuration utilities such as Chef. The ExtraHop Context and Correlation Engine is built for massively scalable transaction analysis up to a sustained 20Gbps. As soon as traffic is detected by the platform, ExtraHop s Context and Correlation Engine automatically discovers and classifies devices, both physical and virtual, and determines relationships between devices based on MAC addresses, IP addresses, naming protocols, and other heuristic elements. As the IT environment changes with new software builds and upgraded infrastructure components, for example ExtraHop automatically detects and adjusts to those changes. For distributed environments, the ExtraHop Central Manager delivers a consolidated view of wire data from multiple ExtraHop appliances, enabling organizations to gain visibility into the communications of hundreds of thousands of devices across datacenters and branch offices. IT administrators can easily update the platform firmware remotely, making the ExtraHop platform an ideal choice for deployment within physically isolated, or lights-out, datacenters. Full-Stream Reassembly and Full-Content Analysis While other products only inspect L4 headers, only the ExtraHop Context and Correlation Engine performs full-stream reassembly continuously in real time. This advanced approach reassembles multiple packets into a stream and reconstructs transactions, flows, and sessions a prerequisite for true application fluency. ExtraHop is purpose-built for production on-premises and cloud environments, supporting real-world traffic patterns such as IP fragments, out-of-order segments, and microbursts. When packet loss occurs on the monitoring link, ExtraHop resynchronizes and recovers. Because it was built to take full advantage of multicore processing, the ExtraHop Context and Correlation Engine is able to perform fullstream reassembly at a sustained 20Gbps. Through full-stream reassembly, the ExtraHop Context and Correlation Engine can analyze the full content of transaction payloads (not to be confused with packet payloads) and extract crucial details such as the specific URI included in a HTTP 500 Error, slow stored procedures in a database, or the location of a corrupt file in network-attached storage. ExtraHop offers protocol modules for web applications, NoSQL and relational databases, network-attached storage (NAS) and storage-area networks (SANs), directory services, and industry-specific protocols for financial and telecommunications verticals.
6 ExtraHop gives us the intelligence we need to continually increase efficiency and sustain a competitive advantage. Drew Garner Director of Cloud Architecture Concur Streaming Datastore and Intelligent Alerting Engine The ExtraHop Context and Correlation Engine includes a high-speed, streaming datastore that records and retrieves performance and health metrics in real time. Optimized for time-sequenced telemetry, the datastore writes to and reads from underlying block devices directly, translating into reliably superior recording and retrieval speeds without the tuning and management required by a relational database. The streaming datastore powers an intelligent alerting engine that helps IT teams prevent small issues from growing into larger problems. IT teams can configure the default alerts and create new alerts for behaviors and events such as network activity, webserver and database errors, payload length, slow transactions, and expiring SSL certificates. Open, Extensible, and Shareable Platform ExtraHop is a platform for IT Operations innovation, equipping IT organizations to quickly meet new requirements for visibility and insight. ExtraHop offers generous options for integration with existing IT management toolsets, including policy-based logging of events that are only available through analysis of wire data. Best of all, the innovative extensions for the ExtraHop platform can be easily bundled, shared, and improved upon through the ExtraHop community. Open ExtraHop works with other management and monitoring solutions using both push and pull integration. For push integration, syslog export enables IT teams to send policy-based, event-driven metrics to any IT management console, custom Big Data analysis store, SIEM product, or third-party management tool such as Keynote, SevOne, or Splunk. For pull integration, IT teams can use SDK documentation to access the same API that is used by the ExtraHop web interface. This API provides immediate access to any metric in the ExtraHop datastore. Extensible ExtraHop provides a programmatic interface to its Context and Correlation Engine that IT teams can use to define and implement new custom metrics in minutes. Application Inspection Triggers (AI Triggers) make it possible to rapidly answer questions such as How many duplicate orders are occurring and whom do they affect? Which client types are affected by this new update? What users are accessing this sensitive storage file? and What are the front-end web requests that are associated with these slow SQL queries? Shareable What makes ExtraHop a true platform is the ability to package and share extensions. IT teams can package together dashboards, alerts, geomaps, dynamic groups, and AI Triggers and then share them within the organization or with the wider ExtraHop user community. These solution bundles can be downloaded and extended to meet particular IT management tasks or application monitoring requirements. In this way, IT teams benefit from community-driven enhancements by quickly implementing and building on the innovation of others.
7 ExtraHop in Action Companies from a wide range of industries are using ExtraHop to transform how they run IT. The following examples provide a glimpse into what is possible with the IT and business insights delivered through the ExtraHop platform. End-User Intelligence Unlike monitoring products that only show what users are doing and experiencing on the frontend, ExtraHop can correlate user activity and experience to performance in the backend IT infrastructure. In other words, ExtraHop does not just show what users are experiencing, it also explains why. One telecommunications service provider used ExtraHop to identify the specific users whose devices were adversely affected by a firmware update. Traditionally, service providers would rely on tools that show which systems are communicating and when. Only ExtraHop enables IT teams to see what is actually being said between systems. In the case of the service provider, ExtraHop reconstructed and analyzed the contents of all Diameter transactions, including attribute-value pairs (AVPs) such as customer IDs and handset type. With this information, the service provider could easily isolate which subscribers were affected by the firmware update and work with the handset manufacturer to develop a fix. ExtraHop has proven itself to be very valuable to Alaska Airlines and no other solution in our environment has been able to analyze Informix the way that ExtraHop does. It has enabled us to quickly and accurately diagnose several issues that would have been impractical or impossible to pin down previously. Kris Kutchera VP of Information Technology Alaska Air Group A large research hospital had spent weeks trying to isolate the cause of extremely slow Citrix logins every morning around 8:30 a.m. With ExtraHop, the hospital identified severe contention at the storage tier a single doctor was pulling down 2GB of photos stored in his My Pictures folder every time he logged in. By deleting the My Pictures folder from user profiles, the IT team at the research hospital solved the problem, helping to earn goodwill from users and paving the way for an expansion of the hospital s VDI deployment. Proactive Remediation In an ideal world, everything is tested and works perfectly when deployed to production. Reality works much differently, requiring IT Operations team to maintain real-time visibility into the performance of production applications. ExtraHop provides trend-based early-warning alerts for the entire production environment so that IT teams can proactively identify and fix problems fast. Prior to deploying ExtraHop, Alaska Airlines IT team had no way of monitoring the real-time performance of their Informix database. This database underlies Alaska Airlines weights and balances application, which must calculate weight distribution on planes before they are cleared for takeoff. The IT team could not continuously run profilers on the database in production because of the high overhead required. With ExtraHop, Alaska Airlines monitors the performance of its critical Informix database continuously with zero overhead. By reconstructing and analyzing all transactions, ExtraHop provides the IT team with real-time database performance metrics, including details such as errors, methods, and users.
8 With ExtraHop, IT organizations can monitor the performance of databases in production, including details such as methods, without running any database profilers, which can add onerous system overhead. Infrastructure Optimization Oftentimes, IT Operations teams do not root out inefficiency from their infrastructure because no one is complaining and there are other urgent projects waiting. ExtraHop makes it easier to identify inefficient activity as well as poor performance that users quietly tolerate. Detailed metrics from ExtraHop also help IT teams to determine the optimal settings for application delivery controllers (ADCs), WAN optimizers, and network-attached storage given the unique requirements of their applications. By assembling the TCP state machines for every endpoint, ExtraHop can monitor sophisticated TCP metrics such as PAWS-dropped SYNs, receive-window throttles, retransmission timeouts, and Nagle delays. At one company, an Operations team member was using ExtraHop to find SQL queries that were good candidates for caching. In the course of his investigation, he saw that CIFS traffic comprised 70 percent of network bandwidth. This seemed odd, so he drilled into the CIFS transaction details and found some familiar file names in the list files associated with the company s homegrown logging system! A bug in the log archive script was causing five million files to be copied across the network unnecessarily. The network team was unfamiliar with the logging system and had assumed that this traffic growth was organic. In fact, they were preparing a forklift upgrade of the network infrastructure to handle the increase. However, with the archive script fixed, network utilization dropped by an astounding 70 percent, which helped the company defer hundreds of thousands of dollars in capital expense. Legacy networkmonitoring tools would not have helped in this case. Only ExtraHop, with its ability to analyze L7 application-level details, is able to distinguish CIFS traffic and list the filenames for each transaction.
9 Healthcare services provider MedSolutions used ExtraHop to identify a misconfiguration in their F5 BIG-IP that was adding network latency for users in the corporate office. ExtraHop showed a high number of retransmission timeouts (RTOs) on LAN segments behind the corporate load balancers behavior that was obvious looking at TCP analysis in ExtraHop, but would have required careful investigation with a packet sniffer to reveal otherwise. The IT team found the F5 BIG-IP was misconfigured with a TCP profile for a wide-area network instead of local-area network. In addition to RTOs, ExtraHop tracks sophisticated TCP metrics such as Nagle delays and tinygrams, which help network teams and system administrators to determine which congestion control algorithms to turn on. With ExtraHop, MedSolutions has a real-time, holistic view of all of our applications and infrastructure. This operational intelligence enables us to quickly answer questions and take action to improve performance and efficiency. Satish Dave CIO MedSolutions Application Optimization ExtraHop supports the entire application management lifecycle, providing architects, developers, testers, and operations teams with a way to measure how updates and configurations affect performance. With consistent and trusted data from ExtraHop, stakeholders can work together more effectively to ensure fast and smooth rollouts. ExtraHop also provides operational intelligence for packaged applications, enabling IT teams monitor performance across all tiers of the application delivery chain. A large outdoor equipment retailer rolled out mobile point-of-sale (POS) devices in preparation for the holiday shopping season. The company estimated that by reducing lines at checkout counters, they would recoup nearly one million dollars in lost sales. However, store managers complained that performance for these mobile devices was so slow that they were useless, with product scans taking from 30 seconds to one minute. Using SSL analysis in ExtraHop, the IT Operations team discovered the third-party mobile POS software was performing 15 SSL handshakes per transaction. The vendor provided a fix so that the application used recognized SSL tokens, reducing transaction times to less than one second faster even than traditional POS terminals. IT Decision Management ExtraHop provides IT organizations with the insight they need to make decisions about capacity planning, application migrations, decommissioning legacy systems, and infrastructure changes. Practice Fusion, a provider of web-based electronic medical record (EMR) solutions, used ExtraHop to migrate a portion of their web application from physical to virtual infrastructure. This particular workload was customized to run a particular HP server platform, and previous attempts to virtualize the workload had failed because the software encountered race conditions and similar problems. With ExtraHop, the IT team at Practice Fusion measured baseline performance for the application on the dedicated HP servers and on a parallel virtual infrastructure. ExtraHop showed that performance was slightly better on the virtual infrastructure, helping Practice Fusion to avoid spending $75,000 purchasing new hardware and revalidating the software for the new platform.
10 We set up ExtraHop in our staging environment so that the engineering team can see the impact of new code against our baseline performance. With visibility across all tiers of the environment, we can see whether a performance problem is due to infrastructure, misconfiguration, or possibly a code-level issue. John Hluboky VP of Technical Operations Practice Fusion Concur relies on more than 1,000 database instances to power its SaaS expense reporting solution. So when the R&D Operations team wanted to dramatically expand the cache in front of the database, finding the best SQL workloads to migrate to the cache would have been next to impossible using database profilers. Instead, Concur used ExtraHop to analyze database transactions for the entire infrastructure and determine the total weight for each SQL query by calculating the number of times that query was run by the time required to return the data. This information helped Concur to justify expanding its cache from 13,000 hits per day to more than 500 million hits per day, which in turn resulted in a 20 percent improvement in application performance. IT and Business Intelligence The wire data that flows through IT environments contains a wealth of information that is valuable to the business. ExtraHop enables IT organizations to tap this valuable business data to help drive additional revenue and analyze customer behavior and pricing trends. A large financial services firm knew its system was duplicating orders, but could not find the source of the problem or discover which accounts were affected and how frequently. The IT team used ExtraHop to analyze the XML payload and extract details specified by the Orbital payment protocol, including user, merchant ID, account number, and order ID (see below). Through syslog export, the IT team set up ExtraHop to automatically forward this specific information to their Splunk deployment for search and analysis. ExtraHop enables IT teams to easily mine the full transaction payload and extract metrics that are relevant to the business, such as account numbers and order IDs.
11 A major online advertising platform used ExtraHop to identify customers who had exhausted their prepaid keyword accounts. Before using ExtraHop, the IT Operations team had no visibility into the cause for HTTP 500 errors returned by their own API. ExtraHop enabled the team to examine the HTTP payload for these transactions and see what was causing the errors. In many cases, the application was returning an HTTP 500 message when the prepaid limit was reached, not because of an actual server problem. By proactively identifying which large clients needed to replenish their account balances, the online advertising platform is able to collect revenue that would otherwise be lost. Security and Compliance Because ExtraHop provides detailed metrics for every transaction passing over the wire, it provides security teams with valuable information about who is accessing which systems and how they are doing so. For example, IT teams can use ExtraHop to see which clients are accessing the database using root or system administrator accounts. ExtraHop also facilitates compliance audits by providing audit teams with detailed reports showing database and storage activity that is in violation of policy, including unauthorized access to specific directories and files. The IT Operations team at an online retailer was trying to stop an attacker that was extracting data from the database through SQL injection. Using ExtraHop, the IT team isolated the web requests that resulted in HTTP 500 errors and database responses in excess of 5MB. The IT team then used ExtraHop to analyze the web requests and find both the IP address of the attacker and the database vulnerability they were trying to exploit. This information enabled the IT team to quickly block connections from the attacker and patch the database. Many IT organizations use ExtraHop to defeat repeated brute-force FTP hacking attempts from overseas IP addresses. These IT teams set an alert in ExtraHop that fires when a specific client fails three FTP login attempts within 30 seconds and triggers a Fail2Ban action for that particular client IP address. With ExtraHop, IT teams can easily track all SSL certificate expirations and RSA key sizes.
12 ExtraHop provides the real-time operational intelligence required to make IT more agile and proactive. The world s best-run IT organizations use ExtraHop to manage more than half a million devices and monitor over a trillion transactions daily, including Adobe, Alaska Airlines, Concur, Expedia, and Microsoft. ExtraHop Networks, Inc. 520 Pike Street, Suite 1700 Seattle, WA USA [email protected] T F Conclusion Operations teams stand at the intersection of IT and the business. Increasingly, business success will depend on how quickly and how well these IT Operations teams respond to new demands. ExtraHop delivers the greatest results in companies that believe how they run IT matters. Organizations across a wide variety of industries including telecommunications, financial services, retail, healthcare, and government use ExtraHop to build sustainable advantages over their competition. By running IT operations better, these companies can respond faster to new requirements, roll out innovative new services faster, provide superior user experiences, and quickly gather business insights. Using ExtraHop s visibility and insight, Operations, Development, Security, and other teams are working together to continually improve security, performance, and availability. At the same time, these IT teams are cutting costs through a more elegant, scalable, and flexible framework for IT operational intelligence. Customer Support [email protected] (US) +44 (0) (EMEA) 2013 ExtraHop Networks, Inc. All rights reserved.
FIVE WAYS WIRE DATA ANALYTICS ENABLES REAL-TIME HEALTHCARE SYSTEMS
WHITE PAPER FIVE WAYS WIRE DATA ANALYTICS ENABLES REAL-TIME HEALTHCARE SYSTEMS Abstract Healthcare organizations face a transformational shift with the rise of what Gartner has dubbed the realtime healthcare
Designing and Building an Open IT Operations Analytics (ITOA) Architecture
WHITE PAPER Designing and Building an Open IT Operations Analytics (ITOA) Architecture Abstract This white paper provides a roadmap for designing and building an open IT Operations Analytics (ITOA) architecture.
Ten Best Practices for Optimizing ADC Deployments
EXTRAHOP WHITE PAPER Ten Best Practices for Optimizing ADC Deployments Abstract Application Delivery Controllers (ADCs) are critical control points in the application environment. This paper examines the
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
Modern IT Operations Management. Why a New Approach is Required, and How Boundary Delivers
Modern IT Operations Management Why a New Approach is Required, and How Boundary Delivers TABLE OF CONTENTS EXECUTIVE SUMMARY 3 INTRODUCTION: CHANGING NATURE OF IT 3 WHY TRADITIONAL APPROACHES ARE FAILING
End Your Data Center Logging Chaos with VMware vcenter Log Insight
End Your Data Center Logging Chaos with VMware vcenter Log Insight By David Davis, vexpert WHITE PAPER Table of Contents Deploying vcenter Log Insight... 4 vcenter Log Insight Usage Model.... 5 How vcenter
Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools
A Software White Paper December 2013 Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools A Joint White Paper from Login VSI and Software 2 Virtual Desktop
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
UNIFIED PERFORMANCE MANAGEMENT
UNIFIED PERFORMANCE MANAGEMENT VISIBILITY CONTROL OPTIMIZATION COMPLETE WAN OPTIMIZATION Increase the speed and efficiency of your wide area network. Exinda s Unified Performance Management (UPM) solution
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Executive Summary As organizations
How to Build a Massively Scalable Next-Generation Firewall
How to Build a Massively Scalable Next-Generation Firewall Seven measures of scalability, and how to use them to evaluate NGFWs Scalable is not just big or fast. When it comes to advanced technologies
Virtualization Essentials
Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically
Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services
Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services What You Will Learn Windows Server on WAAS reduces the cost and complexity
The Purview Solution Integration With Splunk
The Purview Solution Integration With Splunk Integrating Application Management and Business Analytics With Other IT Management Systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview Integration
Performance Management for Enterprise Applications
performance MANAGEMENT a white paper Performance Management for Enterprise Applications Improving Performance, Compliance and Cost Savings Teleran Technologies, Inc. 333A Route 46 West Fairfield, NJ 07004
WHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
STEELCENTRAL APPRESPONSE
STEELCENTRAL APPRESPONSE REAL-TIME APPLICATION PERFORMANCE MONITORING BASED ON ACTUAL END-USER EXPERIENCE BUSINESS CHALLENGE Problems can happen anywhere at the end user device, on the network, or across
Server & Application Monitor
Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today
F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
A TECHNICAL REVIEW OF CACHING TECHNOLOGIES
WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,
RIVERBED APPRESPONSE
RIVERBED APPRESPONSE REAL-TIME APPLICATION PERFORMANCE MONITORING BASED ON ACTUAL END-USER EXPERIENCE BUSINESS CHALLENGE Problems can happen anywhere at the end user device, on the network, or across application
Open SDN for Network Visibility
SOLUTION GUIDE Open SDN for Network Visibility Simplifying large scale network monitoring systems with Big Tap 1 This solution guide describes how Big Tap, a network monitoring application from Big Switch
The Ultimate Guide to Gaining Control of the WAN
LAYLAND CONSULTING The Ultimate Guide to Gaining Control of the WAN A TechTarget Document Robin Layland November 2009 The e-book, The Ultimate Guide to Gaining Control of the WAN, explains the drivers
VMware vcloud Networking and Security
VMware vcloud Networking and Security Efficient, Agile and Extensible Software-Defined Networks and Security BROCHURE Overview Organizations worldwide have gained significant efficiency and flexibility
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. [ WhitePaper ]
[ WhitePaper ] PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. Over the past decade, the value of log data for monitoring and diagnosing complex networks has become increasingly obvious.
Traffic Visibility Networking (TVN) can Simplify and Scale IT Operations in a Networked World
Traffic Visibility Networking (TVN) can Simplify and Scale IT Operations in a Networked World January 2012 Prepared by: Zeus Kerravala Traffic Visibility Networking (TVN) can Simplify and Scale IT Operations
The Evolution of Load Testing. Why Gomez 360 o Web Load Testing Is a
Technical White Paper: WEb Load Testing To perform as intended, today s mission-critical applications rely on highly available, stable and trusted software services. Load testing ensures that those criteria
Simplified Management With Hitachi Command Suite. By Hitachi Data Systems
Simplified Management With Hitachi Command Suite By Hitachi Data Systems April 2015 Contents Executive Summary... 2 Introduction... 3 Hitachi Command Suite v8: Key Highlights... 4 Global Storage Virtualization
IBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
Presented by Philippe Bogaerts Senior Field Systems Engineer [email protected]. Securing application delivery in the cloud
Presented by Philippe Bogaerts Senior Field Systems Engineer [email protected] Securing application delivery in the cloud 2 The Leader in Application Delivery Networking Users Data Center At Home In the
Application Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
EMC Data Protection Advisor 6.0
White Paper EMC Data Protection Advisor 6.0 Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection environments, improve compliance
INSERT COMPANY LOGO HERE
INSERT COMPANY LOGO HERE 2014 Frost & Sullivan 1 We Accelerate Growth Technology Innovation Leadership Award Network Security Global, 2014 Frost & Sullivan s Global Research Platform Frost & Sullivan is
Test Run Analysis Interpretation (AI) Made Easy with OpenLoad
Test Run Analysis Interpretation (AI) Made Easy with OpenLoad OpenDemand Systems, Inc. Abstract / Executive Summary As Web applications and services become more complex, it becomes increasingly difficult
Mike Canney Principal Network Analyst getpackets.com
Mike Canney Principal Network Analyst getpackets.com 1 My contact info contact Mike Canney, Principal Network Analyst, getpackets.com [email protected] 319.389.1137 2 Capture Strategies capture Capture
whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management
whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management Taking the Guesswork Out of Network Performance Management EXECUTIVE SUMMARY Many enterprise
Brochure. Update your Windows. HP Technology Services for Microsoft Windows 2003 End of Support (EOS) and Microsoft Migrations
Brochure Update your Windows HP Technology Services for Microsoft End of Support (EOS) and Microsoft Migrations Stabilize and secure your infrastructure Microsoft will end support for Windows Server 2003/R2
A Look at the New Converged Data Center
Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable
Business Value of Microsoft System Center 2012 Configuration Manager
Business Value of Microsoft System Center 2012 Configuration Manager Sponsored by: Microsoft Corporation Publish date: February 2013 Abstract: Microsoft System Center 2012 Configuration Manager ( Configuration
A TECHNICAL WHITE PAPER ATTUNITY VISIBILITY
A TECHNICAL WHITE PAPER ATTUNITY VISIBILITY Analytics for Enterprise Data Warehouse Management and Optimization Executive Summary Successful enterprise data management is an important initiative for growing
Application Performance Monitoring (APM) Technical Whitepaper
Application Performance Monitoring (APM) Technical Whitepaper Table of Contents Introduction... 3 Detect Application Performance Issues Before Your Customer Does... 3 Challenge of IT Manager... 3 Best
Riverbed SteelCentral. Product Family Brochure
Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,
NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring
NitroView Unified Security and Compliance Unmatched Speed and Scale Application Data Monitoring Database Monitoring Log Management Content Aware SIEM TM IPS Today s security challenges demand a new approach
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF
NFX FOR MSP SOLUTION BRIEF SP Monitor Jump Start Security-as-a-Service Designed to give you everything you need to get started immediately providing security-as-a service, SP Monitor is a real-time event
Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks
IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
Network Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/
An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
Scalability in Log Management
Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com [email protected] Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
Header 1. John T. Irwin Software Consulting Manager EMEA Managing End User Experience
Header 1 John T. Irwin Software Consulting Manager EMEA Managing End User Experience BSM Addressing Proactive Operations Planning, predictive analytics, and preventative automation to improve IT s response
Support the Era of the App with End-to-End Network and Application Performance Visibility
Support the Era of the App with End-to-End Network and Application Performance Visibility Traditional Performance Management Is Not Enough The realities of the modern IT landscape are daunting. Your business-critical
White Paper Integrating The CorreLog Security Correlation Server with BMC Software
orrelogtm White Paper Integrating The CorreLog Security Correlation Server with BMC Software This white paper describes how the CorreLog Security Correlation Server easily integrates with BMC Performance
RAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Overcoming Obstacles to Retail Supply Chain Efficiency and Vendor Compliance
Overcoming Obstacles to Retail Supply Chain Efficiency and Vendor Compliance 0 GreenLionDigital.com How process automation, data integration and visibility, advanced analytics, and collaboration improve
I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
VDI FIT and VDI UX: Composite Metrics Track Good, Fair, Poor Desktop Performance
VDI FIT and VDI UX: Composite Metrics Track Good, Fair, Poor Desktop Performance Key indicators and classification capabilities in Stratusphere FIT and Stratusphere UX Whitepaper INTRODUCTION This whitepaper
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP
5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP With support for Cisco ACE load balancer ending, organizations need to find an alternative. Contents Introduction 3 Advanced Architecture 3 Ease of
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
A business intelligence agenda for midsize organizations: Six strategies for success
IBM Software Business Analytics IBM Cognos Business Intelligence A business intelligence agenda for midsize organizations: Six strategies for success A business intelligence agenda for midsize organizations:
Riverbed SteelCentral. Product Family Brochure
Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,
Meeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
W H I T E P A P E R A p p l i c a t i o n D e l i v e r y f o r C l o u d S e r v i c e s : C u s t o m i z i n g S e r v i c e C r e a t i o n i n V i r t u a l E n v i r o n m e n t s Sponsored by: Brocade
QRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
How To Make Data Streaming A Real Time Intelligence
REAL-TIME OPERATIONAL INTELLIGENCE Competitive advantage from unstructured, high-velocity log and machine Big Data 2 SQLstream: Our s-streaming products unlock the value of high-velocity unstructured log
Redefining Infrastructure Management for Today s Application Economy
WHITE PAPER APRIL 2015 Redefining Infrastructure Management for Today s Application Economy Boost Operational Agility by Gaining a Holistic View of the Data Center, Cloud, Systems, Networks and Capacity
Cloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst
White Paper EMC s Enterprise Hadoop Solution Isilon Scale-out NAS and Greenplum HD By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst February 2012 This ESG White Paper was commissioned
Network Security Monitoring: Looking Beyond the Network
1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT [email protected] [email protected] February 8, 2011 2 Abstract Network security monitoring
Network Monitoring Fabrics Are Key to Scaling IT
Network Monitoring Fabrics Are Key to Scaling IT September 2014 Prepared by: Zeus Kerravala Network Monitoring Fabrics Are Key to Scaling IT by Zeus Kerravala September 2014 º º º º º º º º º º º º º º
HyperQ Remote Office White Paper
HyperQ Remote Office White Paper Parsec Labs, LLC. 7101 Northland Circle North, Suite 105 Brooklyn Park, MN 55428 USA 1-763-219-8811 www.parseclabs.com [email protected] [email protected] Introduction
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1 Introduction What s in a name? SIEM? SEM? SIM? Technology Drivers Challenges & Technology Overview Deciding what s right for you Worst
IBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser
Kaseya Product Brief The Kaseya Platform Making your systems more secure, your staff more productive, your services more reliable and your results easier to validate. No matter what part of Kaseya s integrated
