Cloud-Scale BGP and NetFlow Analysis. Jim Frey, VP Product, Kentik Technologies December 15, 2015
|
|
|
- Malcolm Johnson
- 9 years ago
- Views:
Transcription
1 Cloud-Scale BGP and NetFlow Analysis Jim Frey, VP Product, Kentik Technologies December 15, 2015
2 Agenda Common NetOps Stress points Helpful Data Sets NetFlow, BGP Handling NetFlow and BGP at Cloud Scale Kentik s Approach Wrap-Up / Q&A 2
3 NetOps Stress Points: Needing Instant Answers Things You Need Answers to About/From Your Network Where in my network is the problem? Is this an attack or legitimate traffic? Does performance meet expectations? How should I allocate my resources in the future? $$$ X S S S R R S S S $$$ S S R R S S $$$
4 What We Hear. To Address These Questions, NetOps Needs: Accurate Visibility, Without Delay Relevant Alerts: No False Positives or Negatives Complete Data: Breadth + Depth Fast/Flexible Data Exploration Tools that don t suck (time or $$) 4
5 What Data Sets Can Help? And which ones can do the job cost effectively? 5
6 Primary Network Monitoring Data Choices Polled Stats Examples - SNMP, WMI Advantages - Ubiquitous - Good for monitoring device health/status/activity Disadvantages - No traffic detail - Typically n o frequen t th an every 5 minutes truly antireal-time Flow Records Examples - NetFlow, sflow, IPFIX Advantages - Details on traffic src/dest/content, etc. - Very cost effective Disadvantages - NRT (near real-time) at best - Incomplete app-layer detail - Limited performance metrics - Data volumes can be massive Packet Inspection Examples - Packets -> xflow - Long term stream-to-disk Advantages - Most complete app layer detail - True real-time (millisecond lvl) - Complete vendor independent Disadvantages - Expensive to deploy at scale - Requires network tap or SPAN - Packet captures can be massive 6
7 Secondary Network Monitoring Data Choices Log Records Examples - Syslog Advantages - Continuous/streaming - Unique, device-specific info - True real-time Disadvantages - No standards must have very flexible search/mapping tools - Data volumes can be massive Routing/Path Data Examples - OSPF, IGRP, BGP Advantages - Details on traffic paths and provider volumes - Insights into Internet factors Disadvantages - Address data only no awareness of traffic - Must peer with routers to get updates Synthetic Agents Examples - IP SLA, Independent test sw Advantages - Assess functions/services 24x7 - Provides both availability and performance measures Disadvantages - Deploying/maintaining enough agents to achieve full coverage - Only an approximation of real user experience (at best) 7
8 Key Assertion: Use Multiple Data Types for Best Results You never know which data set will present the specific insights you need The challenge (real magic) comes from correlating multiple datasets, i.e.: Behavioral observations with configuration changes Trends with underlying traffic details Routing data with traffic data 8
9 Why Correlate Routing Data with Traffic Data? For Providers Recognizing new service opportunities based on subscriber (and peer) behavior Optimizing peering relationships for cost control For Web Services / Commerce Recognizing where your customers are and how they reach you Managing peering relationships for best customer experience For Enterprise Assessing how your connectivity providers perform/compare Building Internet IQ how you connect/relate to the outside world 9
10 Cloud Scale for NetFlow and BGP: The Big Data Challenge Why can t we just use our existing tools? 10
11 Existing Tools: Falling Behind Network traffic has grown exponentially; Legacy tools/tech haven t kept pace. Result? Fragmented tools, visibility gaps, unanswered questions. Cloud, SaaS, Big Data 10G 100G 1G 10M 100M
12 Why Big Data? - Network Monitoring Data IS Big Data - Meets Volume/Variety/Velocity Test - Billions of records/day (millions/second) - Big Data architectures are considered best practices today for open/flexible correlation, analytics 12
13 Why Big Data? - Network Monitoring Data IS Big Data - Meets Volume/Variety/Velocity Test - Billions of records/day (millions/second) - Big Data architectures are considered best practices today for open/flexible correlation, analytics Specific Challenges For NetFlow + BGP Existing solutions shortfalls: - Flexibility for moving between viewpoints and into full details - Data Completeness due to reliance on summarized/aggregated flow data - Speed: Generating new analysis in a timely manner 13
14 How to Get/Use Big Data Approach? 14
15 How to Get/Use Big Data Approach? 1. BYO Build Your Own Pick back end & reporting/analysis tools (open source = free?) Procure operating platforms (hard, virtual, or cloud servers = $$) Integrate, add data sources, and get it up and running (dev = $$) Keep it up and running (ops/admin = $$) 15
16 How to Get/Use Big Data Approach? 1. BYO Build Your Own Pick back end & reporting/analysis tools (open source = free?) Procure operating platforms (hard, virtual, or cloud servers = $$) Integrate, add data sources, and get it up and running (dev = $$) Keep it up and running (ops/admin = $$) 2. Let SOMEONE ELSE build/optimize/operate Subscribe to SaaS (ops $$) Just Send Your Data and enjoy the ride! 16
17 Kentik s Answer How we address the Big Data challenge to meet the needs of Network Operators now 17
18 Kentik Detect: the first and only SaaS Solution For Network Ops Management & Visibility at Terabit Scale Web Portal Real-time & historical queries S S S R R NetFlow/ sflow/ipfix SNMP BGP Kentik Data Engine Alerts / Syslog / JSON Open API SQL / RESTful The Network is the Sensor Big Data Network Telemetry Platform Analyze & Take Action CLOUD- BASED REAL- TIME MULTI- TENANT OPEN GLOBAL
19 What s Behind the Kentik Data Engine Multi-tiered/Clustered for Scale / Load Balancing / HA, Hosted by Kentik INGEST CLUSTER DATA STORAGE CLUSTER CLIENTS POSTGRES SERVERS NetFlow SNMP BGP SQL N M Optimized for Massive Data Ingest & Rapid Query Response
20 Kentik Portal Dashboard 20
21 Top Traffic Flows 21
22 Traffic by Source Geography 22
23 AS Path Changes 23
24 AS Top Talkers and Drill Down Options 24
25 Peering Analytics: ASN by Dest Country Paths 25
26 Peering Analytics: Traffic by BGP Paths 26
27 Peering Analytics: Traffic by Origin AS ( Last Hop ) 27
28 Peering Analytics: Traffic by Transit AS 28
29 Key Takeaways: Cloud Scale NetFlow + BGP Why You Need It - Clear Insight into external/internet network traffic behaviors - Improved customer/subscriber engagement - Reduced network operating costs Technical Path to Success - This is a big data problem, requiring high capacity/speed for data management, correlation, exploration, and analytics - SaaS solutions are a fully viable option
30 Network Intelligence at Terabit Scale Thank You! Jim Frey VP Product Kentik
The Kentik Data Engine
The Kentik Data Engine A CLUSTERED, MULTI-TENANT APPROACH FOR MANAGING THE WORLD S LARGEST NETWORKS When Kentik set out to build a network traffic monitoring solution that would be scalable, high-precision,
Application Performance Management (APM) Inspire Your Users With Every App Transaction. Anand Akela CA Technologies @aakela
Application Performance Management (APM) Inspire Your Users With Every App Transaction Anand Akela CA Technologies @aakela Agenda 1 2 3 The App Economy Business Reputation Relies on App Experience APM
End-to-End Network Centric Performance Management
End-to-End Network Centric Performance Management Gordon Bolt [email protected] Application Performance Networks exist to support applications and services Application or End-User Experience is what matters
Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery
Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers
Riverbed SteelCentral. Product Family Brochure
Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,
Riverbed SteelCentral. Product Family Brochure
Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,
WHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
Elevating Data Center Performance Management
Elevating Data Center Performance Management Data Center innovation reduces operating expense, maximizes employee productivity, and generates new sources of revenue. However, many I&O teams lack proper
The Value of Flow Data for Peering Decisions
The Value of Flow Data for Peering Decisions Hurricane Electric IPv6 Native Backbone Massive Peering! Martin J. Levy Director, IPv6 Strategy Hurricane Electric 22 nd August 2012 Introduction Goal of this
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1 Introduction What s in a name? SIEM? SEM? SIM? Technology Drivers Challenges & Technology Overview Deciding what s right for you Worst
Network Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
Network Operations Analytics
Network Operations Analytics Solution Guide December 2015 TP2 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 2 Solution Components... 3 Before
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
Logentries Insights: The State of Log Management & Analytics for AWS
Logentries Insights: The State of Log Management & Analytics for AWS Trevor Parsons Ph.D Co-founder & Chief Scientist Logentries 1 1. Introduction The Log Management industry was traditionally driven by
SolarWinds Network Performance Monitor powerful network fault & availabilty management
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
The Purview Solution Integration With Splunk
The Purview Solution Integration With Splunk Integrating Application Management and Business Analytics With Other IT Management Systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview Integration
Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com [email protected]
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
How To Get Started With Whatsup Gold
WhatsUp Gold v16.2 Getting Started Guide Co Welcome Welcome to WhatsUp Gold... 1 About WhatsUp Gold... 1 WhatsUp Gold Editions... 2 Deploying Deploying WhatsUp Gold... 4 STEP 1: Prepare the network...
Splunk for Networking and SDN
Copyright 2013 Splunk Inc. Splunk for Networking and SDN Stela Udovicic Senior Product Marke?ng Manager, Splunk #splunkconf Legal No?ces During the course of this presenta?on, we may make forward- looking
Cheap and efficient anti-ddos solution
Cheap and efficient anti-ddos solution Who am I? Alexei Cioban Experience in IT 13 years CEO & Founder IT-LAB 7 years IT trainings 5 years 2 About company Year of foundation - 2007 12 employees www.it-lab.md
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA What is ReporterAnalyzer? ReporterAnalyzer gives network professionals insight into how application traffic is impacting network performance.
SOLARWINDS NETWORK PERFORMANCE MONITOR
DATASHEET SOLARWINDS NETWORK PERFORMANCE MONITOR Fault, Availability, Performance, and Deep Packet Inspection SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud
Regaining MPLS VPN WAN Visibility with Route Analytics Seeing through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN connectivity to MPLS VPN
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]
[ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting
INFRASTRUCTURE MONITORING:
Speed at Scale Infrastructure Monitoring [ DataSheet ] INFRASTRUCTURE MONITORING: INTEGRATED METRICS, FLOWS AND LOGS. More and more of today s service delivery environments are moving to hyperscale-based
EMC STORAGE RESOURCE MANAGEMENT SUITE
EMC STORAGE RESOURCE MANAGEMENT SUITE Aligning and optimizing storage to meet service level objectives Gintaras Pelenis EMC SE Controlling the Cost of Data Growth Rapid data growth leads to rising storage
Managing LTE IP Transport Networks with Route Analytics
Managing LTE IP Transport Networks with Route Analytics WHITE PAPER Table of Contents Executive Summary 3 LTE Core and Backhaul Transport Architectures 4 Why IP Networks Are Inherently Unpredictable 4
Decoding the Big Data Deluge a Virtual Approach. Dan Luongo, Global Lead, Field Solution Engineering Data Virtualization Business Unit, Cisco
Decoding the Big Data Deluge a Virtual Approach Dan Luongo, Global Lead, Field Solution Engineering Data Virtualization Business Unit, Cisco High-volume, velocity and variety information assets that demand
Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data
Minder simplifying IT All-in-one solution to monitor Network, Server, Application & Log Data Simplify the Complexity of Managing Your IT Environment... To help you ensure the availability and performance
Monitoring Log Management and Alerting
Monitoring Log Management and Alerting Services Description February 2009 1 / 24 Contents Monitoring Log Management and Alerting... 1 1. Centralized Management... 3 1.1. Centralized management :... 3 1.2.
WhatsUp Gold 2016 Getting Started Guide
WhatsUp Gold 2016 Getting Started Guide Contents CHAPTER 1 Welcome Welcome to WhatsUp Gold... 1 About WhatsUp Gold... 1 WhatsUp Gold Editions... 2 Deploying Deploying WhatsUp Gold... 5 STEP 1: Prepare
Essential Ingredients for Optimizing End User Experience Monitoring
Essential Ingredients for Optimizing End User Experience Monitoring An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Neustar IT MANAGEMENT RESEARCH, Table of Contents Executive Summary...1
Real-Time Traffic Engineering Management With Route Analytics
Real-Time Traffic Engineering Management With Route Analytics Executive Summary Increasing numbers of service providers and mobile operators are using RSVP-TE based traffic engineering to provide bandwidth
Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
Network Monitoring. Easy, failsafe, and complete visibility of your network. Our customers have the same view as our NOC technicians.
One software solution to monitor your entire network, including devices, applications, traffic, and availability. Network monitoring is the constant evaluation fo your systems performance within the IT
Ipswitch WhatsUp Gold vs. Solarwinds Orion Comparing Product Offerings
Ipswitch WhatsUp Gold vs. Solarwinds Orion Comparing Product Offerings Matched Capabilities, Yet Multifold Differences in Cost by MarketPlane Consulting sponsored by Ipswitch March 2010 INTRODUCTION With
RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL
RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL Pascal Geenens CONSULTING ENGINEER, JUNIPER NETWORKS [email protected] BUSINESS AGILITY Need to create and deliver new revenue opportunities faster Services
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
Server & Application Monitor
Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich
SolarWinds Network Performance Monitor
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,
AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst
ESG Lab Spotlight AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst Abstract: This ESG Lab Spotlight details ESG s hands-on testing of
Measuring end-to-end application performance in an on-demand world. Shajeer Mohammed Enterprise Architect
Measuring end-to-end application performance in an on-demand world Shajeer Mohammed Enterprise Architect Agenda 1 Introduction to CA 2 Application Performance Management and its Need 3 How CA Solutions
Delivering actionable service knowledge
Delivering actionable service knowledge Converged Infrastructure Monitoring and Management (CIM 2 ) Delivering actionable service knowledge Converged Infrastructure Monitoring & Management (CIM 2 ) from
Network Security Monitoring: Looking Beyond the Network
1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT [email protected] [email protected] February 8, 2011 2 Abstract Network security monitoring
Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management
Routing & Traffic Analysis for Converged Networks Filling the Layer 3 Gap in VoIP Management Executive Summary Voice over Internet Protocol (VoIP) is transforming corporate and consumer communications
MSP. HOW MSPs Can Use Performance Monitoring to Create New Revenue Streams. [ WhitePaper ] Introduction
[ WhitePaper ] MSP HOW MSPs Can Use Performance Monitoring to Create New Revenue Streams. Introduction Today s Managed Service Providers (MSPs) face the common challenge of needing to grow revenue and
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views
Kaseya Product Brief Kaseya Traverse Predictive SLA Management and Monitoring Kaseya Traverse Traverse is a breakthrough cloud and service-level monitoring solution that provides real time visibility into
Securing and Monitoring BYOD Networks using NetFlow
Securing and Monitoring BYOD Networks using NetFlow How NetFlow can help with Security Analysis, Application Detection and Traffic Monitoring Don Thomas Jacob Technical Marketing Engineer ManageEngine
The Shortcut Guide To. Smart Network Management for the SMB. Chris Hampton. Network Management Software
tm The Shortcut Guide To Smart Network Management for the SMB Network Management Software Ch apter 4: Four Must Have Features for a Smart Network Management Solution... 45 Ge t Answers When You Need Them...
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
Visualization, Management, and Control for Cisco IWAN
Visualization, Management, and Control for Cisco IWAN Overview Cisco Intelligent WAN (IWAN) delivers an uncompromised user experience over any connection, whether that connection is Multiprotocol Label
Network Metrics Content Pack for VMware vrealize Log Insight
Network Metrics Content Pack for VMware vrealize Log Insight User Manual Version 2.1 June, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction...
SolarWinds Network Performance Monitor
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,
whitepaper SolarWinds Integration with 3rd Party Products Overview
SolarWinds Integration with 3rd Party Products Overview This document is intended to provide a technical overview of the integration capabilities of SolarWinds products that are based on the Orion infrastructure.
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
To Receive CPE Credit
Outcome Metrics for National Associations November 17, 2015 To Receive CPE Credit Participate in entire webinar Answer attendance checks & polls when they are provided If you are viewing this webinar in
How To Create Situational Awareness
SIEM: The Integralis Difference January, 2013 Avoid the SIEM Pitfalls Get it right the first time Common SIEM challenges Maintaining staffing levels 24/7 Blended skills set, continuous building of rules
One software solution to monitor your entire network, including devices, applications traffic and availability.
One software solution to monitor your entire network, including devices, applications traffic and availability. About Britannic Expert Integrators We are award winning specialists in IP communications,
CA Opscenter: Delivering Exceptional Customer Experience in the Application Economy
CA Opscenter: Delivering Exceptional Customer Experience in the Application Economy Carl Lloyd, Business Lead, Service Assurance 17th June 2014 THIS IS THE AGE OF THE APPLICATION ECONOMY AND IT S ALL ABOUT
7 Key Requirements for Distributed Network Monitoring
7 Key Requirements for Distributed Network Monitoring WHITE PAPER Distributed network monitoring uses dispersed data-collection points and analysis services to give IT administrators and business managers
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
STEALTHWATCH MANAGEMENT CONSOLE
STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations
IBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
Cisco Remote Management Services for Security
Cisco Remote Management Services for Security Innovation: Many Take Advantage of It, Some Strive for It, Cisco Delivers It. Cisco Remote Management Services (RMS) for Security provide around the clock
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
Who is Generating all This Traffic?
Who is Generating all This Traffic? Network Monitoring in Practice Luca Deri Who s ntop.org? Started in 1998 as open-source monitoring project for developing an easy to use passive monitoring
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
Network Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
Designing and Building an Open IT Operations Analytics (ITOA) Architecture
WHITE PAPER Designing and Building an Open IT Operations Analytics (ITOA) Architecture Abstract This white paper provides a roadmap for designing and building an open IT Operations Analytics (ITOA) architecture.
SecurityDAM On-demand, Cloud-based DDoS Mitigation
SecurityDAM On-demand, Cloud-based DDoS Mitigation Table of contents Introduction... 3 Why premise-based DDoS solutions are lacking... 3 The problem with ISP-based DDoS solutions... 4 On-demand cloud DDoS
Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance
White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,
QRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
Scalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
Leveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
The Time has come for A Single View of IT. Sridhar Iyengar March 2011
The Time has come for A Single View of IT Sridhar Iyengar March 2011 ManageEngine Portfolio Network Servers & Applications Desktop ServiceDesk Windows Infrastructure Event Log & Compliance Security Network
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
Extreme Networks Purview Application Analytics Integration with VMware vrealize Log Insight
Extreme Networks Purview Application Analytics Integration with VMware vrealize Log Insight Application Note Abstract: This document describes the integration of Extreme Networks Purview Application Analytics
How To Make Data Streaming A Real Time Intelligence
REAL-TIME OPERATIONAL INTELLIGENCE Competitive advantage from unstructured, high-velocity log and machine Big Data 2 SQLstream: Our s-streaming products unlock the value of high-velocity unstructured log
Header 1. John T. Irwin Software Consulting Manager EMEA Managing End User Experience
Header 1 John T. Irwin Software Consulting Manager EMEA Managing End User Experience BSM Addressing Proactive Operations Planning, predictive analytics, and preventative automation to improve IT s response
Hillstone Intelligent Next Generation Firewall
Hillstone Intelligent Next Generation Firewall Kris Nawani Solution Manager (Thailand) 12 th March 2015 1 About Hillstone Networks Founded 2006 by Netscreen visionaries World class team with security,
Maintaining Non-Stop Services with Multi Layer Monitoring
Maintaining Non-Stop Services with Multi Layer Monitoring Lahav Savir System Architect and CEO of Emind Systems [email protected] www.emindsys.com The approach Non-stop applications can t leave on their
Flow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
How To Sell Security Products To A Network Security Company
Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that
Comprehensive Security with Splunk and Cisco
Copyright 2014 Splunk Inc. Comprehensive Security with Splunk and Cisco Mario MASSARD Splunk Senior SE [email protected] Company Company (NASDAQ: SPLK) Founded 2004, first software release in 2006 HQ: San
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
API Management: Powered by SOA Software Dedicated Cloud
Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting
Network Performance Management Solutions Architecture
Network Performance Management Solutions Architecture agility made possible Network Performance Management solutions from CA Technologies compliment your services to deliver easily implemented and maintained
Optimizing Service Levels in Public Cloud Deployments
WHITE PAPER OCTOBER 2014 Optimizing Service Levels in Public Cloud Deployments Keys to Effective Service Management 2 WHITE PAPER: OPTIMIZING SERVICE LEVELS IN PUBLIC CLOUD DEPLOYMENTS ca.com Table of
Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka
Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka Tim Evens ([email protected]) NANOG-65 Traditional Method: VTY (cli/netconf/xml) Data is polled instead of pushed (not real-time) Large queries
