ASSURING THE PERFORMANCE OF CLOUD-BASED APPLICATIONS
|
|
|
- Maria Stafford
- 10 years ago
- Views:
Transcription
1 WHITEPAPER The rapid emergence of software-as-a-service (SaaS) applications over the last four or five years has empowered businesses to increase revenue and reduce operational costs. Salesforce.com, NetSuite, Workday and other SaaS applications have been deployed by thousands of companies, from multinational corporations to small businesses. Their performance and reliability have become critical to business operations because they deliver core functionalities including CRM, ERP, accounting, communications and training. CORE BUSINESS NEED SAAS APPLICATION BANDWIDTH CONSUMPTION Ongoing training and education Weekly, monthly, quarterly reports or statements on business operations Large documents such as reports, CAD files, or presentations Protection against loss of data; recovering data after a disaster On-line audio/video training (Examples: Taleo, SumTotal, SuccessFactors) Data queries, dashboards and business intelligence information (Examples: Salesforce.com, NetSuite, Workday) Large document transfer (Examples: Office365; Box.net; Yousendit) Cloud storage/backup (Examples: evault; CrashPlan; Mozy; Carbonite) 200Kbps Mobile Device 400Kbps 1Mbps - Desktop 200Kbps 1Mbps - Desktop 50Kbps 200Kbps 100Kbps 1Mbps SaaS applications are easily and quickly deployed. But they present a new challenge: the whole SaaS infrastructure application servers, storage and network connectivity is outside the control of business IT. Here are a few of the many ways in which unpredictable access or performance of core SaaS applications can affect a business: 1. Missed order bookings before the end of a reporting period 2. Incomplete financial reporting 3. Loss of compliance with industry and regulatory statutes for training 4. Delays in construction projects due to holdups in design completion and review Another effect of SaaS performance and reliability issues is the impact of user complaints on IT. Users don t call Salesforce.com or Workday about performance or access problems; they call IT. The burdens of trouble ticket capture, review and reporting impact IT personnel and IT projects designed to expand business services or reduce costs. SaaS Traffic Load Examples Of course, SaaS applications consume bandwidth. This can range from smaller amounts of bandwidth from incremental database updates to very large video downloads for learning management systems. Impact of Recreational Traffic on SaaS Performance SaaS applications come into a business network through Internet connections. These connections also serve VPN traffic from remote users who are trying to access internal applications. Meanwhile, employees are using the same Internet access points for recreational purposes. The reality is that core SaaS applications are fighting for bandwidth with YouTube videos, online gaming, and uploads of photos from the family trip to Disneyland. Here are some examples of bandwidth consumption by recreational traffic: 1
2 RECREATIONAL ACTIVITY YouTube video viewing BYOD OS update IMPACT ON NETWORK BANDWIDTH 200Kbps Mobile phone 400Kbps - Tablet 1Mbps 1.5Mbps Desktop/laptop 50MB 920MB 500Kbps 50MB 14 minutes hours Online gaming 50Kbps 100Kbps 30 minutes = 10.8 MBs 20 minutes = 14.4 MBs Uploading a 1-minute child s birthday party video (230MB) 500Kbps upload = 1 hour 4 minutes What Options Do You Have for Ensuring SaaS App Access and Performance? built into all routers, and any network administrator should know how to login and configure QoS on them. So if SaaS applications consume bandwidth and compete for bandwidth with other applications, what are the options for managing performance over the network? Here are the five most common alternatives: 1. Buy additional Internet bandwidth. IT simply grows the Internet access point(s) with external providers. Pro: Adding bandwidth is easy. Vendors will gladly offer quotes and time frames. Con: New capacity is expensive, and is quickly consumed by nonbusiness applications because most networks have neither Layer 7 visibility nor control of bandwidth consumption. With no optimization (protocol optimization, compression, or caching) in place, redundant traffic like BYOD OS or application updates continues to traverse the network unabated. This leads to a vicious cycle of adding costly bandwidth to improve SaaS performance and watching non-business traffic expand to consume it. 2. Turn on or tune QoS on routers. All network routers can maintain a basic quality of service (QoS) level on network traffic coming across the ports. Pro: Using the command line interface (CLI) level, setting up a QoS configuration for traffic on router ports is fast and easy. The feature is Con: Routers lack the application and content intelligence necessary to make QoS useful. They create risk and cannot manage inbound QoS. Intelligence refers to the ability to differentiate Salesforce.com, Webex, NetSuite, or Office365 from YouTube, BBC and ESPN. To a router, it s all port 80 traffic. Even if you can identify the traffic, creating complex ACLs on routers is often viewed as a dangerous operational step. Most network operations groups prefer to limit router QoS to setting MPLS CoS classes; more advanced ACLs are very difficult to scale across a large distributed environment, and can destabilize the core router functions. Lastly, routers use queuing for QoS. That s great on outbound traffic, but inbound queuing happens after contention has taken place, making it an ineffective approach. 3. Implement application and content QoS. IT can install and configure an appliance or a virtual appliance application (VA) that provides visibility or control (QoS) by application and content. Pro: This approach allows network administrators to allocate and prioritize Internet connectivity bandwidth according to the business value of each application. This protects Internet bandwidth for key SaaS applications and ensures that recreational traffic is contained, so the vicious cycle of bandwidth-buying is avoided. Con: Application and content visibility applications don t provide optimization leverage to mitigate the flow of redundant data across the network. 2
3 4. Use traditional symmetric WAN optimization. Pro: Traditional WAN optimization uses a symmetric model to accelerate most types of WAN traffic, including CIFS, FTP, TCP and iscsi. It can make application performance feel like local performance even from 7,000 miles away on another continent and reduce bandwidth by up to 90 percent. Con: Symmetric WAN optimization is impractical for SaaS applications. For it to work, it would have to be deployed as an appliance or a virtual appliance at each SaaS vendor s data center, which would present management and cost challenges. It would also require IT to go to all SaaS vendors and get them to agree to install a WAN optimization solution in their infrastructures. Setup, maintenance and support would have to be negotiated. Not by any means an easily scalable or repeatable structure. Additionally, the QoS mechanisms on WAN optimization equipment are much like those of routers they re very coarse, lack the application and content intelligence to be effective, and only affect OUTBOUND traffic. 5. Implement asymmetric caching and splitting. Asymmetric caching and splitting is the dynamic caching of data by a single appliance and splitting and serving it as needed. When the content is no longer being accessed, it s aged out of the cache. Pro: Asymmetric caching stores rich web content that is accessed repeatedly. It splits live video (such as a CEO webcast) and caches and splits on-demand video (like music videos from YouTube). It optimizes both enterprise cloud applications and general Internet traffic to reduce bandwidth consumption. Con: Asymmetric caching typically works only with HTTP, HTTPS and video traffic (not with legacy or storage protocols). It only optimizes repeat access to a specific piece of content, such as a video file, a document, or a dashboard element. Clearly, none of these options can ensure reliable access and performance for SaaS applications. Let s review the capabilities of a complete SaaS performance solution which Blue Coat can provide. Best Practices for Ensuring SaaS Access and Performance The Basic Question: How Does Network Bandwidth Usage Align with Goals? To compare Internet network capacity with operational goals, businesses must have visibility into the traffic on the network, a means of controlling and prioritizing it and, finally, a way to accelerate and optimize applications and protocols. Blue Coat provides tools that enable you to implement effective strategies. 1. Reserve Internet Bandwidth for Critical SaaS Applications Cloud and SaaS applications are typically accessed via Internet links. Those links can suffer contention due to spikes in usage, which slow delivery of cloud applications. By reserving bandwidth for cloud applications, you can better assure performance. To do this, however, you need QoS systems that are intelligent enough to identify cloud applications and differentiate them from other port 80/443 traffic. Step 1 illustrates an application and content level view of traffic that can drive QoS policy on a Blue Coat PacketShaper. Here s what this enables you to do: lnternet links can be partitioned to reserve 25 percent of bandwidth for cloud applications. 3
4 Priorities can provide a simple way to allocate bandwidth, giving more important SaaS applications higher priority. They can also prioritize access to burstable partitions. Dynamic sub-partitions can allocate bandwidth fairly on the whole link or within a partition among active users. This can be beneficial for individual SaaS application sessions or virtual desktop deployments. Application-based MPLS tagging allows you to set DiffServ, TOS bits and even MPLS labels at an application level, saving you from complex router ACLs. 2. Contain Contentious Applications with Specialized Asymmetric QoS Video traffic YouTube, BBC and other media outlets move huge amounts of video that is consuming 80 percent of all Internet capacity today. The volume of traffic generated by celebrity deaths, tragedies, news events or just everyday usage can crowd out SaaS applications. Then there s the mind-boggling traffic from iphones, ipads and Androids: app downloads, content downloads, OS downloads, video and picture uploads and cloud drive/backup systems that together have created a GB network data load per user. You can manage this traffic with a containment partition. Most QoS technologies, however, work as queues; they can t control the remote servers that can flood your network with traffic. With Blue Coat, the combination of application-level QoS and asymmetric TCP rate-control technologies can intelligently manipulate window sizes and ACKs to throttle the sending rates of remote servers, effectively enforcing QoS policies: Partitions can limit recreational traffic to 10 or 20 percent of capacity. A low priority for bursting gives recreational traffic access to additional bandwidth when excess capacity is low. If business-critical cloud applications need the bandwidth, their higher priority to burstable bandwidth will take effect. Application-based MPLS tagging allows you to set DiffServ, TOS bits and even MPLS labels at an application level, saving you from complex router ACLs. All these policies are driven by the Blue Coat application-level view of traffic and are simple to implement. You can immediately contain the impact of undesirable traffic and assure bandwidth availability for key applications. 3. Monitor Response Times As you manage bandwidth, smart tools can passively monitor the response times of key applications. By tracking network delay, server delay and total delay, you can set proactive alarms that alert when you dip below expected performance levels for example, an SNMP trap when Salesforce.com normalized network delay exceeds 1000ms. You can then be aware of degrading conditions before users start phoning in complaints. There are a number of response time statistics onboard PacketShaper. These statistics are passively calculated based on TCP data transaction heuristics. They are not perfect end user views, but rather indicators of when performance is degrading. Normalized Network Delay is one of the key statistics; it tracks transaction times on the network, normalized across transactions with small data sets (http page load) or very large dataset transfers (FTP of a 100MB file). You can: Break out top 5 SaaS applications onto the traffic tree. Monitor performance levels to identify baselines of normal performance, noting spikes in response times. Set a total delay threshold at 1000ms (base); set a normalized network delay baseline of 300ms or a Round Trip Time (RTT) at the expected link latency (e.g. 60ms for a domestic MPLS link, 150ms for an Internet link). Configure an SNMP trap to trigger when either of the two thresholds are violated. 4
5 4. Leverage Asymmetric Acceleration to Speed Performance and Reduce Bandwidth of SaaS WAN optimization technologies are used to reduce bandwidth and accelerate performance. Because they typically require something on each side of the transaction, they are mostly useless for SaaS apps, where vendors don t use that type of optimization. Asymmetric caching technologies a single appliance or virtual appliance at the branch office and/or Internet ingress can speed delivery significantly. You can intelligently cache entire video files, dashboard queries, business Intelligence reports accelerating performance 25X and multiplying bandwidth to 500X. The impact of video and application downloads to mobile devices can be minimized by object-caching on the Blue Coat ProxySG/MACH5 appliance. The ProxySG/MACH5 caches the first download. Subsequent requests for that download will be served directly from the local appliance instead of the WAN and the Internet. When demand ceases, the video, download, or web-page screen build will age out and be removed from the cache. It s critical that all popular video delivery methods be supported to mitigate the impact of video on business operations. ProxySG/MACH5 supports all popular video formats. It communicates with video-serving servers to pull down a single stream to a requesting location and split it into as many real-time streams as local branch users have requested. The same principle applies to on-demand video, but in that case the ProxySG/MACH5 caches the video for users who call up the video later for example, when they receive an ed URL from a coworker. ProxySG (ProxyEdition or MACH5) accelerates and optimizes: 5. Gain Visibility into Usage of Network Resources with a Real-Time, Granular View of Internet Traffic To manage application traffic on your network you must have a granular view of it granular enough to let you differentiate web-based applications and content. Knowing that traffic is coming via Port 80 or Port 443 doesn t help you to understand what s impacting internal applications. Your visibility into Internet traffic must be granular enough to let you identify it by flow (business vs. recreational) and in real time, so you can see traffic bursts, respond quickly, and see instant results. 10% Online meetings 2% Remote access 2% SAP 4% VoIP 2% Entire videos, BI dashboards, files and web content cached on box Distribute fresh content from cache multiple times to authorized users Accelerate performance 25x Reduce bandwidth 20-70% Information 10% At-risk 5% SaaS app screen builds and applications: HTTP objects, screen builds, Java Applets, business intelligence dashboards, documents and more File Services 4% Commerce 5% Leisure 4% Video (news, YouTube, social networks, regional television): Adobe Flash, native and encrypted (RTMP, RTMPe); Microsoft Silverlight (HTTP/RTSP); HTML5; Apple QuickTime; HTTP/SSL BYOD: ios and Android OS updates, app downloads and updates, photo and video uploads and downloads Social networks: webpage screen builds, online games, photo and video uploads and downloads Backup 4% Facebook Video 8% Facebook Games 7% Facebook Wall 2% IM 1% YouTube 14% BBC 5% Other MM 5% Health 3% Society 2% Banking 2% 5
6 The problem is that the huge number of applications and websites makes it very difficult to get a clear understanding of traffic. That s why Blue Coat PacketShaper provides real-time traffic classification of hundreds of applications and millions of websites, measuring utilization and response times and recording a hundred stats for each class. PacketShaper technology gives you the ability to classify and differentiate: Hundreds of enterprise applications, with sub-classification of key applications like Microsoft, SAP and Oracle Internet applications that use multiple techniques to evade detection P2P, IM, gaming, Skype, proxy avoidance Tens of millions of websites in 84 categories Applications within complex social media sites like Facebook, using detailed sub-classification for effective segmentation and control This real-time visibility gives you a clear picture of what s happening on your network, and a path to traffic control. Re-architect Your Network for Today s Applications Cloud/SaaS, as well as video, BYOD and other recreational traffic, comes from outside the enterprise from the Internet. Yet networks are architected for Internal applications, with Internet access backhauled over the WAN. With new cloud security architectures, you can now safely connect branch offices to the Internet. You can maintain proper usage and protection from malware, while reducing networking costs 67 percent and improve cloud performance by removing that extra hop of latency through the data center. Branch appliance caches SaaS and recreational content, removes traffic from WAN backhaul. Same appliance forwards traffic to Cloud. Cloud prevents malware, enforces web usage policies, provides detailed logging. Overall network expense drops 67 percent due to reduction in backhaul traffic. Removal of extra hop of latency through the data center speeds performance of cloud applications and reduces contention over the WAN, improving internal application performance as well. Blue Coat Provides a Complete Solution to Ensure SaaS Application Performance and Reliability Blue Coat technology gives businesses complete visibility, control and optimization of SaaS application traffic. It minimizes the impact of recreational traffic on business operations while allowing employees to access Internet-based SaaS applications. Our unique combination of capabilities allows you to re-architect your network for tomorrow s applications. Contact Blue Coat for the complete story. 6
7 Blue Coat Systems Inc. Corporate Headquarters Sunnyvale, CA EMEA Headquarters Hampshire, UK APAC Headquarters Singapore Blue Coat Systems, Inc. All rights reserved. No part of this document may be reproduced by any means nor translated to any electronic medium without the written consent of Blue Coat Systems, Inc. Information contained in this document is believed to be accurate and reliable as of the date of publication; however, it should not be interpreted to be a commitment on the part of Blue Coat, and Blue Coat cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. Blue Coat makes no warranties, express, implied, or statutory, as to the information in this document. The information contained in this document was developed for products and services offered in the U.S. Blue Coat may not offer the products, services, or features discussed in this document in other countries. Consult your local Blue Coat representative for information on the products and services currently available in your area. Blue Coat products, technical services, and any other technical data referenced in this document are subject to U.S. export control and sanctions laws, regulations and requirements, and may be subject to export or import regulations in other countries. You agree to comply strictly with these laws, regulations and requirements, and acknowledge that you have the responsibility to obtain any licenses, permits or other approvals that may be required in order to export, re-export, transfer in country or import after delivery to you. Blue Coat may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. Blue Coat, ProxySG, PacketShaper, CacheFlow, IntelligenceCenter and BlueTouch are registered trademarks of Blue Coat Systems, Inc. in the U.S. and worldwide. All other trademarks mentioned in this document are the property of their respective owners. v.wp-assuring-performance-cloud-based-apps-en-v2c
WAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS
WHITEPAPER EXECUTIVE SUMMARY Microsoft SharePoint is a web-based collaboration and information-sharing platform designed as a centralized replacement for multiple web applications. SharePoint leverages
WAN Optimization for Microsoft SharePoint BPOS >
White Paper WAN Optimization for Microsoft SharePoint BPOS > Best Practices Table of Contents Executive Summary 2 Introduction 3 SharePoint BPOS performance: Managing challenges 4 SharePoint 2007: Internal
BOOSTING INTERNET ACCESS LINK PERFORMANCE WITH BLUE COAT WAN OPTIMIZATION TECHNOLOGIES
PERFORMANCE WITH BLUE COAT WHITEPAPER EXECUTIVE SUMMARY Gateways to Internet traffic are facing unprecedented loads and growth rates in all types of industries and organizations due to the growth of mobile
Is Your Network Ready for VoIP? > White Paper
> White Paper Tough Questions, Honest Answers For many years, voice over IP (VoIP) has held the promise of enabling the next generation of voice communications within the enterprise. Unfortunately, its
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper
> A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
FOUR STEPS TO HIGH PERFORMANCE WAN AND INTERNET
WHITEPAPER VISIBILITY AND CONTROL ARE KEY TO AN EFFECTIVE WAN PERFORMANCE STRATEGY Problems with application and network performance on the WAN and Internet links are caused by many and varied issues congestion,
Application Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
SECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES
WHITEPAPER In today s complex network architectures it seems there are limitless ways to deploy networking equipment. This may be the case for some networking gear, but for web gateways there are only
Blue Coat WebFilter >
White Paper Blue Coat WebFilter > Delivering the web access your users want with the control you need Why Dynamic Content Filtering has Become Essential Two billion videos per day are watched on YouTube.
A TECHNICAL REVIEW OF CACHING TECHNOLOGIES
WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,
Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper
Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security
Reverse Proxy for Trusted Web Environments > White Paper
> White Paper ProxySG for Reverse Proxy Web-based solutions are being implemented for nearly every aspect of business operations, and increasingly for trusted environments with mission-critical business
White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com
Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge Video content usage within the enterprise is growing significantly. In fact, Gartner forecasted that by 2016, large
Lab Testing Summary Report
Lab Testing Summary Report September 2007 Report 070914 Product Category: WAN Optimization Vendor Tested: Packeteer, Inc. Product Tested: ishaper 400 Key findings and conclusions: Deep packet inspection
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Executive Summary As organizations
The Next Generation Network:
JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite
Whitepaper. Controlling the Network Edge to Accommodate Increasing Demand
Whitepaper Controlling the Network Edge to Accommodate Increasing Demand February 2007 Introduction A common trend in today s distributed work environment is to centralize applications and the data previously
White Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks.
White Paper The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks. - 1 - Executive Summary The era of mobility and consumerization has fundamentally
How To Create A Qos
WHITE PAPER Three Steps to Success with QoS A Riverbed White Paper Introduction: QoS ensures predictable application performance QoS is one of the most widely deployed networking technologies. It is a
Best Practices - Monitoring and Controlling Peer-to-Peer (P2P) Applications
Best Practices - Monitoring and Controlling Peer-to-Peer (P2P) Applications APPLICATION Peer-to-Peer (P2P) EXAMPLES AudioGalaxy, edonkey, BitTorrent, KaZaA, etc. USAGE Locate and exchange (swap) files.
Blue Coat Security First Steps Solution for Streaming Media
Blue Coat Security First Steps Solution for Streaming Media SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
Voice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
Threat Containment for Facebook
Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing
Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management
Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management Executive Summary Organizations
WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc.
WAN OPTIMIZATION Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc. Disclaimer Please be aware that the concepts and opinions expressed in the following presentation are those of
SLA para aplicaciones en redes WAN. Alvaro Cayo Urrutia
SLA para aplicaciones en redes WAN Alvaro Cayo Urrutia Quién es FLUKE NETWORKS? Enterprise SuperVision (ESV) Soluciones portátiles de prueba y análisis LAN y WAN distribuidas Infrastructure SuperVision
Using PacketShaper to Control Bring Your Own Device Traffic
Blue Coat Systems Using PacketShaper to Control Bring Your Own Device Traffic Tips and Tricks Supporting the BYOD Worldwide Phenomenon Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide.
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
Web Application Classification Feature
Web Application Classification Feature PacketShaper 11.5 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
Masters Project Proxy SG
Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the
Blue Coat Security First Steps Transparent Proxy Deployments
Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
Blue Coat Security First Steps. Solution for HTTP Object Caching
Solution for HTTP Object Caching Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM,
First Steps to Using a PacketShaper
First Steps to Using a PacketShaper Table of Contents Table of Contents Overview... 1 Classifying Traffic on the Network... 2 Discover Traffic... 2 View the Class Tree... 3 Problems?... 4 Analyzing Network
How To Choose A Wan Optimization Controller
How to Pick the Right WAN Optimization Solution for Your Organization 3 April 2013 ID:G00250203 Analyst(s): Bjarne Munch VIEW SUMMARY WAN optimization controllers continue to have significant differences
Cisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage
Data Sheet Cisco WAAS Express Product Overview Organizations today face several unique WAN challenges: the need to provide employees with constant access to centrally located information at the corporate
UNIFIED PERFORMANCE MANAGEMENT
UNIFIED PERFORMANCE MANAGEMENT VISIBILITY CONTROL OPTIMIZATION COMPLETE WAN OPTIMIZATION Increase the speed and efficiency of your wide area network. Exinda s Unified Performance Management (UPM) solution
WAN Optimization Solutions Bring Web 2.0 to the Classroom and Control P2P Traffic
WAN Optimization Solutions Bring Web 2.0 to the Classroom and Control P2P Traffic Presenter: Con Nikolouzakis, Chief Product Officer Overview Company founded in 2002 Education Customers (ANZ) Develop WAN
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
How To Choose A Network Firewall
Critical Considerations in Choosing a Network Firewall Version 5.4.3 July 2014 Why today s Firewalls are broken Visibility No visibility into user behavior No control over applications Manageability No
E-Guide. Sponsored By:
Security and WAN optimization: Getting the best of both worlds E-Guide As the number of people working outside primary office locations increases, the challenges surrounding security and optimization are
Securing and Optimizing the Next Generation Branch Office
Securing and Optimizing the Next Generation Branch Office 1 Global Organizations Current state of affairs 3 Globally distributed enterprises rely on the WAN for day to day operations to stay competitive
NEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE
: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE A CLOSER LOOK REVEALS WHY PROXY-BASED ARCHITECTURE IS UNIQUELY EFFECTIVE IN DEFENDING AGAINST WEB-BASED THREATS. The web is central to the way we work, live,
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
Secure Web Gateways Buyer s Guide >
White Paper Secure Web Gateways Buyer s Guide > (Abbreviated Version) The web is the number one source for malware distribution. With more than 2 million 1 new pages added every day and 10,000 new malicious
Decrypt Inbound SSL Traffic for Passive Security Device (D-H)
Decrypt Inbound SSL Traffic for Passive Security Device (D-H) SSL Visibility Appliance First Steps Guide Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG,
DUBEX CUSTOMER MEETING
DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1 AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2 WEBPULSE 3 GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE
Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud
Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud What You Will Learn The adoption of cloud-based computing and applications promises to improve the agility, efficiency,
Application Performance Management
Application Performance Management Intelligence for an Optimized WAN xo.com Application Performance Management Intelligence for an Optimized WAN Contents Abstract 3 Introduction 3 Business Drivers for
Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks
Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks April 2014 www.liveaction.com Contents 1. Introduction... 1 2. WAN Networks... 2 3. Using LiveAction
Real World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
Best Practices for Controlling Skype within the Enterprise. Whitepaper
Best Practices for Controlling Skype within the Enterprise Whitepaper INTRODUCTION Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by
The Next Generation of Wide Area Networking
The Next Generation of Wide Area Networking Introduction As pointed out in The 2014 State of the WAN Report 1, the vast majority of WAN traffic currently uses either the Internet or MPLS. Since the Internet
Blue Coat Systems. Client Manager Redundancy for ProxyClient Deployments
Blue Coat Systems Client Manager Redundancy for ProxyClient Deployments Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
Optimize Application Delivery for Global Deployment Of SAP BusinessObjects Enterprise with Blue Coat Systems Acceleration
Optimize Application Delivery for Global Deployment Of SAP BusinessObjects Enterprise with Blue Coat Systems Acceleration A Report from SAP Co-Innovation Lab Blue Coat: Chris Webber, Jonathan Bensen, Chris
WAN optimization and acceleration products reduce cost and bandwidth requirements while speeding throughput.
BUSINESS SOLUTIONS Pumping up the WAN WAN optimization and acceleration products reduce cost and bandwidth requirements while speeding throughput. Today s data center managers are looking for improvement
The Ultimate Guide to Gaining Control of the WAN
LAYLAND CONSULTING The Ultimate Guide to Gaining Control of the WAN A TechTarget Document Robin Layland November 2009 The e-book, The Ultimate Guide to Gaining Control of the WAN, explains the drivers
Assuring Your Business Continuity
Assuring Your Business Continuity Q-Balancer Range Offering Business Continuity, Productivity, and Security Q-Balancer is designed to offer assured network connectivity to small and medium business (SME)
White Paper: Virtual Leased Line
Executive Summary: Virtual Leased Line (VLL) for high throughput and high reliability Enterprise Branch Office Communications The Truffle Broadband Bonding Network Appliance enables enterprise branch offices
Site2Site VPN Optimization Solutions
XROADS NETWORKS WHITE PAPER Site2Site VPN Optimization Solutions XROADS NETWORKS - WHITE PAPER Site2Site VPN Optimization Solutions The purpose of this paper is to provide an understanding of how XRoads
SolarWinds Scalability Engine Guidelines for SolarWinds Products Technical Reference
SolarWinds Scalability Engine Guidelines for SolarWinds Products Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced
Application Performance Management for Enterprise WANs
Whitepaper Application Performance Management for Enterprise WANs A 3 makes a significant difference to my ability to see what is actually going on and to align my available resource to the most critical
The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands
The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com [email protected] September 2003 1 Agenda Today s IT challenges Introduction to Network
Guarantee Microsoft Office 365 end-user experience
Guarantee Microsoft Office 365 end-user experience APPLICATION BRIEF Guarantee Microsoft Office 365 end-user experience Most enterprises are considering moving their Office productivity tools to the cloud,
Prioritize Access to Business Applications With Cyberoam s Application Visibility & Control
White paper Cyberoam UTM Prioritize Access to Business Applications With Cyberoam s Application Visibility & Control www.cyberoam.com Contents Executive Summary Identifying APPLICATIONS to Manage them
Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits
Executive Brief for Sharing Sites & Digital Content Providers Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Summary The Opportunity/Challenge The revenue
Reverse Proxy with SSL - ProxySG Technical Brief
SGOS 5 Series Reverse Proxy with SSL - ProxySG Technical Brief What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the functionality for a robust and flexible reverse proxy solution. In addition
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R A d v a n c e d I P S e r v i c e s w i t h A T & T ' s M P L S - E n a b l e
Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment
Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment What You Will Learn Cisco Systems and Akamai Technologies intend to deliver the world s first combined Cisco Intelligent WAN with
CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR
PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical
The Value of Managed Application Services > White Paper
> White Paper Executive Summary In today s networked world, being able to connect the right resources to the right opportunities or problems at the right time can give businesses the edge and agility they
Configuring an efficient QoS Map
Configuring an efficient QoS Map This document assumes the reader has experience configuring quality of service (QoS) maps and working with traffic prioritization. Before reading this document, it is advisable
WanVelocity. WAN Optimization & Acceleration
WanVelocity D A T A S H E E T WAN Optimization & Acceleration WanVelocity significantly accelerates applications while reducing bandwidth costs using a combination of application acceleration, network
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Application Layer vs. TCP Layer WAN Optimization > White Paper
> White Paper Executive Summary When planning the capacity of a WAN optimization solution, it s best to base calculations on a WAN optimization appliance s ability to perform application-layer functions,
Common Core Network Readiness Guidelines Is your network ready? Detailed questions, processes, and actions to consider.
Common Core Network Readiness Guidelines Is your network ready? Detailed questions, processes, and actions to consider. Is Your School Network Ready? Network readiness is an important factor in any new
Lab Testing Summary Report
Lab Testing Summary Report February 14 Report 132B Product Category: Web Security Gateway Vendor Tested: Key findings and conclusions: security appliance exhibits best rate to date, 91.3%, for classifying
White Paper. Enterprise IPTV and Video Streaming with the Blue Coat ProxySG >
White Paper Enterprise IPTV and Video Streaming with the Blue Coat ProxySG > Table of Contents INTRODUCTION................................................... 2 SOLUTION ARCHITECTURE.........................................
WAN Performance Analysis A Study on the Impact of Windows 7
A Talari Networks White Paper WAN Performance Analysis A Study on the Impact of Windows 7 Test results demonstrating WAN performance changes due to upgrading to Windows 7 and the network architecture and
Microsoft Exchange 2010 /Outlook 2010 Performance with Riverbed WAN Optimization
Microsoft Exchange 2010 /Outlook 2010 Performance with Riverbed WAN Optimization A Riverbed whitepaper Riverbed participated in an early Microsoft TAP program to validate interoperability for Exchange
Mesh VPN Link Sharing (MVLS) Solutions
XROADS NETWORKS WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions XROADS NETWORKS - WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions The purpose of this paper is to provide an understanding of how XRoads
Best Practices for Controlling Skype within the Enterprise > White Paper
> White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it
Preparing Your IP Network for High Definition Video Conferencing
WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available
white paper Using WAN Optimization to support strategic cloud initiatives
Every Cloud should have a Silver Peak Lining Using WAN Optimization to support strategic cloud initiatives Every Cloud should have a Silver Peak Lining Using WAN Optimization to support strategic cloud
Virtual Leased Line (VLL) for Enterprise to Branch Office Communications
Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband
Enterprise Buyer Guide
Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight
Optimization of Citrix ICA with Steelhead Appliances and RiOS 6.0 WHITE PAPER
Optimization of Citrix ICA with Steelhead Appliances and RiOS 6.0 WHITE PAPER INTRODUCTION Desktop virtualization architectures enable enterprises to host their applications and data centrally and to access
Best Practices for Selecting WAN Optimization Solutions: Benchmarking Performance ROI. A Shunra Software White Paper
Best Practices for Selecting WAN Optimization Solutions: Benchmarking Performance ROI A Shunra Software White Paper Executive Summary As businesses become increasingly dependent on the effective delivery
Quality of Service (QoS) for Enterprise Networks. Learn How to Configure QoS on Cisco Routers. Share:
Quality of Service (QoS) for Enterprise Networks Learn How to Configure QoS on Cisco Routers Share: Quality of Service (QoS) Overview Networks today are required to deliver secure, measurable and guaranteed
