Situational Awareness Through Continuous Monitoring The Smart Route to Visibility TM!
Gigamon At a Glance Founded 2004 in with first product shipped May, 2005 Invented and Patented Intelligent Data Access Technology Installed 7,000+ units at 800+ companies in 40 Countries Profitable since 2006 55%+ growth year over year since 2006 150+ employees
Management 100+ Years of Data Networking / Telecoms Experience Name / Title Experience Ted Ho CEO and Co-Founder Patrick Leong CTO and Co-Founder King Won VP Product & Service and Co-Founder Thomas Cheung VP Engineering and Co-Founder Aidan Cullen CFO Michael Ruettgers Board Member Corey Mulloy & Peter Bell Board Members
Application is Business Distributed Access / Centralized Management Content points: Few Many Dedicated Virtualized Silo Cloud þ Tremendous growth in data to be consumed, processed, and shared þ Separation of applications from underlying infrastructure þ Leverage private and public hosted models with centralized IT resources IP traffic growth continues to be explosive Requiring networks to be faster, flatter and more efficient while supporting increased requirements for security, analytics and compliance
Network Problems Getting Worse Difficult to Access Crucial Data at the Right Time Fragmented, Complex, Expensive, and Inefficient Visibility Cost Utilization Scalability n Lack of visibility fragmented monitoring approaches provide network engineers limited access to particular points in the network for multiple tools n Significant management overhead and monitoring costs high CapEx and OpEx given fragmented configuration and layout of tools n Lack of centralized data capture leads to inefficient utilization of tools tools in low volume areas are undersubscribed while those in high-volume areas are oversubscribed n Lack of scalability requires multiple expensive devices to be deployed across network boundaries, creating complexity, performance and management issues $$$$
Rapidly-Growing New Market Traffic Visibility Infrastructure Spending* Driving Forces 1200 Explosive Growth of Data 1000 Too Many Packets ( double every 2 years) 800 Fast Adjacent Market Growth An Enabling Technology 600 400 Accelerated Innovation 10/100 -> 1G à 10 G à 40 G à 100G Millions 200 0 2011 2015 Cloud Computing Rapid Data Center Build-outs & Consolidation
Global CIO Top 10 Priorities 1. Cloud computing 2. Virtualization 3. Mobile Technologies 4. IT Management 5. Business Intelligence 6. Network, Voice & Data Comm s 7. Enterprise Applications 8. Collaboration technologies 9. Infrastructure 10. Web 2.0 January 2011 -Gartner Survey of 2,014 International CIO s 50 Countries / 38 Industries
Federal CIO Top 5 Concerns 1. Inadequate Budget 2. Agile development 3. Open government 4. Cloud Computing 5. Social media - Flat or decreasing - Conflicting priorities & alignment - Oversight - Security, Privacy, Risk - Privacy, productivity, security May 2011 Tech America - 46 CIO s / 36 Agency s
Always On! Enabling Continuous Monitoring Visibility to network traffic is paramount to security monitoring and collections Combination of passive & active monitoring and protection Distribute or collect data streams across multiple organizations Scale and extend across geographies Extend architectural visibility into Virtualized deployments Visibility into virtualized environments and Cloud
Multi-Tier Networks Powering Analysis Capabilities Infrastructure Client Experience / Productivity Boundary Access Mobility / Wireless
Virtualization Desktops, Clients and mobility VDI deployments require same security at all layers Authentication requests Dedicated protocols for PCoIP
Monitoring the Cloud! Yes, we monitor the cloud Visibility across Clouds Who s knocking at the door? Legitimate or not? Security Monitoring across cloud boundaries Risk aversion New protocols and application Future proofing
Flow-Mapping Providing Discrete Information Access across multiple layers All inputs filter on the same information, no need to create filters for each port Inputs can be dynamically added or filtering profiles can be dynamically updated
Flow Mapping The Patented Secret Sauce VOIP, IDS, CEM, Web, SQL Data source 1 (SPAN1 10GB) Map Rule VOIP, VOIP, VOIP Tool 1 (VOIP) VOIP, IDS, CEM, Web, SQL Data source 2 (SPAN2 10GB) VOIP, IDS, CEM, Web, SQL Data source 3 (SPAN3 10GB) Map Rule Map Rule Map Rule Map Rule IDS, IDS, IDS CEM, CEM, CEM Web, Web, Web Tool 2 (IDS) Tool 3 (CEM) Tool 4 (Web) SQL, SQL, SQL Tool 5 (SQL) Configurable Hardware Based Rules Bound to Ingress Ports All Network Traffic Tool 6 (Recorder) Ingress Ports Enables high speed distribution of customized data streams Increases proficiency of analysis tools, workflow and time to resolution. Egress Ports Only the specific data types are sent to targeted tools, greatly reducing tool processing overhead while ensuring zero packets loss and simultaneously increases efficiency. 14
Budgets & Cost Cost Avoidance & Cost Difference Budgets Flat or declining(most likely declining Discretionary funds are drying up Government shifting to hosting & services model pay by the sip and more accurately measure Cost Avoidance Consolidation and centralization of monitoring Better utilization of existing tooling investments Cost Difference Using available funds in the most effective manner for production Monitoring & tooling can be planned proactively, not rushed Customers pay by the sip, no need to spend by the gallon
Summary Highlights Benefits Continuous Monitoring ü Enables complete visibility and protection at all times Pro-active approach Framework ü Revolutionary centralized control / management architecture empowers a category-leading, cost-effective solution Scalability Future proofing ü Addresses current architectures and requirements while inserting a structured approach to future requirements Alignment Multiple growth vectors ü Unique technology and differentiated focus provide a sustainable platform and create multiple vectors of growth Cost Control Business model ü Risk adverse approach to leveraging current montiroing and tooling investments Cost efficiency Compliance ü Fundamental approach to meeting FISMA requirements Vision and execution