Save Budget Dollars using Smart Data Access Technology

Similar documents
Secure Access Complete Visibility

Table of Contents. Network Critical NA LLC Tel: Franklin Street, Suite

Enhanced Visibility, Improved ROI

Intelligent Data Access Networking TM

Efficient Network Monitoring Access

Enhancing Cisco Networks with Gigamon // White Paper

WHITE PAPER. Tap Technology Enables Healthcare s Digital Future

Out-of-Band Security Solution // Solutions Overview

In-Band Security Solution // Solutions Overview

Network Packet Monitoring Optimizations Powered By SDN

Architecture Overview

HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES

How To Extend Security Policies To Public Clouds

White Paper. Intrusion Detection Deploying the Shomiti Century Tap

Cisco Change Management: Best Practices White Paper

Net Optics and Cisco NAM

Software Defined Networking A quantum leap for Devops?

Ixia Director TM. Powerful, All-in-One Smart Filtering with Ultra-High Port Density. Efficient Monitoring Access DATA SHEET

Unified network traffic monitoring for physical and VMware environments

Enhancing Cisco Networks with Gigamon // White Paper

Network Packet Monitoring Optimizations in Data Centre

The Bomgar Appliance in the Network

Business Cases for Brocade Software-Defined Networking Use Cases

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Net Optics xbalancer and McAfee Network Security Platform Integration

4G Aggregation Network Monitoring (ANM) Switch

Brocade Telemetry Solutions

Network Performance Channel

Business Case for S/Gi Network Simplification

domain is known as the high side, and the less secure domain is the low side. Depending on the application, the

Chapter 11 Cloud Application Development

Data Center Networking Designing Today s Data Center

Active Visibility for Multi-Tiered Security // Solutions Overview

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

Smart Network Access System SmartNA 10 Gigabit Aggregating Filtering TAP

Elevating Data Center Performance Management

Networking and High Availability

Observer Probe Family

ACL Compliance Director FAQ

Visibility in the Modern Data Center // Solution Overview

Observer Probe Family

Deploying Network Taps for improved security

How To Build A Network For Storage Area Network (San)

GigaVUE-420. The Next Generation. Data Access Switch. Gigamon Systems. Intelligent Data Access Networking

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA

Cisco SFS 7000D Series InfiniBand Server Switches

CTS2134 Introduction to Networking. Module Network Security

Developing Network Security Strategies

DEPLOYMENT GUIDE. This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform.

Policy Management: The Avenda Approach To An Essential Network Service

Monitoring Load Balancing in the 10G Arena: Strategies and Requirements for Solving Performance Challenges

The Visibility Fabric Architecture A New Approach to Traffic Visibility // White Paper

Technical Note. ForeScout CounterACT: Virtual Firewall

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Web Security Firewall Setup. Administrator Guide

Virtualized Security: The Next Generation of Consolidation

Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

HP End User Management software. Enables real-time visibility into application performance and availability. Solution brief

How To Create A Network Monitoring System (Flowmon) In Avea-Tech (For Free)

Networking and High Availability

New Service Provider Economics with Network Optimization Services. Executive Summary. Key Takeaways

Configuration Management: Best Practices White Paper

Network Agent Quick Start

Secure Networks for Process Control

Cisco Firewall Technology

Solving Monitoring Challenges in the Data Center

2. Are explicit proxy connections also affected by the ARM config?

Cisco Bandwidth Quality Manager 3.1

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

Cisco Wide Area Application Services (WAAS) Software Version 4.0

Network Management and Monitoring Software

The Role of Cisco SONA in Enterprise Architecture Frameworks and Strategies

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Optimized Network Monitoring

Application Performance Management - Deployment Best Practices Using Ixia- Anue Net Tool Optimizer

How to Eliminate the No: 1 Cause of Network Downtime. Learn about the challenges with configuration management, solutions, and best practices.

Internet Content Provider Safeguards Customer Networks and Services

40 Gigabit Ethernet and Network Monitoring

NetQoS Delivers Distributed Network

PREPARED FOR ABC CORPORATION

How To Use The Cisco Mds F Bladecenter Switch For Ibi Bladecenter (Ibi) For Aaa2 (Ibib) With A 4G) And 4G (Ibb) Network (Ibm) For Anaa

Network Performance Management Solutions Architecture

Smart Network. Smart Business. White Paper. Enabling Robust Logging of Web Applications

NEC s Juniper Technology Brief Issue 2

Any-to-any switching with aggregation and filtering reduces monitoring costs

The Software Defined Hybrid Packet Optical Datacenter Network SDN AT LIGHT SPEED TM CALIENT Technologies

Network Architecture Validated designs utilizing MikroTik in the Data Center

White Paper. Best Practices for 40 Gigabit Implementation in the Enterprise

Firewall Firewall August, 2003

SURF Feed Connection Guide

EMC Smarts Application Discovery Manager and Multisite Data Aggregation

Tk20 Network Infrastructure

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Optimised Managed IT Services, Hosting and Infrastructure. Keep your business running at peak performance

Transcription:

Save Budget Dollars using Smart Data Access Technology Data Centers can benefit from Smart Data Access Technology Fall 2011 Copyright 2011. Network Critical NA LLC. All Rights Reserved. 1.

The data center is command central for any organization. It is where the applications and associated data negotiate the network infrastructure 24x7, providing critical services to both internal and external customers. Today s data centers are increasingly complex with many different vendors and technologies working together at faster speeds than ever before. The need for security, accountability and compliance is paramount. One of the results of more and more monitoring tools being deployed in a given network is that practices such as utilization of SPAN and VACL ports are proving to be unacceptable solutions. In order to guarantee and certify that the data in your network is secure and that it complies with FISMA, CALEA and other lawful intercept rules and regulations, your network administrator must have access to all the data, not just what a SPAN or VACL network link can deliver to the monitoring tools. The TAP solution deployed in the network must be secure ensuring the packets of data running through them cannot be compromised. Network Critical Smart Network Access (SmartNA) Technology provides all the security required to keep your data safe from prying eyes while allowing the traffic going through the network to be delivered to your monitoring tools. Whenever a tool is placed into the network, a new point of failure is introduced. Downtime in the data center can cost thousands of dollars in lost productivity. To ensure the efficient operation of the data center, reduce bottlenecks, prevent outages and maintain security, it is vital for IT to carefully monitor and analyze all the data in the data center. It is not only absolutely necessary to have failsafe access, but secure access as well, and complete visibility of the organization s most important asset data. To achieve this goal, organizations must augment their architecture to include Smart Data Access Technology. Building a Secure Smart Data Access Technology Network The data center is part of a network ecosystem that drives the work of any size organization. It is comprised of switches, routers, firewalls, application servers, IP services (DNS, RADIUS, and LDAP), virtualized applications, and storage area networks. Monitoring the actual network data is extremely important to the security of the company. Companies will typically implement networks with countless numbers of monitoring and security tools for defense but find out that it is not efficient or cost effective to have a tool connected on every critical data path. The key to improved secure access and better visibility is to build a Smart Data Access Technology network that can filter, aggregate, consolidate and replicate data to the monitoring and security tools that are already found in the data center. Copyright 2011. Network Critical NA LLC. All Rights Reserved. 2.

How Smart Data Access Technology can be architected into your network Copyright 2011. Network Critical NA LLC. All Rights Reserved. 3.

The key to secure access is to TAP inline between major network devices found in the data center. This includes core switch-to-switch links, switch-to-router and switch-to-server links. TAPs can also be deployed in passive network connections that copy data from the link to the monitoring and analyzing devices. Network Critical designed the SmartNATM as a modular product. This modular design provides secure access of the data, allowing greater flexibility that can accommodate the different media types typically present. The chassis and module architecture allows an agency s data center to save costly rack space by housing several different modules to perform filtering, aggregating and regeneration all in the same chassis. By moving beyond the fixed-function chassis, companies will provide their data centers with reduced power consumption and a smaller footprint. Many of these benefits provide Day One cost savings. They include: Reduced Monitoring Burden and Gain Increased Effectiveness of Existing Tools Often a customer will experience a tool overburdened by the amount of data sent to it or difficulty monitoring higher speed connections with lower speed tools. Smart Data Access Technology like the SmartNATM System will diminish these problems using filtering functionality. Filtering allows the 10G traffic or aggregated traffic to be throttled down to less than 1G and sent to the 1G tool that the company already owns. With filtering, users can reduce the amount of data being sent to a tool so the tool will only see the data it needs instead of processing voluminous amounts of unnecessary data. This improves efficiency and saves budget dollars. Eliminated SPAN/Port Monitor Contention Most switch and router manufacturers such as Cisco, Brocade, HP, and Juniper have a use limitation of only two ports for SPAN/Port Mirroring connections. Because of this limitation, users have reduced visibility into data because all packet capture/data recorder, application monitoring and security tools cannot access the data they need to see. By using Network Critical SmartNA TAPs, users can connect these same SPAN/Port Mirroring connections to the routers and switches and easily replicate the data to multiple tools at the same time. Copyright 2011. Network Critical NA LLC. All Rights Reserved. 4.

Easily Add New Tools and Monitor New Applications Data centers are continuously evolving, adding new applications or services and new monitoring tools. When all monitored data is routed through Smart Data Access Technology, users can easily connect new tools or monitor new applications using the SmartNATM system s modular technology by quickly sending data to new tools without disturbing existing monitoring connections. All of this can be accomplished without having to wait for lengthy change management processes because no downtime is incurred and all data is passively accessed and distributed by the SmartNATM system. Secure Your Monitored Data Another important consideration when monitoring or capturing data is controlling access to that data to ensure only authorized users capture or see it. The Network Critical SmartNATM system secures data by offering many different security options: user-based port locking to ensure only authorized users can access specific ports; packet slicing, which slices the payload of application data; SNMP traps which are triggered when an existing device is unplugged or a new device is plugged into an empty port; data masking which hides the contents of sensitive information; and user- and group-based centralized authentication using RADIUS/TACACS. Additionally, all out-of-band management functions use secure access technologies such as SSH and HTTPS. Copyright 2011. Network Critical NA LLC. All Rights Reserved. 5.

An Example of a Security Solution Copyright 2011. Network Critical NA LLC. All Rights Reserved. 6.

Summary: Introducing comprehensive Smart Data Access Technology solutions such as Network Critical SmartNATM System within data centers will provide secure access and complete visibility into all mission critical data 24x7. With complete visibility and secure access, organizations will reduce downtime and time- to-resolution of complex data center issues, benefiting all internal and external users. Network Critical Smart Data Access Technology resolves many issues such as SPAN/Mirror port contention, monitoring 10Gbps connections with lower speed capable tools, configuration and change order management and other obstacles that normally require a significant amount of time and resources. With thousands of units deployed and the uncompromised attention Network Critical clients receive; network administrators will realize greater efficiency, improved productivity and most importantly, the security of their most important asset information. About Network Critical Network Critical, the creator of the network TAP solution, provides lab-certified, innovative, carrier-grade TAP solutions which allow complete access to network traffic. Network Critical TAPs are used with network intrusion detection systems, network intrusion protection systems, network traffic monitoring and more to provide 100% network visibility with zero packet loss 24 hours a day, 365 days a year. The organization s commitment to uncompromised attention provides customers with an involved, attentive and hands-on experience that will meet their needs of today and exceed their expectations for tomorrow. Network Critical is a global access technology solution provider with operations based in Buffalo, NY USA; Reading, Berkshire UK; and Amsterdam, the Netherlands. For more information, visit. Copyright 2011. Network Critical NA LLC. All Rights Reserved. 7.