Network Analytics for More Intelligent SDN

Similar documents
Extreme Networks Solutions for Microsoft Skype for Business Deployments SOLUTION BRIEF

We are able to increase application response time thus increasing productivity

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

VIA COLLAGE Deployment Guide

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

HOLDING ON TO YOUR BANDWIDTH

Automate PCI Compliance Monitoring, Investigation & Reporting

How to Turn Your Network into a Strategic Business Asset with Purview EBOOK

Eliminating the cost and complexity of hardware controllers with cloud-based centralized management

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

Cisco Configuration Assistant

How To Create An Intelligent Infrastructure Solution

Presentation Title: When Anti-virus Doesn t Cut it: Catching Malware with SIEM

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

VIA CONNECT PRO Deployment Guide

BYOD Networks for Kommuner

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

Securing Office 365 with MobileIron

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options

The Mandate for Lights-Out IT Management

The Purview Solution Integration With Splunk

ALCATEL-LUCENT ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs

ALCATEL-LUCENT ENTERPRISE CONVERGED CAMPUS NETWORK SOLUTION Deliver a consistent, high-quality user experience, streamline operations, and reduce

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Using SIEM for Real- Time Threat Detection

Cisco s BYOD / Mobility

POLICY MANAGEMENT MODULE

Bring Your Own Design: Implemen4ng BYOD Without Going Broke or Crazy. Eric Stresen- Reuter Technical Director Ruckus Wireless

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN

Today's security needs in networking

Using SDN-OpenFlow for High-level Services

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

SDN in the Campus LAN Offers Immediate Benefits

ALCATEL-LUCENT OMNIVISTA 2500 NETWORK MANAGEMENT SYSTEM

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Software defined networking. Your path to an agile hybrid cloud network

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Evaluation Guide. iprism Web Security V7.000

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

ENTERPRISE MOBILITY ENABLE YOUR NETWORKS TO SUPPORT ENTERPRISE MOBILITY

Cisco & Big Data Security

SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility

On-boarding and Provisioning with Cisco Identity Services Engine

FASTER, SIMPLER AND SMARTER NETWORKS THROUGH SDN INNOVATION

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Cisco Configuration Assistant

NetScope: Powerful Network Management

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

Cisco TrustSec Solution Overview

Achieving Service Quality and Availability Using Cisco Unified Communications Management Suite

Observer Analyzer Provides In-Depth Management

Serro Solutions Enables Managed Security Service Providers to Optimize Networking Performance and Cost

Symantec Mobile Management Suite

Best Practices from Deployments of Oracle Enterprise Operations Monitor

Wireless Network Analysis. Complete Network Monitoring and Analysis for a/b/g/n

Perform: Monitor to Assure a Great User Experience

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Testing & Assuring Mobile End User Experience Before Production. Neotys

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect

VLANs. Application Note

Cisco Prime Virtual Network Analysis Module

IP Telephony Management

Managing enterprise in a mobile world

ResNet Guide. Information & Learning Services. Here to support your study and research

Statement of Service Enterprise Services - AID Microsoft IIS

Simple, scalable and secure unified wired and wireless networking

A Vision for Operational Analytics as the Enabler for Business Focused Hybrid Cloud Operations

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF

Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses

SANS Top 20 Critical Controls for Effective Cyber Defense

ReliaTel VoIP QoS and UC Management Solution

Norton Mobile Privacy Notice

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

White Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks.

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Meru MobileFLEX Architecture

IDM and Endpoint Integrity Technical Overview

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Managed Security Services for Data

Key Trends in Enterprise Networks

Agenda , Palo Alto Networks. Confidential and Proprietary.

CUTTING THE CORD BY MOVING TO.11AC SAVES WEST CHESTER OVER $1M

Extending Collaboration to BYOD Devices

Statement of Service Enterprise Services - MANAGE Microsoft IIS

The Benefits of an Integrated Approach to Security in the Cloud

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Layer 7 Visibility and Control

SDN Applications in Today s Data Center

SIP, Security and Session Border Controllers

How To Manage A Network With Ccomtechnique

MINIMIZING CYBER-SECURITY EXPOSURE BEFORE, DURING & AFTER AN EMERGENCY

APPENDIX 3 LOT 3: WIRELESS NETWORK

BYOD: BRING YOUR OWN DEVICE.

Welcome to XO WorkTime

Transcription:

Network Analytics for More Intelligent SDN Derek Granath Sr. Director, Product Line Management Santa Clara, CA USA April 2015

Agenda The Network as a Strategic Business Asset Network Analytics Information About the Network Information From the Network Using SDN to Improve the Lync User Experience Customer Example 2

THE NETWORK IS MORE THAN STRATEGIC CONNECTIVITY Organizations require technology to make better business decisions Innovative CIOs contribute to business transformation Data traversing the network can be a source of strategic intelligence Network Analytics can improve user experience, security, business transformation 3

NETWORK ANALYTICS BUSINESS TRANSFORMATION Measure strategic applications to assure adoption and productivity Understand application usage to increase revenue Transform unknown or unrelated info into business intelligence As CIO, I m now invited back to the business table with my CEO and lines of business We are able to improve application response time thus increasing productivity I have committed to increase productivity by 30% over 5 years using Purview 4 NETWORK ANALYTICS BETTER USER EXPERIENCE Optimize network and server architecture for bandwidth-hungry applications Streamline troubleshooting with application and network performance visibility IT business planning for improved productivity We fixed performance issues on 6 servers in less than 20 minutes We can open 1 trouble ticket instead of 3 (server, network, application) We now schedule downtime based on low application usage periods NETWORK ANALYTICS BETTER SECURITY Understand shadow IT or unapproved applications Help assure security compliance Detect malicious applications We quickly located and correlated application use I can now tell if students are using applications that meet our security requirements

Information about the Network APs, Switches, Ports IP, Mac Addresses Topology Bandwidth Utilization Alarms & Alerts Design/Optimize Analyze Keeps the lights on, but doesn t contribute to business transformation Monitor Implement 5

Information from the Network Context User/Role Device Application* Access Method Location Time Policy Guest Employee Privileged user Service personnel Contractor Employee Owned Vstng_Emp Device Personal Device Corporate Device Guest Device HTTP Facebook Oracle Salesforce Youtube Twitter Google VDI Wireless Wired Auth. Method 802.1x Web based MAC Conference Rooms Hall way Class room Outside the agency 5ft from an Acess Pt M S 8 am 6 pm Weekends Holidays Anytime Allow Deny Rate Limit Contain Single SSID/VLAN Multiple VLANs Box IF $User_Identity AND $Device AND $Access AND $Location AND $Time THEN $Permission_Allowed

Network Analytics for More Intelligent SDN More Intelligent SDN to Improve User Experience Optimize application performance to improve user experience Ensure SLAs for business critical applications Ensure business ROI on new Applications Better utilize network resources Eliminate issues before they occur User Identity Joe Access Smith Type(s) Wireless Associated AP: wifi-243 SSID: Prod-Guest BSSID: 0-1a-e8-14-de-98 Virtual Device Identity(s) Windows v7.5.3 Device Type(s) Apple MacBook Air Samsung Galaxy Note Location Building-A Floor-2 Conference Room-7b Time of Day Wednesday, April 11, 2012 9:41:00 AM EST Application Provision Web (HTTP): 5Mb download Email (SMTP): 2Mb download All other Services: DISABLED Authentication MAC-Auth: 28:37:37:19:17:e6 PWA: 00:00:f0:45:a2:b3 802.1X: 00:0D:3A:00:a2:f1 Health Authorization Role: Sponsored Guest Sponsor: Jane Doe Internet Access Shared Engineering Servers Physical Device Identity(s) Apple Lion OSX v10.7 Android v4.0.4 Symantec Anti-Virus: Enabled Signature Update v10.4.3 OS Patches Up to date Peer2Peer Service: DISABLED 43 Services Running 7

Why Software Defined Networking - SDN? Recipe if this then that Trigger Ingredients Action Ingredients

If I get an email with a PowerPoint attachment then save it to Google Drive If I m within 500m from home, then open the garage door, set the heat to 20C and turn on the kitchen light If my favorite stock hits my target price then send me a phone Notification If I send a text msg to IFTTT containing the string #help then ring my cell phone

So what does this have to do with SDN?

If a medical device connects to the network then send its traffic through the firewall Topology Services Analytics VPN If a device is found with a vulnerability then automatically redirect traffic to the firewall AAA Skype for Business DNS/DHCP SDN Location Services Firewall Business Applications If a Skype (Lync) video call is initiated then apply dynamic priority and optimal network path for the call SIEM Orchestration If network demand from business applications is high then rate limit any Netflix traffic

Skype for Business SDN Integration (formerly known as Lync) SDN to Deliver Improved User Experience Automated End-to-End QoS for Skype for Business Clients In-depth, Contextual Visibility into Performance, Call Quality Qualified for Wired and Wireless Deployable at scale Today

Lync Solution Architecture with Open SDN Platform Leverages Open Daylight OneController OpenFlow, OVSDB and other protocols QoS prioritization across mixed switch infrastructures Frees customers from proprietary lock-in SDN solution designed to broaden market applicability 13

Visibility - Voice and Video Call Quality in Context MOS Start, End, Duration Caller, Callee, URI Location Info Session Info Prioritized Session Info 14

Analytics Custom Reporting 15

City of Bellevue Nearly $100,000 in program savings from deploying Skype for Business (Lync) vs. traditional IP/PBX System Deployed QoS end-to-end to 1,200 users in their Microsoft Skype for Business environment in hours vs. weeks Quickly identified and resolved application and networkrelated issues Gained deeper insights into application investments, network utilization, resource use, and Skype for Business implementation success factors. Using Extreme Networks made it quick and easy for us to incorporate the built-in QoS to deliver the best user experience to all of our employees across the City. - Garrett Solberg, Senior Network Architect, City of Bellevue 16