Network Performance + Security Monitoring

Similar documents
STEALTHWATCH MANAGEMENT CONSOLE

REVOLUTIONIZE THE WAY YOU VIEW YOUR NETWORK GAIN A UNIFIED VIEW OF SECURITY AND NETWORK OPERATIONS ACROSS PHYSICAL AND VIRTUAL NETWORKS

STEALTHWATCH MANAGEMENT CONSOLE

with NetFlow Technology Adam Powers Chief Technology Officer

Riverbed SteelCentral. Product Family Brochure

Riverbed SteelCentral. Product Family Brochure

Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope

Best Practices for Building a Security Operations Center

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

How To Manage A Network With Ccomtechnique

Cisco Cyber Threat Defense - Visibility and Network Prevention

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

CA Service Desk Manager

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

RIVERBED APPRESPONSE

How To Buy Nitro Security

IBM Security QRadar Risk Manager

Actionable Security Intelligence: Preparing for the Next Threat with a Proactive Strategy

Extreme Networks Security Analytics G2 Risk Manager

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Bridging the gap between COTS tool alerting and raw data analysis

Using Lancope StealthWatch for Information Security Monitoring

Managed Security Services for Data

Observer Analyzer Provides In-Depth Management

Mapping to NIST and Exceeding the Standard with StealthWatch

IBM Security QRadar Risk Manager

Network Management and Monitoring Software

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

IBM QRadar Security Intelligence Platform appliances

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Bringing Enterprise-class Network Performance and Security Management Together using NetFlow

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Virtualization Essentials

QRadar SIEM and FireEye MPS Integration

Application Performance Management

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

STEELCENTRAL APPRESPONSE

McAfee Server Security

Performance Management for Enterprise Applications

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IBM Security Intrusion Prevention Solutions

IBM QRadar Security Intelligence April 2013

E-Guide. Sponsored By:

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views

Network Forensics Buyer s Guide

QRadar Security Management Appliances

IBM SECURITY QRADAR INCIDENT FORENSICS

The Purview Solution Integration With Splunk

The SIEM Evaluator s Guide

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Observer Reporting Server Sample Executive Reports

QRadar SIEM and Zscaler Nanolog Streaming Service

Aternity Virtual Desktop Monitoring. Complete Visibility Ensures Successful VDI Outcomes

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

NetFlow Tips and Tricks

Implement a unified approach to service quality management.

SolarWinds Network Performance Monitor powerful network fault & availabilty management

IBM Security QRadar QFlow Collector appliances for security intelligence

Riverbed Performance Management

Wireless Network Analysis. Complete Network Monitoring and Analysis for a/b/g/n

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Network Performance Management Solutions Architecture

IBM Security Intelligence Strategy

Elevating Data Center Performance Management

7 Key Requirements for Distributed Network Monitoring

Vulnerability Management

QRadar Security Intelligence Platform Appliances

Cisco IOS Flexible NetFlow Technology

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Aternity Desktop and Application Virtualization Monitoring. Complete Visibility Ensures Successful Outcomes

Secure Cloud-Ready Data Centers Juniper Networks

Enhance visibility into and control over software projects IBM Rational change and release management software

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

IBM Security IBM Corporation IBM Corporation

VMware Solutions for Small and Midsize Business

Improving Business Service Uptime. Proactive network performance management solutions ensure optimal business service for the Dynamic Enterprise

White Paper: Application and network performance alignment to IT best practices

Boosting enterprise security with integrated log management

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

Best Practices for NetFlow/IPFIX Analysis and Reporting

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Application Visibility and Monitoring >

Cisco Performance Visibility Manager 1.0.1

Remote Management Services Portfolio Overview

Introducing IBM s Advanced Threat Protection Platform

whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management

SolarWinds Network Performance Monitor

Cisco Prime Network Analysis Module Software 5

SOLARWINDS NETWORK PERFORMANCE MONITOR

Transcription:

Network Performance + Security Monitoring

Gain actionable insight through flow-based security and network performance monitoring across physical and virtual environments. Uncover the root cause of performance issues and security threats before they put your enterprise at risk. CHALLENGES In today s complex business environment, organizations demand continuous access to and fast performance from networks and business-critical applications. When performance slows, network operations and security teams must be able to isolate the root cause and restore both physical and virtual environments quickly and efficiently. However, as networks expand and security threats rise, IT teams are losing network visibility, knowledge and control. TECHNOLOGIES AND TRAFFIC VOLUMES ARE GROWING EXPONENTIALLY Key business trends including globalization, user mobility and IT consumerization are adding layers of complexity to the network. Networks are now expected to support a rapidly growing number of applications and mobile devices and the resulting exponential growth in traffic volume creating a new breed of management and security challenges. Complicating matters is the advent of Web 2.0, which has resulted in as much as 85 percent of all network traffic going through port 80, making it difficult to distinguish between individual applications using conventional monitoring solutions. The recent proliferation of cloud computing and virtualization creates yet another obstacle, diminishing network visibility and opening organizations up to further risk. KNOWLEDGE IS POWER With all the new innovation flooding into the enterprise, network and security teams simply cannot keep up with the demands confronting them on a daily basis. Monitoring, securing and troubleshooting such high volumes of traffic can be an extremely expensive, laborintensive process. The multiple, disparate tools traditionally used by network and security teams provide limited insight, resulting in troubling network blind spots. To achieve secure, high-performing networks, IT teams need to know what, when and how specific technologies are in use across the enterprise and by whom. SOLUTION So how can network and security teams continue to provide more services, applications and tools for users and still know what is going on inside the network? STEALTHWATCH THE EYES AND EARS OF YOUR NETWORK by Lancope is the leading solution for flow-based security and network performance monitoring across physical and virtual environments. By leveraging NetFlow, sflow and other flow data from existing routers and switches, provides in-depth, borderless network visibility. With, network operations and security teams can obtain actionable insight into who is using the network, what applications and services are in use, and how well they are performing. combines behavioral-based network performance and security monitoring with application and identity awareness at a fraction of the cost of conventional monitoring solutions. The system empowers IT teams to make faster, more informed decisions across mission-critical areas including troubleshooting, incident response, compliance, resource allocation, capacity planning and change management. not only provides basic details about the who, what, when and where of network traffic it also enables you to focus on the all-important why behind network problems and how to resolve them.

KNOW YOUR NETWORK. RUN YOUR BUSINESS. WHAT Layer 7 deep packet inspection to determine what caused the issue WHEN Historical trends coupled with real-time analysis to pinpoint precisely when the situation occurred WHERE Physical and virtual network monitoring across the entire enterprise to identify where the problem originated WHO Identity awareness to discover who caused the problem and who was affected WHY Behavioral baselining to uncover why a problem occurred in the first place HOW Actionable intelligence to quickly deduce how to solve the issue

Get Empowered WITH STEALTHWATCH Achieve faster Mean Time To Know Gain borderless network visibility According to Gartner, through 2012, more than 80% of application performance and availability failures will be blamed on network problems, but the network will represent less than 20% of the root cause. STEALTHWATCH CAPABILITIES Obtain actionable intelligence Unify security, network and application performance monitoring Maintain secure, high-performing networks Track issues to specific user and device Enforce policies to achieve regulatory compliance SECURITY Proactively Identify Internal and External Threats On the security front, a lack of network visibility can be particularly damaging. Traditional security systems monitor only the perimeter and do not provide insight into insider attacks or threats introduced by employee-owned mobile devices. Additionally, external attacks such as advanced persistent threats continue to bypass traditional safeguards, and employing conventional security systems internally is cost-prohibitive. Without adequate internal monitoring, security issues can go unnoticed for long periods of time, wreaking havoc on the network. Unlike other solutions, takes a proactive approach to security by analyzing network behavior instead of relying on signatures to identify attacks. can detect targeted, custom threats, zero-day worms, viruses, botnets and other malware, as well as insider threats including network misuse, policy violations and data leakage. Advanced identity awareness helps track issues all the way down to the specific user responsible. In addition to providing in-depth intelligence on the internal network, can also conduct behavioral analytics on data from perimeter devices such as firewalls to deliver even greater contextual awareness. Security managers can also choose to automatically mitigate issues using existing routers, switches and firewalls. Through its patented Concern Index, automatically prioritizes the most severe issues to ensure that they are dealt with first. is also ideal for performing sophisticated forensic analysis to investigate incidents. NETWORK PERFORMANCE Dramatically Streamline Troubleshooting and Increase Network Insight Complete, real-time visibility into all hosts and traffic on the network provides valuable insight into network anomalies. This visibility enables security and network operations teams to

easily determine whether issues stem from the network itself or from specific applications. It also enables them to quickly pinpoint the root cause of issues down to the exact application and user, dramatically reducing Mean Time To Know. employs deep packet inspection to both identify and gather performance statistics for Layer 7 applications across physical and virtual environments. The system also automatically recognizes and starts baselining new servers and applications to quickly detect issues caused by misconfigured, malfunctioning or unauthorized applications and devices. Behavioral baselining is critical since network changes and migrations commonly cause performance issues. With, organizations can costeffectively and efficiently maximize network performance and avoid damaging downtime. SCALABILITY Maximize Investment, Minimize Complexity Setting itself apart from other solutions, is extremely scalable to meet the needs of large networks and enterprises, analyzing up to 3 million flows per second. performs in-depth analysis and reporting with a very light footprint that does not interfere with network performance. By combining network and security capabilities into a single, unified platform and leveraging an organization s existing infrastructure, eliminates costs and complexities associated with non-integrated point solutions. is fast and simple to deploy and features a highly efficient workflow. An intuitive user interface and customizable, graphical reports quickly provide anyone in the enterprise with an easy-to-digest, real-time view of what is happening on the network. In addition to dramatically improving network, security and datacenter operations, the detailed network insight generated by can enhance other functions including human resources, help desk and compliance. With, processes are vastly improved, skills and experience are better utilized, and technologies are leveraged to their maximum potential. Our team s productivity has increased significantly because we now have time to focus on other projects instead of spending hours manually diagnosing networkrelated traffic problems. Gibraltar Industries Dartmouth College (U.S.A.) reported that immediately upon deployment, uncovered 400 misbehaving hosts and helped reduce network threats by 90%.

KEY FEATURES BEHAVIOR-BASED FLOW ANALYSIS Scalable, enterprise-wide visibility into network behavioral changes enables fast troubleshooting of application performance and network latency issues. APPLICATION AWARENESS Lancope: The Leader in Flow Collection and Analysis Lancope, Inc. is a leading provider of flow-based monitoring to ensure high-performing and secure networks for global enterprises. Unifying critical network performance and security information for borderless network visibility, Lancope provides actionable insight that reduces the time between problem onset and resolution. Enterprise customers worldwide, including healthcare, financial services, government and higher education institutions, rely on Lancope to make better network decisions and avoid costly outages and downtime. Founded in 2000 in Atlanta, GA, Lancope is continuously innovating to stay ahead of customer demands and marketplace trends, holding five patents and more than 130 proprietary algorithms. With Lancope, you can know your network and run your business better. Lancope has received numerous awards for its leadership in network and security technologies from a variety of publications, including GSN, Network Computing, SC Magazine and Red Herring, and was named Best Joint Security and Network Management Solution by Enterprise Management Associates, Inc. For more information, visit www.lancope.com. Deep packet inspection and behavior analysis help identify encrypted and obfuscated applications and protocols, while also ensuring that the network is delivering applications reliably and securely. Advanced URL data further enhances troubleshooting efforts. CONCERN INDEX Proprietary technology automatically prioritizes the most severe issues to ensure that they are dealt with first. RELATIONAL FLOW MAPPING Innovative, graphical representations of related hosts on the network (e.g., business units, functional areas, geographical maps, etc.) provide a real-time view of how specific groups of hosts are performing at any given time. USER IDENTITY TRACKING Identity-aware flow analysis enhances troubleshooting and ensures compliance by pinpointing the source of issues all the way down to the exact user. Identity data is available from the IDentity appliance or through integration with Cisco s Identity Services Engine (ISE). POINT-OF-VIEW Customized, real-time views of network intelligence according to specific roles extend the value of across the organization while still protecting sensitive information.

reduces the time, cost and complexity of troubleshooting the network and can be deployed at the cost of conventional technologies. STEALTHWATCH PRODUCT FAMILY STEALTHWATCH MANAGEMENT CONSOLE The Management Console available as a physical or virtual appliance serves as the central management point for collecting, analyzing and reporting on network and security data across the enterprise. STEALTHWATCH FLOWCOLLECTOR The FlowCollector gathers traffic information from existing network infrastructure using NetFlow, sflow or other types of flow data. Comprehensive and continuous awareness of network activity results in extremely rapid detection and response for potential issues, featuring advanced troubleshooting capabilities not found in other flow-based technologies. The FlowCollector is also available as a virtual appliance. STEALTHWATCH FLOWSENSOR Through a combination of behavior analysis and deep packet inspection, the FlowSensor identifies applications and protocols in use across the network. It gathers packet- Management Console level performance statistics and URL data at a fraction of the cost of traditional probe-based devices. The FlowSensor can be installed easily in both physical and virtual environments, and plays a key role in troubleshooting application performance problems and security incidents. STEALTHWATCH IDENTITY IDentity enables network and security professionals to quickly drill all the way down to the user level to troubleshoot issues, holding users accountable for their actions, improving audit controls for regulatory compliance and enhancing the end-user experience. STEALTHWATCH FLOWREPLICATOR The FlowReplicator improves network performance by aggregating network and security information from multiple locations into a single data stream to send to the FlowCollector or other devices. Fast, easy flow replication greatly simplifies migration to new technologies. https has accelerated incident resolution for the Puget Sound Blood Center, allowing the organization to retain the $22,680 it typically loses for each hour of downtime. With limited staff responsible for monitoring, securing and optimizing such a large network, provides us with much needed visibility to do our jobs faster and more effectively. Central Michigan University FlowCollector FlowReplicator Cisco ISE IDentity VM VM VE NetFlow/ sflow-enabled Routers, Switches, Firewalls FlowSensor vsphere with FlowSensor VE NetFlow, sflow, syslog, SNMP User and Device Information

Network Performance + Security Monitoring 888.419.1462 770.225.6500 www.lancope.com 3650 Brookside Pkwy, Suite 400 Alpharetta, Georgia 30022 2012 Lancope, Inc. All rights reserved. Lancope,, and other trademarks are registered or unregistered trademarks of Lancope, Inc. All other trademarks are properties of their respective owners.