Proprietary & Confidential

Slides:



Advertisements
Similar presentations
What is Cloud Computing? Massive computing resources, deployed among virtual datacenters, dynamically allocated to specific users and tasks and accessed.
Advertisements

© 2012 Gigamon. All rights reserved. The Dynamic World of Threat Detection, Containment & Response 1.
Complete Event Log Viewing, Monitoring and Management.
Windows IT Pro magazine Datacenter solution with lower infrastructure costs and OPEX savings from increased operational efficiencies. Datacenter.
Bringing Together Linux-based Switches and Neutron
Introducing New Additions to ProSafe Advanced Smart Switch Family: GS724TR and GS748TR (ProSafe 24 and 48-port Gigabit Smart Switches with Static Routing)
Connect communicate collaborate GN3plus What the network should do for clouds? Christos Argyropoulos National Technical University of Athens (NTUA) Institute.
DOT – Distributed OpenFlow Testbed
SHARKFEST '08 | Foothill College | March 31 - April 2, 2008 Non-Intrusive Out-of-Band Network Monitoring Utilizing a Data-Access Switch April 1, 2008 Patrick.
System Center 2012 R2 Overview
Application Centric Infrastructure
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Software Defined Networking.
vCenter Application Discovery Manager (ADM)
What is a Virtual Tap? Intelligent Access and Monitoring Architecture Solutions.
Virtual techdays INDIA │ 9-11 February 2011 Cross Hypervisor Management Using SCVMM 2008 R2 Vikas Madan │ Partner Consultant II, Microsoft Corporation.
Net Optics Virtualization Solutions Deployment Case Study Intelligent Access and Monitoring Architecture Solutions.
It’s What You Can’t See That Will Sink You
Virtualization for Cloud Computing
Secure Cloud Computing with Virtualized Network Infrastructure HotCloud 10 By Xuanran Zong.
© 2011 Colt Technology Services Group Limited. All rights reserved Fax2Mail solution overview Presenter’s Name.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Net Optics Confidential and Proprietary Phantom Virtual Tap May 2011 Intelligent Access and Monitoring Architecture Solutions.
Data Center Network Redesign using SDN
Sanbolic Enabling the Always-On Enterprise Company Overview.
Extreme Networks Confidential and Proprietary. © 2010 Extreme Networks Inc. All rights reserved.
Agentless Security for Windows Server 2012, Windows Server 2012 R2, System Center VMM, Hyper-V and Windows 8 ISV Partner Alliance Value.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Healthcare – Large S. Florida Hospice Jeff Potter – IT Consultant.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
© 2010 IBM Corporation Plugging the Hypervisor Abstraction Leaks Caused by Virtual Networking Alex Landau, David Hadas, Muli Ben-Yehuda IBM Research –
Net Optics Confidential and Proprietary iLink Agg xStream Intelligent Access and Monitoring Architecture Solutions.
CON Software-Defined Networking in a Hybrid, Open Data Center Krishna Srinivasan Senior Principal Product Strategy Manager Oracle Virtual Networking.
Bluesocket vWLAN Overview. Its ALL about n……
How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.
Smart Grid Energy Generation Renewable Energy Distributed Generation Transmission & Distribution Load Management Demand Response Electrical Vehicles Charging.
© 2006 Cisco Systems, Inc. All rights reserved.Presentation_ID 1 Transforming Server Virtualization with Cisco VN-Link Belmont Chia Consulting System Engineer.
Modern Challenges for IT Governance, Risk, and Compliance in the Enterprise Brian Robison Product Manager McAfee Eric Fredericksen, PhD Solutions Architect.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.
Introduction to Avaya’s SDN Architecture February 2015.
Appliance and Ecosystem Where will NFV deploy first – Core carriers are moving now, but complex migration – BSS/OSS has to be maintained – Refine troubleshooting.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
1 Copyright © 2013 Tap DANZing with Arista Networks Redefining the Cost of the Access Layer.
Blue Coat Cloud Continuum
Network Virtualization Ben Pfaff Nicira Networks, Inc.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
2V0-641 Dumps VMware Certified Professional 6 - Network Virtualization Beta Exam PDF File Download :
IoT Edge Analytics Richa Asarawala Software Engineer 10/20/1016.
Boost VM Density with AV Designed for VDI
MICROSOFT AZURE ISV PROFILE: BMC SOFTWARE
Let's talk about Linux and Virtualization in 'vLAMP'
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Vidcoding Introduces Scalable Video and TV Encoding in the Cloud at an Affordable Price by Utilizing the Processing Power of Azure Batch MICROSOFT AZURE.
The Control Room… …is the Central Location of Visualized Information
New Heights by Guiding Them into the Cloud
A10 Networks vThunder Leverages the Powerful Microsoft Azure Cloud Platform to Offer Advanced Layer 4-7 Networking, Security on a Global Scale MICROSOFT.
1.
Cloud DX Connected Health Kits Depend on Azure to Deliver Cloud Storage and Securely Host Data for its Remote Patient Monitoring MICROSOFT AZURE APP BUILDER.
TitanXR Product Overview name title phone February 2015
Veeam Backup Repository
Virtualization & Security real solutions
Aled Edwards, Anna Fischer, Antonio Lain HP Labs
Utilizing the Capabilities of Microsoft Azure, Skipper Offers a Results-Based Platform That Helps Digital Advertisers with the Marketing of Their Mobile.
The Only Digital Asset Management System on Microsoft Azure, MediaValet Is Uniquely Equipped to Meet Any Company’s Needs MICROSOFT AZURE ISV PROFILE: MEDIAVALET.
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
MyCloudIT Enables Partners to Drive Their Cloud Profitability Using CSP-Enabled Desktop Hosting Automation with Microsoft Azure and Office 365 MICROSOFT.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
See your OpenStack Network Like Never Before
Security Delivery Platform for the Micro-segmented Data Center
Zendos Tecnologia Utilizes the Powerful, Scalable
Presentation transcript:

Proprietary & Confidential Virtual Monitoring Solution Unified Virtual and Physical Network Monitoring Product Marketing August 2015 apcon.com Proprietary & Confidential

Virtual Network Monitoring Challenges The Enterprise VM Challenge Intra-VM network traffic is a blind spot Elasticity of virtual environment complicates monitoring Complexity to monitor any traffic, across an evolving network, and ensure diagnostic tool compatibility Lack of unified virtual and physical monitoring Tool manufacturers provide proprietary, vendor specific solution Lack visibility of traffic between virtual machines Need to ensure VM security compliance Need to ensure VM operational efficiency Need ability to diagnose VM traffic issues Desirable to use existing security & performance tool farm Desirable to use existing monitoring staff Desirable to have unified physical and virtual monitor architecture Problems with over subscription and dropped packets VM specific tool solutions too expensive Solutions that require monitoring VM app expensive to dedicates resources Support for cross platform hypervisors Proprietary & Confidential

APCON Virtual Monitoring Overview Unified virtual and physical monitoring Increase visibility with existing tool farm East/West or Inter-VM traffic visibility Direct Kernel or API integration No VM probe or agent required No updates or maintenance of VMs or virtual probes Low resource utilization Multi-hypervisor support: Linux KVM, Hyper-V, more Virtual switch port mirror visibility of any VM traffic Ability to ensure VM security compliance Ability to ensure VM operational efficiency Ability to diagnose VM traffic issues Use existing security & performance tool farm Use existing monitoring staff Unified physical and virtual monitor architecture Out of band monitoring does not effect production traffic Leverages existing virtual switch port mirror (SPAN), no agents or VMs to install Supports all modern data center architectures Mirrored traffic is RSPAN (GRE tunnel) across current network to APCON monitoring systems Filtering based on VM Identification (VMID) in addition to IP, VXLAN, VLAN ID and more Easy to use VM Monitoring control

IntellaStore Unified Virtual & Physical Monitoring This phase relies on virtual switch port mirroring / SPAN – it will support ONLY environments with virtual switch (usually distributed) with SPAN/Mirror functionality. Green line: Encapsulated traffic, Blue line raw packets (from wired networks and post decapsulation on IntellaStore II) Proprietary & Confidential

IntellaStore II Decapsulation This phase relies on virtual switch port mirroring / SPAN Green line: Encapsulated traffic, Blue line raw packets (from wired networks and post decapsulation on IntellaStore II) Proprietary & Confidential

Virtual Monitoring with TitanXR This phase relies on virtual switch port mirroring / SPAN Green line: Encapsulated traffic, Blue line raw packets (from wired networks and post decapsulation on IntellaStore II) Proprietary & Confidential

TitanXR Unified Monitoring Management Big Data Center(s) Virtual Network(s) TitanXR Data Center(s) Remote Location(s) IntellaStore II Mobile App Proprietary & Confidential

Virtual Taps and Filters

Virtual Tap Filters

Virtual Tap View Summary

APCON Virtual Network Monitoring Summary Complete VM Traffic Visibility Unified virtual and physical monitoring Complete VM visibility, integrated solution Integrates with existing hypervisor plus nonintrusive traffic control filter Central VM virtual monitoring of Linux KVM, Hyper-V and more Use existing tool farm. Lower overall costs. Virtual switch port mirror visibility of any VM traffic Ability to ensure VM security compliance Ability to ensure VM operational efficiency Ability to diagnose VM traffic issues Use existing security & performance tool farm Use existing monitoring staff Unified physical and virtual monitor architecture Out of band monitoring does not effect production traffic Leverages existing virtual switch port mirror (SPAN), no agents or VMs to install Supports all modern data center architectures Mirrored traffic is RSPAN (GRE tunnel) across current network to APCON monitoring systems Filtering based on VM Identification (VMID) in addition to IP, VXLAN, VLAN ID and more Easy to use VM Monitoring control Proprietary & Confidential

Proprietary & Confidential Thank You Proprietary & Confidential