Presentation is loading. Please wait.

Presentation is loading. Please wait.

Finding the top users of bandwidth on your network

Similar presentations


Presentation on theme: "Finding the top users of bandwidth on your network"— Presentation transcript:

1 Finding the top users of bandwidth on your network
Aisling Dillon, Darragh Delaney

2 Agenda Sources of user data on computer networks
What you need to be logging in Active Directory Associating packet and flow data with usernames Finding out where user devices are plugged into your network

3

4 Where are the ‘pain’ points
4. Virtual Networks 5. Local Networks 1. Internet links 3. Remote Networks 2. Remote Links

5 Sources of user and network data (agentless)
Packet capture Log files & syslog NetFlow SNMP

6 Customer Use Case Can Download and get it on your network in 30 minutes!!! Virtual or physical!! Free fully functional trial, 30 days

7 Where can you get user logon events?
RADIUS

8 Customer Use Case

9 Customer Case study – Issue with WAN link
Ottawa pitch Traffic....Xilinx story Good analogy is physical security, users are in your network in your office block, place cameras at strategic points, where the risk is, so you can monitor and, tape and go back..... Get alerts and/or investigate Report easily, answer requests for information Go to DEMO here!! Getting visibility at the right level – Tsol Just did a survey,,, and the main pains we address or how customers are using the system are More detail on bandwidth usage, usernames, who are hogging that valuable resource and maybe slowing critical business apps down We track files moving around the network, internally, if a folder has been moved, who touched it last??? More visibility and insight internally, so much data and networks so critical, users more techy, lots of mobile devices,lots of risk, ALERT me if something unusual happens, get me the data I need to report and investigate!! Data protection, an audit trail. TYCO tunnelling case. Internal activity, what is going on internally, what are users doing, contractors,

10 User & network forensics

11 Finding out where user devices are plugged into your network

12

13 Next steps Recording will be sent out later
Download a free trial from Online demos also available at

14


Download ppt "Finding the top users of bandwidth on your network"

Similar presentations


Ads by Google