Mais conteúdo relacionado Semelhante a SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions (20) SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions2. Agenda 9.00: Welcome - Coffee and croissants 9.35 : Conference and Exchanges: "Why a network behaviour analysis solution is now indispensable for the management of your network?“ the new challenges for Network and Security managers NBA solutions: vital tools for your daily network management SecurActive NSS, an innovative Network Behavior Analysis solution 10h30 : Overview of SecurActive NSS in a real environment © 2009 SecurActive. Proprietary and Confidential 5. Develop and sell SecurActive NSS, the new network & application performance analysis solutions 7. European leader of the Network Behavior AnalysisMarket (“Red Herring 100 Europe Winner” 2008)© 2009 SecurActive. Proprietary and Confidential 8. More than 450 customers in Western Europe © 2009 SecurActive. Proprietary and Confidential 9. © 2009 SecurActive. Proprietary and Confidential The new challenges of your daily network management 10. NBA addresses the growing complexity of network administration © 2009 SecurActive. Proprietary and Confidential Fast changing & unclear perimeters of private networks (remote users, partners, remote sites, providers, etc.) Change in user behaviour (more demanding, varied usages , growing autonomy) Most varied usage of network and frequent deployment of new applications Increased need for permanent view on network behaviour Frequent modifications of network architecture (fusion, acquisition, new venture, etc.) 11. © 2009 SecurActive. Proprietary and Confidential Unclear perimeters of private networks Change in user behaviour New Network Usage More demanding Networks are growing up and are much more complex to manage Varied usages Growing autonomy Frequent modifications of network architecture 13. Network Behaviour Analysis NBA stands for © 2009 SecurActive. Proprietary and Confidential 15. © 2009 SecurActive. Proprietary and Confidential Capture of strategic flows on the corporate network Private network security Track non compliant usage, incidents and security breaches Diagnosis Analysis & network / security incident resolution Analysis of Network and Application behaviour Monitoring, planning & decision making Main features of a NBA solution NBA Solution IP Flow analysis Storage, presentation 16. Main features of a NBA solution © 2009 SecurActive. Proprietary and Confidential Capture of strategic flows NBA Solution IP Flow analysis Storage, presentation Diagnostic and Troubleshooting Private network security Analysis of Network and Application behaviours 17. How should a perfect NBA solutions be? Increase the effectiveness of an IT team and make network management easier Simple and intuitive to use Configuration of the solution has to be made according to your business context Understand the real behaviour of the network No change in the network architecture (no additional point of failure) A passive implementation Personalised reports and alerting modules Work free-minded 19. Dashboard Network map Graphs Details SecurActive NSS’s - Our Approach SecurActive NSS approach Classical network analysis approach Large volume of data to be analysed 1 to 5 clicks from synthesis to detail Report © 2009 SecurActive. Proprietary and Confidential 20. SecurActive, a NBA solution Network usage and flow mapping Security/Network Application Performance Capture of strategic flows 21. SecurActive How it works? © 2009 SecurActive. Proprietary and Confidential Dashboard Network map Graphs Details Queryengine GUI Report Alert Storage Alertengine Business Context Network aggregation Security aggregation NSS Sniffer 29. SecurActive – Range of solutions © 2009 SecurActive. Proprietary and Confidential NSS-800 8 GE + 2 SPF + 1 additional interface NSS-500 8 GE + 2 additional interfaces Performance NSS-200 7 GE (+1GE) Set of appliances to address every kind of needs. NSS-100 2GE +1FE (+1FE) NSS-10 2FE (+1 FE) Large Enterprise Remote Office/ Medium Enterprise 35. I want to centralise one of my vital applications 43. Situation Regional French newspaper group Has numerous news agencies, some of which are located in zones that are not equipped with high speed Internet access Some journalists have difficulties transmitting their articles on time because of a slow network. Without SecurActive No one is able to determine the cause of the slowdown. Simple ping measures are made and obtain normal results on the network’s lines at 64kbps. The problem persists for weeks. © 2009 SecurActive. Proprietary and Confidential 45. TCP Connection Time © 2009 SecurActive. Proprietary and Confidential SYN SYNACK Connection Time ACK time Server Client WAN network 46. Round Trip Time In © 2009 SecurActive. Proprietary and Confidential Data RTTin ACK time Server Client WAN network 47. Round Trip Time Out © 2009 SecurActive. Proprietary and Confidential Data RTTout ACK time Server Client WAN network 48. Application Response Time © 2009 SecurActive. Proprietary and Confidential Applicative request Applicative treatment ART 1stpacket of applicative response time Server Client WAN network 49. Retransmission delay © 2009 SecurActive. Proprietary and Confidential Non-acknowledgedpacket RD time Server Client WAN network First acknowledgedpacket ACK 51. ICMP Errors © 2009 SecurActive. Proprietary and Confidential Client Server « Host unreachable » 53. Situation This is a service company The work culture is liberal and there is complete trust on network users. Access to the Internet is usually slow Without SecurActive: poor quality of the link? the illegal use of the Internet? or the insufficient bandwidth? © 2009 SecurActive. Proprietary and Confidential