SlideShare uma empresa Scribd logo
1 de 36
Baixar para ler offline
Jay Botelho
Director of Product Management
WildPackets                                      Show us your tweets!
jbotelho@wildpackets.com                            Use today’s webinar hashtag:

Ran Nahmias
                                                  #wp_virtualnetwork
                                              with any questions, comments, or feedback.
Director, Virtualization and Cloud Services
                                                        Follow us @wildpackets
Net Optics
ran@netoptics.com
                                                                © WildPackets, Inc.   www.wildpackets.com
Agenda
•   Current Trends in Virtualization
•   What Causes Virtual Network Blind Spots?
•   Eliminating the Blind Spot
•   Network Analysis in Virtual Environments
•   Net Optics Overview
•   WildPackets Overview




                                               © WildPackets, Inc.
Current State of Virtualization
• 75% of large companies have implemented some form of
 virtualization1
• Percentage of servers actually virtualized remains small at
 approximately 10 – 15% in these companies1
• Virtual systems are a tempting target for security breaches
   ‒ Compromising only one layer provides access to many2
• Storage virtualization – 45% adoption; 5th most effective
 strategy3,7
   ‒ Deduplication
   ‒ Thin provisioning
   ‒ Tiering




                                                            © WildPackets, Inc.
Current Trends in Virtualization
          •    Bundling virtualization with servers1
          •    SMBs get into the action4, 5
          •    Automation on the rise5, 6
          •    Better backup, recovery and live migration tools5, 6
          •    I/O virtualization 6
          •    Desktop Virtualization5, 6, 8
                   ‒ Benefits depend on vertical industry
                   ‒ Mobile access devices (eg. iPads) driving adoption




WildPackets Overview                    PROPRIETARY AND CONFIDENTIAL   © WildPackets, Inc.   4
What Causes Network Blind Spots



        11000110101   11000110101




    ?
11000110101




                                    © WildPackets, Inc.
Eliminating the Blind Spot




                     © WildPackets, Inc.   www.wildpackets.com
WildPackets Overview   PROPRIETARY AND CONFIDENTIAL   © WildPackets, Inc.   7
Hypervisor Virtual Stack Monitoring
                     Challenge
                                            ESX Virtual Stack
                                             vm1       vm2         vm3




                                                                                                 Physical Network
                                                                                                    Security &
     Virtualization Creates                                                                         Monitoring
    Security, Monitoring and
       Compliance Risks                                         Virtual Switch                           Analyzer


•    No visibility into inter-VM traffic,                                                                IDS
     vulnerabilities or threats

•    Lacks auditing of data passing
     between virtual servers
                                                                   Physical Host Server
•    Inability to pinpoint resource
     utilization issues




                                                                                   © WildPackets, Inc.
Phantom Virtual Tap Solution
                                            ESX Virtual Stack with
                                            Phantom Installed
                                          Phantom




                 
                                          Controlle   vm1     vm2       vm3
                                              r
                                            (VM)




     Enables Security,
                                                                                                   Physical Network
Performance Monitoring and                                                                            Security &
       Compliance                                 Phantom Virtual Tap                                 Monitoring


•   100% visibility of inter-VM traffic                                                                    Analyzer

•   Kernel implementation—                                          Virtual Switch
    no need for SPAN Ports on Virtual
    Switch / Promiscuous Mode                                                                              IDS

•   Bridges virtual traffic to physical
    monitoring tools

                                                                    Physical Host Server




                                                                                     © WildPackets, Inc.
Net Optics Converged Network Solution
                                                               ESX




                
                                                                                    Phantom
                                                                 vm1     vm2    vm3 Controlle
                                                                                    r
                                                                                    (VM)


                                                                                                           Physical Server
      Physical and Virtual
                                            Analyzer
      Monitoring Access                                                         Phantom                     Physical Server
                                                                                Monitor™
•   Hypervisor-specific Tap                 IDS
                                                                                                            Physical Server
                                                                                Hypervisor
•   Purpose-built for virtualization
                                                               Encapsulated
•   Monitor through Live-Migration                                  Tunnel
    (VMotion)

•   TAP for each VM instance
    (by VM ID)
                                            Phantom Manager™                       Director™             Indigo Pro™
•   Tight Integration with VMware vCenter

•   Fault-Tolerant and Non disruptive
    Architecture
                                                                        LAN/W
                                                                         AN




                                                                                                © WildPackets, Inc.
Support for vMotion Migration
ESX 1                                  ESX 2

    vm1   vm2    vm3                       vm5   vm6




                Phantom                                  Phantom
                Monitor™                                 Monitor™


                Hypervisor                               Hypervisor




                             LAN/WAN
                                                       Phantom
                                                       Manager™




                                                        © WildPackets, Inc.
Net Optics Standalone Network Solution
                                                                   ESX




                
                                                                                          Phantom
                                                                      vm1      vm2    vm3 Controlle
                                                                                          r
                                                                                          (VM)


                                                                                                                 Physical Server
   Phantom Virtual Tap
                                             Analyzer
Standalone Implementation                                                             Phantom                     Physical Server
                                                                                      Monitor™
•   Phantom Tap can be deployed as total     IDS
    virtualization monitoring solution                                                                            Physical Server
                                                                                      Hypervisor

•   Can capture and bridge traffic of
    interest directly to select inspection
    tools                                                       Encapsulated Tunnel

•   No hardware required, can be installed
    and deployed off of data center floor
                                             Phantom Manager™                                                  Indigo Pro™




                                                                             LAN/W
                                                                              AN




                                                                                                      © WildPackets, Inc.
Phantom Virtual Tap Key Advantages




  • Gain end-to-end         • Achieve security,    • Realize the full
    traffic visibility in     compliance and         potential of your
    the virtual               performance            virtual data center
    environment               monitoring standards




WildPackets Overview           PROPRIETARY AND CONFIDENTIAL   © WildPackets, Inc.   14
Establishing Goals for Network
Analysis in Virtual Environments




                        © WildPackets, Inc.   www.wildpackets.com
Net Optics and WildPackets




WildPackets Overview            PROPRIETARY AND CONFIDENTIAL   © WildPackets, Inc.   16
What’s The Difference?

 Traditional NA – Virtual NA = 0

• All the same goals apply
   ‒   Monitoring/reporting
   ‒   Background analysis with alarms/alerts
   ‒   Real-time vs. post-capture analysis
   ‒   Network performance/application performance/VoIP
• Only the implementation is different




                                                     © WildPackets, Inc.
Understand Your Virtual Environment
• Traffic levels per   • Baselines
 virtual interface       ‒ Establish and re-establish
   ‒ Mbps?               ‒ Use Expert events for further
   ‒ Packets per           classification
     second?
   ‒ Packet size
     distribution?
• Traffic level per
 application
   ‒ Average rates
   ‒ Peak rates
   ‒ Weekly patterns




                                            © WildPackets, Inc.
Real-time vs. Post Capture Analysis
• Real-time analysis
   ‒   RAM is your friend
   ‒   Flexible, on-the-fly changes
   ‒   Network utilization under 3Gbps
   ‒   Validating theories
• Post-capture analysis
   ‒ Disk capacity is your friend - steady-state traffic at 1Gbps requires:
       7.68 GB/min
       460 GB/hr
       11 TB/day
   ‒   Wide-open analysis
   ‒   Network utilization at full line rate (10Gbps)
   ‒   Need to retain ALL data for post-capture analysis
   ‒   Forensics searches are CPU and RAM intensive
                                                           © WildPackets, Inc.
Real-time Statistics Always Available




WildPackets Overview    PROPRIETARY AND CONFIDENTIAL   © WildPackets, Inc.   20
Net Optics Overview




                 © WildPackets, Inc.   www.wildpackets.com
Introduction to Net Optics
Customers
• Financial, Telco, Enterprise, Government,             Markets
  Healthcare
• 85% of the Fortune 100                                BRIC
• 52% of the Fortune 500                                 6%
• 7,500 Global Deployments                       APAC
                                                  16%
Highlights
                                                                 N.
                                                               America
• Founded in 1996, Private, Self-Funded          EMEA           60%
• 60 Quarters of Growth & Profitability           18%
• Strong Management Team
• Headquarters in Silicon Valley, USA
• Sales Offices in New York, Atlanta, Seattle,
  Germany, China

Go to Market Strategy
• 30% Direct Sales
• 25% OEM/Partner Relationship
• 45% Global Channel
Technology
• Four new inventions each year
• 20+ patents and patent pending applications                      © WildPackets, Inc.
Selected Customers
Financial   Telco   Enterprise   Healthcare          Government




                                              © WildPackets, Inc.
Networking Industry Trends and Pain
                    Points
Network must be designed for                         No visibility into the virtualized
scalability & agility                                                          network
New Applications                                                    Explosive Growth
Network Stability                                                CAPEX Improvements
Low Latency                     Network                      No Compliance Monitoring
                                            Virtualization
Data Center Consolidation      Complexity




Compliance                                    Network                     Link Saturation
                                Security
Internal/External Intrusions                  Speeds                    Oversubscription
Lawful Interception                                                      10G 40G 100G
Cybercrime

Security must be architected in,
not a point solution                              Tools & instruments can’t keep up
                                                                  © WildPackets, Inc.
Net Optics Position in the Network
Applications Layer
 Protocol
 Analyzers
 IPS
 Forensics
 Performance
 Data Loss
 Prevention
 VoIP Analyzer




Access & Control Layer                                                           Net Optics Products Solve
                  Indigo Pro™               Director xStream
                                                  Pro™                 Taps
                                                                                  • Oversubscribed Analysis & Security
                         Aggregation                                                Tools
                                Director™                              Bypass
                                                                      Switches
                                                                                  • Requirement for Total Visibility
                   Director                          xBalancer™                   • Need for Multiple Tool Deployment
                 Phantom™ Virtual                                                 • Network Scalability
                       Tap
                                    Gig Zero Delay                                • Visibility into Virtualization
                                        Tap™                   Regeneration
                                                                  Tap™            • High Availability & Tool Redundancy



Network Layer
                                                                                                           ESX Stack
 Core Network                                                                                               vm         Vm    Vm
                                                                                                             1          2     3
 Data Center
 User Access
 Virtual Data
 Center                                                                                                                     Phantom
                                                                                                                            Monitor™
 Cloud                                                                                                                      V Switch
                                                                                                          Hypervisor




                                                                                                     © WildPackets, Inc.
Net Optics Products
       Access             Control     Management


Bypass Switches



                                     Indigo Pro™

Intelligent Taps




Network Taps




Virtual Tap                          appTap™


                                           © WildPackets, Inc.
WildPackets Overview   PROPRIETARY AND CONFIDENTIAL   © WildPackets, Inc.   27
WildPackets Overview




                 © WildPackets, Inc.   www.wildpackets.com
Corporate Background
• Experts in network monitoring, analysis, and troubleshooting
   ‒ Founded: 1990 / Headquarters: Walnut Creek, CA
   ‒ Offices throughout the US, EMEA, and APAC


• Our customers are leading edge organizations
   ‒ Mid-market, and enterprise lines of business
   ‒ Financial, manufacturing, ISPs, major federal agencies,
     state and local governments, and universities
   ‒ Over 7,000 customers / 60+ countries / 80% of Fortune 1,000


• Award-winning solutions that improve network performance
   ‒ Internet Telephony, Network Magazine, Network Computing Awards
   ‒ United States Patent 5,787,253 issued July 28, 1998
        • Different approach to maintaining availability of network services

                                                               © WildPackets, Inc.
What We Do
• Provide network visibility and intelligence …
   ‒ WatchPoint, OmniPeek, OmniEngines
       • Expert systems – we find the problems for you
       • Superior drill-down capability – trouble-shoot from anywhere
       • Flexible, customizable, extensible – leverage your investment
   ‒ Professional services, training, best practices
• For all network segments …
   ‒ Data center to desktop to remote office
   ‒ LAN, WAN, Wireless …
   ‒ HTTP, Email, Database, VoIP, Video …
• To …
   ‒ Network engineers; IT Management; Developers


                                                            © WildPackets, Inc.
Real-World Deployments
    Education          Financial   Government




Health Care / Retail   Telecom     Technology




                                     © WildPackets, Inc.
Product Offerings
          Software and Turnkey Appliances
• Enterprise Monitoring and Reporting
   ‒ WatchPoint Server
   ‒ OmniFlow, NetFlow, and sFlow Collectors
• Network Probes & Recorders
   ‒ Omnipliance Network Recorders – Edge, Core
   ‒ TimeLine Network Recorder
   ‒ OmniAdapter Analysis Cards
• Distributed Analysis Software
   ‒ OmniPeek – Enterprise, Professional, Basic, Connect
   ‒ OmniEngine – Enterprise, Desktop, OmniVirtual
• Portable Solutions
   ‒ OmniPeek software
   ‒ Omnipliance Portable
                                                    © WildPackets, Inc.
TimeLine Network Recorder
 11.7Gbps Sustained Capture

 • Fastest network recording and real-time statistical
  display — simultaneously
    ‒ Network statistics display in TimeLine visualization format
 • Rapid, intuitive forensics search and retrieval
    ‒ Historical network traffic analysis and quick data rewinding
    ‒ Several pre-defined forensics search templates making
      searches easy and fast
 • A natural extension to the WildPackets product line
 • Turnkey bundled solution


                                                         © WildPackets, Inc.
Omnipliance Network Recorders
     Price/performance solutions for every application




             Portable               Edge                 Core                  TimeLine
              Ruggedized        Small Networks /     Regional Offices /           Datacenter
            Troubleshooting      Remote Offices      Small Datacenter             Workhorse
Chassis                                1U                   3U                           3U

Memory        2 GB / 8 GB          4 GB / 8 GB         6 GB / 24 GB             18 GB / 24 GB

Expansion   1 PCI-E / 2 PCI-X   1 PCI-E or 1 PCI-X        4 PCI-E                    4 PCI-E

Storage     500 GB / 2.5 TB           1 TB                 8 TB             8 TB / 16 TB / 32 TB




                                                                          © WildPackets, Inc.
Key Differentiators
• High-level network monitoring to root-cause analysis
• Single solution for today’s converged networks
   ‒ Wired, Wireless, 1GB, 10GB, VoIP, Video, TelePresence, IPTV
• Reduce and even eliminate network downtime
   ‒ Automated monitoring 24x7
   ‒ Speedy resolution of network bottlenecks
• Improve network and application performance
• Uniquely Extensible Platform – tailored to your needs
   ‒ Plug-ins and APIs for integration and customization




                                                      © WildPackets, Inc.
Q&A

   Show us your tweets!
      Use today’s webinar hashtag:           Follow us on SlideShare!
                                              Check out today’s slides on SlideShare
    #wp_virtualnetwork                           www.slideshare.net/wildpackets
with any questions, comments, or feedback.
          Follow us @wildpackets



                                                           © WildPackets, Inc.   www.wildpackets.com
Thank You!

WildPackets, Inc.                 Net Optics, Inc.
1340 Treat Boulevard, Suite 500   5303 Betsy Ross Drive
Walnut Creek, CA 94597            Santa Clara, CA 95054
(925) 937-3200                    (408) 737-7777


                                        © WildPackets, Inc.   www.wildpackets.com

Mais conteúdo relacionado

Mais de Savvius, Inc

Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkSavvius, Inc
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsSavvius, Inc
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekSavvius, Inc
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisSavvius, Inc
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Savvius, Inc
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersSavvius, Inc
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?Savvius, Inc
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?Savvius, Inc
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Savvius, Inc
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network Savvius, Inc
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewSavvius, Inc
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisSavvius, Inc
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Savvius, Inc
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Savvius, Inc
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring Savvius, Inc
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint GroupSavvius, Inc
 

Mais de Savvius, Inc (20)

Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with Omnipeek
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN Analysis
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
 

Último

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Último (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Total Virtual Network Visibility

  • 1. Jay Botelho Director of Product Management WildPackets Show us your tweets! jbotelho@wildpackets.com Use today’s webinar hashtag: Ran Nahmias #wp_virtualnetwork with any questions, comments, or feedback. Director, Virtualization and Cloud Services Follow us @wildpackets Net Optics ran@netoptics.com © WildPackets, Inc. www.wildpackets.com
  • 2. Agenda • Current Trends in Virtualization • What Causes Virtual Network Blind Spots? • Eliminating the Blind Spot • Network Analysis in Virtual Environments • Net Optics Overview • WildPackets Overview © WildPackets, Inc.
  • 3. Current State of Virtualization • 75% of large companies have implemented some form of virtualization1 • Percentage of servers actually virtualized remains small at approximately 10 – 15% in these companies1 • Virtual systems are a tempting target for security breaches ‒ Compromising only one layer provides access to many2 • Storage virtualization – 45% adoption; 5th most effective strategy3,7 ‒ Deduplication ‒ Thin provisioning ‒ Tiering © WildPackets, Inc.
  • 4. Current Trends in Virtualization • Bundling virtualization with servers1 • SMBs get into the action4, 5 • Automation on the rise5, 6 • Better backup, recovery and live migration tools5, 6 • I/O virtualization 6 • Desktop Virtualization5, 6, 8 ‒ Benefits depend on vertical industry ‒ Mobile access devices (eg. iPads) driving adoption WildPackets Overview PROPRIETARY AND CONFIDENTIAL © WildPackets, Inc. 4
  • 5. What Causes Network Blind Spots 11000110101 11000110101 ? 11000110101 © WildPackets, Inc.
  • 6. Eliminating the Blind Spot © WildPackets, Inc. www.wildpackets.com
  • 7. WildPackets Overview PROPRIETARY AND CONFIDENTIAL © WildPackets, Inc. 7
  • 8. Hypervisor Virtual Stack Monitoring Challenge ESX Virtual Stack vm1 vm2 vm3 Physical Network Security & Virtualization Creates Monitoring Security, Monitoring and Compliance Risks Virtual Switch Analyzer • No visibility into inter-VM traffic, IDS vulnerabilities or threats • Lacks auditing of data passing between virtual servers Physical Host Server • Inability to pinpoint resource utilization issues © WildPackets, Inc.
  • 9. Phantom Virtual Tap Solution ESX Virtual Stack with Phantom Installed Phantom  Controlle vm1 vm2 vm3 r (VM) Enables Security, Physical Network Performance Monitoring and Security & Compliance Phantom Virtual Tap Monitoring • 100% visibility of inter-VM traffic Analyzer • Kernel implementation— Virtual Switch no need for SPAN Ports on Virtual Switch / Promiscuous Mode IDS • Bridges virtual traffic to physical monitoring tools Physical Host Server © WildPackets, Inc.
  • 10. Net Optics Converged Network Solution ESX  Phantom vm1 vm2 vm3 Controlle r (VM) Physical Server Physical and Virtual Analyzer Monitoring Access Phantom Physical Server Monitor™ • Hypervisor-specific Tap IDS Physical Server Hypervisor • Purpose-built for virtualization Encapsulated • Monitor through Live-Migration Tunnel (VMotion) • TAP for each VM instance (by VM ID) Phantom Manager™ Director™ Indigo Pro™ • Tight Integration with VMware vCenter • Fault-Tolerant and Non disruptive Architecture LAN/W AN © WildPackets, Inc.
  • 11. Support for vMotion Migration ESX 1 ESX 2 vm1 vm2 vm3 vm5 vm6 Phantom Phantom Monitor™ Monitor™ Hypervisor Hypervisor LAN/WAN Phantom Manager™ © WildPackets, Inc.
  • 12. Net Optics Standalone Network Solution ESX  Phantom vm1 vm2 vm3 Controlle r (VM) Physical Server Phantom Virtual Tap Analyzer Standalone Implementation Phantom Physical Server Monitor™ • Phantom Tap can be deployed as total IDS virtualization monitoring solution Physical Server Hypervisor • Can capture and bridge traffic of interest directly to select inspection tools Encapsulated Tunnel • No hardware required, can be installed and deployed off of data center floor Phantom Manager™ Indigo Pro™ LAN/W AN © WildPackets, Inc.
  • 13. Phantom Virtual Tap Key Advantages • Gain end-to-end • Achieve security, • Realize the full traffic visibility in compliance and potential of your the virtual performance virtual data center environment monitoring standards WildPackets Overview PROPRIETARY AND CONFIDENTIAL © WildPackets, Inc. 14
  • 14. Establishing Goals for Network Analysis in Virtual Environments © WildPackets, Inc. www.wildpackets.com
  • 15. Net Optics and WildPackets WildPackets Overview PROPRIETARY AND CONFIDENTIAL © WildPackets, Inc. 16
  • 16. What’s The Difference? Traditional NA – Virtual NA = 0 • All the same goals apply ‒ Monitoring/reporting ‒ Background analysis with alarms/alerts ‒ Real-time vs. post-capture analysis ‒ Network performance/application performance/VoIP • Only the implementation is different © WildPackets, Inc.
  • 17. Understand Your Virtual Environment • Traffic levels per • Baselines virtual interface ‒ Establish and re-establish ‒ Mbps? ‒ Use Expert events for further ‒ Packets per classification second? ‒ Packet size distribution? • Traffic level per application ‒ Average rates ‒ Peak rates ‒ Weekly patterns © WildPackets, Inc.
  • 18. Real-time vs. Post Capture Analysis • Real-time analysis ‒ RAM is your friend ‒ Flexible, on-the-fly changes ‒ Network utilization under 3Gbps ‒ Validating theories • Post-capture analysis ‒ Disk capacity is your friend - steady-state traffic at 1Gbps requires: 7.68 GB/min 460 GB/hr 11 TB/day ‒ Wide-open analysis ‒ Network utilization at full line rate (10Gbps) ‒ Need to retain ALL data for post-capture analysis ‒ Forensics searches are CPU and RAM intensive © WildPackets, Inc.
  • 19. Real-time Statistics Always Available WildPackets Overview PROPRIETARY AND CONFIDENTIAL © WildPackets, Inc. 20
  • 20. Net Optics Overview © WildPackets, Inc. www.wildpackets.com
  • 21. Introduction to Net Optics Customers • Financial, Telco, Enterprise, Government, Markets Healthcare • 85% of the Fortune 100 BRIC • 52% of the Fortune 500 6% • 7,500 Global Deployments APAC 16% Highlights N. America • Founded in 1996, Private, Self-Funded EMEA 60% • 60 Quarters of Growth & Profitability 18% • Strong Management Team • Headquarters in Silicon Valley, USA • Sales Offices in New York, Atlanta, Seattle, Germany, China Go to Market Strategy • 30% Direct Sales • 25% OEM/Partner Relationship • 45% Global Channel Technology • Four new inventions each year • 20+ patents and patent pending applications © WildPackets, Inc.
  • 22. Selected Customers Financial Telco Enterprise Healthcare Government © WildPackets, Inc.
  • 23. Networking Industry Trends and Pain Points Network must be designed for No visibility into the virtualized scalability & agility network New Applications Explosive Growth Network Stability CAPEX Improvements Low Latency Network No Compliance Monitoring Virtualization Data Center Consolidation Complexity Compliance Network Link Saturation Security Internal/External Intrusions Speeds Oversubscription Lawful Interception 10G 40G 100G Cybercrime Security must be architected in, not a point solution Tools & instruments can’t keep up © WildPackets, Inc.
  • 24. Net Optics Position in the Network Applications Layer Protocol Analyzers IPS Forensics Performance Data Loss Prevention VoIP Analyzer Access & Control Layer Net Optics Products Solve Indigo Pro™ Director xStream Pro™ Taps • Oversubscribed Analysis & Security Aggregation Tools Director™ Bypass Switches • Requirement for Total Visibility Director xBalancer™ • Need for Multiple Tool Deployment Phantom™ Virtual • Network Scalability Tap Gig Zero Delay • Visibility into Virtualization Tap™ Regeneration Tap™ • High Availability & Tool Redundancy Network Layer ESX Stack Core Network vm Vm Vm 1 2 3 Data Center User Access Virtual Data Center Phantom Monitor™ Cloud V Switch Hypervisor © WildPackets, Inc.
  • 25. Net Optics Products Access Control Management Bypass Switches Indigo Pro™ Intelligent Taps Network Taps Virtual Tap appTap™ © WildPackets, Inc.
  • 26. WildPackets Overview PROPRIETARY AND CONFIDENTIAL © WildPackets, Inc. 27
  • 27. WildPackets Overview © WildPackets, Inc. www.wildpackets.com
  • 28. Corporate Background • Experts in network monitoring, analysis, and troubleshooting ‒ Founded: 1990 / Headquarters: Walnut Creek, CA ‒ Offices throughout the US, EMEA, and APAC • Our customers are leading edge organizations ‒ Mid-market, and enterprise lines of business ‒ Financial, manufacturing, ISPs, major federal agencies, state and local governments, and universities ‒ Over 7,000 customers / 60+ countries / 80% of Fortune 1,000 • Award-winning solutions that improve network performance ‒ Internet Telephony, Network Magazine, Network Computing Awards ‒ United States Patent 5,787,253 issued July 28, 1998 • Different approach to maintaining availability of network services © WildPackets, Inc.
  • 29. What We Do • Provide network visibility and intelligence … ‒ WatchPoint, OmniPeek, OmniEngines • Expert systems – we find the problems for you • Superior drill-down capability – trouble-shoot from anywhere • Flexible, customizable, extensible – leverage your investment ‒ Professional services, training, best practices • For all network segments … ‒ Data center to desktop to remote office ‒ LAN, WAN, Wireless … ‒ HTTP, Email, Database, VoIP, Video … • To … ‒ Network engineers; IT Management; Developers © WildPackets, Inc.
  • 30. Real-World Deployments Education Financial Government Health Care / Retail Telecom Technology © WildPackets, Inc.
  • 31. Product Offerings Software and Turnkey Appliances • Enterprise Monitoring and Reporting ‒ WatchPoint Server ‒ OmniFlow, NetFlow, and sFlow Collectors • Network Probes & Recorders ‒ Omnipliance Network Recorders – Edge, Core ‒ TimeLine Network Recorder ‒ OmniAdapter Analysis Cards • Distributed Analysis Software ‒ OmniPeek – Enterprise, Professional, Basic, Connect ‒ OmniEngine – Enterprise, Desktop, OmniVirtual • Portable Solutions ‒ OmniPeek software ‒ Omnipliance Portable © WildPackets, Inc.
  • 32. TimeLine Network Recorder 11.7Gbps Sustained Capture • Fastest network recording and real-time statistical display — simultaneously ‒ Network statistics display in TimeLine visualization format • Rapid, intuitive forensics search and retrieval ‒ Historical network traffic analysis and quick data rewinding ‒ Several pre-defined forensics search templates making searches easy and fast • A natural extension to the WildPackets product line • Turnkey bundled solution © WildPackets, Inc.
  • 33. Omnipliance Network Recorders Price/performance solutions for every application Portable Edge Core TimeLine Ruggedized Small Networks / Regional Offices / Datacenter Troubleshooting Remote Offices Small Datacenter Workhorse Chassis 1U 3U 3U Memory 2 GB / 8 GB 4 GB / 8 GB 6 GB / 24 GB 18 GB / 24 GB Expansion 1 PCI-E / 2 PCI-X 1 PCI-E or 1 PCI-X 4 PCI-E 4 PCI-E Storage 500 GB / 2.5 TB 1 TB 8 TB 8 TB / 16 TB / 32 TB © WildPackets, Inc.
  • 34. Key Differentiators • High-level network monitoring to root-cause analysis • Single solution for today’s converged networks ‒ Wired, Wireless, 1GB, 10GB, VoIP, Video, TelePresence, IPTV • Reduce and even eliminate network downtime ‒ Automated monitoring 24x7 ‒ Speedy resolution of network bottlenecks • Improve network and application performance • Uniquely Extensible Platform – tailored to your needs ‒ Plug-ins and APIs for integration and customization © WildPackets, Inc.
  • 35. Q&A Show us your tweets! Use today’s webinar hashtag: Follow us on SlideShare! Check out today’s slides on SlideShare #wp_virtualnetwork www.slideshare.net/wildpackets with any questions, comments, or feedback. Follow us @wildpackets © WildPackets, Inc. www.wildpackets.com
  • 36. Thank You! WildPackets, Inc. Net Optics, Inc. 1340 Treat Boulevard, Suite 500 5303 Betsy Ross Drive Walnut Creek, CA 94597 Santa Clara, CA 95054 (925) 937-3200 (408) 737-7777 © WildPackets, Inc. www.wildpackets.com