SlideShare a Scribd company logo
1 of 54
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Business ROI Technical (IT) ROI Copyright 2009 IdeaData Pty Ltd Flow-Based Network Intelligence ROI
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Scalability, Granularity, Flexibility NetFlow Auditor Unique Capabilities
Flow-Based Network Intelligence you can depend on.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“…  The network never stops growing and it never gets a rest …” Purdue University Network Mapping Project Copyright 2009 IdeaData Pty Ltd Top 10 reasons why it is critical to have  Visibility of the traffic on your network
Network Auditing:  Companies are challenged with maintaining too many tools that all show a slightly different view of the same data. Often with limited Visibility.  Hence the need for a convergent toolkit. Capacity Planning Accounting Performance Root Cause Analysis Security Surveillance Lockdown QoS Business Intelligence Copyright 2009 IdeaData Pty Ltd
Copyright 2009 IdeaData Pty Ltd How does NetFlow work?
NetFlow Auditor Architecture Copyright 2009 IdeaData Pty Ltd ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright 2009 IdeaData Pty Ltd NetFlow Auditor Smart Investment Grows as your needs grow Anomaly Detection Performance Professional Scalable Flow Capture For very high-flow capture ,[object Object],[object Object],Security  / Compliance Forensics Comparative Baselining QoS 95 th  Percentile Billing ,[object Object],[object Object],Root Cause Analysis QoS Billing ,[object Object],[object Object],[object Object],Troubleshooting QoS ,[object Object],Lite Free Enterprise Bandwidth Utilization ,[object Object],[object Object],Anomaly Detection  Add-on
[object Object],[object Object],[object Object],[object Object],Copyright 2009 IdeaData Pty Ltd NetFlow Auditor unique design Time NetFlow Auditor  Other Solutions
Flow-Based Network Intelligence you can depend on.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],NetFlow Auditor Forensics plus Anomaly Detection
Alerts – Menus and Popups Alerts are easily seen or edited from the left menus and by clicking on the grid element you want to configure. Mouse over popup provide additional information. The “My Alerts” menu Filters the Alert information simply by clicking on its grid.
Standard Alerting vs Anomaly Detection
Anomaly Detection – Preset Monitored Traffic Items
Anomaly Detection – Intelligent Baseline Examples Measurement Profiles Flows / bps / Packets / Packet Size / Bytes / Counts Examples of Monitored Traffic Items 168 Intelligent Baseline Statistics are learned for each  Monitored Traffic Item . (4 Statistical baselines for each of the 6 Measurement Profiles for each weekday).
Anomaly Detection – Multiple Baselines per Alert Count Average Flows Average Packets Average Bytes Minimum bps Average Packets Size Average Bytes Standard Deviation Bytes Maximum Statistical Standard Deviation / Average / Minimum / Maximum Measurement Profiles Flows / bps / Packets / Packet Size / Bytes / Counts ,[object Object],[object Object],[object Object],[object Object]
Anomaly Detection – Primary Alert View
Anomaly Detection – Root Cause Analysis
Anomaly Detection – 3 clicks to an Intelligent Baseline Make your own rules (Steps 1 & 2) From Configuration menu choose interface, application, its protocol, location or QoS class etc …This is a useful starting point, once you have setup your criteria to begin learning a baseline you can edit it and tune the filter at anytime.
Anomaly Detection – 3 clicks to an Intelligent Baseline Make your own rules (Step 3)
Anomaly Detection – Case: Large P2P Traffic Following an Anomaly Alert we discover a large amount of P2P traffic, It’s a bittorrent and xbox traffic downloads outside of business hours. The IP Addresses and location tags indicate the department, Now that you know where its coming from it’s a simple process to build an access list and stop it dead in its tracks. As Netflow Auditor has a comprehensive scheduler and multiple output formats including csv, PDF  and SNMP, this process can be fully automated
Standard Alerting – Case: Heavy Traffic Detection
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Saving you time and money Network Auditing Forensics and Security
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Anomaly Plus Standard Alerting – DDoS Identification
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],How can Netflow Forensics and  Anomaly Detection help me in Security?
Flow-Based Network Intelligence you can depend on.
[object Object],[object Object],[object Object],[object Object],Network Forensic analysis methods
[object Object],[object Object],[object Object],[object Object],Network Forensic analysis methods
[object Object],[object Object],[object Object],[object Object],Network Forensic analysis methods
[object Object],[object Object],[object Object],[object Object],Network Forensic analysis methods
[object Object],[object Object],[object Object],[object Object],Network Forensic analysis methods
[object Object],[object Object],[object Object],Who needs short-term  Network Analytics? ,[object Object],[object Object],[object Object],Who needs long-term  Network Trending? NetFlow Auditor freeform drilldown Copyright 2009 IdeaData Pty Ltd Device/Interface, Business Group, Customer/User, AS, QoS  Conversations Applications Time Last Minute, Last 15 Minutes, Last Hour, Last Day/Week/Month .... Real-time Long Term
Quickly find Servers such as P2P Servers Or track conversations
Quickly find Servers such as P2P Servers Or track conversations
Packet Size Distribution
IP Conversations Stacked. See Anomalies, Servers, P2P? Copyright 2009 IdeaData Pty Ltd
For specific Servers see all talkers and applications Copyright 2009 IdeaData Pty Ltd
Application Detail: Email and DNS Traffic Last 7 Days Copyright 2009 IdeaData Pty Ltd
Conversations for one Minute on a selected interface Copyright 2009 IdeaData Pty Ltd
Flow-Based Network Intelligence you can depend on.
Comparative Baselining Alert on the rising and falling threshold of every flow individually, grouped or filtered
Full Flow Compliance analysis for a selected interface Copyright 2009 IdeaData Pty Ltd
IP Bidirectional analysis Copyright 2009 IdeaData Pty Ltd
Right Click drilldown for a Time Period Copyright 2009 IdeaData Pty Ltd
Grid Options Copyright 2009 IdeaData Pty Ltd
Breakdown of usage by Location Copyright 2009 IdeaData Pty Ltd
Weekday Baseline. All SMTP Traffic for a location Copyright 2009 IdeaData Pty Ltd
Monitoring QoS. Long-Term Comparative Baseline Copyright 2009 IdeaData Pty Ltd
Route Analysis for last week Copyright 2009 IdeaData Pty Ltd
All http flows per minute received on an interface Copyright 2009 IdeaData Pty Ltd
Monitoring QoS: ToS Precedence Last 13 Hours Copyright 2009 IdeaData Pty Ltd
Application Bi-directional analysis on an interface Copyright 2009 IdeaData Pty Ltd
Packet Size Distribution analysis on a router/switch Copyright 2009 IdeaData Pty Ltd

More Related Content

What's hot

Actual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long PeriodActual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long PeriodAPNIC
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowCisco DevNet
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDaniel Vinyar
 
DDoS Threats Landscape : Countering Large-scale DDoS attacks
DDoS Threats Landscape : Countering Large-scale DDoS attacksDDoS Threats Landscape : Countering Large-scale DDoS attacks
DDoS Threats Landscape : Countering Large-scale DDoS attacksMyNOG
 
APNIC Hackathon CDN Ranking
APNIC Hackathon CDN Ranking APNIC Hackathon CDN Ranking
APNIC Hackathon CDN Ranking Siena Perry
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issuesbathinin1
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Canada
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?APNIC
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)Jeff Green
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)Jeff Green
 
On her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy AgencyOn her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy AgencyStephen Kho
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementIlya Mikov
 
DDoS 101: Attack Types and Mitigation
DDoS 101: Attack Types and MitigationDDoS 101: Attack Types and Mitigation
DDoS 101: Attack Types and MitigationCloudflare
 
MPLS SDN NFV WORLD'17 - SDN NFV deployment update
MPLS SDN NFV WORLD'17 - SDN NFV deployment updateMPLS SDN NFV WORLD'17 - SDN NFV deployment update
MPLS SDN NFV WORLD'17 - SDN NFV deployment updateStephane Litkowski
 
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...Time Sensitive Networks: How changes to standard Ethernet enable convergence ...
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...Erik van Hilten
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeMyNOG
 
PLNOG 9: Robert Dąbrowski - Carrier-grade NAT (CGN) Solution with FortiGate
PLNOG 9: Robert Dąbrowski - Carrier-grade NAT (CGN) Solution with FortiGatePLNOG 9: Robert Dąbrowski - Carrier-grade NAT (CGN) Solution with FortiGate
PLNOG 9: Robert Dąbrowski - Carrier-grade NAT (CGN) Solution with FortiGatePROIDEA
 
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricBangladesh Network Operators Group
 

What's hot (20)

Actual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long PeriodActual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long Period
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible Netflow
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
 
DDoS Threats Landscape : Countering Large-scale DDoS attacks
DDoS Threats Landscape : Countering Large-scale DDoS attacksDDoS Threats Landscape : Countering Large-scale DDoS attacks
DDoS Threats Landscape : Countering Large-scale DDoS attacks
 
Having Honeypot for Better Network Security Analysis
Having Honeypot for Better Network Security AnalysisHaving Honeypot for Better Network Security Analysis
Having Honeypot for Better Network Security Analysis
 
APNIC Hackathon CDN Ranking
APNIC Hackathon CDN Ranking APNIC Hackathon CDN Ranking
APNIC Hackathon CDN Ranking
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issues
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven Telemetry
 
Make the internet safe with DNS Firewall
Make the internet safe with DNS FirewallMake the internet safe with DNS Firewall
Make the internet safe with DNS Firewall
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
On her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy AgencyOn her majesty's secret service - GRX and a Spy Agency
On her majesty's secret service - GRX and a Spy Agency
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic management
 
DDoS 101: Attack Types and Mitigation
DDoS 101: Attack Types and MitigationDDoS 101: Attack Types and Mitigation
DDoS 101: Attack Types and Mitigation
 
MPLS SDN NFV WORLD'17 - SDN NFV deployment update
MPLS SDN NFV WORLD'17 - SDN NFV deployment updateMPLS SDN NFV WORLD'17 - SDN NFV deployment update
MPLS SDN NFV WORLD'17 - SDN NFV deployment update
 
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...Time Sensitive Networks: How changes to standard Ethernet enable convergence ...
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL Lee
 
PLNOG 9: Robert Dąbrowski - Carrier-grade NAT (CGN) Solution with FortiGate
PLNOG 9: Robert Dąbrowski - Carrier-grade NAT (CGN) Solution with FortiGatePLNOG 9: Robert Dąbrowski - Carrier-grade NAT (CGN) Solution with FortiGate
PLNOG 9: Robert Dąbrowski - Carrier-grade NAT (CGN) Solution with FortiGate
 
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
 

Viewers also liked

Manageengine Netflow analyzer - An Insight
Manageengine Netflow analyzer - An InsightManageengine Netflow analyzer - An Insight
Manageengine Netflow analyzer - An InsightSai Sundhar Padmanabhan
 
NetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseNetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseCisco Canada
 
How to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco RoutersHow to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco RoutersSolarWinds
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowLancope, Inc.
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowNetFlow Analyzer
 
Как работать с маркетинговыми кейсами
Как работать с маркетинговыми кейсамиКак работать с маркетинговыми кейсами
Как работать с маркетинговыми кейсамиSegrey Nikishov - @n_grey
 
C Byouth Presentation V4
C Byouth Presentation V4C Byouth Presentation V4
C Byouth Presentation V4Spencer Willis
 
SMM учебник 2 (Промсвязьбанк)
SMM учебник 2 (Промсвязьбанк)SMM учебник 2 (Промсвязьбанк)
SMM учебник 2 (Промсвязьбанк)Segrey Nikishov - @n_grey
 
201610무들배지시스템
201610무들배지시스템201610무들배지시스템
201610무들배지시스템won ho
 
2013 First Food Forum: Day three welcome
2013 First Food Forum: Day three welcome2013 First Food Forum: Day three welcome
2013 First Food Forum: Day three welcomeW.K. Kellogg Foundation
 
20150430_Meiji Univ 発明の民主化 -深セン、シンガポール、タイ、ネパール、トロンハイム、そして東京のメイカームーブメント #fmstks
20150430_Meiji Univ 発明の民主化 -深セン、シンガポール、タイ、ネパール、トロンハイム、そして東京のメイカームーブメント #fmstks20150430_Meiji Univ 発明の民主化 -深セン、シンガポール、タイ、ネパール、トロンハイム、そして東京のメイカームーブメント #fmstks
20150430_Meiji Univ 発明の民主化 -深セン、シンガポール、タイ、ネパール、トロンハイム、そして東京のメイカームーブメント #fmstksNico-Tech Shenzhen/ニコ技深圳コミュニティ
 
Are you solving a problem worth solving?
Are you solving a problem worth solving?Are you solving a problem worth solving?
Are you solving a problem worth solving?Elaine Chen
 
Integrating Google My Maps and language learning
Integrating Google My Maps and language learningIntegrating Google My Maps and language learning
Integrating Google My Maps and language learningMarcos Racilan
 
The Gender Pay Gap: A Closer Look at the Underlying Causes
The Gender Pay Gap: A Closer Look at the Underlying CausesThe Gender Pay Gap: A Closer Look at the Underlying Causes
The Gender Pay Gap: A Closer Look at the Underlying CausesThomas Econometrics
 
Интернет-маркетинг для салонов красоты
Интернет-маркетинг для салонов красотыИнтернет-маркетинг для салонов красоты
Интернет-маркетинг для салонов красотыFert
 
Brief sampling of works done.
Brief sampling of works done.Brief sampling of works done.
Brief sampling of works done.carloslarua
 
Social Media Tips - MEPRA
Social Media Tips - MEPRASocial Media Tips - MEPRA
Social Media Tips - MEPRADigiArabs
 

Viewers also liked (20)

Manageengine Netflow analyzer - An Insight
Manageengine Netflow analyzer - An InsightManageengine Netflow analyzer - An Insight
Manageengine Netflow analyzer - An Insight
 
NetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseNetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat Defense
 
How to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco RoutersHow to Configure NetFlow v5 & v9 on Cisco Routers
How to Configure NetFlow v5 & v9 on Cisco Routers
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlow
 
Netflow slides
Netflow slidesNetflow slides
Netflow slides
 
Oracle backup
Oracle backupOracle backup
Oracle backup
 
Как работать с маркетинговыми кейсами
Как работать с маркетинговыми кейсамиКак работать с маркетинговыми кейсами
Как работать с маркетинговыми кейсами
 
C Byouth Presentation V4
C Byouth Presentation V4C Byouth Presentation V4
C Byouth Presentation V4
 
SMM учебник 2 (Промсвязьбанк)
SMM учебник 2 (Промсвязьбанк)SMM учебник 2 (Промсвязьбанк)
SMM учебник 2 (Промсвязьбанк)
 
201610무들배지시스템
201610무들배지시스템201610무들배지시스템
201610무들배지시스템
 
Review2015
Review2015Review2015
Review2015
 
2013 First Food Forum: Day three welcome
2013 First Food Forum: Day three welcome2013 First Food Forum: Day three welcome
2013 First Food Forum: Day three welcome
 
20150430_Meiji Univ 発明の民主化 -深セン、シンガポール、タイ、ネパール、トロンハイム、そして東京のメイカームーブメント #fmstks
20150430_Meiji Univ 発明の民主化 -深セン、シンガポール、タイ、ネパール、トロンハイム、そして東京のメイカームーブメント #fmstks20150430_Meiji Univ 発明の民主化 -深セン、シンガポール、タイ、ネパール、トロンハイム、そして東京のメイカームーブメント #fmstks
20150430_Meiji Univ 発明の民主化 -深セン、シンガポール、タイ、ネパール、トロンハイム、そして東京のメイカームーブメント #fmstks
 
Are you solving a problem worth solving?
Are you solving a problem worth solving?Are you solving a problem worth solving?
Are you solving a problem worth solving?
 
Integrating Google My Maps and language learning
Integrating Google My Maps and language learningIntegrating Google My Maps and language learning
Integrating Google My Maps and language learning
 
The Gender Pay Gap: A Closer Look at the Underlying Causes
The Gender Pay Gap: A Closer Look at the Underlying CausesThe Gender Pay Gap: A Closer Look at the Underlying Causes
The Gender Pay Gap: A Closer Look at the Underlying Causes
 
Интернет-маркетинг для салонов красоты
Интернет-маркетинг для салонов красотыИнтернет-маркетинг для салонов красоты
Интернет-маркетинг для салонов красоты
 
Brief sampling of works done.
Brief sampling of works done.Brief sampling of works done.
Brief sampling of works done.
 
Social Media Tips - MEPRA
Social Media Tips - MEPRASocial Media Tips - MEPRA
Social Media Tips - MEPRA
 

Similar to Flow-Based Network Intelligence Reduces Costs & Provides Real-Time Visibility

Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New YearSavvius, Inc
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Deploying Network Taps for Improved Security
Deploying Network Taps for Improved SecurityDeploying Network Taps for Improved Security
Deploying Network Taps for Improved SecurityDatacomsystemsinc
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.pptAssadLeo1
 
Why Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringWhy Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringDevOps.com
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTSplunk
 
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveTop 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveManageEngine, Zoho Corporation
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...BGA Cyber Security
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
SplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunk
 
Agata overview
Agata overviewAgata overview
Agata overviewUdi Levin
 
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...ManageEngine, Zoho Corporation
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Linux IT Monitoring tools - An Overview
Linux  IT Monitoring tools - An Overview Linux  IT Monitoring tools - An Overview
Linux IT Monitoring tools - An Overview viswesvaran d
 

Similar to Flow-Based Network Intelligence Reduces Costs & Provides Real-Time Visibility (20)

Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Deploying Network Taps for Improved Security
Deploying Network Taps for Improved SecurityDeploying Network Taps for Improved Security
Deploying Network Taps for Improved Security
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
Why Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringWhy Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network Monitoring
 
Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINT
 
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveTop 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
PacketsNeverLie
PacketsNeverLiePacketsNeverLie
PacketsNeverLie
 
Firewall
FirewallFirewall
Firewall
 
SplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT Breakout
 
Agata overview
Agata overviewAgata overview
Agata overview
 
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Linux IT Monitoring tools - An Overview
Linux  IT Monitoring tools - An Overview Linux  IT Monitoring tools - An Overview
Linux IT Monitoring tools - An Overview
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Flow-Based Network Intelligence Reduces Costs & Provides Real-Time Visibility