SlideShare a Scribd company logo
1 of 10
© 2014 Gigamon Inc. All rights reserved.
Visibility into Virtualized
Data Centers
© 2014 Gigamon Inc. All rights reserved.
Migration to Virtualized Servers and Cloud Computing
Offers Many Benefits but also Many Challenges
2
Benefits
Flexible, dynamic IT infrastructure
Improved resource utilization
Huge cost savings
Better TCO and ROI
Challenges
Reduced Visibility
Greater difficulty in finding & fixing
performance problems
Security
Reality
Your team is virtualized and going to the
cloud, like it or not
So you need to figure out how to overcome
the challenges
© 2014 Gigamon Inc. All rights reserved.
Why the Reduced Visibility?
3
Note that all of these contributors to reduced visibility
are actual benefits of virtualization
The issue is how to get the benefits while dealing with
the challenges
Let’s start with the challenges
Distributed
application
architectures
VMs on the
move
Traffic not
traversing the
physical
network
© 2014 Gigamon Inc. All rights reserved.
Challenge 1: Traffic not Traversing the Physical Network
4
The result:
Only part of the traffic is visible to monitoring at the edge
With virtualization, a lot of traffic doesn’t traverse the physical network
Physical Switch
Traditional monitoring tools can’t see new encapsulated traffic in overlay networks
Traffic Destination Traffic Destination Traffic Destination
Monitoring/Security Solutions
© 2014 Gigamon Inc. All rights reserved.
Challenge 2: Distributed Application Architectures
5
Once monolithic, large applications are now running in a distributed
application architecture
The results:
More east/west traffic handling applications
More difficult to monitor and troubleshoot
vSwitch
OVERLAY NETWORK
UNDERLAY NETWORK
Database
Hypervisor
Web Java LDAP AAA
DB API DB API REST JSON API
Web Java
vSwitch
Hypervisor
vSwitch
Web Java LDAP AAA
DB API DB API REST JSON API
Web Java
© 2014 Gigamon Inc. All rights reserved. 6
Challenge 3: VMs on the Move
The result:
Limited visibility and potential security gaps
VM migration across servers or across data center boundaries uses
technologies such as VMotion, which hide traffic details from monitoring
devices
You need to track vMotion events in order to retain monitoring continuity
and history
© 2014 Gigamon Inc. All rights reserved.
If you can’t see
it, you can’t
control it
Virtualization
creates silos of
IT hidden from
security tools
7
Additional Challenge: Security
© 2014 Gigamon Inc. All rights reserved.
Additional Challenge: Pressure on IT Infrastructure
and Admin
8
Increased demand to
monitor and report on all
network traffic
Need to stay in
compliance with internal
and external regulations
© 2014 Gigamon Inc. All rights reserved.
Gigamon Enables Virtual Server and
Virtual Network Monitoring
9
Gigamon provides unmatched visibility into these environments:
Traffic not traversing the
physical network
Distributed application
architectures
VMs on the move
Hidden silos of virtualized IT
Overlay/underlay networks
© 2014 Gigamon Inc. All rights reserved.
Thank You
10
Download Whitepaper
www.gigamon.com

More Related Content

Viewers also liked

Q1 fy15 earnings call slides draft 9-3-2014
Q1 fy15 earnings call slides draft 9-3-2014Q1 fy15 earnings call slides draft 9-3-2014
Q1 fy15 earnings call slides draft 9-3-2014
Jo Thorgen
 

Viewers also liked (15)

WebEx Avago Presentation for Eccolo Media 2010
WebEx Avago Presentation for Eccolo Media 2010WebEx Avago Presentation for Eccolo Media 2010
WebEx Avago Presentation for Eccolo Media 2010
 
Q1 fy15 earnings call slides draft 9-3-2014
Q1 fy15 earnings call slides draft 9-3-2014Q1 fy15 earnings call slides draft 9-3-2014
Q1 fy15 earnings call slides draft 9-3-2014
 
Gigamon Systems GigaVUE-420 Hardware Tour
Gigamon Systems GigaVUE-420 Hardware TourGigamon Systems GigaVUE-420 Hardware Tour
Gigamon Systems GigaVUE-420 Hardware Tour
 
2013 datwyler training 4 fibre product overview - info tech middle east
2013 datwyler training 4   fibre product overview - info tech middle east2013 datwyler training 4   fibre product overview - info tech middle east
2013 datwyler training 4 fibre product overview - info tech middle east
 
Metro High-Speed Product Line Manager
Metro High-Speed Product Line ManagerMetro High-Speed Product Line Manager
Metro High-Speed Product Line Manager
 
Gigamon Systems Case Studies
Gigamon Systems Case StudiesGigamon Systems Case Studies
Gigamon Systems Case Studies
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Gigamon Systems Hardware Tour
Gigamon Systems Hardware TourGigamon Systems Hardware Tour
Gigamon Systems Hardware Tour
 
Harnessing the Power of Metadata for Security
Harnessing the Power of Metadata for SecurityHarnessing the Power of Metadata for Security
Harnessing the Power of Metadata for Security
 
How to Select a Security Visibility Solution
How to Select a Security Visibility SolutionHow to Select a Security Visibility Solution
How to Select a Security Visibility Solution
 
Enterprise Networks: No Tool Left Behind
Enterprise Networks: No Tool Left BehindEnterprise Networks: No Tool Left Behind
Enterprise Networks: No Tool Left Behind
 
Fluke Electrical Safety Seminar Slides
Fluke Electrical Safety Seminar SlidesFluke Electrical Safety Seminar Slides
Fluke Electrical Safety Seminar Slides
 
Gigamon — платформа обеспечения информационной безопасности
Gigamon — платформа обеспечения информационной безопасностиGigamon — платформа обеспечения информационной безопасности
Gigamon — платформа обеспечения информационной безопасности
 
Spy hard, challenges of 100G deep packet inspection on x86 platform
Spy hard, challenges of 100G deep packet inspection on x86 platformSpy hard, challenges of 100G deep packet inspection on x86 platform
Spy hard, challenges of 100G deep packet inspection on x86 platform
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 

More from gigamon

More from gigamon (15)

Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case Study
Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case StudyAlfa Banking Group enhances Network Performance Monitoring| Gigamon Case Study
Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case Study
 
How subscriber aware traffic processing yielded big savings for us wireless p...
How subscriber aware traffic processing yielded big savings for us wireless p...How subscriber aware traffic processing yielded big savings for us wireless p...
How subscriber aware traffic processing yielded big savings for us wireless p...
 
40GB BiDirectional Passive TAP from Gigamon - G-TAP Product Brief
40GB BiDirectional Passive TAP from Gigamon - G-TAP Product Brief40GB BiDirectional Passive TAP from Gigamon - G-TAP Product Brief
40GB BiDirectional Passive TAP from Gigamon - G-TAP Product Brief
 
Advanced Network Traffic Intelligence with GigaSmart - Product Brief
Advanced Network Traffic Intelligence with GigaSmart - Product BriefAdvanced Network Traffic Intelligence with GigaSmart - Product Brief
Advanced Network Traffic Intelligence with GigaSmart - Product Brief
 
Network Visibility Operating System Software - GigaVUE-OS Product Brief
Network Visibility Operating System Software - GigaVUE-OS Product Brief Network Visibility Operating System Software - GigaVUE-OS Product Brief
Network Visibility Operating System Software - GigaVUE-OS Product Brief
 
Guardium
GuardiumGuardium
Guardium
 
Tealeaf
TealeafTealeaf
Tealeaf
 
Reconnex
ReconnexReconnex
Reconnex
 
Coradiant
CoradiantCoradiant
Coradiant
 
Network Instruments
Network InstrumentsNetwork Instruments
Network Instruments
 
WildPackets
WildPacketsWildPackets
WildPackets
 
FireEye
FireEyeFireEye
FireEye
 
Network Critical
Network CriticalNetwork Critical
Network Critical
 
Solera Networks
Solera NetworksSolera Networks
Solera Networks
 
Network Physics
Network PhysicsNetwork Physics
Network Physics
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Gigamon: monitor your virtual servers better

  • 1. © 2014 Gigamon Inc. All rights reserved. Visibility into Virtualized Data Centers
  • 2. © 2014 Gigamon Inc. All rights reserved. Migration to Virtualized Servers and Cloud Computing Offers Many Benefits but also Many Challenges 2 Benefits Flexible, dynamic IT infrastructure Improved resource utilization Huge cost savings Better TCO and ROI Challenges Reduced Visibility Greater difficulty in finding & fixing performance problems Security Reality Your team is virtualized and going to the cloud, like it or not So you need to figure out how to overcome the challenges
  • 3. © 2014 Gigamon Inc. All rights reserved. Why the Reduced Visibility? 3 Note that all of these contributors to reduced visibility are actual benefits of virtualization The issue is how to get the benefits while dealing with the challenges Let’s start with the challenges Distributed application architectures VMs on the move Traffic not traversing the physical network
  • 4. © 2014 Gigamon Inc. All rights reserved. Challenge 1: Traffic not Traversing the Physical Network 4 The result: Only part of the traffic is visible to monitoring at the edge With virtualization, a lot of traffic doesn’t traverse the physical network Physical Switch Traditional monitoring tools can’t see new encapsulated traffic in overlay networks Traffic Destination Traffic Destination Traffic Destination Monitoring/Security Solutions
  • 5. © 2014 Gigamon Inc. All rights reserved. Challenge 2: Distributed Application Architectures 5 Once monolithic, large applications are now running in a distributed application architecture The results: More east/west traffic handling applications More difficult to monitor and troubleshoot vSwitch OVERLAY NETWORK UNDERLAY NETWORK Database Hypervisor Web Java LDAP AAA DB API DB API REST JSON API Web Java vSwitch Hypervisor vSwitch Web Java LDAP AAA DB API DB API REST JSON API Web Java
  • 6. © 2014 Gigamon Inc. All rights reserved. 6 Challenge 3: VMs on the Move The result: Limited visibility and potential security gaps VM migration across servers or across data center boundaries uses technologies such as VMotion, which hide traffic details from monitoring devices You need to track vMotion events in order to retain monitoring continuity and history
  • 7. © 2014 Gigamon Inc. All rights reserved. If you can’t see it, you can’t control it Virtualization creates silos of IT hidden from security tools 7 Additional Challenge: Security
  • 8. © 2014 Gigamon Inc. All rights reserved. Additional Challenge: Pressure on IT Infrastructure and Admin 8 Increased demand to monitor and report on all network traffic Need to stay in compliance with internal and external regulations
  • 9. © 2014 Gigamon Inc. All rights reserved. Gigamon Enables Virtual Server and Virtual Network Monitoring 9 Gigamon provides unmatched visibility into these environments: Traffic not traversing the physical network Distributed application architectures VMs on the move Hidden silos of virtualized IT Overlay/underlay networks
  • 10. © 2014 Gigamon Inc. All rights reserved. Thank You 10 Download Whitepaper www.gigamon.com