• Like
  • Save

BIG Data: Architecting Visibility with Net Optics

  • 634 views
Uploaded on

Presentation I did recently on various IDC IT Security roadshows in several different countries like Poland, Czech, Bulgaria, Romania and others. …

Presentation I did recently on various IDC IT Security roadshows in several different countries like Poland, Czech, Bulgaria, Romania and others.

Showing some data about security and breaches, information about BIG data and it's usage and some major cases which happened in last 2 years.

At the end, explaining how Net Optics solutions and products can help you in optimization of your tools and security of your network.

Short one slide shows portfolio of Net Optics and different products used for load balancing, aggregation, regeneration, L2-L7 filtering, packet de-duplication and other features.

Net Optics is deployed more than 7.500 times and already 15 years in the market.

Network Performance Channel GmbH is a leading global value added distributor specialized in networking solutions: Application Aware Network Performance Management, Network TAP, Network Monitoring Switches, Bypass Switches, Intelligent Monitoring Access Solutions and Load Balancing Solutions.

For all info, do not hesitate to contact me:
Mihajlo Prerad
mihajlo.prerad@np-channel.com
www.np-channel.com

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
634
On Slideshare
0
From Embeds
0
Number of Embeds
2

Actions

Shares
Downloads
1
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Architecting Visibility into BIG data networks Mihajlo Prerad mihajlo.prerad@np-channel.com www.np-channel.com | www.network-taps.eu
  • 2. • Brief introduction • What is BIG data? • What makes it BIG? • How BIG it is? • Challenges • Architecture Visibility • About Net Optics • Q&A – Thank you! Agenda 9/12/20132
  • 3. Big Data refers to datasets that grow so large that it is difficult to capture, store, manage, share, analyze and visualize with the typical tools. "Big Data are high-volume, high-velocity, and/or high-variety information assets that require new forms of processing to enable enhanced decision making, insight discovery and process optimization” - Gartner 2012 9/12/20133
  • 4. What makes it BIG? 9/12/20134 volume Terabytes (1012), Petabytes (1015), Exabytes (1018) Yottabytes (1024)! velocity Real-time reaction required BIG data BIG speed 60 seconds is too late. variety Structured Un-structured Semistructured ALL
  • 5. What happens today? 9/12/20135 fixed network MOBILE physical VIRTUAL local CLOUD servers services BYODbring your own device
  • 6. Why Are Security Tools Falling Behind? Complexity, Speed and Scale 9/12/20136 Virtualization Branch Office Private Cloud Branch Office Data Center 100G
  • 7. Your Data Center is becoming a T A R G E T 9/12/20137 Virtualization Branch Office Private Cloud Branch Office Data Center
  • 8. 1.87 M What happens every 60 seconds on Internet? likes 72h of video 347K tweets 3472 photos And in 1 day? 30TB= = 12TB = 40Mphotos/day traffic/day traffic/day = 3Bill.views/day
  • 9. 1.87 M What happens every 60 seconds on Internet? likes 72h of video 347K tweets 3472 photos And in 1 day? 30TB= = 12TB = 40Mphotos/day traffic/day traffic/day = 3Bill.views/day 20 Petabytes= per day
  • 10. Using BIG data 9/12/201310 Barack Obama ( „Twitter“ president) • 84 big data programs with 6 departments • Facebook page: 36M likes • YouTube channel: 290M views • Twitter: 36M followers • 66.000 computer simulations per night Today’s Challenge New Data What’s Possible Healthcare Remote patient monitoring Preventive care, reduced hospitalization Manufacturing In-person support Product sensors Automated diagnosis, support Location-Based Services Based on home zip code Real time location data Geo-advertising, traffic, local search
  • 11. Criminals adopting 9/12/201311 5+ years ago
  • 12. Criminals adopting 9/12/201312 Today • • • • • RSA Security, 2011 • 40M authentication tokens stolen (according to Gartner, 80% of banks use this tokens) • Company spent over $66M since then to monitor the information of concerned clients
  • 13. 9/12/201313 http://venturebeat.com/2012/09/17/2012-security-breaches/ 85% of attacks needed 2 weeks to be discovered!
  • 14. Factors in calculation of financial loss from security breaches/intrusions 9/12/201314 52% 35% 34% 31% 27% Legal defense services Loss of customer business Deployment of security tools Damage to brand 26%Court settlements
  • 15. Information Governance Core Disciplines: Security and Privacy  Locate where sensitive data is  Classify & Define data types  Set policies & metrics  Protect data access  Organize unstructured data  De-identify confidential data  Compliance  SLA  Assess vulnerabilities  Detect intrusions 9/12/201315 Understand & Define Secure & Protect Monitor & Audit
  • 16. Who? (source and destination) Critical information 9/12/201316 What? (IP protocol and port numbers) When? (time when the flow was observed) Where? (input interface) How? (type of service)
  • 17. BIG data - BIG decisions. Protect ONLY what is important! 9/12/201317 Input traffic database monitoring email security aaNPM & NPM Monitored traffic Unwanted traffic virtual traffic FILTER aggregate replicate optimize switch bypass
  • 18. Virtualization Solution Deployment ES X App OS VM1 Hypervisor App OS VM2 App OS VM2 V Switch Phantom™ Manager KV M App OS VM1 Hypervisor App OS VM2 App OS VM2 V Switch Phantom™ Manager XE N App OS VM1 Hypervisor App OS VM2 App OS VM2 V Switch Phantom™ Manager Tunnel IDS NGFW Protocol Analyzer DLP Net Optics Director™ Net Optics Phantom™ HD Physical Server Physical Server LAN/WAN Manager
  • 19. Cost saving: • Reducing CAPEX/OPEX by using fewer tools Benefits 9/12/201319 Customer satisfaction: • No network/link downtime (network ports work even in the case of power failure) Optimization: • Centralized monitoring of different network segments and different types of traffic • Analyze only information of interest Security: • No packets dropped – 100% visibility
  • 20. 9/12/201320 Solutions Use Product Key Benefits 10G/40G Load Balancing Xbalancer / xBalancer 40 • Distribute load to multiple tools for parallel processing Virtual TAP Phantom Virtual TAP • Aggregation, filtering and convergence with physical tools 1G/10G/40G Bypass Switch iBypass Switch with Heartbeat and SNMP v3 • Combined feature set: Tap, Aggregation, Regeneration, Filtering, Static Load Balancer Network Packet Broker Director / Director Pro / Director xStream • Aggregation, Regeneration • De-Duplication • L2-7 Filtering • Static & Dynamic Load balancing 1G/10G/40G Aggregation Regeneration iLink Agg / iLink Agg xStream/ • Aggregates multiple traffic streams for monitoring by a single tool Copper/Fiber TAP 1G/10G/40G/100G TAP • Zero delay: no packet drops • Industry first 100G TAP
  • 21. About Net Optics 9/12/201321 • Founded in 1996. • HQ: Silicon Valley, USA • Offices: Germany, Netherlands, Australia, China • Manufacured industry 1st TAP ever! • 7.500+ global deployments • 20+ patents • 85% of fortune 100 2010 & 2011 Awards Media
  • 22. Thank You! Mihajlo Prerad Regional Sales Manager mihajlo.prerad@np-channel.com +43 664 831 6674 www.netoptics.com www.np-channel.com www.network-taps.eu