Your SlideShare is downloading. ×
0
SecurActive workshop<br />&quot;Why a network behaviour analysis solution is now indispensable for the management of your ...
Agenda<br />9.00: Welcome - Coffee and croissants <br />9.35 : Conference and Exchanges: &quot;Why a network behaviour ana...
© 2009 SecurActive. Proprietary and Confidential<br />SecurActive overview<br />
Corporate Profile<br /><ul><li> European vendor based in Paris (France), since 2004 with solid investor funding
 Develop and sell SecurActive NSS, the new network & application performance analysis solutions
 Distributed throughout Western Europe through a1 tier channel
European leader of the Network Behavior AnalysisMarket (“Red Herring 100 Europe Winner” 2008)</li></ul>© 2009 SecurActive....
More than 450 customers in Western Europe<br />© 2009 SecurActive. Proprietary and Confidential<br />
© 2009 SecurActive. Proprietary and Confidential<br />The new challenges of your daily network <br />management<br />
NBA addresses the growing complexity of network administration<br />© 2009 SecurActive. Proprietary and Confidential<br />...
© 2009 SecurActive. Proprietary and Confidential<br />Unclear perimeters <br />of private networks <br />Change in user be...
© 2009 SecurActive. Proprietary and Confidential<br />Complexity<br />Visibility<br />
Network <br />Behaviour <br />Analysis<br />NBA stands for<br />© 2009 SecurActive. Proprietary and Confidential<br />
© 2009 SecurActive. Proprietary and Confidential<br />Overview of NBA solutions<br />
© 2009 SecurActive. Proprietary and Confidential<br />Capture of strategic <br />flows on the <br />corporate network<br /...
Main features of a NBA solution<br />© 2009 SecurActive. Proprietary and Confidential<br />Capture of strategic flows<br /...
How should a perfect NBA solutions be?<br />Increase the effectiveness of an IT team and make network management easier<br...
© 2009 SecurActive. Proprietary and Confidential<br />SecurActive NSS, a NBA solution<br />
Dashboard<br />Network map<br />Graphs<br />Details<br />SecurActive NSS’s  - Our Approach<br />SecurActive NSS approach<b...
SecurActive, a NBA solution<br />Network usage <br />and flow mapping<br />Security/Network<br />Application<br /> Perform...
SecurActive How it works?<br />© 2009 SecurActive. Proprietary and Confidential<br />Dashboard<br />Network map<br />Graph...
SecurActive NSS, a NBA Solution<br />© 2009 SecurActive. Proprietary and Confidential<br />
A passive, agentless deployment in your Network<br />© 2009 SecurActive. Proprietary and Confidential<br /><ul><li>Non int...
Agentless deployment
Appliance with 2 to 9 listening ports
Implementation via either a port mirroring or a TAP</li></ul>SecurActive<br />Management<br />SecurActive NSS<br />SecurAc...
IP Zones
Network and Security alerts</li></ul>Listening ports<br />Administration port<br />
SecurActive – Range of solutions<br />© 2009 SecurActive. Proprietary and Confidential<br />NSS-800<br />8 GE + 2 SPF + 1 ...
© 2009 SecurActive. Proprietary and Confidential<br />Demonstration<br />
Example of a Proof of Concept<br />Analysis of your strategical traffic<br />Switch – port mirroring<br />SecurActive’s tu...
IP Zones
Network and Security alerts
Reporting</li></ul>© 2009 SecurActive. Proprietary and Confidential<br />Half a day<br />
I want to centralise one of my vital applications<br />
Server<br />WAN network<br />ERP<br />ERP<br />Wb<br />Wa<br />Main network<br />Remote site<br />
Server<br />WAN network<br />Wb<br />ERP<br />Wa<br />Remote site<br />Main network<br />
Server<br />WAN network<br />Wb<br /> Bandwidth analysis<br />ERP<br />Wa<br /><ul><li>Response time analysis
Application
Upcoming SlideShare
Loading in...5
×

SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions

776

Published on

SecurActive is a Network & Application Performance Analyser.
If you are interested about SecurActive solutions, please feel free to contact us: sales@securactive.net

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
776
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
21
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions"

  1. 1. SecurActive workshop<br />&quot;Why a network behaviour analysis solution is now indispensable for the management of your network?“<br />18th November, 2009<br />
  2. 2. Agenda<br />9.00: Welcome - Coffee and croissants <br />9.35 : Conference and Exchanges: &quot;Why a network behaviour analysis solution is now indispensable for the management of your network?“<br />the new challenges for Network and Security managers<br />NBA solutions: vital tools for your daily network management<br />SecurActive NSS, an innovative Network Behavior Analysis solution <br />10h30 : Overview of SecurActive NSS in a real environment<br />© 2009 SecurActive. Proprietary and Confidential<br />
  3. 3. © 2009 SecurActive. Proprietary and Confidential<br />SecurActive overview<br />
  4. 4. Corporate Profile<br /><ul><li> European vendor based in Paris (France), since 2004 with solid investor funding
  5. 5. Develop and sell SecurActive NSS, the new network & application performance analysis solutions
  6. 6. Distributed throughout Western Europe through a1 tier channel
  7. 7. European leader of the Network Behavior AnalysisMarket (“Red Herring 100 Europe Winner” 2008)</li></ul>© 2009 SecurActive. Proprietary and Confidential<br />
  8. 8. More than 450 customers in Western Europe<br />© 2009 SecurActive. Proprietary and Confidential<br />
  9. 9. © 2009 SecurActive. Proprietary and Confidential<br />The new challenges of your daily network <br />management<br />
  10. 10. NBA addresses the growing complexity of network administration<br />© 2009 SecurActive. Proprietary and Confidential<br />Fast changing <br />& unclear perimeters <br />of private networks <br />(remote users, partners,<br /> remote sites, providers, etc.)<br />Change in user behaviour<br />(more demanding, varied usages , <br />growing autonomy)‏<br />Most varied usage of <br />network and frequent <br />deployment of new <br />applications<br />Increased need for permanent view on network behaviour<br />Frequent modifications <br />of network architecture<br />(fusion, acquisition, <br />new venture, etc.)‏<br />
  11. 11. © 2009 SecurActive. Proprietary and Confidential<br />Unclear perimeters <br />of private networks <br />Change in user behaviour<br />New Network Usage<br />More demanding<br />Networks are growing up and are much more complex to manage<br />Varied usages<br />Growing autonomy<br />Frequent modifications <br />of network architecture<br />
  12. 12. © 2009 SecurActive. Proprietary and Confidential<br />Complexity<br />Visibility<br />
  13. 13. Network <br />Behaviour <br />Analysis<br />NBA stands for<br />© 2009 SecurActive. Proprietary and Confidential<br />
  14. 14. © 2009 SecurActive. Proprietary and Confidential<br />Overview of NBA solutions<br />
  15. 15. © 2009 SecurActive. Proprietary and Confidential<br />Capture of strategic <br />flows on the <br />corporate network<br />Private network security<br />Track non compliant usage, <br />incidents and security breaches<br />Diagnosis<br />Analysis & network / security <br />incident resolution <br />Analysis of Network <br />and Application behaviour<br />Monitoring, planning & decision making<br />Main features of a NBA solution<br />NBA Solution<br />IP Flow analysis<br />Storage, presentation<br />
  16. 16. Main features of a NBA solution<br />© 2009 SecurActive. Proprietary and Confidential<br />Capture of strategic flows<br />NBA Solution<br />IP Flow analysis<br />Storage, presentation<br />Diagnostic <br />and Troubleshooting<br />Private <br />network security<br />Analysis of Network <br />and Application behaviours<br />
  17. 17. How should a perfect NBA solutions be?<br />Increase the effectiveness of an IT team and make network management easier<br />Simple and intuitive to use<br />Configuration of the solution has to be made according to your business context<br />Understand the real behaviour of the network<br />No change in the network architecture (no additional point of failure)<br />A passive implementation<br />Personalised reports and alerting modules<br />Work free-minded<br />
  18. 18. © 2009 SecurActive. Proprietary and Confidential<br />SecurActive NSS, a NBA solution<br />
  19. 19. Dashboard<br />Network map<br />Graphs<br />Details<br />SecurActive NSS’s - Our Approach<br />SecurActive NSS approach<br />Classical network analysis approach<br />Large volume of data to be analysed<br />1 to 5 clicks from synthesis to detail<br />Report<br />© 2009 SecurActive. Proprietary and Confidential<br />
  20. 20. SecurActive, a NBA solution<br />Network usage <br />and flow mapping<br />Security/Network<br />Application<br /> Performance<br />Capture of strategic flows<br />
  21. 21. SecurActive How it works?<br />© 2009 SecurActive. Proprietary and Confidential<br />Dashboard<br />Network map<br />Graphs<br />Details<br />Queryengine<br />GUI<br />Report<br />Alert<br />Storage<br />Alertengine<br />Business<br />Context<br />Network<br />aggregation<br />Security<br />aggregation<br />NSS Sniffer<br />
  22. 22. SecurActive NSS, a NBA Solution<br />© 2009 SecurActive. Proprietary and Confidential<br />
  23. 23. A passive, agentless deployment in your Network<br />© 2009 SecurActive. Proprietary and Confidential<br /><ul><li>Non intrusive integration
  24. 24. Agentless deployment
  25. 25. Appliance with 2 to 9 listening ports
  26. 26. Implementation via either a port mirroring or a TAP</li></ul>SecurActive<br />Management<br />SecurActive NSS<br />SecurActive reporting<br />Synthetic presentation based on client network<br /><ul><li>Custom application
  27. 27. IP Zones
  28. 28. Network and Security alerts</li></ul>Listening ports<br />Administration port<br />
  29. 29. SecurActive – Range of solutions<br />© 2009 SecurActive. Proprietary and Confidential<br />NSS-800<br />8 GE + 2 SPF + 1 additional interface<br />NSS-500<br />8 GE + 2 additional interfaces<br />Performance<br />NSS-200<br />7 GE (+1GE)<br />Set of appliances to address every kind of needs.<br />NSS-100<br />2GE +1FE (+1FE)<br />NSS-10<br />2FE (+1 FE)<br />Large Enterprise<br />Remote Office/<br />Medium Enterprise<br />
  30. 30. © 2009 SecurActive. Proprietary and Confidential<br />Demonstration<br />
  31. 31. Example of a Proof of Concept<br />Analysis of your strategical traffic<br />Switch – port mirroring<br />SecurActive’s tuning<br /><ul><li>Custom application
  32. 32. IP Zones
  33. 33. Network and Security alerts
  34. 34. Reporting</li></ul>© 2009 SecurActive. Proprietary and Confidential<br />Half a day<br />
  35. 35. I want to centralise one of my vital applications<br />
  36. 36. Server<br />WAN network<br />ERP<br />ERP<br />Wb<br />Wa<br />Main network<br />Remote site<br />
  37. 37. Server<br />WAN network<br />Wb<br />ERP<br />Wa<br />Remote site<br />Main network<br />
  38. 38. Server<br />WAN network<br />Wb<br /> Bandwidth analysis<br />ERP<br />Wa<br /><ul><li>Response time analysis
  39. 39. Application
  40. 40. LAN
  41. 41. WAN </li></ul>Remote site<br />
  42. 42. The network does not have correct configuration for its back-up program.<br />
  43. 43. Situation<br />Regional French newspaper group<br />Has numerous news agencies, some of which are located in zones that are not equipped with high speed Internet access<br />Some journalists have difficulties transmitting their articles on time because of a slow network.<br />Without SecurActive<br />No one is able to determine the cause of the slowdown.<br />Simple ping measures are made and obtain normal results on the network’s lines at 64kbps.<br />The problem persists for weeks.<br />© 2009 SecurActive. Proprietary and Confidential<br />
  44. 44. People are complaining about my ERP. Why?<br />
  45. 45. TCP Connection Time<br />© 2009 SecurActive. Proprietary and Confidential<br />SYN<br />SYNACK<br />Connection Time<br />ACK<br />time<br />Server<br />Client<br />WAN network<br />
  46. 46. Round Trip Time In<br />© 2009 SecurActive. Proprietary and Confidential<br />Data<br />RTTin<br />ACK<br />time<br />Server<br />Client<br />WAN network<br />
  47. 47. Round Trip Time Out<br />© 2009 SecurActive. Proprietary and Confidential<br />Data<br />RTTout<br />ACK<br />time<br />Server<br />Client<br />WAN network<br />
  48. 48. Application Response Time<br />© 2009 SecurActive. Proprietary and Confidential<br />Applicative request<br />Applicative<br />treatment<br />ART<br />1stpacket of applicative response<br />time<br />Server<br />Client<br />WAN network<br />
  49. 49. Retransmission delay<br />© 2009 SecurActive. Proprietary and Confidential<br />Non-acknowledgedpacket<br />RD<br />time<br />Server<br />Client<br />WAN network<br />First acknowledgedpacket<br />ACK<br />
  50. 50. Where are my misconfigured devices in my LAN?<br />
  51. 51. ICMP Errors<br />© 2009 SecurActive. Proprietary and Confidential<br />Client<br />Server<br />« Host unreachable »<br />
  52. 52. Why is my internet so slow? <br />
  53. 53. Situation<br />This is a service company<br />The work culture is liberal and there is complete trust on network users.<br />Access to the Internet is usually slow<br />Without SecurActive:<br />poor quality of the link?<br />the illegal use of the Internet?<br /> or the insufficient bandwidth?<br />© 2009 SecurActive. Proprietary and Confidential<br />
  54. 54. © 2009 SecurActive. Proprietary and Confidential<br />Conclusion<br />
  55. 55. Conclusion – Why people use SecurActive?<br />© 2009 SecurActive. Proprietary and Confidential<br /><ul><li>Manage network quality of service and applications
  56. 56. Optimise application deployment process
  57. 57. Maximise the quality of your network
  58. 58. Management of network suppliers (telcos) & SLAs
  59. 59. Make best decisions on your network architecture
  60. 60. Improved capacity planning
  61. 61. Reduce costs and limit inefficient investments
  62. 62. Increase internal security
  63. 63. Understand real network usage
  64. 64. Track security issues
  65. 65. Identify non-compliant usage
  66. 66. Diagnose and debug faster
  67. 67. Increase helpdesk efficiency
  68. 68. Have a proactive approach to quality of service
  69. 69. Improve user experience</li></li></ul><li>Next Steps<br /> If you are interested about having a Proof of Concept or a customer meeting, please feel free to contact us:<br />Rodolphe Lafargue<br />M. +33 6 59 33 98 81<br />rodolphe.lafargue@securactive.net<br />© 2009 SecurActive. Proprietary and Confidential<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×