SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions

  • 726 views
Uploaded on

SecurActive is a Network & Application Performance Analyser. …

SecurActive is a Network & Application Performance Analyser.
If you are interested about SecurActive solutions, please feel free to contact us: sales@securactive.net

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
726
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
20
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. SecurActive workshop
    "Why a network behaviour analysis solution is now indispensable for the management of your network?“
    18th November, 2009
  • 2. Agenda
    9.00: Welcome - Coffee and croissants
    9.35 : Conference and Exchanges: "Why a network behaviour analysis solution is now indispensable for the management of your network?“
    the new challenges for Network and Security managers
    NBA solutions: vital tools for your daily network management
    SecurActive NSS, an innovative Network Behavior Analysis solution
    10h30 : Overview of SecurActive NSS in a real environment
    © 2009 SecurActive. Proprietary and Confidential
  • 3. © 2009 SecurActive. Proprietary and Confidential
    SecurActive overview
  • 4. Corporate Profile
    • European vendor based in Paris (France), since 2004 with solid investor funding
    • 5. Develop and sell SecurActive NSS, the new network & application performance analysis solutions
    • 6. Distributed throughout Western Europe through a1 tier channel
    • 7. European leader of the Network Behavior AnalysisMarket (“Red Herring 100 Europe Winner” 2008)
    © 2009 SecurActive. Proprietary and Confidential
  • 8. More than 450 customers in Western Europe
    © 2009 SecurActive. Proprietary and Confidential
  • 9. © 2009 SecurActive. Proprietary and Confidential
    The new challenges of your daily network
    management
  • 10. NBA addresses the growing complexity of network administration
    © 2009 SecurActive. Proprietary and Confidential
    Fast changing
    & unclear perimeters
    of private networks
    (remote users, partners,
    remote sites, providers, etc.)
    Change in user behaviour
    (more demanding, varied usages ,
    growing autonomy)‏
    Most varied usage of
    network and frequent
    deployment of new
    applications
    Increased need for permanent view on network behaviour
    Frequent modifications
    of network architecture
    (fusion, acquisition,
    new venture, etc.)‏
  • 11. © 2009 SecurActive. Proprietary and Confidential
    Unclear perimeters
    of private networks
    Change in user behaviour
    New Network Usage
    More demanding
    Networks are growing up and are much more complex to manage
    Varied usages
    Growing autonomy
    Frequent modifications
    of network architecture
  • 12. © 2009 SecurActive. Proprietary and Confidential
    Complexity
    Visibility
  • 13. Network
    Behaviour
    Analysis
    NBA stands for
    © 2009 SecurActive. Proprietary and Confidential
  • 14. © 2009 SecurActive. Proprietary and Confidential
    Overview of NBA solutions
  • 15. © 2009 SecurActive. Proprietary and Confidential
    Capture of strategic
    flows on the
    corporate network
    Private network security
    Track non compliant usage,
    incidents and security breaches
    Diagnosis
    Analysis & network / security
    incident resolution
    Analysis of Network
    and Application behaviour
    Monitoring, planning & decision making
    Main features of a NBA solution
    NBA Solution
    IP Flow analysis
    Storage, presentation
  • 16. Main features of a NBA solution
    © 2009 SecurActive. Proprietary and Confidential
    Capture of strategic flows
    NBA Solution
    IP Flow analysis
    Storage, presentation
    Diagnostic
    and Troubleshooting
    Private
    network security
    Analysis of Network
    and Application behaviours
  • 17. How should a perfect NBA solutions be?
    Increase the effectiveness of an IT team and make network management easier
    Simple and intuitive to use
    Configuration of the solution has to be made according to your business context
    Understand the real behaviour of the network
    No change in the network architecture (no additional point of failure)
    A passive implementation
    Personalised reports and alerting modules
    Work free-minded
  • 18. © 2009 SecurActive. Proprietary and Confidential
    SecurActive NSS, a NBA solution
  • 19. Dashboard
    Network map
    Graphs
    Details
    SecurActive NSS’s - Our Approach
    SecurActive NSS approach
    Classical network analysis approach
    Large volume of data to be analysed
    1 to 5 clicks from synthesis to detail
    Report
    © 2009 SecurActive. Proprietary and Confidential
  • 20. SecurActive, a NBA solution
    Network usage
    and flow mapping
    Security/Network
    Application
    Performance
    Capture of strategic flows
  • 21. SecurActive How it works?
    © 2009 SecurActive. Proprietary and Confidential
    Dashboard
    Network map
    Graphs
    Details
    Queryengine
    GUI
    Report
    Alert
    Storage
    Alertengine
    Business
    Context
    Network
    aggregation
    Security
    aggregation
    NSS Sniffer
  • 22. SecurActive NSS, a NBA Solution
    © 2009 SecurActive. Proprietary and Confidential
  • 23. A passive, agentless deployment in your Network
    © 2009 SecurActive. Proprietary and Confidential
    • Non intrusive integration
    • 24. Agentless deployment
    • 25. Appliance with 2 to 9 listening ports
    • 26. Implementation via either a port mirroring or a TAP
    SecurActive
    Management
    SecurActive NSS
    SecurActive reporting
    Synthetic presentation based on client network
    • Custom application
    • 27. IP Zones
    • 28. Network and Security alerts
    Listening ports
    Administration port
  • 29. SecurActive – Range of solutions
    © 2009 SecurActive. Proprietary and Confidential
    NSS-800
    8 GE + 2 SPF + 1 additional interface
    NSS-500
    8 GE + 2 additional interfaces
    Performance
    NSS-200
    7 GE (+1GE)
    Set of appliances to address every kind of needs.
    NSS-100
    2GE +1FE (+1FE)
    NSS-10
    2FE (+1 FE)
    Large Enterprise
    Remote Office/
    Medium Enterprise
  • 30. © 2009 SecurActive. Proprietary and Confidential
    Demonstration
  • 31. Example of a Proof of Concept
    Analysis of your strategical traffic
    Switch – port mirroring
    SecurActive’s tuning
    • Custom application
    • 32. IP Zones
    • 33. Network and Security alerts
    • 34. Reporting
    © 2009 SecurActive. Proprietary and Confidential
    Half a day
  • 35. I want to centralise one of my vital applications
  • 36. Server
    WAN network
    ERP
    ERP
    Wb
    Wa
    Main network
    Remote site
  • 37. Server
    WAN network
    Wb
    ERP
    Wa
    Remote site
    Main network
  • 38. Server
    WAN network
    Wb
     Bandwidth analysis
    ERP
    Wa
    Remote site
  • 42. The network does not have correct configuration for its back-up program.
  • 43. Situation
    Regional French newspaper group
    Has numerous news agencies, some of which are located in zones that are not equipped with high speed Internet access
    Some journalists have difficulties transmitting their articles on time because of a slow network.
    Without SecurActive
    No one is able to determine the cause of the slowdown.
    Simple ping measures are made and obtain normal results on the network’s lines at 64kbps.
    The problem persists for weeks.
    © 2009 SecurActive. Proprietary and Confidential
  • 44. People are complaining about my ERP. Why?
  • 45. TCP Connection Time
    © 2009 SecurActive. Proprietary and Confidential
    SYN
    SYNACK
    Connection Time
    ACK
    time
    Server
    Client
    WAN network
  • 46. Round Trip Time In
    © 2009 SecurActive. Proprietary and Confidential
    Data
    RTTin
    ACK
    time
    Server
    Client
    WAN network
  • 47. Round Trip Time Out
    © 2009 SecurActive. Proprietary and Confidential
    Data
    RTTout
    ACK
    time
    Server
    Client
    WAN network
  • 48. Application Response Time
    © 2009 SecurActive. Proprietary and Confidential
    Applicative request
    Applicative
    treatment
    ART
    1stpacket of applicative response
    time
    Server
    Client
    WAN network
  • 49. Retransmission delay
    © 2009 SecurActive. Proprietary and Confidential
    Non-acknowledgedpacket
    RD
    time
    Server
    Client
    WAN network
    First acknowledgedpacket
    ACK
  • 50. Where are my misconfigured devices in my LAN?
  • 51. ICMP Errors
    © 2009 SecurActive. Proprietary and Confidential
    Client
    Server
    « Host unreachable »
  • 52. Why is my internet so slow?
  • 53. Situation
    This is a service company
    The work culture is liberal and there is complete trust on network users.
    Access to the Internet is usually slow
    Without SecurActive:
    poor quality of the link?
    the illegal use of the Internet?
    or the insufficient bandwidth?
    © 2009 SecurActive. Proprietary and Confidential
  • 54. © 2009 SecurActive. Proprietary and Confidential
    Conclusion
  • 55. Conclusion – Why people use SecurActive?
    © 2009 SecurActive. Proprietary and Confidential
    • Manage network quality of service and applications
    • 56. Optimise application deployment process
    • 57. Maximise the quality of your network
    • 58. Management of network suppliers (telcos) & SLAs
    • 59. Make best decisions on your network architecture
    • 60. Improved capacity planning
    • 61. Reduce costs and limit inefficient investments
    • 62. Increase internal security
    • 63. Understand real network usage
    • 64. Track security issues
    • 65. Identify non-compliant usage
    • 66. Diagnose and debug faster
    • 67. Increase helpdesk efficiency
    • 68. Have a proactive approach to quality of service
    • 69. Improve user experience
  • Next Steps
    If you are interested about having a Proof of Concept or a customer meeting, please feel free to contact us:
    Rodolphe Lafargue
    M. +33 6 59 33 98 81
    rodolphe.lafargue@securactive.net
    © 2009 SecurActive. Proprietary and Confidential