• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions
 

SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions

on

  • 1,372 views

SecurActive is a Network & Application Performance Analyser.

SecurActive is a Network & Application Performance Analyser.
If you are interested about SecurActive solutions, please feel free to contact us: sales@securactive.net

Statistics

Views

Total Views
1,372
Views on SlideShare
1,370
Embed Views
2

Actions

Likes
0
Downloads
15
Comments
0

2 Embeds 2

http://www.slideshare.net 1
http://www.slideee.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions Presentation Transcript

    • SecurActive workshop
      "Why a network behaviour analysis solution is now indispensable for the management of your network?“
      18th November, 2009
    • Agenda
      9.00: Welcome - Coffee and croissants
      9.35 : Conference and Exchanges: "Why a network behaviour analysis solution is now indispensable for the management of your network?“
      the new challenges for Network and Security managers
      NBA solutions: vital tools for your daily network management
      SecurActive NSS, an innovative Network Behavior Analysis solution
      10h30 : Overview of SecurActive NSS in a real environment
      © 2009 SecurActive. Proprietary and Confidential
    • © 2009 SecurActive. Proprietary and Confidential
      SecurActive overview
    • Corporate Profile
      • European vendor based in Paris (France), since 2004 with solid investor funding
      • Develop and sell SecurActive NSS, the new network & application performance analysis solutions
      • Distributed throughout Western Europe through a1 tier channel
      • European leader of the Network Behavior AnalysisMarket (“Red Herring 100 Europe Winner” 2008)
      © 2009 SecurActive. Proprietary and Confidential
    • More than 450 customers in Western Europe
      © 2009 SecurActive. Proprietary and Confidential
    • © 2009 SecurActive. Proprietary and Confidential
      The new challenges of your daily network
      management
    • NBA addresses the growing complexity of network administration
      © 2009 SecurActive. Proprietary and Confidential
      Fast changing
      & unclear perimeters
      of private networks
      (remote users, partners,
      remote sites, providers, etc.)
      Change in user behaviour
      (more demanding, varied usages ,
      growing autonomy)‏
      Most varied usage of
      network and frequent
      deployment of new
      applications
      Increased need for permanent view on network behaviour
      Frequent modifications
      of network architecture
      (fusion, acquisition,
      new venture, etc.)‏
    • © 2009 SecurActive. Proprietary and Confidential
      Unclear perimeters
      of private networks
      Change in user behaviour
      New Network Usage
      More demanding
      Networks are growing up and are much more complex to manage
      Varied usages
      Growing autonomy
      Frequent modifications
      of network architecture
    • © 2009 SecurActive. Proprietary and Confidential
      Complexity
      Visibility
    • Network
      Behaviour
      Analysis
      NBA stands for
      © 2009 SecurActive. Proprietary and Confidential
    • © 2009 SecurActive. Proprietary and Confidential
      Overview of NBA solutions
    • © 2009 SecurActive. Proprietary and Confidential
      Capture of strategic
      flows on the
      corporate network
      Private network security
      Track non compliant usage,
      incidents and security breaches
      Diagnosis
      Analysis & network / security
      incident resolution
      Analysis of Network
      and Application behaviour
      Monitoring, planning & decision making
      Main features of a NBA solution
      NBA Solution
      IP Flow analysis
      Storage, presentation
    • Main features of a NBA solution
      © 2009 SecurActive. Proprietary and Confidential
      Capture of strategic flows
      NBA Solution
      IP Flow analysis
      Storage, presentation
      Diagnostic
      and Troubleshooting
      Private
      network security
      Analysis of Network
      and Application behaviours
    • How should a perfect NBA solutions be?
      Increase the effectiveness of an IT team and make network management easier
      Simple and intuitive to use
      Configuration of the solution has to be made according to your business context
      Understand the real behaviour of the network
      No change in the network architecture (no additional point of failure)
      A passive implementation
      Personalised reports and alerting modules
      Work free-minded
    • © 2009 SecurActive. Proprietary and Confidential
      SecurActive NSS, a NBA solution
    • Dashboard
      Network map
      Graphs
      Details
      SecurActive NSS’s - Our Approach
      SecurActive NSS approach
      Classical network analysis approach
      Large volume of data to be analysed
      1 to 5 clicks from synthesis to detail
      Report
      © 2009 SecurActive. Proprietary and Confidential
    • SecurActive, a NBA solution
      Network usage
      and flow mapping
      Security/Network
      Application
      Performance
      Capture of strategic flows
    • SecurActive How it works?
      © 2009 SecurActive. Proprietary and Confidential
      Dashboard
      Network map
      Graphs
      Details
      Queryengine
      GUI
      Report
      Alert
      Storage
      Alertengine
      Business
      Context
      Network
      aggregation
      Security
      aggregation
      NSS Sniffer
    • SecurActive NSS, a NBA Solution
      © 2009 SecurActive. Proprietary and Confidential
    • A passive, agentless deployment in your Network
      © 2009 SecurActive. Proprietary and Confidential
      • Non intrusive integration
      • Agentless deployment
      • Appliance with 2 to 9 listening ports
      • Implementation via either a port mirroring or a TAP
      SecurActive
      Management
      SecurActive NSS
      SecurActive reporting
      Synthetic presentation based on client network
      • Custom application
      • IP Zones
      • Network and Security alerts
      Listening ports
      Administration port
    • SecurActive – Range of solutions
      © 2009 SecurActive. Proprietary and Confidential
      NSS-800
      8 GE + 2 SPF + 1 additional interface
      NSS-500
      8 GE + 2 additional interfaces
      Performance
      NSS-200
      7 GE (+1GE)
      Set of appliances to address every kind of needs.
      NSS-100
      2GE +1FE (+1FE)
      NSS-10
      2FE (+1 FE)
      Large Enterprise
      Remote Office/
      Medium Enterprise
    • © 2009 SecurActive. Proprietary and Confidential
      Demonstration
    • Example of a Proof of Concept
      Analysis of your strategical traffic
      Switch – port mirroring
      SecurActive’s tuning
      • Custom application
      • IP Zones
      • Network and Security alerts
      • Reporting
      © 2009 SecurActive. Proprietary and Confidential
      Half a day
    • I want to centralise one of my vital applications
    • Server
      WAN network
      ERP
      ERP
      Wb
      Wa
      Main network
      Remote site
    • Server
      WAN network
      Wb
      ERP
      Wa
      Remote site
      Main network
    • Server
      WAN network
      Wb
       Bandwidth analysis
      ERP
      Wa
      • Response time analysis
      • Application
      • LAN
      • WAN
      Remote site
    • The network does not have correct configuration for its back-up program.
    • Situation
      Regional French newspaper group
      Has numerous news agencies, some of which are located in zones that are not equipped with high speed Internet access
      Some journalists have difficulties transmitting their articles on time because of a slow network.
      Without SecurActive
      No one is able to determine the cause of the slowdown.
      Simple ping measures are made and obtain normal results on the network’s lines at 64kbps.
      The problem persists for weeks.
      © 2009 SecurActive. Proprietary and Confidential
    • People are complaining about my ERP. Why?
    • TCP Connection Time
      © 2009 SecurActive. Proprietary and Confidential
      SYN
      SYNACK
      Connection Time
      ACK
      time
      Server
      Client
      WAN network
    • Round Trip Time In
      © 2009 SecurActive. Proprietary and Confidential
      Data
      RTTin
      ACK
      time
      Server
      Client
      WAN network
    • Round Trip Time Out
      © 2009 SecurActive. Proprietary and Confidential
      Data
      RTTout
      ACK
      time
      Server
      Client
      WAN network
    • Application Response Time
      © 2009 SecurActive. Proprietary and Confidential
      Applicative request
      Applicative
      treatment
      ART
      1stpacket of applicative response
      time
      Server
      Client
      WAN network
    • Retransmission delay
      © 2009 SecurActive. Proprietary and Confidential
      Non-acknowledgedpacket
      RD
      time
      Server
      Client
      WAN network
      First acknowledgedpacket
      ACK
    • Where are my misconfigured devices in my LAN?
    • ICMP Errors
      © 2009 SecurActive. Proprietary and Confidential
      Client
      Server
      « Host unreachable »
    • Why is my internet so slow?
    • Situation
      This is a service company
      The work culture is liberal and there is complete trust on network users.
      Access to the Internet is usually slow
      Without SecurActive:
      poor quality of the link?
      the illegal use of the Internet?
      or the insufficient bandwidth?
      © 2009 SecurActive. Proprietary and Confidential
    • © 2009 SecurActive. Proprietary and Confidential
      Conclusion
    • Conclusion – Why people use SecurActive?
      © 2009 SecurActive. Proprietary and Confidential
      • Manage network quality of service and applications
      • Optimise application deployment process
      • Maximise the quality of your network
      • Management of network suppliers (telcos) & SLAs
      • Make best decisions on your network architecture
      • Improved capacity planning
      • Reduce costs and limit inefficient investments
      • Increase internal security
      • Understand real network usage
      • Track security issues
      • Identify non-compliant usage
      • Diagnose and debug faster
      • Increase helpdesk efficiency
      • Have a proactive approach to quality of service
      • Improve user experience
    • Next Steps
      If you are interested about having a Proof of Concept or a customer meeting, please feel free to contact us:
      Rodolphe Lafargue
      M. +33 6 59 33 98 81
      rodolphe.lafargue@securactive.net
      © 2009 SecurActive. Proprietary and Confidential