SlideShare a Scribd company logo
1 of 37
Download to read offline
Best Practices for Building Scalable
Visibility Architectures

Jim Frey
VP of Research
Network Management
Enterprise Management Associates

Scott Register
Senior Director
Product Management
Ixia
February 11, 2014
Today’s Presenters
Jim Frey
Vice President of Research, Network Management
Jim has over 25 years of experience in the computing industry
developing, deploying, managing, and marketing software and
hardware products, with the last 20 of those years spent in network
and infrastructure operations and security management, straddling
both enterprise and service provider sectors.

Scott Register
Senior Director, Product Management
Scott has more than 15 years of experience leading product
management operations for global technology companies. Scott lead
product management at BreakingPoint Systems prior to its acquisition
by Ixia. Other past experience includes leading product lines for Blue
Coat, Permeo, and Check Point Software.

Slide 2

© 2014 Enterprise Management Associates, Inc.
Logistics for Today’s Webinar

Questions

• Log questions in the Q&A panel located
on the lower right corner of your screen
• Questions will be addressed during the
Q&A session of the event
Event recording
•

An archived version of the event
recording will be available at
www.enterprisemanagement.com

Event presentation

• A PDF of the PowerPoint
presentation will be available

Slide 3
Agenda
• What is a Visibility Architecture?
• Definitions and Drivers

• Best Practices and Decision Points
• Topology
• Tap or SPAN?
• In-line vs Out-of-Band
• Dealing with Virtualization
• Key Features for NPBs

• Ixia Visibility Solutions

• Wrap-up and Key Takeaways
• Q&A

Slide 4

© 2014 Enterprise Management Associates, Inc.
Visibility Architecture Defined
Systemic approach to establishing access to network traffic
streams for packet-based monitoring and management
purposes

Slide 5

© 2014 Enterprise Management Associates, Inc.
Visibility Architecture Defined
Systemic approach to establishing access to network traffic
streams for packet-based monitoring and management
purposes
Key Value
• Permanent, adaptive packet stream

management infrastructure for reliable,
resilient, effective network and security
operations

Essential Attributes
• Scalability
• Sustainability
• Flexibility

Slide 6

© 2014 Enterprise Management Associates, Inc.
Basic Components of a Visibility Architecture

…
Network Infrastructure
Slide 7

© 2014 Enterprise Management Associates, Inc.
Basic Components of a Visibility Architecture
Packet Analysis & Monitoring Systems
Performance Monitor

Performance Monitor

Security Monitor

Packet Recorder

…

…
Network Infrastructure
Slide 8

© 2014 Enterprise Management Associates, Inc.
Basic Components of a Visibility Architecture
Packet Analysis & Monitoring Systems
Performance Monitor

Performance Monitor

Packet Recorder

Security Monitor

…

Tap

Tap

SPAN

SPAN

…
Network Infrastructure
Slide 9

© 2014 Enterprise Management Associates, Inc.
Basic Components of a Visibility Architecture
Packet Analysis & Monitoring Systems
Performance Monitor

Performance Monitor

Security Monitor

Packet Recorder

…

Visibility
Architecture

…

Tap

Network Visibility Controller
(a.k.a. Network Packet Broker)

Tap

…
SPAN

SPAN

…
…

Network Infrastructure
Slide 10

© 2014 Enterprise Management Associates, Inc.
NVC/NPB Defined
Heart of the Visibility Architecture
• Network devices that provide managed access to packet streams from

SPAN and TAPs to network and security analysis tools

NVCs provide advanced features beyond simple “Agg Tap”
• 1:1, 1:M, M:1, and M:M connections between packet sources and

packet consumers (tools)
• Filtering and manipulating packet streams to improve effectiveness and

efficiency of tools
• Load balancing tools for greater resilience

Slide 11

© 2014 Enterprise Management Associates, Inc.
NVC/NPB Defined
Heart of the Visibility Architecture
• Network devices that provide managed access to packet streams from

SPAN and TAPs to network and security analysis tools

NVCs provide advanced features beyond simple “Agg Tap”
• 1:1, 1:M, M:1, and M:M connections between packet sources and

packet consumers (tools)
• Filtering and manipulating packet streams to improve effectiveness and

efficiency of tools
• Load balancing tools for greater resilience

Aliases….
• Network Monitoring Switch
• Matrix/Aggregation Switch
• Data Access Switch
• Distributed Filter Tap

Slide 12

© 2014 Enterprise Management Associates, Inc.
Why a Visibility Architecture?
Network Growing Faster than the Tools!
Maximum networking link speeds within data center / core networks
100M
1G
10G
40G
100G
0%

10%
Current

20%

30%

40%

50%

Planned in 12 months

Sept. 2013; Sample Size = 177

Slide 13

© 2014 Enterprise Management Associates, Inc.
Why a Visibility Architecture?
Network Growing Faster than the Tools!
Maximum networking link speeds within data center / core networks
100M
1G
10G
40G
100G
0%

10%
Current

20%

30%

40%

50%

Planned in 12 months

Tools Challenged to Keep Pace!
Sept. 2013; Sample Size = 177

Slide 14

© 2014 Enterprise Management Associates, Inc.
Why a Visibility Architecture?
Growing Number of Tools!
Types of tools attached to NVCs/NPBs
Network Performance Monitor
Data Loss Prevention

Intrusion Detection / Prevention
Troubleshooting / Packet Analyzers (e.g. packet
“sniffers”)
Compliance Monitor
Data / Packet Recorder
Application Performance Monitor
VoIP / UC / Video Analyzer

Current

0%
10%
20%
Planned in 12 months

30%

40%

50%

60%

Sept. 2013; Sample Size = 177

Slide 15

© 2014 Enterprise Management Associates, Inc.
Why a Visibility Architecture?
Growing Number of Tools!
Types of tools attached to NVCs/NPBs
Network Performance Monitor
Data Loss Prevention

Intrusion Detection / Prevention
Troubleshooting / Packet Analyzers (e.g. packet
“sniffers”)
Compliance Monitor
Data / Packet Recorder
Application Performance Monitor
VoIP / UC / Video Analyzer

Current

0%
10%
20%
Planned in 12 months

30%

40%

50%

60%

Can’t accommodate using old/dedicated approach!
Sept. 2013; Sample Size = 177

Slide 16

© 2014 Enterprise Management Associates, Inc.
Why a Visibility Architecture?
In-Lines Use Cases for Security Deployments
Security priorities: Never Higher

Threat landscape: Never More Daunting
One important answer: Active Enforcement
• Intrusion Prevention Systems (IPS)
• Data Loss Prevention (DLP)

Sept. 2013: Sample Size = 177

Slide 17

© 2014 Enterprise Management Associates, Inc.
Why a Visibility Architecture?
In-Lines Use Cases for Security Deployments
Security priorities: Never Higher

Threat landscape: Never More Daunting
One important answer: Active Enforcement
• Intrusion Prevention Systems (IPS)
• Data Loss Prevention (DLP)

Major concerns
• Performance of IPS, DLP
• Resilience of IPS, DLP

Potential answer
• Highly efficient, packet switching
• Advanced resilience features
Sept. 2013: Sample Size = 177

Slide 18

© 2014 Enterprise Management Associates, Inc.
Who Is Ixia?

The MOST TRUSTED names

in networking trust

Test

Visibility

Security

Enterprises trust IXIA to:
 Assess vendor equipment and applications
 Improve network security posture
 Improve network and application visibility
and performance

Service Providers trust IXIA to:
 Improve and speed service delivery
 Speed roll out of next gen services
 Improve network and application visibility
and performance

Equipment Manufacturers trust IXIA
to:
 Develop next generation devices
 Speed time to market
 Improve performance and reliability

Chip Fabricators trust IXIA to:
 Validate protocol conformance
 Speed time to market

Slide 19
Best Practices for Visibility
Architectures

Slide 20

© 2014 Enterprise Management Associates, Inc.
Best Practices:
Where NVCs/NPBs Are Deployed
Where has your organization deployed Network Visibility Controllers (NVCs)?
Data center core network
Top of Rack
Data center Edge (ingress/egress)
Campus backbone
Remote sites
DMZ
End of Row

Backhaul links
Other (Please specify)
0%
Current

10%

20%

30%

40%

50%

60%

70%

Planned in 12 months

Sept. 2013; Sample Size = 177

Slide 21

© 2014 Enterprise Management Associates, Inc.
Best Practices:
Where NVCs/NPBs Are Deployed
Where has your organization deployed Network Visibility Controllers (NVCs)?
Data center core network
Top of Rack
Data center Edge (ingress/egress)
Campus backbone
Remote sites
DMZ
End of Row

Backhaul links
Other (Please specify)
0%
Current

10%

20%

30%

40%

50%

60%

70%

Planned in 12 months

Points of Concentration & Control
Sept. 2013; Sample Size = 177

Slide 22

© 2014 Enterprise Management Associates, Inc.
Poll Question

If you have network or security monitoring tools that require
SPAN ports or TAP connections, do you (select one):

A.
B.
C.
D.

Slide 23

Plan to expand use of SPAN ports
Plan to expand use of TAPs
Plan to add both more SPAN ports and TAPs
Have no plans to add more SPAN ports or TAPs

© 2014 Enterprise Management Associates, Inc.
Best Practices:
Mixing SPAN and TAP for Access
50.0%
40.0%
30.0%

20.0%
10.0%

2009
2013

0.0%

Sample Size = 165 (Sept 2009); 177 (Sept 2013)

Slide 24

© 2014 Enterprise Management Associates, Inc.
Best Practices:
Mixing SPAN and TAP for Access
50.0%
40.0%
30.0%

20.0%
2009
2013

10.0%
0.0%

Need Both, but Leaning Towards Taps
Sample Size = 165 (Sept 2009); 177 (Sept 2013)

Slide 25

© 2014 Enterprise Management Associates, Inc.
Data Deduplication
Necessity if using SPAN ports
A

A

D

D

C

A
F

C

C
E

D

B

F

E

A

 Increase throughput efficiency to monitoring tools
 Reduce monitoring tool overload
 Improve monitoring tool processing efficiency
 Eliminate duplicate packet storage

Slide 26

C

B

A
Best Practices:
In-Line vs. Out-of-Band deployments
Are NVCs deployed in-line anywhere within your organization's network?
No, and no plans to do so

10%

40%

No, but planning
to do so

Yes – currently
deployed in-line

50%

Sept. 2013: Sample Size = 177

Slide 27

© 2014 Enterprise Management Associates, Inc.
Best Practices:
In-Line vs. Out-of-Band deployments
Are NVCs deployed in-line anywhere within your organization's network?
No, and no plans to do so

10%

40%

No, but planning
to do so

Yes – currently
deployed in-line

50%

Essential: Load Balancing + Bypass Technology
Sept. 2013: Sample Size = 177

Slide 28

© 2014 Enterprise Management Associates, Inc.
Inline Security
Typical Inline Security Deployments

Campus

Network

Cloud

Branch

Core

Data Center

Why Inline Security?

Critical Considerations

 Threat prevention, not reaction

 Cannot take the network down

 Satisfy compliance requirements

 Cannot slow or block application traffic

 Prevent IPR and publicity “issues”

 Must scale with network demands

Slide 29
Best Practices:
Dealing with Virtualized Environments
Approaches using or considering for adding packet monitoring to virtualized
environments
Packet analysis tools deployed
on VMs for intra-host visibility

SPAN/Port Mirroring from virtual
switches
Virtual taps
Header stripping for overlay
encapsulations
0%

20%

40%

60%

80%

Sept. 2013; Sample Size = 156

Slide 30

© 2014 Enterprise Management Associates, Inc.
Best Practices:
Dealing with Virtualized Environments
Approaches using or considering for adding packet monitoring to virtualized
environments
Packet analysis tools deployed
on VMs for intra-host visibility

SPAN/Port Mirroring from virtual
switches
Virtual taps
Header stripping for overlay
encapsulations
0%

20%

40%

60%

80%

Select Techniques Based on Specific Needs
Sept. 2013; Sample Size = 156

Slide 31

© 2014 Enterprise Management Associates, Inc.
Virtual Visibility
Core Switch

Network Packet Brokers

Enables inter-VM,
east-west traffic
monitoring to
eliminate the blind
spots in virtualized
environments

Top of Rack
Switch

Virtualized Host
Hypervisor
vSwitch
Kernel Module

Virtual Tap

VM

VM

VM

VM

App

App

App

App

App

OS
Slide 32

VM

OS

OS

OS

OS
Best Practices:
Key NVC/NPB Features
Most important packet manipulation features (Mean by role)
Load Bal across multiple tools
Inbound Filtering
Outbound Filtering
Decryption
Time stamping
Tunneling
Port labeling
Masking
De-duplication
IPv6 support
Header stripping (de-encapsulation)
Media conversion (i.e. 10G to 1G)
Packet slicing

3 = Critical
2 = Helpful
1 = Not Important

2.00
Executive

2.25

2.50

2.75

Staff

Sept. 2013; Sample Size = 177

Slide 33

© 2014 Enterprise Management Associates, Inc.
Feature Priorities Vary by Industry Vertical
Financials

Manufacturing

1. Inbound Filtering

1. Load Balancing

2. Load Balancing

2. Outbound Filtering

3. Outbound Filtering

3. De-duplication/Tunneling

4. Time Stamping

Healthcare/Pharma

All Others

1. Load Balancing

2. Inbound Filtering

2. Inbound Filtering

3. Packet Slicing / IPv6 /

3. Decryption

Port Labeling / Outbound
Filtering

Slide 34

1. Load Balancing

4. Tunneling

© 2014 Enterprise Management Associates, Inc.
Creating A Network Visibility Architecture

Visibility Architecture
Remote Office
Branch Office

Campus

Network
Operations

Network
Taps

App
Aware

Virtual
& Cloud
Access

Core

Data Center
Private Cloud

Virtualization

Carrier Networks
Wired and Mobile

Slide 35

Out of
Band
NPB

Inline
Bypass

Network
Access

Element
Mgmt

Performance
Management

Security
Admin

Policy
Mgmt
Inline
NPB

Packet
Brokers

Session
Aware

Applications

Server Admin

Data Center
Automation

Management

Audit &
Privacy

Forensics
EMA: Key Takeaways on Visibility Architectures
1. Visibility Architectures provide both tactical
and strategic advantages to security and
operations
2. Deploy in the core first; expand to edge
and remote sites over time

3. Top, most-valued NVC/NPB features are
Load Balancing and Inbound/Outbound
filtering, though other features may also be
important based on vertical sector
4. Focus on scalability, flexibility,
manageability, completeness when
seeking solutions

Slide 36

© 2014 Enterprise Management Associates, Inc.
Question & Answer:
Please log questions in the Q&A Panel
Jim Frey
JFrey@enterprisemanagement.com
@jfrey80

Scott Register
sregister@ixiacom.com
@swregister
Download this
FREE White Paper
from the follow-up email
you receive from EMA!
Or go to the Ixiacom.com home page
and click on the EMA webinar banner.
Slide 37

More Related Content

What's hot

What's hot (20)

Why Zenoss is Right for You
Why Zenoss is Right for YouWhy Zenoss is Right for You
Why Zenoss is Right for You
 
TransUnion's Impact of Impact
TransUnion's Impact of ImpactTransUnion's Impact of Impact
TransUnion's Impact of Impact
 
ITAM 2015-2020: How new technology will shape the role of the IT Asset Manager
ITAM 2015-2020: How new technology will shape the role of the IT Asset ManagerITAM 2015-2020: How new technology will shape the role of the IT Asset Manager
ITAM 2015-2020: How new technology will shape the role of the IT Asset Manager
 
Office 365 Monitoring Best Practices
Office 365 Monitoring Best PracticesOffice 365 Monitoring Best Practices
Office 365 Monitoring Best Practices
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
 
ITAM Best Practices - Knowledge14
ITAM Best Practices - Knowledge14ITAM Best Practices - Knowledge14
ITAM Best Practices - Knowledge14
 
Digital Operations Excellence - PagerDuty Summit Series Keynote
Digital Operations Excellence - PagerDuty Summit Series KeynoteDigital Operations Excellence - PagerDuty Summit Series Keynote
Digital Operations Excellence - PagerDuty Summit Series Keynote
 
Flexera Software Solutions for Enterprises
Flexera Software Solutions for EnterprisesFlexera Software Solutions for Enterprises
Flexera Software Solutions for Enterprises
 
AdminStudio Suite Datasheet
AdminStudio Suite DatasheetAdminStudio Suite Datasheet
AdminStudio Suite Datasheet
 
Managing Growth at Sanofi - How TrueSight Capacity Optimization Helped Align ...
Managing Growth at Sanofi - How TrueSight Capacity Optimization Helped Align ...Managing Growth at Sanofi - How TrueSight Capacity Optimization Helped Align ...
Managing Growth at Sanofi - How TrueSight Capacity Optimization Helped Align ...
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information Security
 
Optimizing Identity Governance using Perseus IAM
Optimizing Identity Governance using Perseus IAMOptimizing Identity Governance using Perseus IAM
Optimizing Identity Governance using Perseus IAM
 
CMDB - Use Cases
CMDB - Use CasesCMDB - Use Cases
CMDB - Use Cases
 
Monitoring Consumer Digital Experience
Monitoring Consumer Digital ExperienceMonitoring Consumer Digital Experience
Monitoring Consumer Digital Experience
 
Business Application Support and Automation for a Government Organization
Business Application Support and Automation for a Government OrganizationBusiness Application Support and Automation for a Government Organization
Business Application Support and Automation for a Government Organization
 
BMC Engage - ITAM 2015-2020: The Evolving Role of the IT Asset Manager
BMC Engage - ITAM 2015-2020: The Evolving Role of the IT Asset ManagerBMC Engage - ITAM 2015-2020: The Evolving Role of the IT Asset Manager
BMC Engage - ITAM 2015-2020: The Evolving Role of the IT Asset Manager
 
V center application discovery manager customer facing technical presentation
V center application discovery manager customer facing technical presentationV center application discovery manager customer facing technical presentation
V center application discovery manager customer facing technical presentation
 
Why SaaS BI
Why SaaS BIWhy SaaS BI
Why SaaS BI
 
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
 
How Citrix Aligns IT to Business Goals
How Citrix Aligns IT to Business Goals How Citrix Aligns IT to Business Goals
How Citrix Aligns IT to Business Goals
 

Viewers also liked

Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
LiveAction Next Generation Network Management Software
 
INTRO SUCESSFUL PROJECTS
INTRO  SUCESSFUL PROJECTSINTRO  SUCESSFUL PROJECTS
INTRO SUCESSFUL PROJECTS
Rauf Marfyne
 

Viewers also liked (16)

Leveraging a big data model in the IT domain
Leveraging a big data model in the IT domainLeveraging a big data model in the IT domain
Leveraging a big data model in the IT domain
 
Analyst deck-20160524-final
Analyst deck-20160524-finalAnalyst deck-20160524-final
Analyst deck-20160524-final
 
Command Your Data Center - Net Optics/Ixia
Command Your Data Center - Net Optics/IxiaCommand Your Data Center - Net Optics/Ixia
Command Your Data Center - Net Optics/Ixia
 
Big Data in Action
Big Data in ActionBig Data in Action
Big Data in Action
 
Network Critical
Network CriticalNetwork Critical
Network Critical
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overview
 
La recreación.
La recreación.La recreación.
La recreación.
 
Shooting schedule-location
Shooting schedule-locationShooting schedule-location
Shooting schedule-location
 
Demo Arbo Management Systeem
Demo Arbo Management SysteemDemo Arbo Management Systeem
Demo Arbo Management Systeem
 
Vanguardia
VanguardiaVanguardia
Vanguardia
 
Demo Arbo Management Systeem
Demo Arbo Management SysteemDemo Arbo Management Systeem
Demo Arbo Management Systeem
 
Cover stroy
Cover stroyCover stroy
Cover stroy
 
69177635 autocad-2
69177635 autocad-269177635 autocad-2
69177635 autocad-2
 
INTRO SUCESSFUL PROJECTS
INTRO  SUCESSFUL PROJECTSINTRO  SUCESSFUL PROJECTS
INTRO SUCESSFUL PROJECTS
 
Seguridad Voip
Seguridad VoipSeguridad Voip
Seguridad Voip
 

Similar to Best Practices for Building Scalable Visibility Architectures

Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
منیزہ ہاشمی
 

Similar to Best Practices for Building Scalable Visibility Architectures (20)

Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the Test
 
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceGetting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
 
Journey to the Software Defined Data Center: EMA Research Results Revealed
Journey to the Software Defined Data Center: EMA Research Results Revealed Journey to the Software Defined Data Center: EMA Research Results Revealed
Journey to the Software Defined Data Center: EMA Research Results Revealed
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Develop an Enterprise-wide Cloud Adoption Strategy – Chris Merrigan
Develop an Enterprise-wide Cloud Adoption Strategy – Chris MerriganDevelop an Enterprise-wide Cloud Adoption Strategy – Chris Merrigan
Develop an Enterprise-wide Cloud Adoption Strategy – Chris Merrigan
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
PureApp Presentation
PureApp PresentationPureApp Presentation
PureApp Presentation
 
5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Getting Demo & POV Ready
Getting Demo & POV ReadyGetting Demo & POV Ready
Getting Demo & POV Ready
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet Brokers
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change
 
IntegrationWorks: Grow Your Business with the API Economy
IntegrationWorks: Grow Your Business with the API EconomyIntegrationWorks: Grow Your Business with the API Economy
IntegrationWorks: Grow Your Business with the API Economy
 
Enterprise Monitoring 2018: Converged Application & Infrastructure Monitoring...
Enterprise Monitoring 2018: Converged Application & Infrastructure Monitoring...Enterprise Monitoring 2018: Converged Application & Infrastructure Monitoring...
Enterprise Monitoring 2018: Converged Application & Infrastructure Monitoring...
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCDevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
 

More from Enterprise Management Associates

More from Enterprise Management Associates (20)

Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Best Practices for Building Scalable Visibility Architectures

  • 1. Best Practices for Building Scalable Visibility Architectures Jim Frey VP of Research Network Management Enterprise Management Associates Scott Register Senior Director Product Management Ixia February 11, 2014
  • 2. Today’s Presenters Jim Frey Vice President of Research, Network Management Jim has over 25 years of experience in the computing industry developing, deploying, managing, and marketing software and hardware products, with the last 20 of those years spent in network and infrastructure operations and security management, straddling both enterprise and service provider sectors. Scott Register Senior Director, Product Management Scott has more than 15 years of experience leading product management operations for global technology companies. Scott lead product management at BreakingPoint Systems prior to its acquisition by Ixia. Other past experience includes leading product lines for Blue Coat, Permeo, and Check Point Software. Slide 2 © 2014 Enterprise Management Associates, Inc.
  • 3. Logistics for Today’s Webinar Questions • Log questions in the Q&A panel located on the lower right corner of your screen • Questions will be addressed during the Q&A session of the event Event recording • An archived version of the event recording will be available at www.enterprisemanagement.com Event presentation • A PDF of the PowerPoint presentation will be available Slide 3
  • 4. Agenda • What is a Visibility Architecture? • Definitions and Drivers • Best Practices and Decision Points • Topology • Tap or SPAN? • In-line vs Out-of-Band • Dealing with Virtualization • Key Features for NPBs • Ixia Visibility Solutions • Wrap-up and Key Takeaways • Q&A Slide 4 © 2014 Enterprise Management Associates, Inc.
  • 5. Visibility Architecture Defined Systemic approach to establishing access to network traffic streams for packet-based monitoring and management purposes Slide 5 © 2014 Enterprise Management Associates, Inc.
  • 6. Visibility Architecture Defined Systemic approach to establishing access to network traffic streams for packet-based monitoring and management purposes Key Value • Permanent, adaptive packet stream management infrastructure for reliable, resilient, effective network and security operations Essential Attributes • Scalability • Sustainability • Flexibility Slide 6 © 2014 Enterprise Management Associates, Inc.
  • 7. Basic Components of a Visibility Architecture … Network Infrastructure Slide 7 © 2014 Enterprise Management Associates, Inc.
  • 8. Basic Components of a Visibility Architecture Packet Analysis & Monitoring Systems Performance Monitor Performance Monitor Security Monitor Packet Recorder … … Network Infrastructure Slide 8 © 2014 Enterprise Management Associates, Inc.
  • 9. Basic Components of a Visibility Architecture Packet Analysis & Monitoring Systems Performance Monitor Performance Monitor Packet Recorder Security Monitor … Tap Tap SPAN SPAN … Network Infrastructure Slide 9 © 2014 Enterprise Management Associates, Inc.
  • 10. Basic Components of a Visibility Architecture Packet Analysis & Monitoring Systems Performance Monitor Performance Monitor Security Monitor Packet Recorder … Visibility Architecture … Tap Network Visibility Controller (a.k.a. Network Packet Broker) Tap … SPAN SPAN … … Network Infrastructure Slide 10 © 2014 Enterprise Management Associates, Inc.
  • 11. NVC/NPB Defined Heart of the Visibility Architecture • Network devices that provide managed access to packet streams from SPAN and TAPs to network and security analysis tools NVCs provide advanced features beyond simple “Agg Tap” • 1:1, 1:M, M:1, and M:M connections between packet sources and packet consumers (tools) • Filtering and manipulating packet streams to improve effectiveness and efficiency of tools • Load balancing tools for greater resilience Slide 11 © 2014 Enterprise Management Associates, Inc.
  • 12. NVC/NPB Defined Heart of the Visibility Architecture • Network devices that provide managed access to packet streams from SPAN and TAPs to network and security analysis tools NVCs provide advanced features beyond simple “Agg Tap” • 1:1, 1:M, M:1, and M:M connections between packet sources and packet consumers (tools) • Filtering and manipulating packet streams to improve effectiveness and efficiency of tools • Load balancing tools for greater resilience Aliases…. • Network Monitoring Switch • Matrix/Aggregation Switch • Data Access Switch • Distributed Filter Tap Slide 12 © 2014 Enterprise Management Associates, Inc.
  • 13. Why a Visibility Architecture? Network Growing Faster than the Tools! Maximum networking link speeds within data center / core networks 100M 1G 10G 40G 100G 0% 10% Current 20% 30% 40% 50% Planned in 12 months Sept. 2013; Sample Size = 177 Slide 13 © 2014 Enterprise Management Associates, Inc.
  • 14. Why a Visibility Architecture? Network Growing Faster than the Tools! Maximum networking link speeds within data center / core networks 100M 1G 10G 40G 100G 0% 10% Current 20% 30% 40% 50% Planned in 12 months Tools Challenged to Keep Pace! Sept. 2013; Sample Size = 177 Slide 14 © 2014 Enterprise Management Associates, Inc.
  • 15. Why a Visibility Architecture? Growing Number of Tools! Types of tools attached to NVCs/NPBs Network Performance Monitor Data Loss Prevention Intrusion Detection / Prevention Troubleshooting / Packet Analyzers (e.g. packet “sniffers”) Compliance Monitor Data / Packet Recorder Application Performance Monitor VoIP / UC / Video Analyzer Current 0% 10% 20% Planned in 12 months 30% 40% 50% 60% Sept. 2013; Sample Size = 177 Slide 15 © 2014 Enterprise Management Associates, Inc.
  • 16. Why a Visibility Architecture? Growing Number of Tools! Types of tools attached to NVCs/NPBs Network Performance Monitor Data Loss Prevention Intrusion Detection / Prevention Troubleshooting / Packet Analyzers (e.g. packet “sniffers”) Compliance Monitor Data / Packet Recorder Application Performance Monitor VoIP / UC / Video Analyzer Current 0% 10% 20% Planned in 12 months 30% 40% 50% 60% Can’t accommodate using old/dedicated approach! Sept. 2013; Sample Size = 177 Slide 16 © 2014 Enterprise Management Associates, Inc.
  • 17. Why a Visibility Architecture? In-Lines Use Cases for Security Deployments Security priorities: Never Higher Threat landscape: Never More Daunting One important answer: Active Enforcement • Intrusion Prevention Systems (IPS) • Data Loss Prevention (DLP) Sept. 2013: Sample Size = 177 Slide 17 © 2014 Enterprise Management Associates, Inc.
  • 18. Why a Visibility Architecture? In-Lines Use Cases for Security Deployments Security priorities: Never Higher Threat landscape: Never More Daunting One important answer: Active Enforcement • Intrusion Prevention Systems (IPS) • Data Loss Prevention (DLP) Major concerns • Performance of IPS, DLP • Resilience of IPS, DLP Potential answer • Highly efficient, packet switching • Advanced resilience features Sept. 2013: Sample Size = 177 Slide 18 © 2014 Enterprise Management Associates, Inc.
  • 19. Who Is Ixia? The MOST TRUSTED names in networking trust Test Visibility Security Enterprises trust IXIA to:  Assess vendor equipment and applications  Improve network security posture  Improve network and application visibility and performance Service Providers trust IXIA to:  Improve and speed service delivery  Speed roll out of next gen services  Improve network and application visibility and performance Equipment Manufacturers trust IXIA to:  Develop next generation devices  Speed time to market  Improve performance and reliability Chip Fabricators trust IXIA to:  Validate protocol conformance  Speed time to market Slide 19
  • 20. Best Practices for Visibility Architectures Slide 20 © 2014 Enterprise Management Associates, Inc.
  • 21. Best Practices: Where NVCs/NPBs Are Deployed Where has your organization deployed Network Visibility Controllers (NVCs)? Data center core network Top of Rack Data center Edge (ingress/egress) Campus backbone Remote sites DMZ End of Row Backhaul links Other (Please specify) 0% Current 10% 20% 30% 40% 50% 60% 70% Planned in 12 months Sept. 2013; Sample Size = 177 Slide 21 © 2014 Enterprise Management Associates, Inc.
  • 22. Best Practices: Where NVCs/NPBs Are Deployed Where has your organization deployed Network Visibility Controllers (NVCs)? Data center core network Top of Rack Data center Edge (ingress/egress) Campus backbone Remote sites DMZ End of Row Backhaul links Other (Please specify) 0% Current 10% 20% 30% 40% 50% 60% 70% Planned in 12 months Points of Concentration & Control Sept. 2013; Sample Size = 177 Slide 22 © 2014 Enterprise Management Associates, Inc.
  • 23. Poll Question If you have network or security monitoring tools that require SPAN ports or TAP connections, do you (select one): A. B. C. D. Slide 23 Plan to expand use of SPAN ports Plan to expand use of TAPs Plan to add both more SPAN ports and TAPs Have no plans to add more SPAN ports or TAPs © 2014 Enterprise Management Associates, Inc.
  • 24. Best Practices: Mixing SPAN and TAP for Access 50.0% 40.0% 30.0% 20.0% 10.0% 2009 2013 0.0% Sample Size = 165 (Sept 2009); 177 (Sept 2013) Slide 24 © 2014 Enterprise Management Associates, Inc.
  • 25. Best Practices: Mixing SPAN and TAP for Access 50.0% 40.0% 30.0% 20.0% 2009 2013 10.0% 0.0% Need Both, but Leaning Towards Taps Sample Size = 165 (Sept 2009); 177 (Sept 2013) Slide 25 © 2014 Enterprise Management Associates, Inc.
  • 26. Data Deduplication Necessity if using SPAN ports A A D D C A F C C E D B F E A  Increase throughput efficiency to monitoring tools  Reduce monitoring tool overload  Improve monitoring tool processing efficiency  Eliminate duplicate packet storage Slide 26 C B A
  • 27. Best Practices: In-Line vs. Out-of-Band deployments Are NVCs deployed in-line anywhere within your organization's network? No, and no plans to do so 10% 40% No, but planning to do so Yes – currently deployed in-line 50% Sept. 2013: Sample Size = 177 Slide 27 © 2014 Enterprise Management Associates, Inc.
  • 28. Best Practices: In-Line vs. Out-of-Band deployments Are NVCs deployed in-line anywhere within your organization's network? No, and no plans to do so 10% 40% No, but planning to do so Yes – currently deployed in-line 50% Essential: Load Balancing + Bypass Technology Sept. 2013: Sample Size = 177 Slide 28 © 2014 Enterprise Management Associates, Inc.
  • 29. Inline Security Typical Inline Security Deployments Campus Network Cloud Branch Core Data Center Why Inline Security? Critical Considerations  Threat prevention, not reaction  Cannot take the network down  Satisfy compliance requirements  Cannot slow or block application traffic  Prevent IPR and publicity “issues”  Must scale with network demands Slide 29
  • 30. Best Practices: Dealing with Virtualized Environments Approaches using or considering for adding packet monitoring to virtualized environments Packet analysis tools deployed on VMs for intra-host visibility SPAN/Port Mirroring from virtual switches Virtual taps Header stripping for overlay encapsulations 0% 20% 40% 60% 80% Sept. 2013; Sample Size = 156 Slide 30 © 2014 Enterprise Management Associates, Inc.
  • 31. Best Practices: Dealing with Virtualized Environments Approaches using or considering for adding packet monitoring to virtualized environments Packet analysis tools deployed on VMs for intra-host visibility SPAN/Port Mirroring from virtual switches Virtual taps Header stripping for overlay encapsulations 0% 20% 40% 60% 80% Select Techniques Based on Specific Needs Sept. 2013; Sample Size = 156 Slide 31 © 2014 Enterprise Management Associates, Inc.
  • 32. Virtual Visibility Core Switch Network Packet Brokers Enables inter-VM, east-west traffic monitoring to eliminate the blind spots in virtualized environments Top of Rack Switch Virtualized Host Hypervisor vSwitch Kernel Module Virtual Tap VM VM VM VM App App App App App OS Slide 32 VM OS OS OS OS
  • 33. Best Practices: Key NVC/NPB Features Most important packet manipulation features (Mean by role) Load Bal across multiple tools Inbound Filtering Outbound Filtering Decryption Time stamping Tunneling Port labeling Masking De-duplication IPv6 support Header stripping (de-encapsulation) Media conversion (i.e. 10G to 1G) Packet slicing 3 = Critical 2 = Helpful 1 = Not Important 2.00 Executive 2.25 2.50 2.75 Staff Sept. 2013; Sample Size = 177 Slide 33 © 2014 Enterprise Management Associates, Inc.
  • 34. Feature Priorities Vary by Industry Vertical Financials Manufacturing 1. Inbound Filtering 1. Load Balancing 2. Load Balancing 2. Outbound Filtering 3. Outbound Filtering 3. De-duplication/Tunneling 4. Time Stamping Healthcare/Pharma All Others 1. Load Balancing 2. Inbound Filtering 2. Inbound Filtering 3. Packet Slicing / IPv6 / 3. Decryption Port Labeling / Outbound Filtering Slide 34 1. Load Balancing 4. Tunneling © 2014 Enterprise Management Associates, Inc.
  • 35. Creating A Network Visibility Architecture Visibility Architecture Remote Office Branch Office Campus Network Operations Network Taps App Aware Virtual & Cloud Access Core Data Center Private Cloud Virtualization Carrier Networks Wired and Mobile Slide 35 Out of Band NPB Inline Bypass Network Access Element Mgmt Performance Management Security Admin Policy Mgmt Inline NPB Packet Brokers Session Aware Applications Server Admin Data Center Automation Management Audit & Privacy Forensics
  • 36. EMA: Key Takeaways on Visibility Architectures 1. Visibility Architectures provide both tactical and strategic advantages to security and operations 2. Deploy in the core first; expand to edge and remote sites over time 3. Top, most-valued NVC/NPB features are Load Balancing and Inbound/Outbound filtering, though other features may also be important based on vertical sector 4. Focus on scalability, flexibility, manageability, completeness when seeking solutions Slide 36 © 2014 Enterprise Management Associates, Inc.
  • 37. Question & Answer: Please log questions in the Q&A Panel Jim Frey JFrey@enterprisemanagement.com @jfrey80 Scott Register sregister@ixiacom.com @swregister Download this FREE White Paper from the follow-up email you receive from EMA! Or go to the Ixiacom.com home page and click on the EMA webinar banner. Slide 37