SlideShare a Scribd company logo
1 of 2
Download to read offline
Deep Traffic Visibility for Virtualized Infrastructure
L7Viewer is a traffic analysis tool that provides complete visibility of all network traffic that crosses a virtualized
infrastructure, up to Layer 7. It facilitates and accelerates common IT tasks such as VM migration, application
upgrades, and root-cause identification for network and application issues.
The Challenge
Today’s typical virtualized IT infrastructure with dynamic,
distributed resources and increasing inter-dependencies is highly
complex to manage. A lack of visibility is often cited as the main
problem by IT staff; it creates operational challenges which impact
routine tasks such application upgrades or root-cause identification
for trouble tickets.
The Solution
L7Viewer provides a complete L2-7 view of all inter-VM traffic in the
data center and between any VM and the external environment. It
maps network traffic and displays the information in a way that’s
easy to understand, with a set of comprehensive filters for instant
access to the data you need.
Technical Implementation
 A lightweight probe VM on each hypervisor analyzes all traffic
passing through the virtual switch
 The probe feeds an analytics node storing records in a database
 Deployment and orchestration through VMware vCenter
 An intuitive interface is used to browse detailed information on
VM traffic across the data center
Exhaustive View of All Traffic
 Sees all network traffic up to Layer 7
 2700+ protocols and applications recognized
with their categories (video, email, P2P, etc.)
 Sees traffic from both known (sanctioned) and
unknown (e.g. Shadow IT) applications
 Covers inter-VM traffic as well as traffic
between any VM and external environment
 Includes traffic to / from VMs that may not be
listed or described in inventory
 View per VM, hypervisor, physical link, IP
address, and connection (L2-L4)
Easy-to-Use
 Auto-discovery of VMs, applications and
hypervisors
 Dashboards presented according to use case
 Trend indicators & alarms
 Deployment and orchestration through
VMware vCenter
 Can be used by any IT admin
Non-Intrusive
 Passive network monitoring, with no impact
on application performance
 No significant bandwidth overhead or impact
on CPU utilization
 Supports users without admin privileges
Visualization per tenant
Ability to visualize traffic for a single tenant
Key Features & Benefits
Additional usage areas:
 Efficient backups and disaster recovery planning
through ability to map active and inactive servers
 Identify and group application VMs to optimize
performance and enhance security
 Reduce security risks through detection of shadow IT
 Easy configuration of new firewalling rules, by
observing traffic going through the firewall
L7Viewer is a brand of Qosmos, the leader in IP traffic classification and network intelligence technology used in physical, SDN and
NFV architectures. For more information: www.qosmos.com/products/l7viewer
Copyright © 2016 Qosmos Tech S.A.S. All rights reserved. Qosmos, the Qosmos logo, L7Viewer and Qosmos ixEngine are trademarks of Qosmos. Other names and brands may be claimed as the property of others.
What’s unique with the L7 Viewer?
 Most detailed visibility in the industry
(2700+ protocols, from Layer 2 to 7)
 See traffic from both known (sanctioned) and
unknown (e.g. Shadow IT) applications
 Covers inter-VM traffic as well as traffic between
any VM and external environment
 Ability to filter per hypervisor, VM, IP, host, port,
protocol, application
 Dashboards for specific use cases
Use Case Challenge Solution IT Benefits Business Benefits
Safe VM mi-
gration and
update
To safely remove or up-
date a VM or a virtual-
ized server, it is crucial to
have a complete view of all
connections with the other
VMs. This knowledge of
application dependencies
avoids operational issues
at the time of the upgrade.
L7Viewer lists all inter-VM
connections and depend-
encies for the application
to be switched off. The IT
admin can easily and safe-
ly control the migration
procedure.
- Safe VM migration / up-
dates
- Faster execution
- No knock-on effect re-
sulting from invisible de-
pendencies
- Minimizes service disrup-
tion
- Reduces internal re-
sources (staff/time) re-
quired to carry out migra-
tions and updates
- Avoids downtime and
operational bugs resulting
from knock-on effect
Identification
of idle VM s
Inactive VMs can consume
significant infrastructure
resources in large data
centers, increasing both
opex and capex.
Use L7Viewer to identify
VMs that are inactive at
the application level. The
L7 Viewer's displays in real
-time which VMs are idle
based on their traffic pro-
file. The IT admin can de-
commission idle VMs and
load servers with active
applications.
- Optimization of hardware
resources
- Optimization of virtual
infrastructure operations
- Reductions in capex and
opex
- Higher margins on cloud
services
- Reduces energy wastage
Pinpointing
root-cause
of perfor-
mance issues
Sudden spikes of traffic can
reduce overall application
performance and be diffi-
cult to diagnose.
Use L7Viewer to quickly
pinpoint e.g. the cause of
the traffic spike. The IT
admin can quickly take
appropriate action.
- Shorter Mean-Time to
Resolution (MTTR)
- SLA compliance
- Better QoS
- Increases customer satis-
faction
Detection of
security policy
violation
Shadow IT or outside
attackers may use non-
standard ports to hide
their traffic from the IT
organization. This violation
of the security policy is
difficult to detect and con-
stitutes a threat to the
organization.
L7Viewer alerts on any
application using ports
that fall outside estab-
lished security policies.
The IT admin can immedi-
ately block non-authorized
traffic and investigate po-
tential breaches.
- Reduces risk of security
breaches
- Better compliance with
security policies
- Reduces risk of service
disruption resulting from
security breach
- Lowers risk of brand
damage
Examples of Use Cases

More Related Content

What's hot

Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendorsapprize360
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015F5 Networks
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...apprize360
 
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...Adi Gazit Blecher
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5 Networks
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Networks
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
WHGFeatures_BuyersGuide
WHGFeatures_BuyersGuideWHGFeatures_BuyersGuide
WHGFeatures_BuyersGuideEugene Yu
 
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...SolarWinds
 
CENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCESCENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCES Array Networks
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Networks
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Networks
 
Application Virtualization in Citrix XenApp
Application Virtualization in Citrix XenAppApplication Virtualization in Citrix XenApp
Application Virtualization in Citrix XenAppdigitallibrary
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersF5 Networks
 

What's hot (20)

TFI2014 Session I - State of SDN - John Giacomoni
TFI2014 Session I - State of SDN - John GiacomoniTFI2014 Session I - State of SDN - John Giacomoni
TFI2014 Session I - State of SDN - John Giacomoni
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendors
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...
 
Command Your Data Center - Net Optics/Ixia
Command Your Data Center - Net Optics/IxiaCommand Your Data Center - Net Optics/Ixia
Command Your Data Center - Net Optics/Ixia
 
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
5 Ways NCM Can Save You From A Disaster
5 Ways NCM Can Save You From A Disaster5 Ways NCM Can Save You From A Disaster
5 Ways NCM Can Save You From A Disaster
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference Architecture
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
WHGFeatures_BuyersGuide
WHGFeatures_BuyersGuideWHGFeatures_BuyersGuide
WHGFeatures_BuyersGuide
 
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
 
CENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCESCENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCES
 
What's new in NetFlow Analyzer 12.2
What's new in NetFlow Analyzer 12.2What's new in NetFlow Analyzer 12.2
What's new in NetFlow Analyzer 12.2
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and Update
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
 
Application Virtualization in Citrix XenApp
Application Virtualization in Citrix XenAppApplication Virtualization in Citrix XenApp
Application Virtualization in Citrix XenApp
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
 
Hp open view
Hp open viewHp open view
Hp open view
 

Similar to Deep Visibility Virtual Infrastructure Traffic

Riverbed Performance Management
Riverbed Performance ManagementRiverbed Performance Management
Riverbed Performance ManagementCTI Group
 
SDN Enablement for Microsoft Hyper-V powered Data Centers
SDN Enablement for Microsoft Hyper-V powered Data CentersSDN Enablement for Microsoft Hyper-V powered Data Centers
SDN Enablement for Microsoft Hyper-V powered Data CentersBenjamin Eggerstedt
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET Journal
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vuvncson
 
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Tal Lavian Ph.D.
 
Delivering Application Analytics for an Application Fluent Network
Delivering Application Analytics for an Application Fluent NetworkDelivering Application Analytics for an Application Fluent Network
Delivering Application Analytics for an Application Fluent NetworkBenjamin Eggerstedt
 
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...Citrix
 
微软虚拟化技术概览
微软虚拟化技术概览微软虚拟化技术概览
微软虚拟化技术概览betterit
 
Introducing CA Nimsoft Monitor 6 - Webcast
Introducing CA Nimsoft Monitor 6 - WebcastIntroducing CA Nimsoft Monitor 6 - Webcast
Introducing CA Nimsoft Monitor 6 - WebcastCA Nimsoft
 
Convertigo Mobility Platform | Mobile Application Development for Enterprises...
Convertigo Mobility Platform | Mobile Application Development for Enterprises...Convertigo Mobility Platform | Mobile Application Development for Enterprises...
Convertigo Mobility Platform | Mobile Application Development for Enterprises...Convertigo | MADP & MBaaS
 

Similar to Deep Visibility Virtual Infrastructure Traffic (20)

Windows and linux
Windows and linuxWindows and linux
Windows and linux
 
Ixia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution BriefIxia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution Brief
 
Replify accelerator technical overview
Replify accelerator technical overviewReplify accelerator technical overview
Replify accelerator technical overview
 
Riverbed Performance Management
Riverbed Performance ManagementRiverbed Performance Management
Riverbed Performance Management
 
ADC_ver-1.3
ADC_ver-1.3ADC_ver-1.3
ADC_ver-1.3
 
Network Monitoring
Network MonitoringNetwork Monitoring
Network Monitoring
 
Network Monitoring
Network MonitoringNetwork Monitoring
Network Monitoring
 
SDN Enablement for Microsoft Hyper-V powered Data Centers
SDN Enablement for Microsoft Hyper-V powered Data CentersSDN Enablement for Microsoft Hyper-V powered Data Centers
SDN Enablement for Microsoft Hyper-V powered Data Centers
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vu
 
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
 
Delivering Application Analytics for an Application Fluent Network
Delivering Application Analytics for an Application Fluent NetworkDelivering Application Analytics for an Application Fluent Network
Delivering Application Analytics for an Application Fluent Network
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
The New Network
The New NetworkThe New Network
The New Network
 
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
 
微软虚拟化技术概览
微软虚拟化技术概览微软虚拟化技术概览
微软虚拟化技术概览
 
Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
 
Introducing CA Nimsoft Monitor 6 - Webcast
Introducing CA Nimsoft Monitor 6 - WebcastIntroducing CA Nimsoft Monitor 6 - Webcast
Introducing CA Nimsoft Monitor 6 - Webcast
 
Convertigo Mobility Platform | Mobile Application Development for Enterprises...
Convertigo Mobility Platform | Mobile Application Development for Enterprises...Convertigo Mobility Platform | Mobile Application Development for Enterprises...
Convertigo Mobility Platform | Mobile Application Development for Enterprises...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 

Recently uploaded (20)

VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 

Deep Visibility Virtual Infrastructure Traffic

  • 1. Deep Traffic Visibility for Virtualized Infrastructure L7Viewer is a traffic analysis tool that provides complete visibility of all network traffic that crosses a virtualized infrastructure, up to Layer 7. It facilitates and accelerates common IT tasks such as VM migration, application upgrades, and root-cause identification for network and application issues. The Challenge Today’s typical virtualized IT infrastructure with dynamic, distributed resources and increasing inter-dependencies is highly complex to manage. A lack of visibility is often cited as the main problem by IT staff; it creates operational challenges which impact routine tasks such application upgrades or root-cause identification for trouble tickets. The Solution L7Viewer provides a complete L2-7 view of all inter-VM traffic in the data center and between any VM and the external environment. It maps network traffic and displays the information in a way that’s easy to understand, with a set of comprehensive filters for instant access to the data you need. Technical Implementation  A lightweight probe VM on each hypervisor analyzes all traffic passing through the virtual switch  The probe feeds an analytics node storing records in a database  Deployment and orchestration through VMware vCenter  An intuitive interface is used to browse detailed information on VM traffic across the data center Exhaustive View of All Traffic  Sees all network traffic up to Layer 7  2700+ protocols and applications recognized with their categories (video, email, P2P, etc.)  Sees traffic from both known (sanctioned) and unknown (e.g. Shadow IT) applications  Covers inter-VM traffic as well as traffic between any VM and external environment  Includes traffic to / from VMs that may not be listed or described in inventory  View per VM, hypervisor, physical link, IP address, and connection (L2-L4) Easy-to-Use  Auto-discovery of VMs, applications and hypervisors  Dashboards presented according to use case  Trend indicators & alarms  Deployment and orchestration through VMware vCenter  Can be used by any IT admin Non-Intrusive  Passive network monitoring, with no impact on application performance  No significant bandwidth overhead or impact on CPU utilization  Supports users without admin privileges Visualization per tenant Ability to visualize traffic for a single tenant Key Features & Benefits
  • 2. Additional usage areas:  Efficient backups and disaster recovery planning through ability to map active and inactive servers  Identify and group application VMs to optimize performance and enhance security  Reduce security risks through detection of shadow IT  Easy configuration of new firewalling rules, by observing traffic going through the firewall L7Viewer is a brand of Qosmos, the leader in IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures. For more information: www.qosmos.com/products/l7viewer Copyright © 2016 Qosmos Tech S.A.S. All rights reserved. Qosmos, the Qosmos logo, L7Viewer and Qosmos ixEngine are trademarks of Qosmos. Other names and brands may be claimed as the property of others. What’s unique with the L7 Viewer?  Most detailed visibility in the industry (2700+ protocols, from Layer 2 to 7)  See traffic from both known (sanctioned) and unknown (e.g. Shadow IT) applications  Covers inter-VM traffic as well as traffic between any VM and external environment  Ability to filter per hypervisor, VM, IP, host, port, protocol, application  Dashboards for specific use cases Use Case Challenge Solution IT Benefits Business Benefits Safe VM mi- gration and update To safely remove or up- date a VM or a virtual- ized server, it is crucial to have a complete view of all connections with the other VMs. This knowledge of application dependencies avoids operational issues at the time of the upgrade. L7Viewer lists all inter-VM connections and depend- encies for the application to be switched off. The IT admin can easily and safe- ly control the migration procedure. - Safe VM migration / up- dates - Faster execution - No knock-on effect re- sulting from invisible de- pendencies - Minimizes service disrup- tion - Reduces internal re- sources (staff/time) re- quired to carry out migra- tions and updates - Avoids downtime and operational bugs resulting from knock-on effect Identification of idle VM s Inactive VMs can consume significant infrastructure resources in large data centers, increasing both opex and capex. Use L7Viewer to identify VMs that are inactive at the application level. The L7 Viewer's displays in real -time which VMs are idle based on their traffic pro- file. The IT admin can de- commission idle VMs and load servers with active applications. - Optimization of hardware resources - Optimization of virtual infrastructure operations - Reductions in capex and opex - Higher margins on cloud services - Reduces energy wastage Pinpointing root-cause of perfor- mance issues Sudden spikes of traffic can reduce overall application performance and be diffi- cult to diagnose. Use L7Viewer to quickly pinpoint e.g. the cause of the traffic spike. The IT admin can quickly take appropriate action. - Shorter Mean-Time to Resolution (MTTR) - SLA compliance - Better QoS - Increases customer satis- faction Detection of security policy violation Shadow IT or outside attackers may use non- standard ports to hide their traffic from the IT organization. This violation of the security policy is difficult to detect and con- stitutes a threat to the organization. L7Viewer alerts on any application using ports that fall outside estab- lished security policies. The IT admin can immedi- ately block non-authorized traffic and investigate po- tential breaches. - Reduces risk of security breaches - Better compliance with security policies - Reduces risk of service disruption resulting from security breach - Lowers risk of brand damage Examples of Use Cases