SlideShare a Scribd company logo
1 of 2
Download to read offline
Technology Alliance Partner I Solution Brief

Phantom Virtualization Tap Plus RSA NetWitness Add Up to
Exceptional Gains in Monitoring, Visibility, Cost-Savings and ROI
Net Optics and EMC-RSA
The Challenge

Solution Highlights

Virtualization deployments can offer many great, cost-saving benefits, however it also
creates new challenges when it comes to network security, compliance, and meeting
regulations and SLAs. The introduction of vSwitches means that current physical
monitoring tools, such as the EMC – RSA NetWitness™Investigator, cannot easily extend
into the Intra-VM level within virtual hypervisors. The time may not yet be ideal for
investment in new virtualization-specific tools and training, and the company may wish
to continue leveraging such system resources as vCPU, vRAM, vNIC, storage and others.

·	 Leverages current policies and tool previous existing
NetWitness investment in converged environments
to deliver full value

The Solution
The EMC-RSA and Net Optics joint solution leverages the scalability and powerful
analytics of the NetWitness platform with the Phantom Virtualization Tap’s ability to
deliver 100 percent visibility. In combination, they can protect sensitive data, maximize
user experience, reduce mean time to resolution, and quickly—or even proactively—
identify potential threats,

•	 Captures data passing between virtual machines
(VMs) and sends traffic of interest to virtual and
physical monitoring tools of choice into your EMC
RSA NetWitness
•	 Supports all major hypervisors, including Xen, Oracle
VM, vSphere 5, KVM, and Hyper-V. vSphere 4.X and
5.X, Microsoft Hyper-V 2012, Xen, Oracle VM, KVM,
and Parallels 6.0
•	 Achieves pervasive visibility and obtain situational
awareness into the content of all network traffic and
discrete behavior of entities operating across the
network.

This solution offers users knowledge and confidence that their virtual data centers attain •	 Detects advanced threats including insider threats,
zero-day exploits and targeted malware, advanced
full visibility of their intra-VM (“east-west”) traffic. The Phantom Virtualization Tap is a
persistent threats, fraud, espionage, data exfiltration,
VMsafe, kernel module that lets customers export traffic of interest from their virtual
and continuous monitoring of security controls.
machines to their existing RSA NetWitness Investigator appliance. This enables the RSA
•	 Obtains actionable intelligence by performing
NetWitness to receive encapsulated traffic of interest. It can then terminate the GRE
real-time, free-form contextual analysis of network
headers and fully inspect/audit the network packets in unaltered state to meet SLAs and
and log data captured and reconstructed by the
achieve regulatory compliance.
NetWitness network security monitoring platform.
The Net Optics Phantom Virtualization Tap contributes superior network traffic
monitoring and access capabilities for virtualized computing environments. This Tap
captures data passing between virtual machines (VMs) and sends traffic of interest to
NetWitness. The Phantom Virtualization Tap supports all major hypervisors, including
vSphere 4.x and 5.x, Microsoft Hyper-V 2012, Citrix XenServer, Oracle VM, KVM, and
Parallels 6.0.
Deep visibility of packet-level data makes for smooth management of virtual network
security, compliance, and performance. Because the Phantom Virtualization Tap bridges
virtual-to-physical in converged environments, a customer can leverage current policies
and physical monitoring tools to derive their full invested values.
In addition, the Phantom Virtualization Tap can replicate all traffic within the virtual
switch, apply smart TapFlow™ filtering, and send only traffic of interest to the RSA
NetWitness appliance. Sending only relevant traffic for monitoring optimizes NetWitness
performance with no risk of oversubscription. Instead, NetWitness can reserve CPU
and memory resources to perform patented methods for decapsulating protocols and
applications.

•	 Enhances the ability to keep pace with changing
environments
•	 Drives unparalleled performance, scalability and low
latency
•	 Increases security operations center agility
Technology Alliance Partner I Solution Brief
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in Monitoring,
Visibility, Cost-Savings and ROI

Hypervisor

V Switch

Phantom™
vm 1 vm 2 vm 3
Virtualization Tap
Hypervisor

Phantom™
Virtualization Tap
Hypervisor

V Switch

Phantom™
Virtualization Tap

V Switch

Hypervisor

V Switch

Switch

EMC RSA Netwitness
The Phantom tap is deployed in any number of virtual environments to
capture inter-vm (east west) traffic. That encapsulated traffic is then sent
to the RSA NEtwitness which decapsulates the GRE header. This traffic can
now be inspected by the for complete security in virtual environment.

Net Optics

RSA

Net Optics is the leading provider of Total Application and
Network Visibility solutions that deliver real-time network
intelligence for peak performance in network monitoring and
security. As a result, businesses achieve the scalable end-to-end
visibility they need to optimize network performance of physical,
virtual and private cloud environments, and remote branch
offices. More than 7,500 enterprises, service providers and
government organizations—including 85 percent of the Fortune
100—trust Net Optics’ comprehensive plug and play family of
application-aware NPM, Network Packet Broker, Virtual/Cloud
and Visibility Management System (VMS) solutions to deliver
immediate results and quick time to value through an easy-to-use
interface. Net Optics maintains a global presence through leading
OEM partner and reseller networks.

RSA, the security division of EMC, is the premier provider
of security, risk and compliance management solutions
for business acceleration. RSA helps the world’s leading
organizations solve their most complex and sensitive security
challenges. These challenges include managing organizational
risk, safeguarding mobile access and collaboration, proving
compliance and securing virtual and cloud environments.
Combining business-critical controls in identity assurance,
encryption & key management. SIEM, Data Loss Prevention,
Continuous Network Monitoring, and Fraud Protection with
industry-leading eGRC capabilities and robust consulting
services, RSA brings visibility and trust to millions of user
identities, the transactions that they perform and the data that
is generated. For more information please visit www.RSA.com
and www.EMC.com.

5303 Betsy Ross Drive
Santa Clara, CA 95054, United States
Main: +1 (408) 737-7777
www.netoptics.com

KVM

vm 1 vm 2 vm 3 Phantom™
Virtualization Tap

V Switch

ORACLE

XEN

With its customizable user interface and advanced analytics,
RSA NetWitness allows users to perform free-form contextual
analysis of their raw network data for complete situational
awareness. The RSA NetWitness platform offers a scalable,
distributed infrastructure with real-time fusion of global threat
intelligence that adapts to changing operational requirements.
The RSA NetWitness deploys a modular-capacity architecture,
via direct-attached capacity or SAN, that adapts to customer
security and data-retention demands.

vm 1 vm 2 vm 3
Phantom™
Virtualization Tap

Hypervisor

HYPER-V

RSA NetWitness is a revolutionary network security monitoring
platform that provides enterprises with situational awareness
of everything happening on the network to solve a wide range
of information-security challenges. When you need clarity
and definitive answers to the most challenging questions, this
product delivers a level of fine-grained detail—plus the agility
to quickly, efficiently examine network and application layer
sessions in am easily comprehensible way.

vm 1 vm 2 vm 3

ESX

vm 1 vm 2 vm 3

Now, analysis that previously took days, now takes only minutes
to perform. Users can easily conduct automated and interactive
analysis of complex security problems now that they able to
fully gain 100% visibility of environment—physical and virtual—
with extensive network and application layer filtering (e.g., MAC,
IP, User, Keywords)

174 Middlesex Turnpike
Bedford, MA 01730, United States
Main: +1 (571) 392-6000
www.rsa.com

Net Optics® is a registered trademark of Net Optics, an Ixia company. Copyright 1996-2013 Net Optics, an Ixia company. All rights reserved. Additional company and product names may be trademarks or
registered trademarks of the individual companies and are respectfully acknowledged. RSA and the RSA logo are trademarks or registered trademarks of RSA, Inc. in the United States and other countries.

More Related Content

What's hot

BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_finalLan & Wan Solutions
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the CloudSumo Logic
 
Isf 2015 continuous diagnostics monitoring may 2015
Isf 2015 continuous diagnostics monitoring  may 2015Isf 2015 continuous diagnostics monitoring  may 2015
Isf 2015 continuous diagnostics monitoring may 2015abhi75
 
The changing landscape of SDN. What your customers need to know.
The changing landscape of SDN. What your customers need to know.The changing landscape of SDN. What your customers need to know.
The changing landscape of SDN. What your customers need to know.Tech Data
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)VMware
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingPriyanka Aash
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowresHai Nguyen
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryUKTI2014
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1Lancope, Inc.
 
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSafeNet
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...IJIR JOURNALS IJIRUSA
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud securityDavid De Vos
 
Gartner Buyers Guide Summary
Gartner Buyers Guide SummaryGartner Buyers Guide Summary
Gartner Buyers Guide SummaryKim Jensen
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyHappiest Minds Technologies
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Happiest Minds Technologies
 

What's hot (20)

BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_final
 
Darren Johnson CV
Darren Johnson CVDarren Johnson CV
Darren Johnson CV
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the Cloud
 
Isf 2015 continuous diagnostics monitoring may 2015
Isf 2015 continuous diagnostics monitoring  may 2015Isf 2015 continuous diagnostics monitoring  may 2015
Isf 2015 continuous diagnostics monitoring may 2015
 
Sangfor SSL VPN Brochure
Sangfor SSL VPN BrochureSangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
 
The changing landscape of SDN. What your customers need to know.
The changing landscape of SDN. What your customers need to know.The changing landscape of SDN. What your customers need to know.
The changing landscape of SDN. What your customers need to know.
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined Networking
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th January
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
 
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security Guide
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
 
Gartner Buyers Guide Summary
Gartner Buyers Guide SummaryGartner Buyers Guide Summary
Gartner Buyers Guide Summary
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network Secuirty
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
 

Viewers also liked

Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksImperva
 
Detection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEyeDetection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEyeSplunk
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceValery Yelanin
 
How To Write A Business Proposal - The Ultimate Guide
How To Write A Business Proposal - The Ultimate GuideHow To Write A Business Proposal - The Ultimate Guide
How To Write A Business Proposal - The Ultimate GuideFit Small Business
 

Viewers also liked (7)

RSA Anatomy of an Attack
RSA Anatomy of an AttackRSA Anatomy of an Attack
RSA Anatomy of an Attack
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
 
160415 lan and-wan-ctap
160415 lan and-wan-ctap160415 lan and-wan-ctap
160415 lan and-wan-ctap
 
Detection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEyeDetection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEye
 
FireEye
FireEyeFireEye
FireEye
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
How To Write A Business Proposal - The Ultimate Guide
How To Write A Business Proposal - The Ultimate GuideHow To Write A Business Proposal - The Ultimate Guide
How To Write A Business Proposal - The Ultimate Guide
 

Similar to Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in Monitoring, Visibility, Cost-Savings and ROI

Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsAngel Villar Garea
 
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareDraft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareSelena829218
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?QOS Networks
 
VirtualWisdom Brochure
VirtualWisdom BrochureVirtualWisdom Brochure
VirtualWisdom BrochureDarren Molloy
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network Michelle Holley
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudSwapna Shetye
 
Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences Markit
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5Sen Nathan
 
Datto RMM Datasheet
Datto RMM DatasheetDatto RMM Datasheet
Datto RMM DatasheetThomas Dodds
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochuretmcleland
 
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonIoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonEurotech
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any BusinessePlus
 
378rev2 presentazione-zar technology-eng-20180917
378rev2 presentazione-zar technology-eng-20180917378rev2 presentazione-zar technology-eng-20180917
378rev2 presentazione-zar technology-eng-20180917Benedetta Ruggeri
 

Similar to Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in Monitoring, Visibility, Cost-Savings and ROI (20)

VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX Deployments
 
Managing The Virtualized Enterprise New Technology, New Challenges
Managing The Virtualized Enterprise New Technology, New ChallengesManaging The Virtualized Enterprise New Technology, New Challenges
Managing The Virtualized Enterprise New Technology, New Challenges
 
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareDraft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | Slideshare
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
 
Compro PT DAYA CIPTA MANDIRI SOLUSI - JAN 2021
Compro PT DAYA CIPTA MANDIRI SOLUSI - JAN 2021Compro PT DAYA CIPTA MANDIRI SOLUSI - JAN 2021
Compro PT DAYA CIPTA MANDIRI SOLUSI - JAN 2021
 
VirtualWisdom Brochure
VirtualWisdom BrochureVirtualWisdom Brochure
VirtualWisdom Brochure
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
 
Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
Datto RMM Datasheet
Datto RMM DatasheetDatto RMM Datasheet
Datto RMM Datasheet
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonIoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any Business
 
378rev2 presentazione-zar technology-eng-20180917
378rev2 presentazione-zar technology-eng-20180917378rev2 presentazione-zar technology-eng-20180917
378rev2 presentazione-zar technology-eng-20180917
 

More from LiveAction Next Generation Network Management Software

More from LiveAction Next Generation Network Management Software (20)

Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
 
Infographic: Aim Straight at Your Application Performance Issues
Infographic: Aim Straight at Your Application Performance IssuesInfographic: Aim Straight at Your Application Performance Issues
Infographic: Aim Straight at Your Application Performance Issues
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
Leveraging vSphere 5.0 For Optimal Visibility and EfficiencyLeveraging vSphere 5.0 For Optimal Visibility and Efficiency
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
 
Security-Centric Networking
Security-Centric NetworkingSecurity-Centric Networking
Security-Centric Networking
 
Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?
 
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring SwitchOverview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
 
Net Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case StudyNet Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case Study
 
Lawful Interception in Virtual Environments
Lawful Interception in Virtual EnvironmentsLawful Interception in Virtual Environments
Lawful Interception in Virtual Environments
 
High-Availability Security Monitoring Using Bypass Switches
High-Availability Security Monitoring Using Bypass SwitchesHigh-Availability Security Monitoring Using Bypass Switches
High-Availability Security Monitoring Using Bypass Switches
 
What is a virtual tap?
What is a virtual tap?What is a virtual tap?
What is a virtual tap?
 
Tap Into the Health of Your Network
Tap Into the Health of Your NetworkTap Into the Health of Your Network
Tap Into the Health of Your Network
 
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
 
Compliance Challenges in a Virtualized Environment
Compliance Challenges in a Virtualized EnvironmentCompliance Challenges in a Virtualized Environment
Compliance Challenges in a Virtualized Environment
 
Network Security in a Virtualized Environment
Network Security in a Virtualized EnvironmentNetwork Security in a Virtualized Environment
Network Security in a Virtualized Environment
 

Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in Monitoring, Visibility, Cost-Savings and ROI

  • 1. Technology Alliance Partner I Solution Brief Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in Monitoring, Visibility, Cost-Savings and ROI Net Optics and EMC-RSA The Challenge Solution Highlights Virtualization deployments can offer many great, cost-saving benefits, however it also creates new challenges when it comes to network security, compliance, and meeting regulations and SLAs. The introduction of vSwitches means that current physical monitoring tools, such as the EMC – RSA NetWitness™Investigator, cannot easily extend into the Intra-VM level within virtual hypervisors. The time may not yet be ideal for investment in new virtualization-specific tools and training, and the company may wish to continue leveraging such system resources as vCPU, vRAM, vNIC, storage and others. · Leverages current policies and tool previous existing NetWitness investment in converged environments to deliver full value The Solution The EMC-RSA and Net Optics joint solution leverages the scalability and powerful analytics of the NetWitness platform with the Phantom Virtualization Tap’s ability to deliver 100 percent visibility. In combination, they can protect sensitive data, maximize user experience, reduce mean time to resolution, and quickly—or even proactively— identify potential threats, • Captures data passing between virtual machines (VMs) and sends traffic of interest to virtual and physical monitoring tools of choice into your EMC RSA NetWitness • Supports all major hypervisors, including Xen, Oracle VM, vSphere 5, KVM, and Hyper-V. vSphere 4.X and 5.X, Microsoft Hyper-V 2012, Xen, Oracle VM, KVM, and Parallels 6.0 • Achieves pervasive visibility and obtain situational awareness into the content of all network traffic and discrete behavior of entities operating across the network. This solution offers users knowledge and confidence that their virtual data centers attain • Detects advanced threats including insider threats, zero-day exploits and targeted malware, advanced full visibility of their intra-VM (“east-west”) traffic. The Phantom Virtualization Tap is a persistent threats, fraud, espionage, data exfiltration, VMsafe, kernel module that lets customers export traffic of interest from their virtual and continuous monitoring of security controls. machines to their existing RSA NetWitness Investigator appliance. This enables the RSA • Obtains actionable intelligence by performing NetWitness to receive encapsulated traffic of interest. It can then terminate the GRE real-time, free-form contextual analysis of network headers and fully inspect/audit the network packets in unaltered state to meet SLAs and and log data captured and reconstructed by the achieve regulatory compliance. NetWitness network security monitoring platform. The Net Optics Phantom Virtualization Tap contributes superior network traffic monitoring and access capabilities for virtualized computing environments. This Tap captures data passing between virtual machines (VMs) and sends traffic of interest to NetWitness. The Phantom Virtualization Tap supports all major hypervisors, including vSphere 4.x and 5.x, Microsoft Hyper-V 2012, Citrix XenServer, Oracle VM, KVM, and Parallels 6.0. Deep visibility of packet-level data makes for smooth management of virtual network security, compliance, and performance. Because the Phantom Virtualization Tap bridges virtual-to-physical in converged environments, a customer can leverage current policies and physical monitoring tools to derive their full invested values. In addition, the Phantom Virtualization Tap can replicate all traffic within the virtual switch, apply smart TapFlow™ filtering, and send only traffic of interest to the RSA NetWitness appliance. Sending only relevant traffic for monitoring optimizes NetWitness performance with no risk of oversubscription. Instead, NetWitness can reserve CPU and memory resources to perform patented methods for decapsulating protocols and applications. • Enhances the ability to keep pace with changing environments • Drives unparalleled performance, scalability and low latency • Increases security operations center agility
  • 2. Technology Alliance Partner I Solution Brief Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in Monitoring, Visibility, Cost-Savings and ROI Hypervisor V Switch Phantom™ vm 1 vm 2 vm 3 Virtualization Tap Hypervisor Phantom™ Virtualization Tap Hypervisor V Switch Phantom™ Virtualization Tap V Switch Hypervisor V Switch Switch EMC RSA Netwitness The Phantom tap is deployed in any number of virtual environments to capture inter-vm (east west) traffic. That encapsulated traffic is then sent to the RSA NEtwitness which decapsulates the GRE header. This traffic can now be inspected by the for complete security in virtual environment. Net Optics RSA Net Optics is the leading provider of Total Application and Network Visibility solutions that deliver real-time network intelligence for peak performance in network monitoring and security. As a result, businesses achieve the scalable end-to-end visibility they need to optimize network performance of physical, virtual and private cloud environments, and remote branch offices. More than 7,500 enterprises, service providers and government organizations—including 85 percent of the Fortune 100—trust Net Optics’ comprehensive plug and play family of application-aware NPM, Network Packet Broker, Virtual/Cloud and Visibility Management System (VMS) solutions to deliver immediate results and quick time to value through an easy-to-use interface. Net Optics maintains a global presence through leading OEM partner and reseller networks. RSA, the security division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world’s leading organizations solve their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption & key management. SIEM, Data Loss Prevention, Continuous Network Monitoring, and Fraud Protection with industry-leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information please visit www.RSA.com and www.EMC.com. 5303 Betsy Ross Drive Santa Clara, CA 95054, United States Main: +1 (408) 737-7777 www.netoptics.com KVM vm 1 vm 2 vm 3 Phantom™ Virtualization Tap V Switch ORACLE XEN With its customizable user interface and advanced analytics, RSA NetWitness allows users to perform free-form contextual analysis of their raw network data for complete situational awareness. The RSA NetWitness platform offers a scalable, distributed infrastructure with real-time fusion of global threat intelligence that adapts to changing operational requirements. The RSA NetWitness deploys a modular-capacity architecture, via direct-attached capacity or SAN, that adapts to customer security and data-retention demands. vm 1 vm 2 vm 3 Phantom™ Virtualization Tap Hypervisor HYPER-V RSA NetWitness is a revolutionary network security monitoring platform that provides enterprises with situational awareness of everything happening on the network to solve a wide range of information-security challenges. When you need clarity and definitive answers to the most challenging questions, this product delivers a level of fine-grained detail—plus the agility to quickly, efficiently examine network and application layer sessions in am easily comprehensible way. vm 1 vm 2 vm 3 ESX vm 1 vm 2 vm 3 Now, analysis that previously took days, now takes only minutes to perform. Users can easily conduct automated and interactive analysis of complex security problems now that they able to fully gain 100% visibility of environment—physical and virtual— with extensive network and application layer filtering (e.g., MAC, IP, User, Keywords) 174 Middlesex Turnpike Bedford, MA 01730, United States Main: +1 (571) 392-6000 www.rsa.com Net Optics® is a registered trademark of Net Optics, an Ixia company. Copyright 1996-2013 Net Optics, an Ixia company. All rights reserved. Additional company and product names may be trademarks or registered trademarks of the individual companies and are respectfully acknowledged. RSA and the RSA logo are trademarks or registered trademarks of RSA, Inc. in the United States and other countries.