SlideShare a Scribd company logo
1 of 22
Download to read offline
Control Your Network with the
Power of Automation
Matt Gowarty, Senior Product Marketing Manager




                                                 © 2013 Infoblox Inc. All Rights Reserved.   1
Infoblox Overview & Business Update

Founded in 1999                                          Total Revenue
                                                     (Fiscal Year Ending July 31)

Headquartered in Santa Clara, CA
with global operations in 25 countries   ($MM)
                                         $180
                                                                                                    $169.2
Leader in technology                     $160
for network control
                                         $140                                           $132.8

Market leadership                        $120

 • Gartner “Strong Positive” rating                                        $102.2
                                         $100
 • 40%+ Market Share (DDI)
                                          $80
                                                                 $61.7
6,100+ customers, 45,000+                 $60            $56.0
systems shipped                                  $35.0
                                          $40


20 patents, 27 pending                    $20

                                           $0
                                                 FY2007 FY2008 FY2009 FY2010 FY2011 FY2012
IPO April 2012: NYSE BLOX

                                                                 © 2013 Infoblox Inc. All Rights Reserved.   2
Triggers that are Redefining the Network

                     MOBILE DEVICE              CLOUD /
 CONSOLIDATION
                      EXPLOSION              VIRTUALIZATION




SOFTWARE DEFINED
                   THREAT LANDSCAPE          IPv6 TRANSITION
   NETWORKS




                                      © 2013 Infoblox Inc. All Rights Reserved.   3
What We Do:
                   Innovative Technology for Network Control
                           END POINTS      VIRTUAL MACHINES                  PRIVATE CLOUD             APPLICATIONS
END-POINTS
  APPS &
   CONTROL PLANE




                                                                                                Historical /Real-time
                                                                                                Reporting & Control
                                                   Infoblox GridTM w/ Real-time
                                                        Network Database
INFRASTRUCTURE
    NETWORK




                       FIREWALLS        SWITCHES                ROUTERS               WEB PROXY                 LOAD BALANCERS

                                                                                             © 2013 Infoblox Inc. All Rights Reserved.   4
What is the Alternative?

                                   END POINTS           VIRTUAL MACHINES       PRIVATE CLOUD                      APPLICATIONS
END-POINTS
  APPS &
   CONTROL PLANE




                     Complexity
                     Risk & Cost
                                    MICROSOFT DNS    MICROSOFT DHCP    VMWARE DNS           UNIX BIND                            QIP

                     Agility
                     Flexibility


                                                             SCRIPTS         COMMAND LINE
INFRASTRUCTURE
    NETWORK




                            FIREWALLS               SWITCHES           ROUTERS              WEB PROXY                      LOAD BALANCERS

                                                                                                        © 2013 Infoblox Inc. All Rights Reserved.   5
Infoblox Network Automation




                         © 2013 Infoblox Inc. All Rights Reserved.   6
“Time-to-Value” Inhibited by
Complexity Outpacing Resources

                             Tasks

                    Make the infrastructure
                     more dynamic                                          Network Scale
                    Reduce risk                                           & Complexity
                    Increase productivity &
                     network availability
 Quantity/Size




                                                         Network                       Increasing
                                                      Infrastructure                  Risks, Costs,
                                                        Demands
                                                                                         Delays



                                                                                Network
                                                                              Management
                                                                               Resources



                                               Time

                                                              © 2013 Infoblox Inc. All Rights Reserved.   7
Infoblox Network Automation

    Automated Network Discovery                             Change & Configuration Management




                                      Discover   Automate




                                      Maintain   Control
Compliance & Policy Standardization                           Firewall ACL & Rule Automation




                                                                         © 2013 Infoblox Inc. All Rights Reserved.   8
Infoblox Network Automation Overview
              Real-time & Historical
                     Analysis



        • Network discovery
        • Built-in analysis
        • Check against best practices    Collected Via:
        • Detect issues                       SNMP
        • Monitor and manage change      CLI/configuration
        • Automate change                     Syslog
                                          Fingerprinting
        • Maintain compliance
        • Provision ACL & rules




                                                 © 2013 Infoblox Inc. All Rights Reserved.
What’s On and Connected to My Network?

 Manual, spreadsheets and/or
  scanning tools
   – Often out of date


 Tight budgets and stretched teams
   – Multi-vendor network devices
   – Proliferation of IP devices


 Ever-changing questions
   –   What’s on my network?
   –   Which ports are active?
   –   Do I need more capacity?
   –   What device is using which IP?
   –   When & where did they connect?



                                        © 2013 Infoblox Inc. All Rights Reserved.   10
Automated Network Discovery

 Continuous network discovery
   – Layer 2 and 3 characteristics
   – IP, MAC, port, VLAN mapping
   – Track used/free/available switch
     ports


 End device tracking
   – What MAC/end-device connected
   – Where and when did they connect
   – Find rouge devices and track
     blacklist


 Automatic IPAM sync
   – Single GUI view of end-points with
     IPAM
   – Up-to-date extensible attributes
                                          © 2013 Infoblox Inc. All Rights Reserved.   11
Keeping Up with Daily Change and Configuration

 Extensive manual processes
   – CLI
   – Scripting


 Limited functionality
   – Configuration scrapes
   – Basic change automation
   – Vendor-specific tools


 Minimal control & documentation
   – Limited work-flow
   – Admin or nothing access rights
   – Massive files require extensive
     manual digging and compiling



                                       © 2013 Infoblox Inc. All Rights Reserved.   12
Change & Change Management

 Ongoing management
   – Change detection/logging
   – Configuration archives
   – Simplified searching and side-by-
     side comparison


 Change automation
   – Embedded jobs
   – Intuitive templates
   – Variable-based jobs


 Change control
   – User-based access rights
   – User-initiated and triggered jobs
   – Work flow integration

                                         © 2013 Infoblox Inc. All Rights Reserved.   13
Is My Network Still Compliant?

 Different drivers
   – External mandates
   – Internal security policies
   – Networking best practices


 Typically reactive
   – When something breaks
   – When audit is required


 Manually intensive
   – Massive log files
   – CLI access
   – Manually collect, aggregate,
     tabulate and present findings



                                     © 2013 Infoblox Inc. All Rights Reserved.   14
Compliance & Policy Standardization

 Embedded expertise
   – Common standards and best
     practices
   – Easily customizable
   – Deployment flexibility


 Continuous monitoring
   – 24x7 issue detection and notification
   – Remediation options
   – Network scorecard


 Simplified reports
   – On-demand reports
   – Standard and custom options



                                             © 2013 Infoblox Inc. All Rights Reserved.
So Many Firewalls, So Many Changes, So Little Time

    Spike in number of security policy changes
    IT headcount not keeping pace
    Multiple point products add confusion
    Network SLAs impacted negatively
    Expensive and diminishes security effectiveness

Firewall
Change
Needed         Search    Figure Out   Determine    Compare      Request        Reconfirm
                 For      Impacted     Correct     Change to    Change/       Correctness
               Devices     Devices     Config     Standards/   Implement          and
                                                  Compliance    Manually      Compliance


                 1          2           3            4           5                   6
                                            Manual

                     Network Provisioning Time                        Hours/Days


           LEGACY APPROACH TO FIREWALL POLICY CHANGE IMPLEMENTATION

                                                                           © 2013 Infoblox Inc. All Rights Reserved.
Firewall Rule & ACL Analysis and Automation

 Leverage automated discovery

 Rule and ACL analysis
   – Built-in expertise
   – Alert on common firewall issues
   – Leverage “simple English” interface


 Search and alerting
   – Powerful search finds vendor-
     specific syntax and commands
   – Blacklisting and whitelisting options


 Integrated provisioning
   – Provision actual changes with
     rollback options
   – Access-based controls
                                             © 2013 Infoblox Inc. All Rights Reserved.
Automated Task Board &
IPAM Sync




                         © 2013 Infoblox Inc. All Rights Reserved.   18
Dealing with Common Challenges

 Growth in number of common changes
   – Add network, turn port up/down, VLAN
     assignment, new device install


 Multiple people/teams needed for many
  tasks – inefficient
                                                    DNS – DHCP- IPAM Admins
   – Manual processes and scripts add to
     problem


 Different team goals and priorities
   – “Just because it’s important to you, doesn’t
     mean it’s important to me”


 Lack of empowerment
   – Sit and wait for others                           Network Engineers


                                                        © 2013 Infoblox Inc. All Rights Reserved.
                                                                                                    19
Empowering Staff

 IPAM sync
   – Combine end-point and network
     data
   – Continuously updated
   – Single interface


 Automated Task Board
   – Simplify common changes
   – IPAM and/or network changes
   – Add records, hosts, addresses,
     etc.
   – Create subnets, activate a port,
     assign a VLAN
   – Delegate down but maintain
     control


                                        © 2013 Infoblox Inc. All Rights Reserved.   20
Infoblox Value To Our Customer

Infoblox makes networks more available, secure and automated


            • GridTM technology for fault tolerance,
              easy updates and one-click DR
            • Optimized for enterprise demand & performance
Available   • Authoritative source for network data

            • Secure hardware form-factor & hardened OS       Available               Secure
            • Designed to minimize vulnerabilities and
              attack surfaces
 Secure     • Common Criteria certified
                                                                  Automated
            • Powerful automation of manual processes
            • Reduce change errors & assure compliance
            • Save time, money and effort
Automated




                                                                   © 2013 Infoblox Inc. All Rights Reserved.   21
Thank You




            © 2013 Infoblox Inc. All Rights Reserved.   22

More Related Content

What's hot

Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012itandlaw
 
Multicore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data CentersMulticore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data Centersscarisbrick
 
I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008pwcom.co.uk Ltd
 
Security & Virtualization in the Data Center
Security & Virtualization in the Data CenterSecurity & Virtualization in the Data Center
Security & Virtualization in the Data CenterCisco Russia
 
OpenFlow Beyond the Data Centre at IP Expo
OpenFlow Beyond the Data Centre at IP ExpoOpenFlow Beyond the Data Centre at IP Expo
OpenFlow Beyond the Data Centre at IP ExpoADVA
 
Meraki 2012 Corporate Brochure
Meraki 2012 Corporate BrochureMeraki 2012 Corporate Brochure
Meraki 2012 Corporate Brochureguillaumepays
 
Развитие технологий SDN для сетей ЦОД
Развитие технологий SDN для сетей ЦОДРазвитие технологий SDN для сетей ЦОД
Развитие технологий SDN для сетей ЦОДCisco Russia
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsetsresponsedatacomms
 
Arch Rock Overview
Arch Rock OverviewArch Rock Overview
Arch Rock Overviewpauldeng
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Mahbubul Alam
 
Alcatellucentsdn2013
Alcatellucentsdn2013Alcatellucentsdn2013
Alcatellucentsdn2013deepersnet
 

What's hot (17)

Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012
 
Multicore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data CentersMulticore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data Centers
 
I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008
 
Security & Virtualization in the Data Center
Security & Virtualization in the Data CenterSecurity & Virtualization in the Data Center
Security & Virtualization in the Data Center
 
OpenFlow Beyond the Data Centre at IP Expo
OpenFlow Beyond the Data Centre at IP ExpoOpenFlow Beyond the Data Centre at IP Expo
OpenFlow Beyond the Data Centre at IP Expo
 
Meraki 2012 Corporate Brochure
Meraki 2012 Corporate BrochureMeraki 2012 Corporate Brochure
Meraki 2012 Corporate Brochure
 
Развитие технологий SDN для сетей ЦОД
Развитие технологий SDN для сетей ЦОДРазвитие технологий SDN для сетей ЦОД
Развитие технологий SDN для сетей ЦОД
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
Arch Rock Overview
Arch Rock OverviewArch Rock Overview
Arch Rock Overview
 
Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Radisys offloading 10412_final
Radisys offloading 10412_finalRadisys offloading 10412_final
Radisys offloading 10412_final
 
Going to the Cloud
Going to the Cloud Going to the Cloud
Going to the Cloud
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012
 
Alcatellucentsdn2013
Alcatellucentsdn2013Alcatellucentsdn2013
Alcatellucentsdn2013
 
Clouds: Beyond Compute and Storage
Clouds: Beyond Compute and StorageClouds: Beyond Compute and Storage
Clouds: Beyond Compute and Storage
 
Cisco Mobile Innovations 2013
Cisco Mobile Innovations 2013Cisco Mobile Innovations 2013
Cisco Mobile Innovations 2013
 

Viewers also liked

LicensingScopeAndBoundaries
LicensingScopeAndBoundariesLicensingScopeAndBoundaries
LicensingScopeAndBoundariesWilliam Francis
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012Infoblox
 
Wp ipam infoblox
Wp ipam infobloxWp ipam infoblox
Wp ipam infobloxislamet
 
How to Sell Security to Your CIO
How to Sell Security to Your CIOHow to Sell Security to Your CIO
How to Sell Security to Your CIORapid7
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachRahul Neel Mani
 
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMCómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMMundo Contact
 
DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6Andreas Taudte
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7Rapid7
 
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret WeaponUberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret WeaponInfer
 
Dns security threats and solutions
Dns security   threats and solutionsDns security   threats and solutions
Dns security threats and solutionsFrank Victory
 
MassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC
 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computerAnjali Agarwal
 

Viewers also liked (18)

LicensingScopeAndBoundaries
LicensingScopeAndBoundariesLicensingScopeAndBoundaries
LicensingScopeAndBoundaries
 
Workgroup Issues
Workgroup IssuesWorkgroup Issues
Workgroup Issues
 
Bmit meet theexperts_2013
Bmit meet theexperts_2013Bmit meet theexperts_2013
Bmit meet theexperts_2013
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
Wp ipam infoblox
Wp ipam infobloxWp ipam infoblox
Wp ipam infoblox
 
Long Infoblox
Long InfobloxLong Infoblox
Long Infoblox
 
Ipadd mngt
Ipadd mngtIpadd mngt
Ipadd mngt
 
How to Sell Security to Your CIO
How to Sell Security to Your CIOHow to Sell Security to Your CIO
How to Sell Security to Your CIO
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMCómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
 
Cyber crime v3
Cyber crime v3Cyber crime v3
Cyber crime v3
 
DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret WeaponUberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
Uberflip and Infer –  Predictive analytics: A Content Marketers Secret Weapon
 
Dns security threats and solutions
Dns security   threats and solutionsDns security   threats and solutions
Dns security threats and solutions
 
Advanced DNS Protection
Advanced DNS ProtectionAdvanced DNS Protection
Advanced DNS Protection
 
MassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalytics
 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computer
 

Similar to Network automation seminar

Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance ManagementRiverbed Technology
 
Presentación Data Center Cablevisión Day 2010
Presentación Data Center Cablevisión Day 2010Presentación Data Center Cablevisión Day 2010
Presentación Data Center Cablevisión Day 2010Logicalis Latam
 
The Cloud: A game changer to test, at scale and in production, SOA based web...
The Cloud: A game changer to test, at scale and in production,  SOA based web...The Cloud: A game changer to test, at scale and in production,  SOA based web...
The Cloud: A game changer to test, at scale and in production, SOA based web...Fred Beringer
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsetsresponsedatacomms
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOpenStorageSummit
 
Becloud hybrid cloud
Becloud hybrid cloudBecloud hybrid cloud
Becloud hybrid cloudBecloud
 
The Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated IndustriesThe Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated Industriesdirkbeth
 
Cccc net app_wallacefung
Cccc net app_wallacefungCccc net app_wallacefung
Cccc net app_wallacefungCloud Congress
 
CCCC NetApp Wallace Fung
CCCC NetApp Wallace FungCCCC NetApp Wallace Fung
CCCC NetApp Wallace FungCloud Congress
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk OverviewSplunk
 
Software-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the NetworkSoftware-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the NetworkRobert Keahey
 
VMware vForum 2012 - Rodney Haywood - Optus
VMware vForum 2012 - Rodney Haywood - OptusVMware vForum 2012 - Rodney Haywood - Optus
VMware vForum 2012 - Rodney Haywood - OptusRodney Haywood
 
Internet Scale Architecture
Internet Scale ArchitectureInternet Scale Architecture
Internet Scale ArchitectureRightScale
 
Presentation f5 – beyond load balancer
Presentation   f5 – beyond load balancerPresentation   f5 – beyond load balancer
Presentation f5 – beyond load balancerxKinAnx
 
L'Internet des objets (IDO)
L'Internet des objets (IDO)L'Internet des objets (IDO)
L'Internet des objets (IDO)Cisco Canada
 

Similar to Network automation seminar (20)

Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
 
Presentación Data Center Cablevisión Day 2010
Presentación Data Center Cablevisión Day 2010Presentación Data Center Cablevisión Day 2010
Presentación Data Center Cablevisión Day 2010
 
The Cloud: A game changer to test, at scale and in production, SOA based web...
The Cloud: A game changer to test, at scale and in production,  SOA based web...The Cloud: A game changer to test, at scale and in production,  SOA based web...
The Cloud: A game changer to test, at scale and in production, SOA based web...
 
The SDN Opportunity
The SDN OpportunityThe SDN Opportunity
The SDN Opportunity
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
GoS presentation MBW 2012
GoS presentation MBW 2012GoS presentation MBW 2012
GoS presentation MBW 2012
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
 
Becloud hybrid cloud
Becloud hybrid cloudBecloud hybrid cloud
Becloud hybrid cloud
 
The Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated IndustriesThe Move to the Cloud for Regulated Industries
The Move to the Cloud for Regulated Industries
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Cccc net app_wallacefung
Cccc net app_wallacefungCccc net app_wallacefung
Cccc net app_wallacefung
 
CCCC NetApp Wallace Fung
CCCC NetApp Wallace FungCCCC NetApp Wallace Fung
CCCC NetApp Wallace Fung
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
S series presentation
S series presentationS series presentation
S series presentation
 
Software-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the NetworkSoftware-Defined Networking (SDN): Unleashing the Power of the Network
Software-Defined Networking (SDN): Unleashing the Power of the Network
 
VMware vForum 2012 - Rodney Haywood - Optus
VMware vForum 2012 - Rodney Haywood - OptusVMware vForum 2012 - Rodney Haywood - Optus
VMware vForum 2012 - Rodney Haywood - Optus
 
Internet Scale Architecture
Internet Scale ArchitectureInternet Scale Architecture
Internet Scale Architecture
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
Presentation f5 – beyond load balancer
Presentation   f5 – beyond load balancerPresentation   f5 – beyond load balancer
Presentation f5 – beyond load balancer
 
L'Internet des objets (IDO)
L'Internet des objets (IDO)L'Internet des objets (IDO)
L'Internet des objets (IDO)
 

More from patmisasi

Scalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services OverviewScalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services Overviewpatmisasi
 
Scalar Corporate Overview FY17 patmisasi
Scalar Corporate Overview FY17 patmisasiScalar Corporate Overview FY17 patmisasi
Scalar Corporate Overview FY17 patmisasipatmisasi
 
Scalar Cloud Consulting Advisory Services
Scalar Cloud Consulting Advisory ServicesScalar Cloud Consulting Advisory Services
Scalar Cloud Consulting Advisory Servicespatmisasi
 
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...patmisasi
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...patmisasi
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016patmisasi
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summarypatmisasi
 
Scalar Whiteboard
Scalar WhiteboardScalar Whiteboard
Scalar Whiteboardpatmisasi
 
Top 10 Executive IT concerns in 2016
Top 10 Executive IT concerns in 2016Top 10 Executive IT concerns in 2016
Top 10 Executive IT concerns in 2016patmisasi
 
Top Executive IT concerns in 2016
Top Executive IT concerns in 2016Top Executive IT concerns in 2016
Top Executive IT concerns in 2016patmisasi
 
Power of Leasing for Pat Misasi at Scalar
Power of Leasing for Pat Misasi at ScalarPower of Leasing for Pat Misasi at Scalar
Power of Leasing for Pat Misasi at Scalarpatmisasi
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015patmisasi
 
ScalarTASK_One-Pager_FINAL
ScalarTASK_One-Pager_FINALScalarTASK_One-Pager_FINAL
ScalarTASK_One-Pager_FINALpatmisasi
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Securitypatmisasi
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
 
corp-overview-about-us-FY15
corp-overview-about-us-FY15corp-overview-about-us-FY15
corp-overview-about-us-FY15patmisasi
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storagepatmisasi
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshowpatmisasi
 
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisions
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisionsVdi storage challenges_presented at vmug_toronto 2014 by scalar decisions
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisionspatmisasi
 

More from patmisasi (20)

Scalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services OverviewScalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services Overview
 
Scalar Corporate Overview FY17 patmisasi
Scalar Corporate Overview FY17 patmisasiScalar Corporate Overview FY17 patmisasi
Scalar Corporate Overview FY17 patmisasi
 
Scalar Cloud Consulting Advisory Services
Scalar Cloud Consulting Advisory ServicesScalar Cloud Consulting Advisory Services
Scalar Cloud Consulting Advisory Services
 
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
Scalar Whiteboard
Scalar WhiteboardScalar Whiteboard
Scalar Whiteboard
 
Top 10 Executive IT concerns in 2016
Top 10 Executive IT concerns in 2016Top 10 Executive IT concerns in 2016
Top 10 Executive IT concerns in 2016
 
Top Executive IT concerns in 2016
Top Executive IT concerns in 2016Top Executive IT concerns in 2016
Top Executive IT concerns in 2016
 
Power of Leasing for Pat Misasi at Scalar
Power of Leasing for Pat Misasi at ScalarPower of Leasing for Pat Misasi at Scalar
Power of Leasing for Pat Misasi at Scalar
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015
 
ScalarTASK_One-Pager_FINAL
ScalarTASK_One-Pager_FINALScalarTASK_One-Pager_FINAL
ScalarTASK_One-Pager_FINAL
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
corp-overview-about-us-FY15
corp-overview-about-us-FY15corp-overview-about-us-FY15
corp-overview-about-us-FY15
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storage
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
 
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisions
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisionsVdi storage challenges_presented at vmug_toronto 2014 by scalar decisions
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisions
 

Network automation seminar

  • 1. Control Your Network with the Power of Automation Matt Gowarty, Senior Product Marketing Manager © 2013 Infoblox Inc. All Rights Reserved. 1
  • 2. Infoblox Overview & Business Update Founded in 1999 Total Revenue (Fiscal Year Ending July 31) Headquartered in Santa Clara, CA with global operations in 25 countries ($MM) $180 $169.2 Leader in technology $160 for network control $140 $132.8 Market leadership $120 • Gartner “Strong Positive” rating $102.2 $100 • 40%+ Market Share (DDI) $80 $61.7 6,100+ customers, 45,000+ $60 $56.0 systems shipped $35.0 $40 20 patents, 27 pending $20 $0 FY2007 FY2008 FY2009 FY2010 FY2011 FY2012 IPO April 2012: NYSE BLOX © 2013 Infoblox Inc. All Rights Reserved. 2
  • 3. Triggers that are Redefining the Network MOBILE DEVICE CLOUD / CONSOLIDATION EXPLOSION VIRTUALIZATION SOFTWARE DEFINED THREAT LANDSCAPE IPv6 TRANSITION NETWORKS © 2013 Infoblox Inc. All Rights Reserved. 3
  • 4. What We Do: Innovative Technology for Network Control END POINTS VIRTUAL MACHINES PRIVATE CLOUD APPLICATIONS END-POINTS APPS & CONTROL PLANE Historical /Real-time Reporting & Control Infoblox GridTM w/ Real-time Network Database INFRASTRUCTURE NETWORK FIREWALLS SWITCHES ROUTERS WEB PROXY LOAD BALANCERS © 2013 Infoblox Inc. All Rights Reserved. 4
  • 5. What is the Alternative? END POINTS VIRTUAL MACHINES PRIVATE CLOUD APPLICATIONS END-POINTS APPS & CONTROL PLANE Complexity Risk & Cost MICROSOFT DNS MICROSOFT DHCP VMWARE DNS UNIX BIND QIP Agility Flexibility SCRIPTS COMMAND LINE INFRASTRUCTURE NETWORK FIREWALLS SWITCHES ROUTERS WEB PROXY LOAD BALANCERS © 2013 Infoblox Inc. All Rights Reserved. 5
  • 6. Infoblox Network Automation © 2013 Infoblox Inc. All Rights Reserved. 6
  • 7. “Time-to-Value” Inhibited by Complexity Outpacing Resources Tasks  Make the infrastructure more dynamic Network Scale  Reduce risk & Complexity  Increase productivity & network availability Quantity/Size Network Increasing Infrastructure Risks, Costs, Demands Delays Network Management Resources Time © 2013 Infoblox Inc. All Rights Reserved. 7
  • 8. Infoblox Network Automation Automated Network Discovery Change & Configuration Management Discover Automate Maintain Control Compliance & Policy Standardization Firewall ACL & Rule Automation © 2013 Infoblox Inc. All Rights Reserved. 8
  • 9. Infoblox Network Automation Overview Real-time & Historical Analysis • Network discovery • Built-in analysis • Check against best practices Collected Via: • Detect issues SNMP • Monitor and manage change CLI/configuration • Automate change Syslog Fingerprinting • Maintain compliance • Provision ACL & rules © 2013 Infoblox Inc. All Rights Reserved.
  • 10. What’s On and Connected to My Network?  Manual, spreadsheets and/or scanning tools – Often out of date  Tight budgets and stretched teams – Multi-vendor network devices – Proliferation of IP devices  Ever-changing questions – What’s on my network? – Which ports are active? – Do I need more capacity? – What device is using which IP? – When & where did they connect? © 2013 Infoblox Inc. All Rights Reserved. 10
  • 11. Automated Network Discovery  Continuous network discovery – Layer 2 and 3 characteristics – IP, MAC, port, VLAN mapping – Track used/free/available switch ports  End device tracking – What MAC/end-device connected – Where and when did they connect – Find rouge devices and track blacklist  Automatic IPAM sync – Single GUI view of end-points with IPAM – Up-to-date extensible attributes © 2013 Infoblox Inc. All Rights Reserved. 11
  • 12. Keeping Up with Daily Change and Configuration  Extensive manual processes – CLI – Scripting  Limited functionality – Configuration scrapes – Basic change automation – Vendor-specific tools  Minimal control & documentation – Limited work-flow – Admin or nothing access rights – Massive files require extensive manual digging and compiling © 2013 Infoblox Inc. All Rights Reserved. 12
  • 13. Change & Change Management  Ongoing management – Change detection/logging – Configuration archives – Simplified searching and side-by- side comparison  Change automation – Embedded jobs – Intuitive templates – Variable-based jobs  Change control – User-based access rights – User-initiated and triggered jobs – Work flow integration © 2013 Infoblox Inc. All Rights Reserved. 13
  • 14. Is My Network Still Compliant?  Different drivers – External mandates – Internal security policies – Networking best practices  Typically reactive – When something breaks – When audit is required  Manually intensive – Massive log files – CLI access – Manually collect, aggregate, tabulate and present findings © 2013 Infoblox Inc. All Rights Reserved. 14
  • 15. Compliance & Policy Standardization  Embedded expertise – Common standards and best practices – Easily customizable – Deployment flexibility  Continuous monitoring – 24x7 issue detection and notification – Remediation options – Network scorecard  Simplified reports – On-demand reports – Standard and custom options © 2013 Infoblox Inc. All Rights Reserved.
  • 16. So Many Firewalls, So Many Changes, So Little Time  Spike in number of security policy changes  IT headcount not keeping pace  Multiple point products add confusion  Network SLAs impacted negatively  Expensive and diminishes security effectiveness Firewall Change Needed Search Figure Out Determine Compare Request Reconfirm For Impacted Correct Change to Change/ Correctness Devices Devices Config Standards/ Implement and Compliance Manually Compliance 1 2 3 4 5 6 Manual Network Provisioning Time Hours/Days LEGACY APPROACH TO FIREWALL POLICY CHANGE IMPLEMENTATION © 2013 Infoblox Inc. All Rights Reserved.
  • 17. Firewall Rule & ACL Analysis and Automation  Leverage automated discovery  Rule and ACL analysis – Built-in expertise – Alert on common firewall issues – Leverage “simple English” interface  Search and alerting – Powerful search finds vendor- specific syntax and commands – Blacklisting and whitelisting options  Integrated provisioning – Provision actual changes with rollback options – Access-based controls © 2013 Infoblox Inc. All Rights Reserved.
  • 18. Automated Task Board & IPAM Sync © 2013 Infoblox Inc. All Rights Reserved. 18
  • 19. Dealing with Common Challenges  Growth in number of common changes – Add network, turn port up/down, VLAN assignment, new device install  Multiple people/teams needed for many tasks – inefficient DNS – DHCP- IPAM Admins – Manual processes and scripts add to problem  Different team goals and priorities – “Just because it’s important to you, doesn’t mean it’s important to me”  Lack of empowerment – Sit and wait for others Network Engineers © 2013 Infoblox Inc. All Rights Reserved. 19
  • 20. Empowering Staff  IPAM sync – Combine end-point and network data – Continuously updated – Single interface  Automated Task Board – Simplify common changes – IPAM and/or network changes – Add records, hosts, addresses, etc. – Create subnets, activate a port, assign a VLAN – Delegate down but maintain control © 2013 Infoblox Inc. All Rights Reserved. 20
  • 21. Infoblox Value To Our Customer Infoblox makes networks more available, secure and automated • GridTM technology for fault tolerance, easy updates and one-click DR • Optimized for enterprise demand & performance Available • Authoritative source for network data • Secure hardware form-factor & hardened OS Available Secure • Designed to minimize vulnerabilities and attack surfaces Secure • Common Criteria certified Automated • Powerful automation of manual processes • Reduce change errors & assure compliance • Save time, money and effort Automated © 2013 Infoblox Inc. All Rights Reserved. 21
  • 22. Thank You © 2013 Infoblox Inc. All Rights Reserved. 22