SlideShare a Scribd company logo
1 of 19
Security Capabilities of IPAM 
Innovation Days
What is IPAM ?
IPAM means 
Management of 
IP Addresses & 
Host Names 
Centralised 
Documentatio 
n of everything 
Control the 
associated 
Services 
DNS & DHCP 
IP-related
Why IPAM ? 
“I’m managing 
DNS & DHCP 
since 20 Years 
...” 
“... and I 
never had 
an Outage.”
Legacy Tools
Mobility and Cloud are changing IT 
Past 
Present Future 
Phones 
Printers 
Desktops 
Physical 
Virtual 
VDI 
Cloud 
Mobile 
SDN 
M2M 
Wearable
Today’s and Future Challenges 
... no Automation 
... no Auditing 
... no Visibility 
... no Consistency Checks 
... no Chance for IPv6
IPAM ... for Automation 
Request 
Network 
DHCP 
Asset 
Multiple 
Admins or 
Systems 
involved
IPAM ... for Automation 
Request 
Automate 
Validate 
Delegate 

IPAM ... for Auditing 
Who? Where? When? 
What?
IPAM ... for Visibility 
Reporting 
Alarming
IPAM ... for Consistency Checks 
IP Reconciliation 
192.168.191.5 Gi0/5 VLAN2 reclaimable 
192.168.191.6 Gi0/6 VLAN2 reclaimable 
192.168.191.1 
Gi0/11 VLAN2 mismatch 
1 
Built-in & 
free of Charge 
L2 / L3 
Discovery 
192.168.191.1 
6 
Gi0/16 VLAN2 unknown 
AA-BB-CC-DD-EE-05 
AA-BB-CC-DD-EE-06 
AA-BB-CC-DD-EE-11 
AA-BB-CC-DD-EE-16
IPAM ... for IPv6 
192.0.2.53 
SLAAC 
2001:db8:2::53 
http://www.insinuator.net/2013/10/ipam-requirements-in-ipv6-networks/
IPAM is central 
Internal 
External 
Beyond
Let’s use this Position 
Access 
Control 
Finger 
Printing 
DNS 
Threat 
Protection
Who’s BlueCat ? 
Company 
Gartner 
Highest Possible 
Rating 
Debt Free 
Invest back in 
business 
> 2000 
Customers 
> 30% 
Revenue Growth 
FY99 - FY14
Who’s BlueCat ? 
Technology 
< 1% 
Industry’s Lowest 
Hardware Failure 
94 
Local Depots 
24x7x5 Onsite 
200K QPS 
Industry’s Fastest 
1U DNS 
Appliance 
5M+ IPs 
Industry’s Most 
Scalable DDI
Thank you for your time. 
Andreas Taudte 
Sales Engineer
Special Thanks to 
Roberto „Rober-Raik“ Tello Oiz.

More Related Content

What's hot

The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branchZscaler
 
Mqtt.fx on hive mq cloud
Mqtt.fx on hive mq cloudMqtt.fx on hive mq cloud
Mqtt.fx on hive mq cloudMargarethaErber
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overviewBAKOTECH
 
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforceThe Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforcePerimeter 81
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
"Processor Options for Edge Inference: Options and Trade-offs," a Presentatio...
"Processor Options for Edge Inference: Options and Trade-offs," a Presentatio..."Processor Options for Edge Inference: Options and Trade-offs," a Presentatio...
"Processor Options for Edge Inference: Options and Trade-offs," a Presentatio...Edge AI and Vision Alliance
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudZscaler
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMwareVMUG IT
 
Telus - Network as a service
Telus - Network as a serviceTelus - Network as a service
Telus - Network as a serviceGavin M Amos.
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud securityZscaler
 
Democratizing Network Automation Through Low-Code
Democratizing Network Automation Through Low-CodeDemocratizing Network Automation Through Low-Code
Democratizing Network Automation Through Low-CodeItential
 
Riverbed Performance Management
Riverbed Performance ManagementRiverbed Performance Management
Riverbed Performance ManagementCTI Group
 
Modern Network Compliance: How Network Compliance Accelerates Automation
Modern Network Compliance: How Network Compliance Accelerates AutomationModern Network Compliance: How Network Compliance Accelerates Automation
Modern Network Compliance: How Network Compliance Accelerates AutomationItential
 
Supercharge Ansible for Networking with Itential
Supercharge Ansible for  Networking with ItentialSupercharge Ansible for  Networking with Itential
Supercharge Ansible for Networking with ItentialItential
 
Unified Cloud Performance Monitoring - The Need of The Hour
Unified Cloud Performance Monitoring - The Need of The HourUnified Cloud Performance Monitoring - The Need of The Hour
Unified Cloud Performance Monitoring - The Need of The HoureG Innovations
 
Automate Network Configuration & Compliance Management with Itential
Automate Network Configuration & Compliance Management with ItentialAutomate Network Configuration & Compliance Management with Itential
Automate Network Configuration & Compliance Management with ItentialItential
 
v.S2 Intelligent WiFi Lock
v.S2 Intelligent WiFi Lockv.S2 Intelligent WiFi Lock
v.S2 Intelligent WiFi LockSteve Bowcut
 
Outage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the InternetOutage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the InternetThousandEyes
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experienceZscaler
 

What's hot (20)

The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branch
 
Mqtt.fx on hive mq cloud
Mqtt.fx on hive mq cloudMqtt.fx on hive mq cloud
Mqtt.fx on hive mq cloud
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overview
 
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforceThe Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
"Processor Options for Edge Inference: Options and Trade-offs," a Presentatio...
"Processor Options for Edge Inference: Options and Trade-offs," a Presentatio..."Processor Options for Edge Inference: Options and Trade-offs," a Presentatio...
"Processor Options for Edge Inference: Options and Trade-offs," a Presentatio...
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
Telus - Network as a service
Telus - Network as a serviceTelus - Network as a service
Telus - Network as a service
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud security
 
Democratizing Network Automation Through Low-Code
Democratizing Network Automation Through Low-CodeDemocratizing Network Automation Through Low-Code
Democratizing Network Automation Through Low-Code
 
Riverbed Performance Management
Riverbed Performance ManagementRiverbed Performance Management
Riverbed Performance Management
 
Modern Network Compliance: How Network Compliance Accelerates Automation
Modern Network Compliance: How Network Compliance Accelerates AutomationModern Network Compliance: How Network Compliance Accelerates Automation
Modern Network Compliance: How Network Compliance Accelerates Automation
 
Supercharge Ansible for Networking with Itential
Supercharge Ansible for  Networking with ItentialSupercharge Ansible for  Networking with Itential
Supercharge Ansible for Networking with Itential
 
Unified Cloud Performance Monitoring - The Need of The Hour
Unified Cloud Performance Monitoring - The Need of The HourUnified Cloud Performance Monitoring - The Need of The Hour
Unified Cloud Performance Monitoring - The Need of The Hour
 
Automate Network Configuration & Compliance Management with Itential
Automate Network Configuration & Compliance Management with ItentialAutomate Network Configuration & Compliance Management with Itential
Automate Network Configuration & Compliance Management with Itential
 
v.S2 Intelligent WiFi Lock
v.S2 Intelligent WiFi Lockv.S2 Intelligent WiFi Lock
v.S2 Intelligent WiFi Lock
 
Outage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the InternetOutage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the Internet
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experience
 

Similar to Security Capabilities of IPAM

Botnet Detection And Countermeasures
Botnet Detection And CountermeasuresBotnet Detection And Countermeasures
Botnet Detection And CountermeasuresSynerzip
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Securitypatmisasi
 
Next Generation Address Management with VitalQIP - Alcatel-Lucent and Perficient
Next Generation Address Management with VitalQIP - Alcatel-Lucent and PerficientNext Generation Address Management with VitalQIP - Alcatel-Lucent and Perficient
Next Generation Address Management with VitalQIP - Alcatel-Lucent and PerficientPerficient, Inc.
 
Different I/O Access Methods for Linux, What We Chose for ScyllaDB, and Why
Different I/O Access Methods for Linux, What We Chose for ScyllaDB, and WhyDifferent I/O Access Methods for Linux, What We Chose for ScyllaDB, and Why
Different I/O Access Methods for Linux, What We Chose for ScyllaDB, and WhyScyllaDB
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentationmaitretester
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Canada
 
SYM iSpectrum Business Cases
SYM iSpectrum Business CasesSYM iSpectrum Business Cases
SYM iSpectrum Business CasesTodd Masters
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityCambridge Intelligence
 
Solution_PP_P_Sangfor Data Protection &amp;amp; Disaster Recovery Solution_20...
Solution_PP_P_Sangfor Data Protection &amp;amp; Disaster Recovery Solution_20...Solution_PP_P_Sangfor Data Protection &amp;amp; Disaster Recovery Solution_20...
Solution_PP_P_Sangfor Data Protection &amp;amp; Disaster Recovery Solution_20...AsepMuhamadFriansyah1
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeAPNIC
 
PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...
PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...
PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...PROIDEA
 
Accelerating the AIoT @ the EDGE
Accelerating the AIoT @ the EDGE Accelerating the AIoT @ the EDGE
Accelerating the AIoT @ the EDGE Amazon Web Services
 
I2O Solutions - HDN Network Security Solution
I2O Solutions - HDN Network Security SolutionI2O Solutions - HDN Network Security Solution
I2O Solutions - HDN Network Security Solutionramsharma
 
Tradeshowpreso1
Tradeshowpreso1Tradeshowpreso1
Tradeshowpreso1Simpletel
 
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spotsIXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spotsCisco Russia
 
Next Generation of Affordable Connectivity - Bristol
Next Generation of Affordable Connectivity - BristolNext Generation of Affordable Connectivity - Bristol
Next Generation of Affordable Connectivity - BristolTodd Kellond
 
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...hasimatwork
 
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real worldRakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real worldSORACOM,INC
 

Similar to Security Capabilities of IPAM (20)

Botnet Detection And Countermeasures
Botnet Detection And CountermeasuresBotnet Detection And Countermeasures
Botnet Detection And Countermeasures
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Next Generation Address Management with VitalQIP - Alcatel-Lucent and Perficient
Next Generation Address Management with VitalQIP - Alcatel-Lucent and PerficientNext Generation Address Management with VitalQIP - Alcatel-Lucent and Perficient
Next Generation Address Management with VitalQIP - Alcatel-Lucent and Perficient
 
Different I/O Access Methods for Linux, What We Chose for ScyllaDB, and Why
Different I/O Access Methods for Linux, What We Chose for ScyllaDB, and WhyDifferent I/O Access Methods for Linux, What We Chose for ScyllaDB, and Why
Different I/O Access Methods for Linux, What We Chose for ScyllaDB, and Why
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentation
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
 
SYM iSpectrum Business Cases
SYM iSpectrum Business CasesSYM iSpectrum Business Cases
SYM iSpectrum Business Cases
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber Security
 
Solution_PP_P_Sangfor Data Protection &amp;amp; Disaster Recovery Solution_20...
Solution_PP_P_Sangfor Data Protection &amp;amp; Disaster Recovery Solution_20...Solution_PP_P_Sangfor Data Protection &amp;amp; Disaster Recovery Solution_20...
Solution_PP_P_Sangfor Data Protection &amp;amp; Disaster Recovery Solution_20...
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
 
PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...
PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...
PLNOG15: Implementation of integrated DDI/NAC solution for a health insurance...
 
Accelerating the AIoT @ the EDGE
Accelerating the AIoT @ the EDGE Accelerating the AIoT @ the EDGE
Accelerating the AIoT @ the EDGE
 
I2O Solutions - HDN Network Security Solution
I2O Solutions - HDN Network Security SolutionI2O Solutions - HDN Network Security Solution
I2O Solutions - HDN Network Security Solution
 
Tradeshowpreso1
Tradeshowpreso1Tradeshowpreso1
Tradeshowpreso1
 
04b-radcliffe
04b-radcliffe04b-radcliffe
04b-radcliffe
 
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spotsIXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
 
Next Generation of Affordable Connectivity - Bristol
Next Generation of Affordable Connectivity - BristolNext Generation of Affordable Connectivity - Bristol
Next Generation of Affordable Connectivity - Bristol
 
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
Section 3 - Technical Sales Foundations for IBM QRadar for Cloud (QRoC)V1 P10...
 
AESIT Presents - OmniWAN
AESIT Presents - OmniWANAESIT Presents - OmniWAN
AESIT Presents - OmniWAN
 
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real worldRakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
 

More from Andreas Taudte

IPAM Security Considerations
IPAM Security ConsiderationsIPAM Security Considerations
IPAM Security ConsiderationsAndreas Taudte
 
AI Possibilities for DDI
AI Possibilities for DDIAI Possibilities for DDI
AI Possibilities for DDIAndreas Taudte
 
DHCP Security Consideration
DHCP Security ConsiderationDHCP Security Consideration
DHCP Security ConsiderationAndreas Taudte
 
Troubleshooting DNS with dig
Troubleshooting DNS with digTroubleshooting DNS with dig
Troubleshooting DNS with digAndreas Taudte
 
CNS @ Infoblox Exchange
CNS @ Infoblox ExchangeCNS @ Infoblox Exchange
CNS @ Infoblox ExchangeAndreas Taudte
 
DDI in University Environments
DDI in University EnvironmentsDDI in University Environments
DDI in University EnvironmentsAndreas Taudte
 
IT-as-a-Service - BlueCat @ NUBIT 2017
IT-as-a-Service - BlueCat @ NUBIT 2017IT-as-a-Service - BlueCat @ NUBIT 2017
IT-as-a-Service - BlueCat @ NUBIT 2017Andreas Taudte
 
Who is Andreas Taudte?
Who is Andreas Taudte?Who is Andreas Taudte?
Who is Andreas Taudte?Andreas Taudte
 
DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6Andreas Taudte
 
The what-you-may-call-it Internet
The what-you-may-call-it InternetThe what-you-may-call-it Internet
The what-you-may-call-it InternetAndreas Taudte
 
Network Control Forum - Vienna 2015
Network Control Forum - Vienna 2015Network Control Forum - Vienna 2015
Network Control Forum - Vienna 2015Andreas Taudte
 

More from Andreas Taudte (20)

IPAM Security Considerations
IPAM Security ConsiderationsIPAM Security Considerations
IPAM Security Considerations
 
Cloud DNS Challenges
Cloud DNS ChallengesCloud DNS Challenges
Cloud DNS Challenges
 
Next-Gen DHCP
Next-Gen DHCPNext-Gen DHCP
Next-Gen DHCP
 
AI Possibilities for DDI
AI Possibilities for DDIAI Possibilities for DDI
AI Possibilities for DDI
 
DHCP Security Consideration
DHCP Security ConsiderationDHCP Security Consideration
DHCP Security Consideration
 
Troubleshooting DNS with dig
Troubleshooting DNS with digTroubleshooting DNS with dig
Troubleshooting DNS with dig
 
DNS Security Strategy
DNS Security StrategyDNS Security Strategy
DNS Security Strategy
 
Extended DNS Errors
Extended DNS ErrorsExtended DNS Errors
Extended DNS Errors
 
CNS @ Infoblox Exchange
CNS @ Infoblox ExchangeCNS @ Infoblox Exchange
CNS @ Infoblox Exchange
 
Core Network Services
Core Network ServicesCore Network Services
Core Network Services
 
DDI in University Environments
DDI in University EnvironmentsDDI in University Environments
DDI in University Environments
 
DDI Project Planning
DDI Project PlanningDDI Project Planning
DDI Project Planning
 
DNS still partying
DNS still partyingDNS still partying
DNS still partying
 
IT-as-a-Service - BlueCat @ NUBIT 2017
IT-as-a-Service - BlueCat @ NUBIT 2017IT-as-a-Service - BlueCat @ NUBIT 2017
IT-as-a-Service - BlueCat @ NUBIT 2017
 
Who is Andreas Taudte?
Who is Andreas Taudte?Who is Andreas Taudte?
Who is Andreas Taudte?
 
DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6DNS, DHCP & IPAM with IPv6
DNS, DHCP & IPAM with IPv6
 
6 Myths about IPv6
6 Myths about IPv66 Myths about IPv6
6 Myths about IPv6
 
The Power of DNS
The Power of DNSThe Power of DNS
The Power of DNS
 
The what-you-may-call-it Internet
The what-you-may-call-it InternetThe what-you-may-call-it Internet
The what-you-may-call-it Internet
 
Network Control Forum - Vienna 2015
Network Control Forum - Vienna 2015Network Control Forum - Vienna 2015
Network Control Forum - Vienna 2015
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Security Capabilities of IPAM

  • 1. Security Capabilities of IPAM Innovation Days
  • 3. IPAM means Management of IP Addresses & Host Names Centralised Documentatio n of everything Control the associated Services DNS & DHCP IP-related
  • 4. Why IPAM ? “I’m managing DNS & DHCP since 20 Years ...” “... and I never had an Outage.”
  • 6. Mobility and Cloud are changing IT Past Present Future Phones Printers Desktops Physical Virtual VDI Cloud Mobile SDN M2M Wearable
  • 7. Today’s and Future Challenges ... no Automation ... no Auditing ... no Visibility ... no Consistency Checks ... no Chance for IPv6
  • 8. IPAM ... for Automation Request Network DHCP Asset Multiple Admins or Systems involved
  • 9. IPAM ... for Automation Request Automate Validate Delegate 
  • 10. IPAM ... for Auditing Who? Where? When? What?
  • 11. IPAM ... for Visibility Reporting Alarming
  • 12. IPAM ... for Consistency Checks IP Reconciliation 192.168.191.5 Gi0/5 VLAN2 reclaimable 192.168.191.6 Gi0/6 VLAN2 reclaimable 192.168.191.1 Gi0/11 VLAN2 mismatch 1 Built-in & free of Charge L2 / L3 Discovery 192.168.191.1 6 Gi0/16 VLAN2 unknown AA-BB-CC-DD-EE-05 AA-BB-CC-DD-EE-06 AA-BB-CC-DD-EE-11 AA-BB-CC-DD-EE-16
  • 13. IPAM ... for IPv6 192.0.2.53 SLAAC 2001:db8:2::53 http://www.insinuator.net/2013/10/ipam-requirements-in-ipv6-networks/
  • 14. IPAM is central Internal External Beyond
  • 15. Let’s use this Position Access Control Finger Printing DNS Threat Protection
  • 16. Who’s BlueCat ? Company Gartner Highest Possible Rating Debt Free Invest back in business > 2000 Customers > 30% Revenue Growth FY99 - FY14
  • 17. Who’s BlueCat ? Technology < 1% Industry’s Lowest Hardware Failure 94 Local Depots 24x7x5 Onsite 200K QPS Industry’s Fastest 1U DNS Appliance 5M+ IPs Industry’s Most Scalable DDI
  • 18. Thank you for your time. Andreas Taudte Sales Engineer
  • 19. Special Thanks to Roberto „Rober-Raik“ Tello Oiz.