SlideShare ist ein Scribd-Unternehmen logo
1 von 39
SecurActive workshop "Why a network behaviour analysis solution is now indispensable for the management of your network?“ 18th November, 2009
Agenda 9.00: Welcome - Coffee and croissants  9.35 : Conference and Exchanges: "Why a network behaviour analysis solution is now indispensable for the management of your network?“ the new challenges for Network and Security managers NBA solutions: vital tools for your daily network management SecurActive NSS, an innovative Network Behavior Analysis solution  10h30 : Overview of SecurActive NSS in a real environment © 2009 SecurActive. Proprietary and Confidential
© 2009 SecurActive. Proprietary and Confidential SecurActive overview
Corporate Profile ,[object Object]
 Develop and sell SecurActive NSS, the new network & application performance analysis solutions
 Distributed throughout Western Europe through a1 tier channel
European leader of the Network Behavior AnalysisMarket (“Red Herring 100 Europe Winner” 2008)© 2009 SecurActive. Proprietary and Confidential
More than 450 customers in Western Europe © 2009 SecurActive. Proprietary and Confidential
© 2009 SecurActive. Proprietary and Confidential The new challenges of your daily network  management
NBA addresses the growing complexity of network administration © 2009 SecurActive. Proprietary and Confidential Fast changing  & unclear perimeters  of private networks  (remote users, partners,  remote sites, providers, etc.) Change in user behaviour (more demanding, varied usages ,  growing autonomy)‏ Most varied usage of  network and frequent  deployment of new  applications Increased need for permanent view on network behaviour Frequent modifications  of network architecture (fusion, acquisition,  new venture, etc.)‏
© 2009 SecurActive. Proprietary and Confidential Unclear perimeters  of private networks  Change in user behaviour New Network Usage More demanding Networks are growing up and are much more complex to manage Varied usages Growing autonomy Frequent modifications  of network architecture
© 2009 SecurActive. Proprietary and Confidential Complexity Visibility
Network  Behaviour  Analysis NBA stands for © 2009 SecurActive. Proprietary and Confidential
© 2009 SecurActive. Proprietary and Confidential Overview of NBA solutions
© 2009 SecurActive. Proprietary and Confidential Capture of strategic  flows on the  corporate network Private network security Track non compliant usage,  incidents and security breaches Diagnosis Analysis & network / security  incident resolution  Analysis of Network  and Application behaviour Monitoring, planning & decision making Main features of a NBA solution NBA Solution IP Flow analysis Storage, presentation
Main features of a NBA solution © 2009 SecurActive. Proprietary and Confidential Capture of strategic flows NBA Solution IP Flow analysis Storage, presentation Diagnostic  and Troubleshooting Private  network security Analysis of Network  and Application behaviours
How should a perfect NBA solutions be? Increase the effectiveness of an IT team and make network management easier Simple and intuitive to use Configuration of the solution has to be made according to your business context Understand the real behaviour of the network No change in the network architecture (no additional point of failure) A passive implementation Personalised reports and alerting modules Work free-minded
© 2009 SecurActive. Proprietary and Confidential SecurActive NSS, a NBA solution
Dashboard Network map Graphs Details SecurActive NSS’s  - Our Approach SecurActive NSS approach Classical network analysis approach Large volume of data to be analysed 1 to 5 clicks from synthesis to detail Report © 2009 SecurActive. Proprietary and Confidential
SecurActive, a NBA solution Network usage  and flow mapping Security/Network Application  Performance Capture of strategic flows
SecurActive How it works? © 2009 SecurActive. Proprietary and Confidential Dashboard Network map Graphs Details Queryengine GUI Report Alert Storage Alertengine Business Context Network aggregation Security aggregation NSS Sniffer
SecurActive NSS, a NBA Solution © 2009 SecurActive. Proprietary and Confidential
A passive, agentless deployment in your Network © 2009 SecurActive. Proprietary and Confidential ,[object Object]
Agentless deployment
Appliance with 2 to 9 listening ports
Implementation via either a port mirroring or a TAPSecurActive Management SecurActive NSS SecurActive reporting Synthetic presentation based on client network ,[object Object]
IP Zones
Network and Security alertsListening ports Administration port
SecurActive – Range of solutions © 2009 SecurActive. Proprietary and Confidential NSS-800 8 GE + 2 SPF + 1 additional interface NSS-500 8 GE + 2 additional interfaces Performance NSS-200 7 GE (+1GE) Set of appliances to address every kind of needs. NSS-100 2GE +1FE (+1FE) NSS-10 2FE (+1 FE) Large Enterprise Remote Office/ Medium Enterprise
© 2009 SecurActive. Proprietary and Confidential Demonstration
Example of a Proof of Concept Analysis of your strategical traffic Switch – port mirroring SecurActive’s tuning ,[object Object]
IP Zones
Network and Security alerts
Reporting© 2009 SecurActive. Proprietary and Confidential Half a day
I want to centralise one of my vital applications
Server WAN network ERP ERP Wb Wa Main network Remote site
Server WAN network Wb ERP Wa Remote site Main network
Server WAN network Wb  Bandwidth analysis ERP Wa ,[object Object]
Application

Weitere ähnliche Inhalte

Was ist angesagt?

Hospitality ruckus wireless
Hospitality ruckus wirelessHospitality ruckus wireless
Hospitality ruckus wirelessayman khder
 
Simplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with CiscoSimplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with CiscoCisco Canada
 
Innovation at Meraki
Innovation at MerakiInnovation at Meraki
Innovation at MerakiCisco Canada
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPTomar awad
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewallCisco Canada
 
Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017Maticmind
 
Winhon Network Solution
Winhon Network SolutionWinhon Network Solution
Winhon Network SolutionJinzdm
 
RUCKUS Technical Family Day: Migrating to RUCKUS Cloud
RUCKUS Technical Family Day: Migrating to RUCKUS CloudRUCKUS Technical Family Day: Migrating to RUCKUS Cloud
RUCKUS Technical Family Day: Migrating to RUCKUS CloudPurdicom
 
CommScope RUCKUS Technical Family
CommScope RUCKUS Technical FamilyCommScope RUCKUS Technical Family
CommScope RUCKUS Technical FamilyPurdicom
 
Accelerating Enterprise Small Cell Deployments
Accelerating Enterprise Small Cell DeploymentsAccelerating Enterprise Small Cell Deployments
Accelerating Enterprise Small Cell DeploymentsCisco Service Provider
 
Iwan advantage-v2-140330172853-phpapp01
Iwan advantage-v2-140330172853-phpapp01Iwan advantage-v2-140330172853-phpapp01
Iwan advantage-v2-140330172853-phpapp01Boris Rojas
 
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN StrategyFlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN StrategyAmir Zmora
 
Ignite your network digitize your business
Ignite your network digitize your businessIgnite your network digitize your business
Ignite your network digitize your businessCisco Canada
 
Introduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier SolutionsIntroduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier SolutionsMichal Jarski
 

Was ist angesagt? (20)

Hospitality ruckus wireless
Hospitality ruckus wirelessHospitality ruckus wireless
Hospitality ruckus wireless
 
Simplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with CiscoSimplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with Cisco
 
Innovation at Meraki
Innovation at MerakiInnovation at Meraki
Innovation at Meraki
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewall
 
Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017
 
ClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirementsClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirements
 
Spectralink airheads 2013
Spectralink airheads 2013Spectralink airheads 2013
Spectralink airheads 2013
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
Winhon Network Solution
Winhon Network SolutionWinhon Network Solution
Winhon Network Solution
 
RUCKUS Technical Family Day: Migrating to RUCKUS Cloud
RUCKUS Technical Family Day: Migrating to RUCKUS CloudRUCKUS Technical Family Day: Migrating to RUCKUS Cloud
RUCKUS Technical Family Day: Migrating to RUCKUS Cloud
 
CommScope RUCKUS Technical Family
CommScope RUCKUS Technical FamilyCommScope RUCKUS Technical Family
CommScope RUCKUS Technical Family
 
Aruba Atmosphere / Airheads 2014 Keerti Melkote Keynote
Aruba Atmosphere / Airheads 2014 Keerti Melkote KeynoteAruba Atmosphere / Airheads 2014 Keerti Melkote Keynote
Aruba Atmosphere / Airheads 2014 Keerti Melkote Keynote
 
Zoneflex , Ruckus Wireless
Zoneflex , Ruckus WirelessZoneflex , Ruckus Wireless
Zoneflex , Ruckus Wireless
 
Accelerating Enterprise Small Cell Deployments
Accelerating Enterprise Small Cell DeploymentsAccelerating Enterprise Small Cell Deployments
Accelerating Enterprise Small Cell Deployments
 
Iwan advantage-v2-140330172853-phpapp01
Iwan advantage-v2-140330172853-phpapp01Iwan advantage-v2-140330172853-phpapp01
Iwan advantage-v2-140330172853-phpapp01
 
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN StrategyFlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
 
Ignite your network digitize your business
Ignite your network digitize your businessIgnite your network digitize your business
Ignite your network digitize your business
 
Introduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier SolutionsIntroduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier Solutions
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 

Ähnlich wie SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions

Network Functions Virtualization – Our Strategy
Network Functions Virtualization – Our StrategyNetwork Functions Virtualization – Our Strategy
Network Functions Virtualization – Our StrategyADVA
 
Cloud Services: Is the Transport Network a Utility or Differentiator
Cloud Services: Is the Transport Network a Utility or DifferentiatorCloud Services: Is the Transport Network a Utility or Differentiator
Cloud Services: Is the Transport Network a Utility or DifferentiatorADVA
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerADVA
 
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...ADVA
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpnRajesh Porwal
 
Implementing Cisco IP Switched Networks
Implementing Cisco IP Switched NetworksImplementing Cisco IP Switched Networks
Implementing Cisco IP Switched NetworksArchana Parameshwari
 
Cloud Camp Milan 2K9 Juniper Networks: Great Network behind the Cloud
Cloud Camp  Milan 2K9 Juniper Networks: Great Network behind the CloudCloud Camp  Milan 2K9 Juniper Networks: Great Network behind the Cloud
Cloud Camp Milan 2K9 Juniper Networks: Great Network behind the CloudGabriele Bozzi
 
Creating New Business Services for the IoT With Network Functions Virtualization
Creating New Business Services for the IoT With Network Functions VirtualizationCreating New Business Services for the IoT With Network Functions Virtualization
Creating New Business Services for the IoT With Network Functions VirtualizationADVA
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoThousandEyes
 
Nub8 & Federated Wireless.pptx
Nub8 & Federated Wireless.pptxNub8 & Federated Wireless.pptx
Nub8 & Federated Wireless.pptxOrlando F. Delgado
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Canada
 
Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...Aruba, a Hewlett Packard Enterprise company
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANRobb Boyd
 
Secure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsSecure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsADVA
 
Pure-Play Virtualization for Rural Broadband
Pure-Play Virtualization for Rural BroadbandPure-Play Virtualization for Rural Broadband
Pure-Play Virtualization for Rural BroadbandADVA
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Laying the Right Foundation for a Successful NFV, Amir Erez
Laying the Right Foundation for a Successful NFV, Amir ErezLaying the Right Foundation for a Successful NFV, Amir Erez
Laying the Right Foundation for a Successful NFV, Amir ErezCloud Native Day Tel Aviv
 

Ähnlich wie SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions (20)

Network Functions Virtualization – Our Strategy
Network Functions Virtualization – Our StrategyNetwork Functions Virtualization – Our Strategy
Network Functions Virtualization – Our Strategy
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
Cloud Services: Is the Transport Network a Utility or Differentiator
Cloud Services: Is the Transport Network a Utility or DifferentiatorCloud Services: Is the Transport Network a Utility or Differentiator
Cloud Services: Is the Transport Network a Utility or Differentiator
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
Implementing Cisco IP Switched Networks
Implementing Cisco IP Switched NetworksImplementing Cisco IP Switched Networks
Implementing Cisco IP Switched Networks
 
Cloud Camp Milan 2K9 Juniper Networks: Great Network behind the Cloud
Cloud Camp  Milan 2K9 Juniper Networks: Great Network behind the CloudCloud Camp  Milan 2K9 Juniper Networks: Great Network behind the Cloud
Cloud Camp Milan 2K9 Juniper Networks: Great Network behind the Cloud
 
Creating New Business Services for the IoT With Network Functions Virtualization
Creating New Business Services for the IoT With Network Functions VirtualizationCreating New Business Services for the IoT With Network Functions Virtualization
Creating New Business Services for the IoT With Network Functions Virtualization
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
 
Nub8 & Federated Wireless.pptx
Nub8 & Federated Wireless.pptxNub8 & Federated Wireless.pptx
Nub8 & Federated Wireless.pptx
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
 
Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
Secure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsSecure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth Applications
 
2012 ah apj wi fi design for voice & video
2012 ah apj   wi fi design for voice & video2012 ah apj   wi fi design for voice & video
2012 ah apj wi fi design for voice & video
 
Pure-Play Virtualization for Rural Broadband
Pure-Play Virtualization for Rural BroadbandPure-Play Virtualization for Rural Broadband
Pure-Play Virtualization for Rural Broadband
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Laying the Right Foundation for a Successful NFV, Amir Erez
Laying the Right Foundation for a Successful NFV, Amir ErezLaying the Right Foundation for a Successful NFV, Amir Erez
Laying the Right Foundation for a Successful NFV, Amir Erez
 

Kürzlich hochgeladen

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions

  • 1. SecurActive workshop "Why a network behaviour analysis solution is now indispensable for the management of your network?“ 18th November, 2009
  • 2. Agenda 9.00: Welcome - Coffee and croissants 9.35 : Conference and Exchanges: "Why a network behaviour analysis solution is now indispensable for the management of your network?“ the new challenges for Network and Security managers NBA solutions: vital tools for your daily network management SecurActive NSS, an innovative Network Behavior Analysis solution 10h30 : Overview of SecurActive NSS in a real environment © 2009 SecurActive. Proprietary and Confidential
  • 3. © 2009 SecurActive. Proprietary and Confidential SecurActive overview
  • 4.
  • 5. Develop and sell SecurActive NSS, the new network & application performance analysis solutions
  • 6. Distributed throughout Western Europe through a1 tier channel
  • 7. European leader of the Network Behavior AnalysisMarket (“Red Herring 100 Europe Winner” 2008)© 2009 SecurActive. Proprietary and Confidential
  • 8. More than 450 customers in Western Europe © 2009 SecurActive. Proprietary and Confidential
  • 9. © 2009 SecurActive. Proprietary and Confidential The new challenges of your daily network management
  • 10. NBA addresses the growing complexity of network administration © 2009 SecurActive. Proprietary and Confidential Fast changing & unclear perimeters of private networks (remote users, partners, remote sites, providers, etc.) Change in user behaviour (more demanding, varied usages , growing autonomy)‏ Most varied usage of network and frequent deployment of new applications Increased need for permanent view on network behaviour Frequent modifications of network architecture (fusion, acquisition, new venture, etc.)‏
  • 11. © 2009 SecurActive. Proprietary and Confidential Unclear perimeters of private networks Change in user behaviour New Network Usage More demanding Networks are growing up and are much more complex to manage Varied usages Growing autonomy Frequent modifications of network architecture
  • 12. © 2009 SecurActive. Proprietary and Confidential Complexity Visibility
  • 13. Network Behaviour Analysis NBA stands for © 2009 SecurActive. Proprietary and Confidential
  • 14. © 2009 SecurActive. Proprietary and Confidential Overview of NBA solutions
  • 15. © 2009 SecurActive. Proprietary and Confidential Capture of strategic flows on the corporate network Private network security Track non compliant usage, incidents and security breaches Diagnosis Analysis & network / security incident resolution Analysis of Network and Application behaviour Monitoring, planning & decision making Main features of a NBA solution NBA Solution IP Flow analysis Storage, presentation
  • 16. Main features of a NBA solution © 2009 SecurActive. Proprietary and Confidential Capture of strategic flows NBA Solution IP Flow analysis Storage, presentation Diagnostic and Troubleshooting Private network security Analysis of Network and Application behaviours
  • 17. How should a perfect NBA solutions be? Increase the effectiveness of an IT team and make network management easier Simple and intuitive to use Configuration of the solution has to be made according to your business context Understand the real behaviour of the network No change in the network architecture (no additional point of failure) A passive implementation Personalised reports and alerting modules Work free-minded
  • 18. © 2009 SecurActive. Proprietary and Confidential SecurActive NSS, a NBA solution
  • 19. Dashboard Network map Graphs Details SecurActive NSS’s - Our Approach SecurActive NSS approach Classical network analysis approach Large volume of data to be analysed 1 to 5 clicks from synthesis to detail Report © 2009 SecurActive. Proprietary and Confidential
  • 20. SecurActive, a NBA solution Network usage and flow mapping Security/Network Application Performance Capture of strategic flows
  • 21. SecurActive How it works? © 2009 SecurActive. Proprietary and Confidential Dashboard Network map Graphs Details Queryengine GUI Report Alert Storage Alertengine Business Context Network aggregation Security aggregation NSS Sniffer
  • 22. SecurActive NSS, a NBA Solution © 2009 SecurActive. Proprietary and Confidential
  • 23.
  • 25. Appliance with 2 to 9 listening ports
  • 26.
  • 28. Network and Security alertsListening ports Administration port
  • 29. SecurActive – Range of solutions © 2009 SecurActive. Proprietary and Confidential NSS-800 8 GE + 2 SPF + 1 additional interface NSS-500 8 GE + 2 additional interfaces Performance NSS-200 7 GE (+1GE) Set of appliances to address every kind of needs. NSS-100 2GE +1FE (+1FE) NSS-10 2FE (+1 FE) Large Enterprise Remote Office/ Medium Enterprise
  • 30. © 2009 SecurActive. Proprietary and Confidential Demonstration
  • 31.
  • 34. Reporting© 2009 SecurActive. Proprietary and Confidential Half a day
  • 35. I want to centralise one of my vital applications
  • 36. Server WAN network ERP ERP Wb Wa Main network Remote site
  • 37. Server WAN network Wb ERP Wa Remote site Main network
  • 38.
  • 40. LAN
  • 42. The network does not have correct configuration for its back-up program.
  • 43. Situation Regional French newspaper group Has numerous news agencies, some of which are located in zones that are not equipped with high speed Internet access Some journalists have difficulties transmitting their articles on time because of a slow network. Without SecurActive No one is able to determine the cause of the slowdown. Simple ping measures are made and obtain normal results on the network’s lines at 64kbps. The problem persists for weeks. © 2009 SecurActive. Proprietary and Confidential
  • 44. People are complaining about my ERP. Why?
  • 45. TCP Connection Time © 2009 SecurActive. Proprietary and Confidential SYN SYNACK Connection Time ACK time Server Client WAN network
  • 46. Round Trip Time In © 2009 SecurActive. Proprietary and Confidential Data RTTin ACK time Server Client WAN network
  • 47. Round Trip Time Out © 2009 SecurActive. Proprietary and Confidential Data RTTout ACK time Server Client WAN network
  • 48. Application Response Time © 2009 SecurActive. Proprietary and Confidential Applicative request Applicative treatment ART 1stpacket of applicative response time Server Client WAN network
  • 49. Retransmission delay © 2009 SecurActive. Proprietary and Confidential Non-acknowledgedpacket RD time Server Client WAN network First acknowledgedpacket ACK
  • 50. Where are my misconfigured devices in my LAN?
  • 51. ICMP Errors © 2009 SecurActive. Proprietary and Confidential Client Server « Host unreachable »
  • 52. Why is my internet so slow?
  • 53. Situation This is a service company The work culture is liberal and there is complete trust on network users. Access to the Internet is usually slow Without SecurActive: poor quality of the link? the illegal use of the Internet? or the insufficient bandwidth? © 2009 SecurActive. Proprietary and Confidential
  • 54. © 2009 SecurActive. Proprietary and Confidential Conclusion
  • 55.
  • 57. Maximise the quality of your network
  • 58. Management of network suppliers (telcos) & SLAs
  • 59. Make best decisions on your network architecture
  • 61. Reduce costs and limit inefficient investments
  • 68. Have a proactive approach to quality of service
  • 69.