SlideShare a Scribd company logo
1 of 36
Download to read offline
EXTENDING AZURE
NETWORK VISIBILITY
WITH MICROSOFT, GIGAMON AND FIDELIS
Presenting today
Karthik Ananthrakrishnan
Program Manager Azure Networking
Microsoft
Baseer Balazadeh
Senior Technical Marketing Engineer
Gigamon
Tom Clare
Senior Product Marketing Manager
Fidelis Cybersecurity
2
Agenda
• Overview of Microsoft Azure Virtual Network TAP
• Gigamon Cloud Overview
• Examine Gigamon Cloud for Azure
• Integration with Fidelis Network
• Review how to detect threats, inspect content and automate
response with Fidelis Network
3
Azure Virtual Network TAP
Karthik Ananthakrishnan
Program Manager, Networking
Forensics
On-Premises
Microsoft
Azure
Network Packet
Broker
TAP
Internet
Network traffic visibility in on-premise networks
5
First native distributed cloud scale TAP
available in public cloud!
6
Virtual Network TAP
Azure Load
Balancer
App Tier Subnet
Web Tier Subnet
Network Packet
Broker
Monitoring Subnet
VM Production Traffic
VM Mirrored Traffic
Virtual Network
TAP
Tools
Security
Operations
Network
Operations
Application
Operations
Forensics
7
Virtual Network TAP
Continuous streaming of virtual machine network traffic to packet collector
Agentless!
Enabling network and application performance management solutions, security
analytics tools​
Complete segmentation ​of security ops and VM owner in a monitoring boundary. VM
owner cannot delete TAPs configured by Security Ops
8
Gigamon Cloud
Baseer Balazadeh – Sr Technical
Marketing Engineering, Cloud
© 2018 Gigamon. All rights reserved. For Internal Use Only 10
Security
Intelligence
Visibility Nodes
Physical, Virtual, and Cloud Infrastructure
Management and
Orchestration
Gigamon Product Portfolio
GigaVUE-FM
▸ Flow Mapping® ▸ Clustering▸ Inline Bypass
▸ GigaVUE H Series
Intelligent Visibility
Virtual
▸ GigaVUE TA Series
Tap Aggregators
▸ G-TAP
Taps
GigaVUE-OS
▸ GigaStream®
Physical
▸ GigaVUE-VM
Tap Aggregator
Cloud
▸ GigaVUE V Series
Intelligent Visibility
▸ G-vTAP
Virtual Taps
Core Intelligence
Insight
Data Store
▸ Detect
▸ Investigate
GigaSMART® Application Intelligence
► Application Visualization
► Application Filter Intelligence
► Application Metadata Intelligence
Subscriber Intelligence
▸ GTP Correlation
▸ FlowVUE® Flow Sampling
▸ SIP/RTP Correlation
▸ 5G/CUPS Correlation
Traffic Intelligence
▸ De-duplication
▸ Slicing
▸ Masking
▸ SSL/TLS Decryption
▸ NetFlow Generation
▸ Advanced Load Balancing
▸ Tunneling
▸ Adaptive Packet Filtering
▸ Header Stripping
API IQL
2019 Gigamon. All rights reserved. 11
Assure the public cloud is being used securely by entire enterprise
Not just identity and access management
Deploy more applications in the public cloud while meeting the needs of compliance and
security
Detect and respond to security or network anomalies
Detect application bottlenecks
Detect lateral movement of threats
Detect data exfiltration
Deploy a well-defined cloud security architecture
Challenges for Cloud Ops and Security Ops Teams
2019 Gigamon. All rights reserved. 12
Public Cloud Visibility Challenges and Gigamon Solution
X Inability to access all traffic
X Discrete vendor monitoring agents per instance
X Impacts workload and virtual network performance
X Static visibility with heavy disruption
✓ Minimize agent overload
✓ Aggregate, select, optimize, and distribute traffic
✓ Customize orchestration and
single-pane-of-glass visualization
✓ Elastic Visibility with ATS as workloads scale-out
Database
Web
Tier
App
Tier
Load Balancer
Tool Tier
Virtual Network or Virtual Private Cloud
AZ
CSP IaaS
NW
Load Balancer
GigaSECURE Cloud
RDS
Web
Tier
App
Tier
ELB
ELB
Tool Tier
Region
AZ
VPC
Database
Web
Tier
App
Tier
Load Balancer
Load Balancer
Virtual Network or Virtual Private Cloud
AZ
CSP IaaS
NW
Visibility Tier
GigaVUE-FM
Tool
Tier
Load Balancer Subnet Database Availability Zone (AZ)ToolInstances
GigaVUE-Cloud for Azure
2019 Gigamon. All rights reserved. 14
Visibility into Microsoft Azure
Azure: Generally Available
GigaVUE-Cloud is an intelligent network
traffic visibility solution that enables
enterprises to secure mission-critical
workloads in Azure
2019 Gigamon. All rights reserved. 15
Deployment Scenario: Azure Hybrid Infrastructure
Availability Set
Web Tier
Subnet
Azure Load
Balancer
Virtual Network
Availability Set
App Tier
Subnet
Azure Load
Balancer
SQL
Database
Visibility Tier
Tool
Tier
Tool
Tier
GigaVUE-FM
2
Deploy Visibility Tier2
Tunneling
4 4
Aggregate and distribute
customized traffic to tools
4
Azure
APIs
1
Integrate with Azure APIs1
Copy Virtual Machine traffic3
3
3
On-Premises Data Center
Data center
RouterVPN Gateway
2019 Gigamon. All rights reserved. 16
Deployment Scenario: Azure Centralized Visibility
Visibility Subnet Tool
Subnet
Visibility Subnet
GigaVUE-FM
Azure APIs
On-Premises
Data Center
Security, Performance Management,
and Analytics Tools
App Tier
Subnet
Web Tier
Subnet
Applications SecOps Business
Units
Visibility Subnet
App Tier
Subnet
Web Tier
Subnet
ExpressRoute
2019 Gigamon. All rights reserved. 17
Deployment Scenario: PaaS
Availability Set
Web
Tier
Subnet
Availability Set
Business
Tier
Subnet
Internet
Virtual Network
Data
Tier
Subnet
Availability Set
REST APIs
GigaVUE-FM
Azure
APIs
Cloud Tools
Configure
Policies
GigaVUE® V Series
2019 Gigamon. All rights reserved. 18
Visibility Tier
Virtual Network 1 Virtual Network 2
Azure Load
Balancing
Azure Load
Balancing
Tool Tier
WireShark
West Central RegionWest US Region
Tool Tier
Splunk
Insight
Fidelis
Peering
Fabric Manager
Application
Performance
Netflow
v5, v9, IPFIX
Slicing
WordPress
Node.js
WebApp
DVWA
Windows
Server
NOC/SOC
Agentless Visibility (Azure vTAP)
Azure API
2019 Gigamon. All rights reserved. 19
GigaVUE V Series
Visibility nodes that aggregate, select, optimize and distribute
traffic
• Acquire and aggregate traffic from G-vTAP agents and Azure vTAP
• Advanced filtering using Flow Mapping
• Generate summarized flow records from network traffic with
NetFlow/IPFIX generation
• Obscure sensitive data with Header Transformation
• Optimize selected traffic with GigaSMART® slicing, sampling, and
masking
• Distribute optimized traffic to tools located anywhere
• Elastic scale and performance
Traffic Aggregation, Optimization, and Distribution
RDS
Web
Tier
App
Tier
ELB
ELB
Tool Tier
Region
AZ
VPC
Database
Web
Tier
App
Tier
Load Balancer
Load Balancer
Virtual Network or Virtual Private Cloud
AZ
CSP IaaS
NW
Visibility Tier
GigaVUE-FM
Tool
Tier
GigaVUE V Series
2019 Gigamon. All rights reserved. 20
GigaVUE FM
Centralized orchestration and single-pane-of-glass visualization
• Tight integration with cloud provider APIs (AWS and Azure)
o Quickly detect compute instance changes
o Automatically adjust Visibility Tiers
• Open REST APIs can be consumed by tools
o Dynamically adjust traffic received
• Auto-discovery and end-to-end topology visualization
Orchestration and Management
RDS
Web
Tier
App
Tier
ELB
ELB
Tool Tier
Region
AZ
VPC
Database
Web
Tier
App
Tier
Load Balancer
Load Balancer
Virtual Network or Virtual Private Cloud
AZ
CSP IaaS
NW
Visibility Tier
GigaVUE-FM
Tool
Tier
GigaVUE-FM
2019 Gigamon. All rights reserved. 21
Network &
Application
Performance
Management
Azure: Cloud Validated Tools
Security and
Vulnerability
Management
Infrastructure
Open Source
2019 Gigamon. All rights reserved. 22
Summary
• Patented Flow
Mapping® to customize
and distribute traffic of
interest
• GigaVUE-FM: Intuitive
drag-and-drop user
interface
• Automatic Target
Selection®: Elastic and
automated visibility for
new workloads
• Open REST APIs for
Automation and
Orchestration
• Patented GigaSMART®
traffic intelligence:
Slicing, Masking,
Sampling,
NetFlow/IPFIX*
• Optimize Tool
performance, reduce
network backhaul
• Multi-Cloud: Azure,
AWS, VMware,
OpenStack
• Benefits any tool any
where that needs
network traffic for
analysis
Fidelis Network
DETECT. HUNT. RESPOND.
© Fidelis Cybersecurity
What You Get With Fidelis Network
24
VISIBILITY
Minimize false positives and
shift from clues to conclusions
so you can quickly address
the alerts that matter most.
Conduct real-time network
analysis and identify behaviors
that indicate compromises.
Automate detection for the
proactive discovery of attackers,
suspicious hosts, and malware.
Identify threats and data
leakage using deep inspection
and analysis of all forms of
content, including unpacking
and extraction of deeply
embedded files.
DETECTION RESPONSE
Threat Prevention
and Detection
Rich Metadata of
Content & Context
DLP for Network,
Email & Web
Automated Response
Playbooks & Scripts
Threat Research &
Intelligence Feeds
© Fidelis Cybersecurity
Detection & Response Visibility
25
• All ports and protocols with DPI, DSI (Layer7), and PCAPs
• Bi-directional analysis with full session reassembly
• Protocol, application, and deep content decoding with
recursive extraction
• Direct, internal, email, web and cloud traffic sensor
locations for wide visibility
• Cyber terrain asset profiling and classification including
importing external sources
• Structured metadata for over 300 attributes, indexed for
fast queries to investigate and hunt
• Enhanced metadata (e.g. alerts, threat intel, geo-
location, policy tagging, ID2IP)
• Custom tags from content of decoded objects (e.g.
author, footer, keyword)
• Metadata storage on-premises or cloud for 360+ days for
retrospective analysis
North-SouthEast-West
Office 365
© Fidelis Cybersecurity
Configuration, Investigation, Analysis, Response, Integration
Deep Session Inspection®
Metadata
and Tags
D E E P S E S S I O N I N S P E C T I O N ®
Content Analysis,
Malware Detection
Deep Content
Decoding
Protocol and
Application Decoding
Full Session
Reassembly
Real-Time
Threat
Detection
Network
Non-
Selective
Network
Memory
Fidelis
CommandPost
FidelisCollector
Fidelis
Sensors
26
© Fidelis Cybersecurity
Deep Content Decoding and Analysis
Deep, Recursive Content Decoding and Analysis
Detects content-level threats that are invisible to other network security systems
Able to apply threat intelligence over a larger detection surface
27
Network
Packets
Session Buffers (RAM)
Content Buffers (RAM)
Content Buffers (RAM)
Non-Selectively “Exploding” Recursively
Embedded Content Objects in RAM
Session
Reassembly
Content Decoders
and Analyzers
Content Decoders
and Analyzers
Protocol and
Application Decoders
and Analyzers
© Fidelis Cybersecurity
Deep Content Visibility
Visibility into Deeply Embedded Network Content (Inbound and Outbound)
28
PDF
DeflateText
Malware
ExcelText
ZIP
PPT
MIME
SMTP
Text
Malicious
Inbound
Content
Classified
Sensitive
Outbound
Content
© Fidelis Cybersecurity
Comprehensive Sensors
29
Fidelis Network Direct Sensor
Fidelis Network Mail Sensor
Fidelis Network Internal Sensor
Fidelis Network Web Sensor
Gateway sensor, all ports and protocol
visibility, 10G sensor HW performance
Datacenter sensor, handles SMB,
DB transactions, and Cloud VMs
Enables graceful quarantine, prevention
of email traffic for DLP and threats
Web proxy traffic via ICAP with web page
redirects for policy violations (DLP, threats)
© Fidelis Cybersecurity
Cyber Terrain Mapping
• Provides Insights of an Organization’s Resources
• Passive Identification, Profiling and Classification
• Assets
- Devices (servers, endpoint, IoT, legacy systems)
• Data
- OS, Applications, Ports
• Comm. Channels and Network Servers Usage
- Shadow-IT tools, Legacy Applications, App Servers, Tools
- Servers: FTP, SSH, DNS, Proxy
• Discover
- Automatic Processes Vs. Human Browsing Sessions
- Internal and External Activities
• Visualization Graphs of Asset Connectivity
30
© Fidelis Cybersecurity
Prevent Threats and Data Loss
31
• Threat Prevention using static signatures, multi-
dimensional behavior rules, threat intelligence feeds,
plus emulation and heuristics
• DLP using data profiling and classification with pre-built
policies for known compliance regulations across
network, email and web sensors to alert on policy
violations
• Data Leakage/Theft where direct and internal sensors
drop sessions, email sensors quarantine, drop, re-route,
or remove attachments, and web sensors redirect web
pages or drop sessions
• Email security via MTA for on-premises or cloud SaaS
email with pre-click URL analysis, attachment analysis,
and OCR image to text analysis for data leakage
• Security analytics based on high and low frequencies,
plus sequencing analysis
North-SouthEast-West
Office 365
© Fidelis Cybersecurity
Detect and Hunt
32
• Threat Detection using cloud-based sandboxing, network
behavior analysis, new threat intelligence automatically
applied to retrospective metadata, plus machine learning
anomaly detection
• Profiling TLS encrypted traffic based on metadata and
certificates, determining human browsing versus
machine traffic, plus evolving data science models to
detect hidden threats
• Threat intelligence open feeds (Fidelis Insight,
Reputation, STIX/TAXII, YARA, Suricata) plus internal
threat intel including custom rules and indicators
• Threat hunting with real-time content analysis or
retrospective indexed metadata supporting fast iterative
and interactive queries to test hunting hypotheses
• Threat Research as a Service (TRaaS) provides on-
demand threat research, intelligence, counter measures,
services, and training
North-SouthEast-West
Office 365
© Fidelis Cybersecurity
Automate Response
33
• Derive conclusions within one solution with aggregated
alerts, context, and evidence
• Automate prevention, detection, investigation and response
with playbooks and custom scripts
• Expose misuse of assets and encryption, plus discover proxy
and security circumvention
• Custom protocol detection, de-obfuscation, attack paths,
and internal threat detection
• Risk scoring with behavioral and historical analytics, plus
policy and alert management
• Open policy interface, plus sending alerts and data to SIEM
or SOAR solutions
• MDR Service provides 24/7 response using our security
stack, metadata, defenses and threat intelligence
North-SouthEast-West
Office 365
© Fidelis Cybersecurity34
Sensors Agents Decoys
Threat Intelligence
Fidelis Insight
3rd Party Threat Intel
Customer Defined Intel
Sandboxing
Execution Analysis
File & Web Analysis
ML-based Malware Detection
ACurated Security Stack— Integrated,Automated & Correlated
FIDELIS ELEVATE™
SIEM
Real Time Analysis –
Detect and Respond
Historical Metadata –
Hunt and Investigate
Response Automation and Analytics Engine
Breadcrumbs | Decoys
AD | MITM
Gateway | Internal |Cloud
Email | Web
Windows | Linux
Mac | Cloud
Data Science
Statistical analysis
Supervised learning models
SOAR
Questions and Next Steps
Learn More
• Fidelis Integration with Azure: https://www.fidelissecurity.com/technology-partners/microsoft-azure
• Fidelis Network Datasheet: https://www.fidelissecurity.com/resources/datasheets/network
See Fidelis in Action
• Free Trial of Fidelis Network: https://www.fidelissecurity.com/network/trial
• Schedule a 1-on-1 Demo: https://www.fidelissecurity.com/products/network/demo35
azurevnettap@microsoft.com
https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-tap-overview
https://azure.microsoft.com/en-us/pricing/details/virtual-network/
https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-faq#virtual-network-tap
Free Trials
• 30 Day Free Trial in Azure Marketplace: https://azuremarketplace.microsoft.com/en-
us/marketplace/apps?search=gigamon&page=1
• 1 Hour Test Drive: https://www.gigamon.com/solutions/use-cases/cloud/gigasecure-cloud-azure.html
Thank You

More Related Content

What's hot

Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksFidelis Cybersecurity
 
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Part 1: Identifying  Insider Threats with Fidelis EDR Technology Part 1: Identifying  Insider Threats with Fidelis EDR Technology
Part 1: Identifying Insider Threats with Fidelis EDR Technology Fidelis Cybersecurity
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis Cybersecurity
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
 
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...Outpost24
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryQuest
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...SaraPia5
 
Disección de amenazas en entornos de nube
Disección de amenazas en entornos de nubeDisección de amenazas en entornos de nube
Disección de amenazas en entornos de nubeCristian Garcia G.
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.marketingunitrends
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceTom K
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?marketingunitrends
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityMarketingArrowECS_CZ
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chainSymantec Brasil
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyVeriato
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthIceQUICK
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallAlienVault
 

What's hot (20)

The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacks
 
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Part 1: Identifying  Insider Threats with Fidelis EDR Technology Part 1: Identifying  Insider Threats with Fidelis EDR Technology
Part 1: Identifying Insider Threats with Fidelis EDR Technology
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception Solution
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
 
Disección de amenazas en entornos de nube
Disección de amenazas en entornos de nubeDisección de amenazas en entornos de nube
Disección de amenazas en entornos de nube
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General Audience
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
 

Similar to Extending Azure Network Visibility with Microsoft, Gigamon and Fidelis

Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraRogerChaucaZea
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdfssusera76ea9
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecaseRENJITHKNAIR5
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаBAKOTECH
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Securitypatmisasi
 
Wavefront by vmware june 2019 - legraswindow
Wavefront by vmware   june 2019 - legraswindowWavefront by vmware   june 2019 - legraswindow
Wavefront by vmware june 2019 - legraswindowAnil Gupta (AJ) - vExpert
 
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...Amazon Web Services
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochureRajDodiya4
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloudcentralohioissa
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsAngel Villar Garea
 
Webinar: Overcoming the Top Challenges of Recovery to the Cloud
Webinar: Overcoming the Top Challenges of Recovery to the CloudWebinar: Overcoming the Top Challenges of Recovery to the Cloud
Webinar: Overcoming the Top Challenges of Recovery to the Cloudiland Cloud
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...Cisco Canada
 

Similar to Extending Azure Network Visibility with Microsoft, Gigamon and Fidelis (20)

Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Wavefront by vmware june 2019 - legraswindow
Wavefront by vmware   june 2019 - legraswindowWavefront by vmware   june 2019 - legraswindow
Wavefront by vmware june 2019 - legraswindow
 
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochure
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX Deployments
 
Webinar: Overcoming the Top Challenges of Recovery to the Cloud
Webinar: Overcoming the Top Challenges of Recovery to the CloudWebinar: Overcoming the Top Challenges of Recovery to the Cloud
Webinar: Overcoming the Top Challenges of Recovery to the Cloud
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Extending Azure Network Visibility with Microsoft, Gigamon and Fidelis

  • 1. EXTENDING AZURE NETWORK VISIBILITY WITH MICROSOFT, GIGAMON AND FIDELIS
  • 2. Presenting today Karthik Ananthrakrishnan Program Manager Azure Networking Microsoft Baseer Balazadeh Senior Technical Marketing Engineer Gigamon Tom Clare Senior Product Marketing Manager Fidelis Cybersecurity 2
  • 3. Agenda • Overview of Microsoft Azure Virtual Network TAP • Gigamon Cloud Overview • Examine Gigamon Cloud for Azure • Integration with Fidelis Network • Review how to detect threats, inspect content and automate response with Fidelis Network 3
  • 4. Azure Virtual Network TAP Karthik Ananthakrishnan Program Manager, Networking
  • 6. First native distributed cloud scale TAP available in public cloud! 6
  • 7. Virtual Network TAP Azure Load Balancer App Tier Subnet Web Tier Subnet Network Packet Broker Monitoring Subnet VM Production Traffic VM Mirrored Traffic Virtual Network TAP Tools Security Operations Network Operations Application Operations Forensics 7
  • 8. Virtual Network TAP Continuous streaming of virtual machine network traffic to packet collector Agentless! Enabling network and application performance management solutions, security analytics tools​ Complete segmentation ​of security ops and VM owner in a monitoring boundary. VM owner cannot delete TAPs configured by Security Ops 8
  • 9. Gigamon Cloud Baseer Balazadeh – Sr Technical Marketing Engineering, Cloud
  • 10. © 2018 Gigamon. All rights reserved. For Internal Use Only 10 Security Intelligence Visibility Nodes Physical, Virtual, and Cloud Infrastructure Management and Orchestration Gigamon Product Portfolio GigaVUE-FM ▸ Flow Mapping® ▸ Clustering▸ Inline Bypass ▸ GigaVUE H Series Intelligent Visibility Virtual ▸ GigaVUE TA Series Tap Aggregators ▸ G-TAP Taps GigaVUE-OS ▸ GigaStream® Physical ▸ GigaVUE-VM Tap Aggregator Cloud ▸ GigaVUE V Series Intelligent Visibility ▸ G-vTAP Virtual Taps Core Intelligence Insight Data Store ▸ Detect ▸ Investigate GigaSMART® Application Intelligence ► Application Visualization ► Application Filter Intelligence ► Application Metadata Intelligence Subscriber Intelligence ▸ GTP Correlation ▸ FlowVUE® Flow Sampling ▸ SIP/RTP Correlation ▸ 5G/CUPS Correlation Traffic Intelligence ▸ De-duplication ▸ Slicing ▸ Masking ▸ SSL/TLS Decryption ▸ NetFlow Generation ▸ Advanced Load Balancing ▸ Tunneling ▸ Adaptive Packet Filtering ▸ Header Stripping API IQL
  • 11. 2019 Gigamon. All rights reserved. 11 Assure the public cloud is being used securely by entire enterprise Not just identity and access management Deploy more applications in the public cloud while meeting the needs of compliance and security Detect and respond to security or network anomalies Detect application bottlenecks Detect lateral movement of threats Detect data exfiltration Deploy a well-defined cloud security architecture Challenges for Cloud Ops and Security Ops Teams
  • 12. 2019 Gigamon. All rights reserved. 12 Public Cloud Visibility Challenges and Gigamon Solution X Inability to access all traffic X Discrete vendor monitoring agents per instance X Impacts workload and virtual network performance X Static visibility with heavy disruption ✓ Minimize agent overload ✓ Aggregate, select, optimize, and distribute traffic ✓ Customize orchestration and single-pane-of-glass visualization ✓ Elastic Visibility with ATS as workloads scale-out Database Web Tier App Tier Load Balancer Tool Tier Virtual Network or Virtual Private Cloud AZ CSP IaaS NW Load Balancer GigaSECURE Cloud RDS Web Tier App Tier ELB ELB Tool Tier Region AZ VPC Database Web Tier App Tier Load Balancer Load Balancer Virtual Network or Virtual Private Cloud AZ CSP IaaS NW Visibility Tier GigaVUE-FM Tool Tier Load Balancer Subnet Database Availability Zone (AZ)ToolInstances
  • 14. 2019 Gigamon. All rights reserved. 14 Visibility into Microsoft Azure Azure: Generally Available GigaVUE-Cloud is an intelligent network traffic visibility solution that enables enterprises to secure mission-critical workloads in Azure
  • 15. 2019 Gigamon. All rights reserved. 15 Deployment Scenario: Azure Hybrid Infrastructure Availability Set Web Tier Subnet Azure Load Balancer Virtual Network Availability Set App Tier Subnet Azure Load Balancer SQL Database Visibility Tier Tool Tier Tool Tier GigaVUE-FM 2 Deploy Visibility Tier2 Tunneling 4 4 Aggregate and distribute customized traffic to tools 4 Azure APIs 1 Integrate with Azure APIs1 Copy Virtual Machine traffic3 3 3 On-Premises Data Center Data center RouterVPN Gateway
  • 16. 2019 Gigamon. All rights reserved. 16 Deployment Scenario: Azure Centralized Visibility Visibility Subnet Tool Subnet Visibility Subnet GigaVUE-FM Azure APIs On-Premises Data Center Security, Performance Management, and Analytics Tools App Tier Subnet Web Tier Subnet Applications SecOps Business Units Visibility Subnet App Tier Subnet Web Tier Subnet ExpressRoute
  • 17. 2019 Gigamon. All rights reserved. 17 Deployment Scenario: PaaS Availability Set Web Tier Subnet Availability Set Business Tier Subnet Internet Virtual Network Data Tier Subnet Availability Set REST APIs GigaVUE-FM Azure APIs Cloud Tools Configure Policies GigaVUE® V Series
  • 18. 2019 Gigamon. All rights reserved. 18 Visibility Tier Virtual Network 1 Virtual Network 2 Azure Load Balancing Azure Load Balancing Tool Tier WireShark West Central RegionWest US Region Tool Tier Splunk Insight Fidelis Peering Fabric Manager Application Performance Netflow v5, v9, IPFIX Slicing WordPress Node.js WebApp DVWA Windows Server NOC/SOC Agentless Visibility (Azure vTAP) Azure API
  • 19. 2019 Gigamon. All rights reserved. 19 GigaVUE V Series Visibility nodes that aggregate, select, optimize and distribute traffic • Acquire and aggregate traffic from G-vTAP agents and Azure vTAP • Advanced filtering using Flow Mapping • Generate summarized flow records from network traffic with NetFlow/IPFIX generation • Obscure sensitive data with Header Transformation • Optimize selected traffic with GigaSMART® slicing, sampling, and masking • Distribute optimized traffic to tools located anywhere • Elastic scale and performance Traffic Aggregation, Optimization, and Distribution RDS Web Tier App Tier ELB ELB Tool Tier Region AZ VPC Database Web Tier App Tier Load Balancer Load Balancer Virtual Network or Virtual Private Cloud AZ CSP IaaS NW Visibility Tier GigaVUE-FM Tool Tier GigaVUE V Series
  • 20. 2019 Gigamon. All rights reserved. 20 GigaVUE FM Centralized orchestration and single-pane-of-glass visualization • Tight integration with cloud provider APIs (AWS and Azure) o Quickly detect compute instance changes o Automatically adjust Visibility Tiers • Open REST APIs can be consumed by tools o Dynamically adjust traffic received • Auto-discovery and end-to-end topology visualization Orchestration and Management RDS Web Tier App Tier ELB ELB Tool Tier Region AZ VPC Database Web Tier App Tier Load Balancer Load Balancer Virtual Network or Virtual Private Cloud AZ CSP IaaS NW Visibility Tier GigaVUE-FM Tool Tier GigaVUE-FM
  • 21. 2019 Gigamon. All rights reserved. 21 Network & Application Performance Management Azure: Cloud Validated Tools Security and Vulnerability Management Infrastructure Open Source
  • 22. 2019 Gigamon. All rights reserved. 22 Summary • Patented Flow Mapping® to customize and distribute traffic of interest • GigaVUE-FM: Intuitive drag-and-drop user interface • Automatic Target Selection®: Elastic and automated visibility for new workloads • Open REST APIs for Automation and Orchestration • Patented GigaSMART® traffic intelligence: Slicing, Masking, Sampling, NetFlow/IPFIX* • Optimize Tool performance, reduce network backhaul • Multi-Cloud: Azure, AWS, VMware, OpenStack • Benefits any tool any where that needs network traffic for analysis
  • 24. © Fidelis Cybersecurity What You Get With Fidelis Network 24 VISIBILITY Minimize false positives and shift from clues to conclusions so you can quickly address the alerts that matter most. Conduct real-time network analysis and identify behaviors that indicate compromises. Automate detection for the proactive discovery of attackers, suspicious hosts, and malware. Identify threats and data leakage using deep inspection and analysis of all forms of content, including unpacking and extraction of deeply embedded files. DETECTION RESPONSE Threat Prevention and Detection Rich Metadata of Content & Context DLP for Network, Email & Web Automated Response Playbooks & Scripts Threat Research & Intelligence Feeds
  • 25. © Fidelis Cybersecurity Detection & Response Visibility 25 • All ports and protocols with DPI, DSI (Layer7), and PCAPs • Bi-directional analysis with full session reassembly • Protocol, application, and deep content decoding with recursive extraction • Direct, internal, email, web and cloud traffic sensor locations for wide visibility • Cyber terrain asset profiling and classification including importing external sources • Structured metadata for over 300 attributes, indexed for fast queries to investigate and hunt • Enhanced metadata (e.g. alerts, threat intel, geo- location, policy tagging, ID2IP) • Custom tags from content of decoded objects (e.g. author, footer, keyword) • Metadata storage on-premises or cloud for 360+ days for retrospective analysis North-SouthEast-West Office 365
  • 26. © Fidelis Cybersecurity Configuration, Investigation, Analysis, Response, Integration Deep Session Inspection® Metadata and Tags D E E P S E S S I O N I N S P E C T I O N ® Content Analysis, Malware Detection Deep Content Decoding Protocol and Application Decoding Full Session Reassembly Real-Time Threat Detection Network Non- Selective Network Memory Fidelis CommandPost FidelisCollector Fidelis Sensors 26
  • 27. © Fidelis Cybersecurity Deep Content Decoding and Analysis Deep, Recursive Content Decoding and Analysis Detects content-level threats that are invisible to other network security systems Able to apply threat intelligence over a larger detection surface 27 Network Packets Session Buffers (RAM) Content Buffers (RAM) Content Buffers (RAM) Non-Selectively “Exploding” Recursively Embedded Content Objects in RAM Session Reassembly Content Decoders and Analyzers Content Decoders and Analyzers Protocol and Application Decoders and Analyzers
  • 28. © Fidelis Cybersecurity Deep Content Visibility Visibility into Deeply Embedded Network Content (Inbound and Outbound) 28 PDF DeflateText Malware ExcelText ZIP PPT MIME SMTP Text Malicious Inbound Content Classified Sensitive Outbound Content
  • 29. © Fidelis Cybersecurity Comprehensive Sensors 29 Fidelis Network Direct Sensor Fidelis Network Mail Sensor Fidelis Network Internal Sensor Fidelis Network Web Sensor Gateway sensor, all ports and protocol visibility, 10G sensor HW performance Datacenter sensor, handles SMB, DB transactions, and Cloud VMs Enables graceful quarantine, prevention of email traffic for DLP and threats Web proxy traffic via ICAP with web page redirects for policy violations (DLP, threats)
  • 30. © Fidelis Cybersecurity Cyber Terrain Mapping • Provides Insights of an Organization’s Resources • Passive Identification, Profiling and Classification • Assets - Devices (servers, endpoint, IoT, legacy systems) • Data - OS, Applications, Ports • Comm. Channels and Network Servers Usage - Shadow-IT tools, Legacy Applications, App Servers, Tools - Servers: FTP, SSH, DNS, Proxy • Discover - Automatic Processes Vs. Human Browsing Sessions - Internal and External Activities • Visualization Graphs of Asset Connectivity 30
  • 31. © Fidelis Cybersecurity Prevent Threats and Data Loss 31 • Threat Prevention using static signatures, multi- dimensional behavior rules, threat intelligence feeds, plus emulation and heuristics • DLP using data profiling and classification with pre-built policies for known compliance regulations across network, email and web sensors to alert on policy violations • Data Leakage/Theft where direct and internal sensors drop sessions, email sensors quarantine, drop, re-route, or remove attachments, and web sensors redirect web pages or drop sessions • Email security via MTA for on-premises or cloud SaaS email with pre-click URL analysis, attachment analysis, and OCR image to text analysis for data leakage • Security analytics based on high and low frequencies, plus sequencing analysis North-SouthEast-West Office 365
  • 32. © Fidelis Cybersecurity Detect and Hunt 32 • Threat Detection using cloud-based sandboxing, network behavior analysis, new threat intelligence automatically applied to retrospective metadata, plus machine learning anomaly detection • Profiling TLS encrypted traffic based on metadata and certificates, determining human browsing versus machine traffic, plus evolving data science models to detect hidden threats • Threat intelligence open feeds (Fidelis Insight, Reputation, STIX/TAXII, YARA, Suricata) plus internal threat intel including custom rules and indicators • Threat hunting with real-time content analysis or retrospective indexed metadata supporting fast iterative and interactive queries to test hunting hypotheses • Threat Research as a Service (TRaaS) provides on- demand threat research, intelligence, counter measures, services, and training North-SouthEast-West Office 365
  • 33. © Fidelis Cybersecurity Automate Response 33 • Derive conclusions within one solution with aggregated alerts, context, and evidence • Automate prevention, detection, investigation and response with playbooks and custom scripts • Expose misuse of assets and encryption, plus discover proxy and security circumvention • Custom protocol detection, de-obfuscation, attack paths, and internal threat detection • Risk scoring with behavioral and historical analytics, plus policy and alert management • Open policy interface, plus sending alerts and data to SIEM or SOAR solutions • MDR Service provides 24/7 response using our security stack, metadata, defenses and threat intelligence North-SouthEast-West Office 365
  • 34. © Fidelis Cybersecurity34 Sensors Agents Decoys Threat Intelligence Fidelis Insight 3rd Party Threat Intel Customer Defined Intel Sandboxing Execution Analysis File & Web Analysis ML-based Malware Detection ACurated Security Stack— Integrated,Automated & Correlated FIDELIS ELEVATE™ SIEM Real Time Analysis – Detect and Respond Historical Metadata – Hunt and Investigate Response Automation and Analytics Engine Breadcrumbs | Decoys AD | MITM Gateway | Internal |Cloud Email | Web Windows | Linux Mac | Cloud Data Science Statistical analysis Supervised learning models SOAR
  • 35. Questions and Next Steps Learn More • Fidelis Integration with Azure: https://www.fidelissecurity.com/technology-partners/microsoft-azure • Fidelis Network Datasheet: https://www.fidelissecurity.com/resources/datasheets/network See Fidelis in Action • Free Trial of Fidelis Network: https://www.fidelissecurity.com/network/trial • Schedule a 1-on-1 Demo: https://www.fidelissecurity.com/products/network/demo35 azurevnettap@microsoft.com https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-tap-overview https://azure.microsoft.com/en-us/pricing/details/virtual-network/ https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-faq#virtual-network-tap Free Trials • 30 Day Free Trial in Azure Marketplace: https://azuremarketplace.microsoft.com/en- us/marketplace/apps?search=gigamon&page=1 • 1 Hour Test Drive: https://www.gigamon.com/solutions/use-cases/cloud/gigasecure-cloud-azure.html