SlideShare una empresa de Scribd logo
1 de 21
Implementing ITIL v3 Practices with David Lennon  Sr. Systems Engineer Lumeta Corporation  [email_address] Constantine Malaxos  Director, Bus. Dev. Lumeta Corporation  [email_address] Lumeta Chris Johnson,  President  Open Access Systems [email_address] 973-838-5525
ITIL v3 map http://www.oasyscorp.com/itilv3map.html
 
Sample RACI Matrix
 
One World, One Network
From Where You Stand,  Can you  Really  See the Network Boundaries?
Defining Data Breaches Verizon’s - 2008 DATA BREACH - INVESTIGATIONS REPORT -  Four Years of Forensic Research. More than 500 Cases. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Discovery for Situational Awareness of the Entire Network Infrastructure   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ One of the issues is we don’t have a way of sharing and seeing the networks today in a timely manner... We’ve got to build that situational awareness ” - LTG Alexander, Director, NSA at RSA 2009
Back to the Future ,[object Object],[object Object],[object Object],[object Object],[object Object]
Gathering Network Data for Action Actionable Network Discovery Data Pinpoint Unauthorized Connectivity Between Discovered Networks Discover Known and Unknown Networks Identify the Network Perimeter Discover Complete Connected IP Address Space and Accompanying Hosts Identify Attributes of Network Devices and Discovered Hosts Network Discovery Host Discovery Leak Discovery Device Fingerprinting OpenAPI Lumeta Network Index Interactive, Searchable Network Maps In-depth Reporting
Provides Automated, Comprehensive Device Discovery for IT Asset Management   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Patented Leak Discovery for Data Leak Prevention ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Discovery Drives Process Improvement &  Cost Efficiencies in IT Asset Management Projects ,[object Object],[object Object],[object Object],[object Object],[object Object],Validate the Assets Update the Database Baseline the Network
Enables Faster Time-to-Value for IT  in Mergers, Acquisitions, Divestitures Unknown / Unmanaged Network Segments Leak to Internet Known /  Managed Network Undocumented Partner Connections
Keeps You Ahead Of Audits  With Active Device Discovery   ,[object Object],[object Object],[object Object],[object Object]
Provides Global Network Visibility for Network Change ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Cost & Number of Data Breaches are Rising ,[object Object],[object Object],[object Object],[object Object],[object Object],Sources:  http://datalossdb.org/ ; Ponemon Institute, “Cost Of A Data Breach”, Verizon Business, “2009 Data Breach Investigations Report” Verizon Business, “2009 Data Breach Investigations Report”
IPsonar offers Unparalleled Network Visibility ,[object Object],[object Object],[object Object],[object Object],Finds inbound and outbound “leaks” Provides a comprehensive view of the entire routed infrastructure ,[object Object],[object Object],Provides visibility into every IP asset, host, node, and connection on  the network – including non-traditional IP-enabled devices
Quick ITIL Wins Using Lumeta IPsonar   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THANK YOU David Lennon  Sr. Systems Engineer Lumeta Corporation  [email_address] Constantine Malaxos  Director, Bus. Dev. Lumeta Corporation  [email_address] Chris Johnson President Open Access Systems [email_address] 973-838-5525

Más contenido relacionado

La actualidad más candente

MDR-SOC is a cybersecurity framework services | Ampcus Inc
MDR-SOC is a cybersecurity framework services | Ampcus IncMDR-SOC is a cybersecurity framework services | Ampcus Inc
MDR-SOC is a cybersecurity framework services | Ampcus IncUnified11
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to SecurityPriyanka Aash
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to PracticeAlgoSec
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
 
Using Big Data for Cybersecurity
Using Big Data for CybersecurityUsing Big Data for Cybersecurity
Using Big Data for CybersecuritySplunk
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system IJECEIAES
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...natjordan6
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Zoe Gilbert
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?Ahmed Banafa
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignPriyanka Aash
 

La actualidad más candente (20)

MDR-SOC is a cybersecurity framework services | Ampcus Inc
MDR-SOC is a cybersecurity framework services | Ampcus IncMDR-SOC is a cybersecurity framework services | Ampcus Inc
MDR-SOC is a cybersecurity framework services | Ampcus Inc
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to Security
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Using Big Data for Cybersecurity
Using Big Data for CybersecurityUsing Big Data for Cybersecurity
Using Big Data for Cybersecurity
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control Design
 

Destacado

Pragmatische Einführung von IT-Servicemanagement - ITIL im Unternehmen - Erfa...
Pragmatische Einführung von IT-Servicemanagement - ITIL im Unternehmen - Erfa...Pragmatische Einführung von IT-Servicemanagement - ITIL im Unternehmen - Erfa...
Pragmatische Einführung von IT-Servicemanagement - ITIL im Unternehmen - Erfa...GFU Cyrus AG
 
ITIL Best Practice for Software Companies
ITIL Best Practice for Software CompaniesITIL Best Practice for Software Companies
ITIL Best Practice for Software CompaniesDaniel Brody
 
IT-Service Management nach ITIL
IT-Service Management nach ITILIT-Service Management nach ITIL
IT-Service Management nach ITILGFU Cyrus AG
 
Cloud Operating Model Design
Cloud Operating Model DesignCloud Operating Model Design
Cloud Operating Model DesignJoseph Schwartz
 
Starting With a Side Project
Starting With a Side ProjectStarting With a Side Project
Starting With a Side ProjectRachel Andrew
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

Destacado (8)

Pragmatische Einführung von IT-Servicemanagement - ITIL im Unternehmen - Erfa...
Pragmatische Einführung von IT-Servicemanagement - ITIL im Unternehmen - Erfa...Pragmatische Einführung von IT-Servicemanagement - ITIL im Unternehmen - Erfa...
Pragmatische Einführung von IT-Servicemanagement - ITIL im Unternehmen - Erfa...
 
ITIL Best Practice for Software Companies
ITIL Best Practice for Software CompaniesITIL Best Practice for Software Companies
ITIL Best Practice for Software Companies
 
IT-Service Management nach ITIL
IT-Service Management nach ITILIT-Service Management nach ITIL
IT-Service Management nach ITIL
 
Cloud Operating Model Design
Cloud Operating Model DesignCloud Operating Model Design
Cloud Operating Model Design
 
Introduction to maintenance
Introduction to maintenanceIntroduction to maintenance
Introduction to maintenance
 
Starting With a Side Project
Starting With a Side ProjectStarting With a Side Project
Starting With a Side Project
 
ITIL and Service Management
ITIL and Service ManagementITIL and Service Management
ITIL and Service Management
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similar a Lumeta IPsonar Aligned to ITIL v3

What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTSplunk
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
SplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunk
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsAdeo Security
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)Jeff Green
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlowAuditor
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docxSUBHI7
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...SolarWinds
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET Journal
 
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream Splunk
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentationaksit_services
 

Similar a Lumeta IPsonar Aligned to ITIL v3 (20)

Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINT
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
SplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT Breakout
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006 PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
 
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 

Más de Open Access Systems Corporation (6)

Network Critical SmartNA Configuration Overview
Network Critical SmartNA Configuration OverviewNetwork Critical SmartNA Configuration Overview
Network Critical SmartNA Configuration Overview
 
A10 Itil Oasys Webex 090309
A10 Itil Oasys  Webex 090309A10 Itil Oasys  Webex 090309
A10 Itil Oasys Webex 090309
 
Oasys Stonesoft Aligned with ITIL
Oasys Stonesoft Aligned with ITILOasys Stonesoft Aligned with ITIL
Oasys Stonesoft Aligned with ITIL
 
Network Critical Taps
Network Critical TapsNetwork Critical Taps
Network Critical Taps
 
Giga Vue420 Items 04 09
Giga Vue420 Items 04 09Giga Vue420 Items 04 09
Giga Vue420 Items 04 09
 
Giga Vue2404 Items 04 09
Giga Vue2404 Items 04 09Giga Vue2404 Items 04 09
Giga Vue2404 Items 04 09
 

Último

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Último (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

Lumeta IPsonar Aligned to ITIL v3

  • 1. Implementing ITIL v3 Practices with David Lennon Sr. Systems Engineer Lumeta Corporation [email_address] Constantine Malaxos Director, Bus. Dev. Lumeta Corporation [email_address] Lumeta Chris Johnson, President Open Access Systems [email_address] 973-838-5525
  • 2. ITIL v3 map http://www.oasyscorp.com/itilv3map.html
  • 3.  
  • 5.  
  • 6. One World, One Network
  • 7. From Where You Stand, Can you Really See the Network Boundaries?
  • 8.
  • 9.
  • 10.
  • 11. Gathering Network Data for Action Actionable Network Discovery Data Pinpoint Unauthorized Connectivity Between Discovered Networks Discover Known and Unknown Networks Identify the Network Perimeter Discover Complete Connected IP Address Space and Accompanying Hosts Identify Attributes of Network Devices and Discovered Hosts Network Discovery Host Discovery Leak Discovery Device Fingerprinting OpenAPI Lumeta Network Index Interactive, Searchable Network Maps In-depth Reporting
  • 12.
  • 13.
  • 14.
  • 15. Enables Faster Time-to-Value for IT in Mergers, Acquisitions, Divestitures Unknown / Unmanaged Network Segments Leak to Internet Known / Managed Network Undocumented Partner Connections
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. THANK YOU David Lennon Sr. Systems Engineer Lumeta Corporation [email_address] Constantine Malaxos Director, Bus. Dev. Lumeta Corporation [email_address] Chris Johnson President Open Access Systems [email_address] 973-838-5525

Notas del editor

  1. Welcome to everyone. This is Chris Johnson from Open Access Systems Corporation. We are an IT Solutions Provider headquartered in Northern New Jersey since 1993 and are partners with Lumeta to bring Network Assurance and Risk Assessment solutions to our clients. Today we will highlight some of the features of Lumeta’s IPsonar and they how benefit ITIL v3 processes, enabling your organization to effectively secure and align IT to meet the goals and objectives of the business. ITIL v3 of course is a set of 5 Core Practices known as the IT Information Library maintained by the British government and used worldwide. Brief Lumeta History: In 1998, Bell Labs scientists developed the first generation of the IPsonar solution. The goal was to determine the boundaries and contents of the Internet itself - a successful effort now known as the Internet Mapping Project. The results are celebrated in the Guinness Book of World Records because of their massive scale. Lumeta spun off from Bell Labs in 2000 to help corporate and government enterprises achieve global network visibility. This legacy of innovation continues today. Lumeta solutions have been awarded repeatedly for advances in network assurance, as have members of their executive team - each of whom is a veteran of the network management and network security markets. During the presentation you can type in any questions or comments in the window at the lower right of your screen. We’ll try to address them while presenting and will directly answer them during the question and answer period at the end. Of course you can contact any of us to arrange an on-site meeting. We should be done in 45 minutes. 1 minute 45 seconds
  2. Here’s a simplified slide of the ITIL Life Cycles of what a mature IT organization “should do”, but not “how” to do it. The first 4 Life Cycles are shown as vertical stacks of processes and functions that have input and output relationships with other processes. The 5 th CSI is represented horizontally on the bottom. The arrow in the upper left remind us that the business owners, CEO’s and CFO’s want their IT investment to be aligned to meet the goals and objectives of the business. The business owners also define the policies and what regulations and what compliance is required. With this information the CIO and CTO will know what they “should” do. IT is organized with this framework that goes through the Life Cycles and the accompanying processes. Not all IT organizations adopt all these principals and often select those sub-processes applicable to their situations. Today we’re talking about Network Discovery and it’s value within this framework. With ITIL the CEO and CFO’s want IT to be aligned with the goals and objectives of the business. Service Strategy reviews the market, financial resources, and what overall services IT will provide. The Service Design cycle includes the processes of how to manage and assure a secure and available IT system that meets Service and Operational levels. Here is where roles are defined – who is responsible, accountable and which process owners need to be consulted or simply kept informed of different activities. It may not be too much of a surprise that the IT Information Security Management owner is Accountable to design and maintain the computer systems and networks used. Service Transition is the cycle where specifications are transformed into hardware and software to be used. The system goes through testing to assure service will be delivered and how the service will be managed in line with other process. A release package is created and transitioned into operations. Service Operations is the day to day running of the systems and front end to all users of IT. Help desk, problem and incident management, and access management are some of the main tasks facing Operations responsible to deliver the highest quality of IT services possible and to create value for the business. The Continual Service Improvement Life Cycle monitors key performance indicators and manages the CSI tasks that takes place within every process in all life cycles. Moving from a known state to an improved state requires a consistent set of reports. Let’s look at the Information Security Management Process in the Service Design Life Cycle shown here in the second vertical stack. (3 minutes 0 seconds)
  3. There are 5 Main Activities for the Information Security Process in ITIL v3. They’re based on inputs from Customers, SLA’s and OLA’s, Regulatory Requirements and the Business’ Security Policy. This diagram is a high level representation and was taken from the ITIL v3 wiki for Security Management – I’ve simplified the by original eliminating all the sub-process you would see if you went to the current wiki. The CONTROL process, at the center, establishes the framework and allocates responsibilities. This management process is responsible to insure monitoring and reporting for all IT Information Security activities. In order to Plan, Maintain, Implement and accurately Evaluate security you need to have exact information of what devices and network routes exist in the infrastructure and you need to know that they are monitored and under your Control. In large networks we find that devices and routes are often missed. (1 minute 10 seconds)
  4. OK, who’s responsible for what? This is a sample RACI Matrix – The R’s, A’s, C’s , and I’s get entered into the matrix defining who is Responsible, Accountable, Consulted, on simply Informed relative to activities. This chart is organized showing a set of the grouped activities a mature IT organization might develop and they are listed down the left. Across the top are the Life Cycles and their associated Processes. You may use something like this in your organization, however, there are several useful variations. Beyond the obvious security tasks outlined by the bold rectangles, I’ve highlighted other grouped activities in pale blue where a comprehensive network discovery tool will apply. All but 7 out of the 25 main activities here can be directly supported by IPsonar. I especially like numbers 11 and 12 that relate to Risk analysis. How can you effectively fulfill your role if the information you are using is inaccurate or incomplete? (1 minute 15 seconds)
  5. This diagram shows an overlay of a previous slide and it indicates the flow between life cycles when introducing a new service or changing an existing service. Every process’s input relies on current an accurate information about the network and devices in order to provide accurate output to the next processes. Consider again Continual Service Improvement at the bottom of the map : We work through 7 steps– define what we should measure , identify what we can measure , Gather, Process, Analyze, Report, Improve and keep optimizing IT to meet the goals and objectives of the business and to create value. With a Network Discovery tool you SHOULD be getting current, complete and accurate information of ALL network routes and devices. Lumeta CAN provide complete information about network routes and attached devices unlike any discovery or management system available as Constantine and David will discuss. You can visit the ITIL wiki and delve into each of the ITIL v3 processes I’ve mentioned and how their inputs and outputs are defined. Your particular organization may take and leave what it can use from the framework. ITIL v3 is the result of over three quarters of a century of development to achieve continual service improvement with its roots in the Deming Cycle –Plan, Do, Check, Act – which is also the basis for Six Sigma and COBIT. All are - continuous quality improvement models. You have to wonder -What ITIL v3 or improvement model has the ability to be comprehensive and conclusive if 10% of an organization’s network is not under management? -How about 20%? Can you have a successful Service Strategy, Service Design, Service Transition or Service Operations practice without breaks when you are working with inaccurate or incomplete information? It is not uncommon when we first engage an organization to discover 20% percent of the network is not visible to the IT department. That 20% consists of knowns and unknowns. At 20% if you have 10,000 IPs out there, 2000 are not visible. That 2000 is where your vulnerabilities are and your business is at risk. OK, At this point I will turn it over to Constantine Malaxos, Director of Business Development and David Lennon, Senior Systems Engineer from Lumeta. to get into these vulnerabilities and an overview of IPsonar and how to mitigate the risk. I’ll be back at the end to highlight a few Quick Wins for those of you implementing ITIL v3 practices. Use the box at the lower right of your screen to type in any questions or email us. Constantine….? (3minutes)
  6. Chris has mentioned 20%. This amount is important, but right now we are going to delve deeper into the why? Why would a large enterprise have 20% of their network NOT under management. Simple stated, your network and ours and everyone on this call, our networks exist in a hyper-connected reality where the most sensitive data or perimeter is literally only a few hops away from some of the most onerous threats to all of our organizations.
  7. What does the perimeter really look like? With the advent of remote computing, with our connections with customers, partners, mobile users, telecommuters and the move to cloud computing. What does your perimeter really look like? This complexity has led to an investment in solutions to help manage change in core infrastructure. Whether these tools are designed to find or assess vulnerabilities; detect/prevent intrusions; or configure, consolidate or manage your infrastructure, they all have the same “Achilles Heel”. All the infrastructure management tools deployed in global organizations today are based on a set of assumptions of what is actually connected on their network. What is visible to them. They all require you tell them which assets to work on or at least the range of IP addresses where to look to find networked assets to manage.  But what about the unknown? 
  8. Let’s talk about the origin of Data Breaches. Verizon had a great report in 2008- The Data Breach Investigations Report. Nine out of 10 data breaches involved…A system unknown to the organization; A system storing data that the organization did not know existed on that system; A system that had unknown network connections or accessibility and A system that had unknown accounts or privelages. We refer to this as the unknown unknowns.
  9. Read the quote… So, How do you Gain Situational Awareness of The Network Infrastructure: How do you fight proactively against “leaks” representing unknown, unrestricted pathways into and/or out of an organizations network. How do you Discover & map all Internet points of presence. How do you Identify and inventory all existing Internet connections. How do you Define & validate the perimeter, maintain accurate intelligence. How do you Determine where horizon boundaries exist. How do you Ensure entry points are properly managed & secured. How do you Perform active probe of entire address space. How do you Quickly and safely discover all IP addresses routed internally. How do you Prove the route of all discovered network connections. How do you Provide validation as connections are moved /changed /decommissioned. All of these questions are crucial in the proactive fight against data breaches and leaks. There is a need to reveal all unauthorized connections and identifying whether access is outbound, inbound, or both. 
  10. Lumeta empowers large enterprise and government with global network visibility, allowing clients to understand how network change affects security, availability, and compliance. Lumeta IPsonar® is the industry’s only network discovery product which discovers every asset on a network, including assets not currently under management and maps the connectivity between assets and networks to help with issues like Mergers & Acquisitions, IT Compliance, Cybersecurity, Critical Infrastructure Protection, Data Leak Prevention, and Large-scale Network Transformations and Roll-outs. Turn over to David Lennon
  11. David Lennon: IPsonar uniquely provides global network visibility of both known and unknown network connections. Starting with the known address space, the product identifies all connectivity and lays out the perimeter of the network. The scans are modular and build upon data gathered throughout each phase. Upon completion, the data is presented is forms from targeted checklists to visual analytics to scorecards meant for senior management.
  12. Retrieve a comprehensive set of network facts. IPsonar rapidly discovers the complete list of IP addresses and address ranges that are connected to the network. Validates reach from network management address space. Map your entire network. IPsonar easily maps every asset on a network – including assets not currently under management – visualizing the connectivity between assets and networks. Enables network and security teams to bring unknown assets under management while deploying security technology more effectively to mitigate risk. Stay in tune with ever-changing infrastructure. IPsonar accurately gauges the impact of network infrastructure change. Allows organizations to stay apprised of planned and unplanned network change, such as connectivity to a new business partner or the addition of unauthorized routers in a branch office. Identify unmanaged devices that may violate policy. Network Assurance enables organizations to discover unmanaged devices with possible policy violations, as well as vulnerable devices that are highly susceptible to a security breach. Ongoing scanning with IPsonar allows organizations to examine discrepancies in previous baselines to easily identify and remediate violations.
  13. Unknown or unauthorized connections on the network pose a major threat to data security. These network leaks represent a means to malicious or unauthorized entry across the network perimeter. Intrusion detection systems serve as gatekeepers to defend the network; nevertheless, circumvention can and does happen – particularly if they are not properly deployed around the areas of the most sensitive data. IPsonar has a patented technology to discover network leaks, and we’re the only tool that finds these unknown, unrestricted pathways into and/or out of an organization’s network perimeter. If sensitive data resides on a system that leaks to the Internet, for example, it may be exploited and used in unauthorized data transmission or access (a “data leak”). This results in significant risk exposure for the organization – many of which have unfortunately been exploited with the exposures documented in the media. While data leaks can happen in a number of ways, proactive network leak prevention protects a potentially high exposure channel in the defense of sensitive data.
  14. Constantine :What we propose is that an active baseline of layer 3 is a critical of a comprehensive security strategy and essential in achieving ITIL objectives. Baseline the network, Validate the assets, update the database. (If running late move to last slide)
  15. IPsonar®, is a fully-automated, comprehensive solution that intelligently streamlines the M&A process for both companies’ networks. Only Lumeta’s Network Assurance solution can give organizations global visibility into their entire network infrastructure, reducing the risk of security gaps, unaccounted infrastructure costs, or rogue network devices. IPsonar provides organizations with the intelligence to optimally drive consolidation efforts, empowering them to: Create an accurate baseline of the entire network before networks are merged and compare that to a subsequent scan after the merge. Plan & Execute Based on Facts, not Assumptions : Automate discovery, improve IT processes. Unlock Savings : Identify opportunities for efficiencies. Improved Performance During Transition : Maintain service availability, security & compliance. Measure Success : Produce security metrics before, during transition and after. .
  16. Maintain compliance amid network and regulatory change. Accurately gauge impact of policy change to security and compliance. Stay apprised of planned and unplanned network change, such as connectivity to a new business partner or addition of unauthorized routers in a branch office. Optimize vulnerability management and incident response. Periodically monitor compliance to assure new mandates and evolving resources do not compromise efforts. Export IPsonar’s network inventory to security tools, aligning them with network change. Eliminate audit surprises. Identify all connections and devices. Isolate configuration problems, and validate access control lists. Prioritize trouble spots so that issues are resolved before audits. Gain “fact-based” compliance reporting. Base reporting on IPsonar's objective results, not word of mouth or extrapolation
  17. Lumeta’s Network Assurance solutions empower you to base infrastructure plans on an accurate understanding of your network, so you can minimize risks while accelerating cost savings. With a comprehensive view of your network assets and their connections, you can easily adapt, maintain, and monitor your network in order to keep your defenses aligned with infrastructure changes and be confident that all of your network assets are under management. Reduce unplanned outages and compliance violations. Gain a regularly updated map of the network based on facts, not impartial or obsolete assumptions. Enable executives and administrators to "look before they leap." Scorecard and minimize network risk. Determine whether an initiative is causing the network to grow more or less stable, compliant and secure. Scorecard network risk prior to and during execution, ranking "contributing factors" to expedite remediation. Improve business continuity preparation and execution. Use a full understanding of hosts, devices and connections to verify plans will work as intended. Improve response to actual disruptions by determining their complete downstream impact. Manage the project portfolio to expected outcomes. Deliver accurate time lines for integration and management of new resources or connectivity to new partners. Use a big-picture network view to prevent projects in one area from destabilizing efforts in another.  
  18. Statistics
  19. Unique Differentiators for IPsonar Only product that provides visibility into every IP asset, host, node, and connection on the network; Only product that reports on network “leaks” – unknown, unrestricted pathways into and/or out of an organizations network – that represent policy violations and security threats; Only product that provides a comprehensive view of the entire routed infrastructure; Only product that measures risk from a network perspective; Only product that finds wireless access points that are connected to the wired network, and tests for inbound or outbound “leaks”; Provides information that is easily integrated into a variety of network and security management; and Is lightweight, fast and safe for the world’s largest high-assurance IP networks.
  20. Here are a few of the quick wins that you can gain when implementing ITIL – Read through ( Thank you for attending this seminar. Please contact me to further the discussion and to possibly arrange for a sample of IPsonar reports on your network. (3 minutes)
  21. Welcome to everyone. This is Chris Johnson from Open Access Systems Corporation. We are an IT Solutions Provider headquartered in Northern New Jersey since 1993 and are partners with Lumeta to bring Network Assurance and Risk Assessment solutions to our clients. Today we will highlight some of the features of Lumeta’s IPsonar and they how benefit ITIL v3 processes, enabling your organization to effectively secure and align IT to meet the goals and objectives of the business. ITIL v3 of course is a set of 5 Core Practices known as the IT Information Library maintained by the British government and used worldwide. Brief Lumeta History: In 1998, Bell Labs scientists developed the first generation of the IPsonar solution. The goal was to determine the boundaries and contents of the Internet itself - a successful effort now known as the Internet Mapping Project. The results are celebrated in the Guinness Book of World Records because of their massive scale. Lumeta spun off from Bell Labs in 2000 to help corporate and government enterprises achieve global network visibility. This legacy of innovation continues today. Lumeta solutions have been awarded repeatedly for advances in network assurance, as have members of their executive team - each of whom is a veteran of the network management and network security markets. During the presentation you can type in any questions or comments in the window at the lower right of your screen. We’ll try to address them while presenting and will directly answer them during the question and answer period at the end. Of course you can contact any of us to arrange an on-site meeting. We should be done in 45 minutes. 1 minute 45 seconds