SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
LAN, WAN, SAN,
   and now
     DAN
Data Access Network
What’s a DAN?
                             out-of-band passive monitoring network
                             Includes passive tools like:
                             Security IDS Sensors,
                             Application Performance Monitors,
                             Troubleshooting Protocol Analyzers,
                             VoIP QoS Probes,
Proprietary & Confidential




                             Forensic Recorders,

                             and Data Access Switching
DAN provides “Data Sockets”
                                       Part of a Flexible Network Infrastructure
                             •   Plug-in multiple out-of-band tools – ANY data to ANY tool
                             •   Unobtrusive 24x7 tool connections – never touch the network
                             •   Aggregate, Replicate, Filter and load balance data streams
                             •   Use legacy 1Gig tools to monitor new 10Gig networks
Proprietary & Confidential




                                                                                               3
Why are DANs Needed Now?
                                          Things Have Changed

                             Enron and 9/11 spawned SOX auditing, increased security
                             and lawful intercept requirement


                             PLUS technology and business developments:
                             Web site e-commerce and internet applications demand support
                             VoIP and media convergence make the network more strategic
Proprietary & Confidential




                             Green networking demands smaller Data Center footprint
                             Network is how business gets done. Downtime is unacceptable
Proliferation of Tools
                             New SOX compliance transaction monitors
                                Keep your boss out of jail!


                             IDS Sensors detect external attacks
                                From hackers

                             NAC appliance protects networks from inside
                                From your own people!


                             CALEA lawful intercept and Forensic Recorders
                             Configuration monitoring tools watch over network
Proprietary & Confidential




                             resources

                             Application and Network troubleshooting
Proliferation Causes Contention
                                       for Span Ports




                                                Security and IT
                                               Engineers seen
                                                     here
Proprietary & Confidential




                                              “Negotiating” Over
                                                 a SPAN Port
An Analogy:


                             Using a DAN is like using a power strip.
Proprietary & Confidential
Too Many Power Tools?
                              Not Enough Sockets?



                                   ?

                               ?             ?
                                         ?
Proprietary & Confidential
For Power Tools, use a Power Strip
Proprietary & Confidential
Too Many Monitoring Tools?
                               Not Enough Span Ports?

                                 ?

                                 ?
                                                 ?

                                  ?
Proprietary & Confidential
For Sensors/Monitors/Analyzers,
                                    Use a DAN Switch
Proprietary & Confidential




                              One Span port serves Many tools
What Other Problems do DANs
                                               solve?
                             Distributed Monitoring burning the budget?
                                Consolidate tools; $ave money on capital and operational budgets


                             Unsecure monitor or tap ports risk data leakage?
                                DAN can secure all access point to prevent snooping


                             Too much traffic for one tool?
                                Reduce and balance load over multiple units to match tool capacity
Proprietary & Confidential




                             Restrictive Configuration Management Policies?
                                Deploy tools and make changes on your own schedule
Monitoring a Mesh Network?
Proprietary & Confidential
Old Solution: Lots of Distributed Tools,
                                Deploy one tool per span port/switch
Proprietary & Confidential




                                         Lots of hardware…very expensive!
Better: Distribute Connections with a DAN
                                  Consolidate Tools; Save CapEx $$$
Proprietary & Confidential




                              Aggregate and balance flows to Consolidated Tools
DAN is “Best Practice” for Network
                                   Infrastructure Design
                             Totally flexible solution to many problems

                             Facilitates unobtrusive instrumentation of a network

                             Solves requirement for multiple tool access

                             Gives tools the view of the total network

                             Secures monitor and tap ports
Proprietary & Confidential




                             Improves monitor coverage, saves time and money.
DAN Solves Access Problems By

                             • Aggregating many links to any tool
                               • Multicasting any link to many tools
                                  • Filtering data to map packets to tools
                                      • Saving $$ Cap Ex and Op Ex budget$
Proprietary & Confidential




                                   Any to Any   Many to Any   Any to Many   Bit-Mask Filtering

Más contenido relacionado

La actualidad más candente

Stories from the Trainyard!
Stories from the Trainyard!Stories from the Trainyard!
Stories from the Trainyard!Patrick Kelley
 
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...UzairAhmad81
 
Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels PresentationRichard Blech
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityPaul Morse
 
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...Mikael Falkvidd
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Ixia NVS Group
 
Antenna Solutions from Laird Connectivity
Antenna Solutions from Laird Connectivity Antenna Solutions from Laird Connectivity
Antenna Solutions from Laird Connectivity Laird Connectivity
 
What is LoRaWAN_Tom Zamir_IoT Expert
What is LoRaWAN_Tom Zamir_IoT ExpertWhat is LoRaWAN_Tom Zamir_IoT Expert
What is LoRaWAN_Tom Zamir_IoT ExpertGuy Vinograd ☁
 
PetNovations case study_architecting IoT systems - Olga Shpigel
PetNovations case study_architecting IoT systems - Olga ShpigelPetNovations case study_architecting IoT systems - Olga Shpigel
PetNovations case study_architecting IoT systems - Olga ShpigelGuy Vinograd ☁
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting programBhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting programAPNIC
 

La actualidad más candente (20)

Stories from the Trainyard!
Stories from the Trainyard!Stories from the Trainyard!
Stories from the Trainyard!
 
Physically securing the wireless installation
Physically securing the wireless installationPhysically securing the wireless installation
Physically securing the wireless installation
 
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
 
Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels Presentation
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
Intercept product
Intercept productIntercept product
Intercept product
 
Day1
Day1Day1
Day1
 
Aruba wireless and clear pass 6 integration guide v1 1.3
Aruba wireless and clear pass 6 integration guide v1 1.3Aruba wireless and clear pass 6 integration guide v1 1.3
Aruba wireless and clear pass 6 integration guide v1 1.3
 
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
 
Antenna Solutions from Laird Connectivity
Antenna Solutions from Laird Connectivity Antenna Solutions from Laird Connectivity
Antenna Solutions from Laird Connectivity
 
2012 ah emea deploying byod
2012 ah emea   deploying byod2012 ah emea   deploying byod
2012 ah emea deploying byod
 
What is LoRaWAN_Tom Zamir_IoT Expert
What is LoRaWAN_Tom Zamir_IoT ExpertWhat is LoRaWAN_Tom Zamir_IoT Expert
What is LoRaWAN_Tom Zamir_IoT Expert
 
Ids 001 ids vs ips
Ids 001 ids vs ipsIds 001 ids vs ips
Ids 001 ids vs ips
 
PetNovations case study_architecting IoT systems - Olga Shpigel
PetNovations case study_architecting IoT systems - Olga ShpigelPetNovations case study_architecting IoT systems - Olga Shpigel
PetNovations case study_architecting IoT systems - Olga Shpigel
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting programBhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
 
Air heads rio 2010 aruba pef overview
Air heads rio 2010   aruba pef overviewAir heads rio 2010   aruba pef overview
Air heads rio 2010 aruba pef overview
 
SIGFOX Makers Tour - Madrid
SIGFOX Makers Tour - MadridSIGFOX Makers Tour - Madrid
SIGFOX Makers Tour - Madrid
 

Destacado

Network Monitoring Trends 2014
Network Monitoring Trends 2014Network Monitoring Trends 2014
Network Monitoring Trends 2014NetFort
 
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 h
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 hKappelman tribalnet - trends in IT infrastructure - 16nov2011 h
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 hLeon Kappelman
 
Five pillars of Infrastructure Monitoring
Five pillars of Infrastructure MonitoringFive pillars of Infrastructure Monitoring
Five pillars of Infrastructure MonitoringDaniel Koller
 
TheThingsNetwork Rhein-Neckar - Kurz-Pitch für den 22.2.
TheThingsNetwork Rhein-Neckar - Kurz-Pitch für den 22.2.TheThingsNetwork Rhein-Neckar - Kurz-Pitch für den 22.2.
TheThingsNetwork Rhein-Neckar - Kurz-Pitch für den 22.2.Daniel Koller
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...CA Technologies
 
Monitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceMonitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceSavvius, Inc
 
Performing Simulation-Based, Real-time Decision Making with Cloud HPC
Performing Simulation-Based, Real-time Decision Making with Cloud HPCPerforming Simulation-Based, Real-time Decision Making with Cloud HPC
Performing Simulation-Based, Real-time Decision Making with Cloud HPCinside-BigData.com
 
Strategic options for datacenter operations - Nordic market and infrastructure
Strategic options for datacenter operations - Nordic market and infrastructureStrategic options for datacenter operations - Nordic market and infrastructure
Strategic options for datacenter operations - Nordic market and infrastructureBusiness Sweden
 
SteelCentral Network Planning and Configuration Management (NPCM)
SteelCentral Network Planning and Configuration Management (NPCM)SteelCentral Network Planning and Configuration Management (NPCM)
SteelCentral Network Planning and Configuration Management (NPCM)Riverbed Technology
 
Open Source Logging and Monitoring Tools
Open Source Logging and Monitoring ToolsOpen Source Logging and Monitoring Tools
Open Source Logging and Monitoring ToolsPhase2
 
Managing and Monitoring Application Performance
Managing and Monitoring Application PerformanceManaging and Monitoring Application Performance
Managing and Monitoring Application PerformanceSebastian Marek
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor PresentationNafaâ TAYACHI
 
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
2016 Network Monitoring & Backup Brand Leader Survey Mini-ReportIT Brand Pulse
 
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...MuleSoft
 
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...PerformanceVision (previously SecurActive)
 
Application Performance Monitoring (APM)
Application Performance Monitoring (APM)Application Performance Monitoring (APM)
Application Performance Monitoring (APM)Site24x7
 
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016ThousandEyes
 

Destacado (20)

Network Monitoring Trends 2014
Network Monitoring Trends 2014Network Monitoring Trends 2014
Network Monitoring Trends 2014
 
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 h
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 hKappelman tribalnet - trends in IT infrastructure - 16nov2011 h
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 h
 
Five pillars of Infrastructure Monitoring
Five pillars of Infrastructure MonitoringFive pillars of Infrastructure Monitoring
Five pillars of Infrastructure Monitoring
 
TheThingsNetwork Rhein-Neckar - Kurz-Pitch für den 22.2.
TheThingsNetwork Rhein-Neckar - Kurz-Pitch für den 22.2.TheThingsNetwork Rhein-Neckar - Kurz-Pitch für den 22.2.
TheThingsNetwork Rhein-Neckar - Kurz-Pitch für den 22.2.
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
 
PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006 PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006
 
Monitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceMonitoring and Managing Network Application Performance
Monitoring and Managing Network Application Performance
 
Performing Simulation-Based, Real-time Decision Making with Cloud HPC
Performing Simulation-Based, Real-time Decision Making with Cloud HPCPerforming Simulation-Based, Real-time Decision Making with Cloud HPC
Performing Simulation-Based, Real-time Decision Making with Cloud HPC
 
Strategic options for datacenter operations - Nordic market and infrastructure
Strategic options for datacenter operations - Nordic market and infrastructureStrategic options for datacenter operations - Nordic market and infrastructure
Strategic options for datacenter operations - Nordic market and infrastructure
 
PRTG
PRTGPRTG
PRTG
 
SteelCentral Network Planning and Configuration Management (NPCM)
SteelCentral Network Planning and Configuration Management (NPCM)SteelCentral Network Planning and Configuration Management (NPCM)
SteelCentral Network Planning and Configuration Management (NPCM)
 
Open Source Logging and Monitoring Tools
Open Source Logging and Monitoring ToolsOpen Source Logging and Monitoring Tools
Open Source Logging and Monitoring Tools
 
Managing and Monitoring Application Performance
Managing and Monitoring Application PerformanceManaging and Monitoring Application Performance
Managing and Monitoring Application Performance
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
 
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
 
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
 
Application Performance Monitoring (APM)
Application Performance Monitoring (APM)Application Performance Monitoring (APM)
Application Performance Monitoring (APM)
 
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
 

Similar a Data Access Network for Monitoring and Troubleshooting

Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systemsgigamon
 
SWG Buyer Guide: Competitive Comparison
SWG Buyer Guide: Competitive ComparisonSWG Buyer Guide: Competitive Comparison
SWG Buyer Guide: Competitive ComparisonCourtland Smith
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAdvantec Distribution
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsetsresponsedatacomms
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsetsresponsedatacomms
 
Using sdn to secure the campus - Networkshop44
Using sdn to secure the campus - Networkshop44Using sdn to secure the campus - Networkshop44
Using sdn to secure the campus - Networkshop44Jisc
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Novell
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Real-Time Innovations (RTI)
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesLancope, Inc.
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC PresentationCloudComputing
 
Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environmentdeepers
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOpenStorageSummit
 
Introduction To NIDS
Introduction To NIDSIntroduction To NIDS
Introduction To NIDSMichael Boman
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 

Similar a Data Access Network for Monitoring and Troubleshooting (20)

Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systems
 
SWG Buyer Guide: Competitive Comparison
SWG Buyer Guide: Competitive ComparisonSWG Buyer Guide: Competitive Comparison
SWG Buyer Guide: Competitive Comparison
 
Intro to SDN - Part I
Intro to SDN - Part IIntro to SDN - Part I
Intro to SDN - Part I
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
Using sdn to secure the campus - Networkshop44
Using sdn to secure the campus - Networkshop44Using sdn to secure the campus - Networkshop44
Using sdn to secure the campus - Networkshop44
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environment
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
 
Introduction To NIDS
Introduction To NIDSIntroduction To NIDS
Introduction To NIDS
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 

Más de Grant Swanson

Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...Grant Swanson
 
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGrant Swanson
 
Gigamon U - Network Rules, Distributed Network Analysis Architecture
Gigamon U - Network Rules, Distributed Network Analysis ArchitectureGigamon U - Network Rules, Distributed Network Analysis Architecture
Gigamon U - Network Rules, Distributed Network Analysis ArchitectureGrant Swanson
 
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Grant Swanson
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGrant Swanson
 
Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGrant Swanson
 
Gigamon U - Packets Gone Wild
Gigamon U - Packets Gone WildGigamon U - Packets Gone Wild
Gigamon U - Packets Gone WildGrant Swanson
 
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Grant Swanson
 
Gigamon U - Missing Link TAP Technology
Gigamon U - Missing Link TAP TechnologyGigamon U - Missing Link TAP Technology
Gigamon U - Missing Link TAP TechnologyGrant Swanson
 
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic AnalysisGigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic AnalysisGrant Swanson
 
Gigamon U - Its Not The Network
Gigamon U - Its Not The NetworkGigamon U - Its Not The Network
Gigamon U - Its Not The NetworkGrant Swanson
 
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback AppliancesGigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback AppliancesGrant Swanson
 

Más de Grant Swanson (12)

Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
 
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
 
Gigamon U - Network Rules, Distributed Network Analysis Architecture
Gigamon U - Network Rules, Distributed Network Analysis ArchitectureGigamon U - Network Rules, Distributed Network Analysis Architecture
Gigamon U - Network Rules, Distributed Network Analysis Architecture
 
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control System
 
Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance Monitoring
 
Gigamon U - Packets Gone Wild
Gigamon U - Packets Gone WildGigamon U - Packets Gone Wild
Gigamon U - Packets Gone Wild
 
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
 
Gigamon U - Missing Link TAP Technology
Gigamon U - Missing Link TAP TechnologyGigamon U - Missing Link TAP Technology
Gigamon U - Missing Link TAP Technology
 
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic AnalysisGigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
 
Gigamon U - Its Not The Network
Gigamon U - Its Not The NetworkGigamon U - Its Not The Network
Gigamon U - Its Not The Network
 
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback AppliancesGigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
 

Último

Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Último (20)

Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

Data Access Network for Monitoring and Troubleshooting

  • 1. LAN, WAN, SAN, and now DAN Data Access Network
  • 2. What’s a DAN? out-of-band passive monitoring network Includes passive tools like: Security IDS Sensors, Application Performance Monitors, Troubleshooting Protocol Analyzers, VoIP QoS Probes, Proprietary & Confidential Forensic Recorders, and Data Access Switching
  • 3. DAN provides “Data Sockets” Part of a Flexible Network Infrastructure • Plug-in multiple out-of-band tools – ANY data to ANY tool • Unobtrusive 24x7 tool connections – never touch the network • Aggregate, Replicate, Filter and load balance data streams • Use legacy 1Gig tools to monitor new 10Gig networks Proprietary & Confidential 3
  • 4. Why are DANs Needed Now? Things Have Changed Enron and 9/11 spawned SOX auditing, increased security and lawful intercept requirement PLUS technology and business developments: Web site e-commerce and internet applications demand support VoIP and media convergence make the network more strategic Proprietary & Confidential Green networking demands smaller Data Center footprint Network is how business gets done. Downtime is unacceptable
  • 5. Proliferation of Tools New SOX compliance transaction monitors Keep your boss out of jail! IDS Sensors detect external attacks From hackers NAC appliance protects networks from inside From your own people! CALEA lawful intercept and Forensic Recorders Configuration monitoring tools watch over network Proprietary & Confidential resources Application and Network troubleshooting
  • 6. Proliferation Causes Contention for Span Ports Security and IT Engineers seen here Proprietary & Confidential “Negotiating” Over a SPAN Port
  • 7. An Analogy: Using a DAN is like using a power strip. Proprietary & Confidential
  • 8. Too Many Power Tools? Not Enough Sockets? ? ? ? ? Proprietary & Confidential
  • 9. For Power Tools, use a Power Strip Proprietary & Confidential
  • 10. Too Many Monitoring Tools? Not Enough Span Ports? ? ? ? ? Proprietary & Confidential
  • 11. For Sensors/Monitors/Analyzers, Use a DAN Switch Proprietary & Confidential One Span port serves Many tools
  • 12. What Other Problems do DANs solve? Distributed Monitoring burning the budget? Consolidate tools; $ave money on capital and operational budgets Unsecure monitor or tap ports risk data leakage? DAN can secure all access point to prevent snooping Too much traffic for one tool? Reduce and balance load over multiple units to match tool capacity Proprietary & Confidential Restrictive Configuration Management Policies? Deploy tools and make changes on your own schedule
  • 13. Monitoring a Mesh Network? Proprietary & Confidential
  • 14. Old Solution: Lots of Distributed Tools, Deploy one tool per span port/switch Proprietary & Confidential Lots of hardware…very expensive!
  • 15. Better: Distribute Connections with a DAN Consolidate Tools; Save CapEx $$$ Proprietary & Confidential Aggregate and balance flows to Consolidated Tools
  • 16. DAN is “Best Practice” for Network Infrastructure Design Totally flexible solution to many problems Facilitates unobtrusive instrumentation of a network Solves requirement for multiple tool access Gives tools the view of the total network Secures monitor and tap ports Proprietary & Confidential Improves monitor coverage, saves time and money.
  • 17. DAN Solves Access Problems By • Aggregating many links to any tool • Multicasting any link to many tools • Filtering data to map packets to tools • Saving $$ Cap Ex and Op Ex budget$ Proprietary & Confidential Any to Any Many to Any Any to Many Bit-Mask Filtering