SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
1© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
IXIA VISIBILITY ARCHITECTURE
Eliminating Blind spots
Юлий Явич, IXIA
2© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
of the
Fortune 100
of the
top 50 carriers
of the
top 15 NEMs
74
45
15
Customer
Focused
Innovation
Enterprise
Carriers/
Service Providers
NEMs
2014 Industry-first ATI security solution
2014 Industry-first virtual tap
2014 Industry-first 400GbE test solution
3© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
IXIA SOLUTION PORTFOLIO
Across the Infrastructure
Across ALL Platforms
Flex Taps,
iBypass,
Virtual Taps
802.11ac,
MU-MIMO
PerfectStorm
BPS vEPC
IxLoad/VE
IxNetwork/VE
Multis SDN
Threat
ARMOR,
ATI
Mobile Endpoint Network Data Center Cloud
NTO, Vision ONE,
Hawkeye,
xStream40,
Control Tower
TEST SECURITY VISIBILITY
6© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | 6© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
INTELLIGENT VISIBILITY
7© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Clients
INTELLIGENT VISIBILITY - CHALLENGES
Server
Network
TapSwitch Switch
How to:
• Get data access for tools?
• Network taps instead of SPAN
ports?
Network
Tap
Network
Tap
Tool 1 Tool 2 Tool N
How to:
• Deal with limited tool ports?
• Scale tool capacity?
• Filter traffic to tools?
• Manage access for each tool?
8© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Network
Operations
Application
Operations
Security
Admin
Forensics
INTELLIGENT VISIBILITY
End-to-End Data Access and Distribution
Switch
Switch
Servers
THE DATA CENTER
Taps
Taps
Taps
Network
Packet
Brokers
• Aggregation
• Filtering
• Load Balancing
• SSL Decryption
• NetFlow
1G
10G
40G
9© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
APPLICATIONS AND NETWORK PERFORMANCE TOOLS
10© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
SECURITY TOOLS
13© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
INTELLIGENT PACKET PROCESSING
All unique frames going to
10.0.0.0/8
Only the first 128 bytes of TCP Port
25 frames
Hardware AFM
NPB
Adv. Packet Processing
Advanced Packet Processing (AFM) Features
• Deduplication
• Header stripping
• Trimming
• Tunnel Termination
• Data Masking
• Timestamping
• Burst Protection
21© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ENTERPRISE – INTELLIGENT APPLICATION PROCESSING
• ATI Processor (ATIP) - Context-rich Application Visibility
• Application forwarding based on application, geography, and RegEx matching
• Real-time dashboard
• Rich NetFlow / IPFIX generation
– Device OS
– Browser
– Carrier BGP AS#
– Geolocation
• Data Masking
• Stateful SSL decryption
All traffic from Georgia
All voice traffic from HTC
Ones
Someone from remote office
Skype for business monitor
NPB –
App Brokering
Meta Data
App Filtering
26© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ATIP ENABLES SSL INSIGHT
• Passive decryption – no impact on application performance
• Fully compatible with all other ATIP features:
Rich Netflow/IPFIX
Data Masking
Geolocation
• Easy setup – just import server certificate & key
• All popular key exchange & ciphers:
RSA & DH Key Exchange
SHA1/521/384/256/224
MD5
• Application Filtering
• Handset/workstation type
• Browser identification
• 3DES
• RC4
• AES
• ECC (Elliptic Curve)
• Encryption details reported over Netflow Hardware Encryption Offload
27© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
SPY GLASS ACTIVE SSL
28© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
NTO FAMILY
NTO 7300
Vision ONE
• 48x1/10G & 4x40G
• Advanced Features
• ATI Processor
> Application layer filtering
> SSL Encryption
> Netflow Generation
• Inline Support
• Load Balancing
• GUI
• 1/10/40/100G Interfaces
• Advanced Features
• ATI Processor
> Application layer filtering
> SSL Encryption
> Netflow Generation
• Packet Capture
• Load Balancing
• GUI
31© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
General Features
> Full Duplex Mode
> Passes all traffic (including errors) from all
layers for comprehensive Troubleshooting
> Regeneration TAP
> No IP address is needed
> Redundant power ensures monitoring uptime
TP-CU3; TP-CU3-ZD
Network A Network B
Mon A
Mon B
TX
TXRX
RX
TX
TX
FULL DUPLEX COPPER TAP
32© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
- 1G/10G/40G/100G (LR & ER)
> Single Mode with LC Connector
-
1G (SX)
> Multi Mode with LC Connector
-
10G (SR)
> Multi Mode with LC Connector
- 40G (SR4 / Cisco Bidi/ MR4)
- 100G (SR10)
> Multi Mode with MTP Connector
IXIA FLEXTAP
34© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
GETTING VIRTUAL TRAFFIC TO MONITORING TOOLS
38© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
CUSTOMER CASE STUDY
International Bank
Customer
• Leading International Bank
Need
• Massive volumes or raw application traffic to monitor
• Control traffic inspection costs
• Improve overall Incident Response Team effectiveness
Results
• Deployed Ixia Intelligent Visibility solutions including NTO 7300
• Reduced monitored traffic using advanced filters of deduplication, packet slicing, IPs, VLANs
• VLAN marking and Time stamping to monitoring tools
• Reduced planned CapEx investments
39© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
CUSTOMER CASE STUDY
Large Hi-tech Company
Customer
• Large L2/3 manufacturer
Need
• Control traffic inspection costs
• Layer 7 filtering to Nectar tool
Results
• Deployed Ixia Intelligent Visibility solution including Vision One
• Reduced monitored traffic using deduplication
• Provided Skype for business specific traffic to Nectar tool
• Reduced planned CapEx investments
40© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
TECHNOLOGY ECOSYSTEM
TrafficREWIND is a unique patent pending solution that uses NetFlow metadata to regenerate the
dynamics of production networks within BreakingPoint test beds
Solution Overview
42© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | 42© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
RESILIENT SECURITY
43© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
RESILIENT SECURITY
Serial Deployments of Inline Security Tools is Dangerous
Switch
Server
Server
Switch
Switch
Switch
 Very complex operationally
 Single points of failure
 Administrative tension
 Expensive to scale
44© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Inline
Security
Tool Farm
RESILIENT SECURITY
A More Detailed View of a Resilient Security Framework
Switch
Server
Switch
Inline Security
Tool Farm
Server
Switch Switch
Bypass Switch
Bypass Switch
Network Packet
Brokers (HA)
Out of Band
Sandboxing
Monitored Tool Links via Heartbeat Packets
Threat Intelligence
Gateway
46© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
INLINE & MONITORING TOGETHER
Inline Monitoring
Inline
• IPS (multiple vendors)
Out-of-band Monitoring
• Data logging
49© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
WORLD-CLASS GLOBAL SUPPORT
Expert team of
>100 engineers
Proven track record
of superior support
Always-on
24x7 coverage
Best-in-class
support tools
50© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
WE MAKE
APPLICATIONS
STRONGER

Más contenido relacionado

La actualidad más candente

Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Canada
 
Cisco Connect Montreal 2017 - Mise à Jour UCS et Hyperflex
Cisco Connect Montreal 2017 - Mise à Jour UCS et HyperflexCisco Connect Montreal 2017 - Mise à Jour UCS et Hyperflex
Cisco Connect Montreal 2017 - Mise à Jour UCS et HyperflexCisco Canada
 
Network Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRNetwork Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRCisco Canada
 
Simplifying Cloud Adoption
Simplifying Cloud AdoptionSimplifying Cloud Adoption
Simplifying Cloud AdoptionCisco Canada
 
Gain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC NetworkingGain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC NetworkingCisco Canada
 
Развитие решений по коммутации в корпоративных сетях Cisco
Развитие решений по коммутации в корпоративных сетях CiscoРазвитие решений по коммутации в корпоративных сетях Cisco
Развитие решений по коммутации в корпоративных сетях CiscoCisco Russia
 
Data models-and-automation-jp
Data models-and-automation-jpData models-and-automation-jp
Data models-and-automation-jpMiya Kohno
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopCisco Canada
 
NFV Cloud DataCenter Adaptation & Tobe evolution ways
NFV Cloud DataCenter Adaptation & Tobe evolution waysNFV Cloud DataCenter Adaptation & Tobe evolution ways
NFV Cloud DataCenter Adaptation & Tobe evolution waysHongsik Choi
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Canada
 
Innovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceInnovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceCisco Canada
 
10G/40G gen to 25G/100G gen, and go forward (HPVI community meetup)
10G/40G gen to 25G/100G gen, and go forward (HPVI community meetup)10G/40G gen to 25G/100G gen, and go forward (HPVI community meetup)
10G/40G gen to 25G/100G gen, and go forward (HPVI community meetup)Takao Setaka
 
Presentation asa 5585-x next generation multi-service adaptive security app...
Presentation   asa 5585-x next generation multi-service adaptive security app...Presentation   asa 5585-x next generation multi-service adaptive security app...
Presentation asa 5585-x next generation multi-service adaptive security app...xKinAnx
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewallCisco Canada
 
Extreme fabric connect
Extreme fabric connectExtreme fabric connect
Extreme fabric connectMUK Extreme
 
Cisco Spark Hybrid Services Architectural Design
Cisco Spark Hybrid Services Architectural DesignCisco Spark Hybrid Services Architectural Design
Cisco Spark Hybrid Services Architectural DesignMark Milton, PMP
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleIxia
 
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...Cisco Canada
 
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6Robb Boyd
 

La actualidad más candente (20)

Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
 
Cisco Connect Montreal 2017 - Mise à Jour UCS et Hyperflex
Cisco Connect Montreal 2017 - Mise à Jour UCS et HyperflexCisco Connect Montreal 2017 - Mise à Jour UCS et Hyperflex
Cisco Connect Montreal 2017 - Mise à Jour UCS et Hyperflex
 
Network Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRNetwork Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XR
 
Simplifying Cloud Adoption
Simplifying Cloud AdoptionSimplifying Cloud Adoption
Simplifying Cloud Adoption
 
Gain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC NetworkingGain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC Networking
 
Развитие решений по коммутации в корпоративных сетях Cisco
Развитие решений по коммутации в корпоративных сетях CiscoРазвитие решений по коммутации в корпоративных сетях Cisco
Развитие решений по коммутации в корпоративных сетях Cisco
 
Data models-and-automation-jp
Data models-and-automation-jpData models-and-automation-jp
Data models-and-automation-jp
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking Workshop
 
NFV Cloud DataCenter Adaptation & Tobe evolution ways
NFV Cloud DataCenter Adaptation & Tobe evolution waysNFV Cloud DataCenter Adaptation & Tobe evolution ways
NFV Cloud DataCenter Adaptation & Tobe evolution ways
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven Telemetry
 
Innovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceInnovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching Space
 
10G/40G gen to 25G/100G gen, and go forward (HPVI community meetup)
10G/40G gen to 25G/100G gen, and go forward (HPVI community meetup)10G/40G gen to 25G/100G gen, and go forward (HPVI community meetup)
10G/40G gen to 25G/100G gen, and go forward (HPVI community meetup)
 
Presentation asa 5585-x next generation multi-service adaptive security app...
Presentation   asa 5585-x next generation multi-service adaptive security app...Presentation   asa 5585-x next generation multi-service adaptive security app...
Presentation asa 5585-x next generation multi-service adaptive security app...
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewall
 
Extreme fabric connect
Extreme fabric connectExtreme fabric connect
Extreme fabric connect
 
Cisco Spark Hybrid Services Architectural Design
Cisco Spark Hybrid Services Architectural DesignCisco Spark Hybrid Services Architectural Design
Cisco Spark Hybrid Services Architectural Design
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
 
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...
 
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
 

Similar a IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots

100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасностиАльбина Минуллина
 
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...Cisco Canada
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...Cisco Canada
 
Mạng chuyển mạch thế hệ mới
Mạng chuyển mạch thế hệ mớiMạng chuyển mạch thế hệ mới
Mạng chuyển mạch thế hệ mớiSunmedia Corporation
 
Cisco connect winnipeg 2018 gain insight and programmability with cisco dc ...
Cisco connect winnipeg 2018   gain insight and programmability with cisco dc ...Cisco connect winnipeg 2018   gain insight and programmability with cisco dc ...
Cisco connect winnipeg 2018 gain insight and programmability with cisco dc ...Cisco Canada
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
 
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Canada
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyCisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaCisco Canada
 
Disaggregation, automation and autonomy in optical networking
Disaggregation, automation and autonomy in optical networkingDisaggregation, automation and autonomy in optical networking
Disaggregation, automation and autonomy in optical networkingADVA
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPatrickAng14
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerADVA
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANRobb Boyd
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld
 
Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...Aruba, a Hewlett Packard Enterprise company
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:Cisco Canada
 
 Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation Network Innovations Driving Business Transformation
 Network Innovations Driving Business TransformationCisco Service Provider
 

Similar a IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots (20)

Vision one-customer
Vision one-customerVision one-customer
Vision one-customer
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности
 
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 
Mạng chuyển mạch thế hệ mới
Mạng chuyển mạch thế hệ mớiMạng chuyển mạch thế hệ mới
Mạng chuyển mạch thế hệ mới
 
Cisco connect winnipeg 2018 gain insight and programmability with cisco dc ...
Cisco connect winnipeg 2018   gain insight and programmability with cisco dc ...Cisco connect winnipeg 2018   gain insight and programmability with cisco dc ...
Cisco connect winnipeg 2018 gain insight and programmability with cisco dc ...
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
 
Disaggregation, automation and autonomy in optical networking
Disaggregation, automation and autonomy in optical networkingDisaggregation, automation and autonomy in optical networking
Disaggregation, automation and autonomy in optical networking
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.ppt
 
OmniSwitch 6860/E Overview
OmniSwitch 6860/E Overview OmniSwitch 6860/E Overview
OmniSwitch 6860/E Overview
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
 
 Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation
 

Más de Cisco Russia

Service portfolio 18
Service portfolio 18Service portfolio 18
Service portfolio 18Cisco Russia
 
История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?Cisco Russia
 
Об оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информацииОб оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информацииCisco Russia
 
Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.Cisco Russia
 
Клиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total CareКлиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total CareCisco Russia
 
Cisco Catalyst 9000 series
Cisco Catalyst 9000 series Cisco Catalyst 9000 series
Cisco Catalyst 9000 series Cisco Russia
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Профессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined AccessПрофессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined AccessCisco Russia
 
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...Cisco Russia
 
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отраслиПромышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отраслиCisco Russia
 
Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год Cisco Russia
 
Годовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 годГодовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 годCisco Russia
 
Безопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений CiscoБезопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений CiscoCisco Russia
 
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...Cisco Russia
 
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...Cisco Russia
 
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...Cisco Russia
 

Más de Cisco Russia (20)

Service portfolio 18
Service portfolio 18Service portfolio 18
Service portfolio 18
 
История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?
 
Об оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информацииОб оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информации
 
Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.
 
Клиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total CareКлиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total Care
 
Cisco Catalyst 9000 series
Cisco Catalyst 9000 series Cisco Catalyst 9000 series
Cisco Catalyst 9000 series
 
Cisco Catalyst 9500
Cisco Catalyst 9500Cisco Catalyst 9500
Cisco Catalyst 9500
 
Cisco Catalyst 9400
Cisco Catalyst 9400Cisco Catalyst 9400
Cisco Catalyst 9400
 
Cisco Umbrella
Cisco UmbrellaCisco Umbrella
Cisco Umbrella
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Cisco FirePower
Cisco FirePowerCisco FirePower
Cisco FirePower
 
Профессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined AccessПрофессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined Access
 
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
 
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отраслиПромышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
 
Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год
 
Годовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 годГодовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 год
 
Безопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений CiscoБезопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений Cisco
 
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
 
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
 
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
 

Último

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 

Último (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 

IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots

  • 1. 1© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots Юлий Явич, IXIA
  • 2. 2© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | of the Fortune 100 of the top 50 carriers of the top 15 NEMs 74 45 15 Customer Focused Innovation Enterprise Carriers/ Service Providers NEMs 2014 Industry-first ATI security solution 2014 Industry-first virtual tap 2014 Industry-first 400GbE test solution
  • 3. 3© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | IXIA SOLUTION PORTFOLIO Across the Infrastructure Across ALL Platforms Flex Taps, iBypass, Virtual Taps 802.11ac, MU-MIMO PerfectStorm BPS vEPC IxLoad/VE IxNetwork/VE Multis SDN Threat ARMOR, ATI Mobile Endpoint Network Data Center Cloud NTO, Vision ONE, Hawkeye, xStream40, Control Tower TEST SECURITY VISIBILITY
  • 4. 6© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | 6© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | INTELLIGENT VISIBILITY
  • 5. 7© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Clients INTELLIGENT VISIBILITY - CHALLENGES Server Network TapSwitch Switch How to: • Get data access for tools? • Network taps instead of SPAN ports? Network Tap Network Tap Tool 1 Tool 2 Tool N How to: • Deal with limited tool ports? • Scale tool capacity? • Filter traffic to tools? • Manage access for each tool?
  • 6. 8© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Network Operations Application Operations Security Admin Forensics INTELLIGENT VISIBILITY End-to-End Data Access and Distribution Switch Switch Servers THE DATA CENTER Taps Taps Taps Network Packet Brokers • Aggregation • Filtering • Load Balancing • SSL Decryption • NetFlow 1G 10G 40G
  • 7. 9© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | APPLICATIONS AND NETWORK PERFORMANCE TOOLS
  • 8. 10© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | SECURITY TOOLS
  • 9. 13© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | INTELLIGENT PACKET PROCESSING All unique frames going to 10.0.0.0/8 Only the first 128 bytes of TCP Port 25 frames Hardware AFM NPB Adv. Packet Processing Advanced Packet Processing (AFM) Features • Deduplication • Header stripping • Trimming • Tunnel Termination • Data Masking • Timestamping • Burst Protection
  • 10. 21© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | ENTERPRISE – INTELLIGENT APPLICATION PROCESSING • ATI Processor (ATIP) - Context-rich Application Visibility • Application forwarding based on application, geography, and RegEx matching • Real-time dashboard • Rich NetFlow / IPFIX generation – Device OS – Browser – Carrier BGP AS# – Geolocation • Data Masking • Stateful SSL decryption All traffic from Georgia All voice traffic from HTC Ones Someone from remote office Skype for business monitor NPB – App Brokering Meta Data App Filtering
  • 11. 26© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | ATIP ENABLES SSL INSIGHT • Passive decryption – no impact on application performance • Fully compatible with all other ATIP features: Rich Netflow/IPFIX Data Masking Geolocation • Easy setup – just import server certificate & key • All popular key exchange & ciphers: RSA & DH Key Exchange SHA1/521/384/256/224 MD5 • Application Filtering • Handset/workstation type • Browser identification • 3DES • RC4 • AES • ECC (Elliptic Curve) • Encryption details reported over Netflow Hardware Encryption Offload
  • 12. 27© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | SPY GLASS ACTIVE SSL
  • 13. 28© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | NTO FAMILY NTO 7300 Vision ONE • 48x1/10G & 4x40G • Advanced Features • ATI Processor > Application layer filtering > SSL Encryption > Netflow Generation • Inline Support • Load Balancing • GUI • 1/10/40/100G Interfaces • Advanced Features • ATI Processor > Application layer filtering > SSL Encryption > Netflow Generation • Packet Capture • Load Balancing • GUI
  • 14. 31© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | General Features > Full Duplex Mode > Passes all traffic (including errors) from all layers for comprehensive Troubleshooting > Regeneration TAP > No IP address is needed > Redundant power ensures monitoring uptime TP-CU3; TP-CU3-ZD Network A Network B Mon A Mon B TX TXRX RX TX TX FULL DUPLEX COPPER TAP
  • 15. 32© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | - 1G/10G/40G/100G (LR & ER) > Single Mode with LC Connector - 1G (SX) > Multi Mode with LC Connector - 10G (SR) > Multi Mode with LC Connector - 40G (SR4 / Cisco Bidi/ MR4) - 100G (SR10) > Multi Mode with MTP Connector IXIA FLEXTAP
  • 16. 34© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | GETTING VIRTUAL TRAFFIC TO MONITORING TOOLS
  • 17. 38© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | CUSTOMER CASE STUDY International Bank Customer • Leading International Bank Need • Massive volumes or raw application traffic to monitor • Control traffic inspection costs • Improve overall Incident Response Team effectiveness Results • Deployed Ixia Intelligent Visibility solutions including NTO 7300 • Reduced monitored traffic using advanced filters of deduplication, packet slicing, IPs, VLANs • VLAN marking and Time stamping to monitoring tools • Reduced planned CapEx investments
  • 18. 39© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | CUSTOMER CASE STUDY Large Hi-tech Company Customer • Large L2/3 manufacturer Need • Control traffic inspection costs • Layer 7 filtering to Nectar tool Results • Deployed Ixia Intelligent Visibility solution including Vision One • Reduced monitored traffic using deduplication • Provided Skype for business specific traffic to Nectar tool • Reduced planned CapEx investments
  • 19. 40© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | TECHNOLOGY ECOSYSTEM TrafficREWIND is a unique patent pending solution that uses NetFlow metadata to regenerate the dynamics of production networks within BreakingPoint test beds Solution Overview
  • 20. 42© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | 42© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | RESILIENT SECURITY
  • 21. 43© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | RESILIENT SECURITY Serial Deployments of Inline Security Tools is Dangerous Switch Server Server Switch Switch Switch  Very complex operationally  Single points of failure  Administrative tension  Expensive to scale
  • 22. 44© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Inline Security Tool Farm RESILIENT SECURITY A More Detailed View of a Resilient Security Framework Switch Server Switch Inline Security Tool Farm Server Switch Switch Bypass Switch Bypass Switch Network Packet Brokers (HA) Out of Band Sandboxing Monitored Tool Links via Heartbeat Packets Threat Intelligence Gateway
  • 23. 46© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | INLINE & MONITORING TOGETHER Inline Monitoring Inline • IPS (multiple vendors) Out-of-band Monitoring • Data logging
  • 24. 49© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | WORLD-CLASS GLOBAL SUPPORT Expert team of >100 engineers Proven track record of superior support Always-on 24x7 coverage Best-in-class support tools
  • 25. 50© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | WE MAKE APPLICATIONS STRONGER