SlideShare a Scribd company logo
1 of 27
Download to read offline
Visibility and Automation for
Enhanced Security
VP, Product Line Management
Ananda Rajagopal
3©2015 Gigamon. All rights reserved.
Pervasive Monitoring for Pervasive Visibility
WHAT IS DRIVING THIS EMERGING NEED?
• Increasing Security Threats
• “Zero Trust” Security model: network traffic monitoring
• Distributed applications create east-west traffic patterns
• Dynamically changing traffic patterns demand better visibility
• Maintain visibility through emerging network architecture changes
• E.g. White Box, SDN, VMware NSX, Cisco ACI, OpenFlow
• Eliminate blind spots due to new encapsulations, encryption*
• E.g. VXLAN, SSL traffic
Security, Distributed Apps, SDN, New Blind Spots Driving Pervasive Monitoring
* ‘Avoid These "Dirty Dozen" Network Security Worst Practices’, Andrew Lerner and Jeremy D'Hoinne, Gartner, January 2015
4©2015 Gigamon. All rights reserved.
Gaps in Traditional Security Model
Perimeter or
Endpoint Based
Simple
Trust Model
Static
Environment
• Inside vs. outside
• Focus on prevention
• Trusted vs
Un-trusted
• Corporate vs.
personal asset
• Fixed locations,
zones, perimeters
• Rule based
• Signature based
• Insider-outsider
boundary dissolved
• BYOD
• Mobility of users,
devices and
applications
5©2015 Gigamon. All rights reserved.
©2015 Gigamon. All rights reserved.
Gaps in Traditional Security Model
Perimeter or
Endpoint Based
Simple
Trust Model
Static
Environment
• Inside vs. outside
• Focus on prevention
• Trusted vs
Un-trusted
• Corporate vs.
personal asset
• Fixed locations,
zones, perimeters
• Rule based
• Signature based
• Insider-outsider
boundary dissolved
• BYOD
• Mobility of users,
devices and
applications
More importantly …
THE VERY NATURE
OF CYBER THREATS
HAS CHANGED!
6©2015 Gigamon. All rights reserved.
Source: RSA
Anatomy of an Advanced Persistent Threat (APT)
65432
In Many Cases the System Stays Breached After Exfiltration!
Phishing & zero
day attack
Back door
Lateral
movement
Data
gathering
Exfiltrate
1
Reconnaissance
7©2015 Gigamon. All rights reserved.
*Trustwave 2014 global security report
**FireEye: Maginot revisited
Current State of Global Security
The mean number of days from
initial intrusion to detection*
The average lifespan of a zero-day
before it is discovered or
disclosed*
of organizations had active Command
& Control (C&C) communications**
of organizations in the study were
breached during the test period**
8©2015 Gigamon. All rights reserved.
Internet
Firewall DMZ
IPS
Spine
Leaf
IDS
Server Farm
Core
Switch
What Else Has Changed That Impacts Security?
FUNDAMENTAL SHIFT IN TRAFFIC PATTERNS
No visibility into lateral
propagation of threats!
9©2015 Gigamon. All rights reserved.
What Else Has Changed That Impacts Security?
DISSOLVING BOUNDARIES BETWEEN THE EDGE AND THE DATA CENTER
Internet
Firewall DMZ
IPS
Spine
Leaf
IDS
Server Farm
Core
Switch
Virtual
Desktop
10©2015 Gigamon. All rights reserved.
What Else Has Changed That Impacts Security?
MOBILITY
Internet
Firewall DMZ
IPS
Spine
Leaf
IDS
Server Farm
Core
Switch
Virtual
Desktop
11©2015 Gigamon. All rights reserved.
Visibility: Catalyst for the Right
Security Architecture
WHAT IS NEEDED?
Deliver network
wide view, regardless
of mobility
Take the guesswork
out of where to
place security tools!
Condense large
volumes of data into
manageable data
Peek into
encrypted traffic
12©2015 Gigamon. All rights reserved.
• Proliferation of tools
• Contention for access to traffic
• Extraordinary costs
• Inconsistent view of traffic
• Model breaks down during a
network upgrade
The Spaghetti of Today’s Monitoring Infrastructure
WHY HAS IT NOT BEEN DONE YET?
Core
Switches
Access
Switches
Internet
Internet
Distribution
Switches
ANTI-
MALWARE
SIEM
DLP
IDS
IPS
FORENSICS
APT ANALYTIC
S
13©2015 Gigamon. All rights reserved.
Example Security Delivery Architecture
OFFERED BY GIGAMON TODAY
Leaf switch
Spine
switch
Spine
switch
Core
switch
Core
switch
Leaf switch
APM
IPS (Inline)
Anti-Malware (Inline)
Network Forensics
Web Analytics
SIEM
DLP
IDS
APT Detection
Security
Tool Rack
GigaVUE-VM
Inline
Bypass
SSL
Decryption
NetFlow
Generation
GigaVUE-FM
14©2015 Gigamon. All rights reserved.
Third Party Applications,
SDN Controller Integration, etc…
Applications & Tools Infrastructure,
User Community
Unified Visibility Fabric™
FOR PERVASIVE VISIBILITY INTO BUSINESS INFRASTRUCTURE
Traffic
Intelligence
Visibility
Fabric Nodes
(Pervasive visibility across
physical, virtual, remote
sites, and future SDN/NFV
production networks)
Fabric
Services Flow Mapping®
Fabric Control
(Management)
Applications
Inline Bypass
GigaVUE-HD8 GigaVUE-HD4 GigaVUE-HB1
GigaVUE-HC2
HSeries
TASeries
GigaVUE-TA1
GigaVUE-OS
on white box*
VirtualVisibility
GigaVUE-VM
TAPs
G-TAP
G-TAP A Series
G-TAP BiDi
Embedded TAPs
GSeries
GigaVUE-2404
GigaVUE-420
G-SECURE-0216
Deduplication
Packet Slicing
FlowVUE™
Masking
GTP Correlation
Header Stripping
NetFlow Generation
Tunneling
SSL Decryption
Adaptive Packet Filtering
GigaVUE-FM
Clustering
API
API
API
API
API
15©2015 Gigamon. All rights reserved.
Physical
• Service chain GigaSMART®
applications
• Leverage hybrid port capability • Create flexible service chains
Advanced Traffic Intelligence Using GigaSMART
MULTIPLE APPLICATIONS CAN BE SERVICE CHAINED TOGETHER
Flow
Mapping®
Tunnel
Termination
SSL
Decryption
Adaptive
Packet Filtering
Virtual
GigaVUE-VM
GigaVUE-VM
Remote site
traffic to DLP
Web Server
Connect Requests
to NPM / CEM
East-West traffic
between virtual
workloads to IDS
Visibility Fabric: A Customer’s Journey
A Programmable Fabric to Detect, React and Respond
16
17©2015 Gigamon. All rights reserved.
The Customer Journey
Visibility Enables
Consolidation & Optimization
Cost, Network & Tool Efficiency,
Traffic Productivity
Visibility Fabric:
Physical & Virtual Nodes
Ability to Manage
Fabric Clusters
Themes
Pain Point/
Value
Business
Value
Gigamon
Solutions
Best
Practices
Visibility Assures
Security & Compliance
Risk Management: Compliance,
Security, Privacy, Data Integrity
Visibility
Platform
Ability to Tie
IT Teams Together
Visibility Delivers
Insight & Action
Business Agility to Anticipate,
React, and Respond
Active Visibility:
Detect & Respond
Ability to Have the Platform
Act as a Real-time Sensor
CAPEX
OPEX
ASSURANCE
CAPEX
OPEX
ASSURANCE
CAPEX
OPEX
AGILITY
+ +
Stages of Customer Adoption and Maturity
18©2015 Gigamon. All rights reserved.
DAY 1 ROI ASSURED!
NPM
NPM
NPM
NPM
Edge
Switches
Internet
Routers
Core
Switches
Distribution
Switches
Case Study: Large Utility
18
$6.25M
$3.1M
NPM
NPM
NPM
NPM
NPM
NPM
NPM
NPM
NPM
NPM
NPM
NPM
 New data center with NPM deployment
 Original Quote for NPM: $6.25M
 Rejected by Utility’s Budget Approvers
 NPM + Gigamon: $3.1M
 Results:
1. Better deployment
2. Improved 4-5 additional tools
3. Visibility Fabric architecture now in place
4. 50% savings in CAPEX
Software Defined Visibility
Programmable Fabric
19
20©2015 Gigamon. All rights reserved.
The Case for a Programmable Visibility Fabric
USE CASE: SECURITY (PROVISIONING AND NOTIFICATIONS)
‘Suspicious’ Pattern
• Generate NetFlow
• Change Flow Map
• Decrypt SSL
APIs
Software Defined
Data Center
Virtual
Workloads
Production Network
Internet
Security
Tools and Analytics
GigaVUE-FM
APIs to Provision
Visibility Fabric™
21©2015 Gigamon. All rights reserved.
The Case for a Programmable Visibility Fabric
USE CASE – INVENTORY, ANALYTICS, PROVISIONING AND ADMINISTRATION
Customer / Partner Applications
(Auto Provisioning)
GigaVUE-FM
Production Network Tools and Analytics
Application
Performance
Network
Management
• Configure Network Port
• Create / Update Flow Map
APIsAPIs
Customer Application
(CMDB)
Vendor APIs
(Inventory, Stats)
Use Case 2 (Inventory/Stats):
• Heterogeneous monitoring
• Reporting
• Capacity Planning
Use Case 3 (Ticketing/Provisioning):
• Configure network port
• Monitor new IP subnet / VLANs
• Upgrade SW image
• Get Inventory / Status
• Get Statistics
Security
APIs to Provision
Visibility Fabric
22©2015 Gigamon. All rights reserved.
The Case for a Programmable Visibility Fabric
USE CASE – PRIVATE CLOUD PROVISIONING
Software Defined
Data Center
Virtual
Workloads
Internet
Use Case 4 (Private Cloud Orchestration):
1. Create new Workloads / VMs
2. Enable Virtual Visibility
vCenter
APIs
vCenter APIs
APIs
• Deploy GigaVUE-VM
• Create Traffic Policies
GigaVUE-FM
Production Network Tools and Analytics
Application
Performance
Network
Management
Security
APIs to Provision
Visibility Fabric™
23©2015 Gigamon. All rights reserved.
The Programmable Fabric
AGILE VISIBILITY FABRIC
Inventory Provisioning Analytics Notifications Administration
Inventory / Orchestration
(OSS, Homegrown)
SDN Controllers
(OpenStack, NSX, ODL)
Monitoring Tools
(NPM, APM, SEIM)
North Bound Integration (NBI) APIs
. . . . . .
GigaVUE-FM
About Gigamon
24
25©2015 Gigamon. All rights reserved.
As of Q4 2014
Gigamon Customers Today
A BROAD SPECTRUM OF BRAND-NAME CUSTOMERS
Enterprise
TECHNOLOGY INDUSTRIAL RETAIL
FINANCE HEALTHCARE & INSURANCE GOVERNMENT
50 of the Top 100 Global SPs
Service Providers
1600+ End Customers 67 of the Fortune-100
26©2015 Gigamon. All rights reserved.
The Complete Visibility Ecosystem
INTEROPERABILITY WITH ANY TOOL AND ANY NETWORK
27©2015 Gigamon. All rights reserved.
• One architecture, One Software, One Management Platform for all visibility
• Holistic Physical + Virtual Visibility
• Zero packet loss through patented hardware filtering and asymmetric reassembly
• Clustering: Extend scale beyond a single node
• GigaSMART: Common platform for advanced traffic intelligence, service chaining
• Best De-duplication in the market: 100x better
• Only vendor with advanced visibility: SSL Decryption, Adaptive Packet Filtering, …
• High fidelity NetFlow for advanced traffic insight
• Advanced Traffic Visualization and Automation with GigaVUE-FM
• Multi-tiered security architecture vs. standalone bypass
Why Gigamon?
PROVEN ACROSS MORE THAN 1600 CUSTOMERS INCLUDING 67 FORTUNE 100
28©2015 Gigamon. All rights reserved.
VISIBILITY
MATTERS

More Related Content

What's hot

What's hot (20)

Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Fortinet Perspectiva Coporativa
Fortinet Perspectiva CoporativaFortinet Perspectiva Coporativa
Fortinet Perspectiva Coporativa
 
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
 
Fight bad bot on the internet
Fight bad bot on the internetFight bad bot on the internet
Fight bad bot on the internet
 
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitive
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation MachineNETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
Digital Transformation - Cisco's Journey
Digital Transformation - Cisco's JourneyDigital Transformation - Cisco's Journey
Digital Transformation - Cisco's Journey
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 

Viewers also liked

Giga vue hb1 event rolling presentation-final-1
Giga vue hb1 event rolling presentation-final-1Giga vue hb1 event rolling presentation-final-1
Giga vue hb1 event rolling presentation-final-1
Christopher Lee
 
Security Onion: peeling back the layers of your network in minutes
Security Onion: peeling back the layers of your network in minutesSecurity Onion: peeling back the layers of your network in minutes
Security Onion: peeling back the layers of your network in minutes
bsidesaugusta
 
Optimizing your google local listing for search
Optimizing your google local listing for searchOptimizing your google local listing for search
Optimizing your google local listing for search
WebFX
 
Wired Update 7 22 09
Wired Update 7 22 09Wired Update 7 22 09
Wired Update 7 22 09
bigalgonzo
 
Q1 fy15 earnings call slides draft 9-3-2014
Q1 fy15 earnings call slides draft 9-3-2014Q1 fy15 earnings call slides draft 9-3-2014
Q1 fy15 earnings call slides draft 9-3-2014
Jo Thorgen
 
Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systems
gigamon
 

Viewers also liked (20)

Gigamon 1Q15 Investor Relations Presentation
Gigamon 1Q15 Investor Relations PresentationGigamon 1Q15 Investor Relations Presentation
Gigamon 1Q15 Investor Relations Presentation
 
Giga vue hb1 event rolling presentation-final-1
Giga vue hb1 event rolling presentation-final-1Giga vue hb1 event rolling presentation-final-1
Giga vue hb1 event rolling presentation-final-1
 
Wireless Investigations using Xplico
Wireless Investigations using XplicoWireless Investigations using Xplico
Wireless Investigations using Xplico
 
Eyeing the Onion
Eyeing the OnionEyeing the Onion
Eyeing the Onion
 
Security Onion: peeling back the layers of your network in minutes
Security Onion: peeling back the layers of your network in minutesSecurity Onion: peeling back the layers of your network in minutes
Security Onion: peeling back the layers of your network in minutes
 
Detecting Malicious SSL Certificates Using Bro
Detecting Malicious SSL Certificates Using BroDetecting Malicious SSL Certificates Using Bro
Detecting Malicious SSL Certificates Using Bro
 
Optimizing your google local listing for search
Optimizing your google local listing for searchOptimizing your google local listing for search
Optimizing your google local listing for search
 
Wired Update 7 22 09
Wired Update 7 22 09Wired Update 7 22 09
Wired Update 7 22 09
 
Gigamon GigaVue 2404 Hardware Tour
Gigamon GigaVue 2404 Hardware TourGigamon GigaVue 2404 Hardware Tour
Gigamon GigaVue 2404 Hardware Tour
 
Q1 fy15 earnings call slides draft 9-3-2014
Q1 fy15 earnings call slides draft 9-3-2014Q1 fy15 earnings call slides draft 9-3-2014
Q1 fy15 earnings call slides draft 9-3-2014
 
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
 
Fujitsu Iccad Presentation--Enable 100G
Fujitsu Iccad Presentation--Enable 100GFujitsu Iccad Presentation--Enable 100G
Fujitsu Iccad Presentation--Enable 100G
 
Everything you wanted to know about cabling but were afraid to ask
Everything you wanted to know about cabling but were afraid to askEverything you wanted to know about cabling but were afraid to ask
Everything you wanted to know about cabling but were afraid to ask
 
WebEx Avago Presentation for Eccolo Media 2010
WebEx Avago Presentation for Eccolo Media 2010WebEx Avago Presentation for Eccolo Media 2010
WebEx Avago Presentation for Eccolo Media 2010
 
Gigamon Systems GigaVUE-420 Hardware Tour
Gigamon Systems GigaVUE-420 Hardware TourGigamon Systems GigaVUE-420 Hardware Tour
Gigamon Systems GigaVUE-420 Hardware Tour
 
2013 datwyler training 4 fibre product overview - info tech middle east
2013 datwyler training 4   fibre product overview - info tech middle east2013 datwyler training 4   fibre product overview - info tech middle east
2013 datwyler training 4 fibre product overview - info tech middle east
 
NetScout Systems corporate overview
NetScout Systems corporate overviewNetScout Systems corporate overview
NetScout Systems corporate overview
 
Gigamon GigaVue 420 Hardware Tour
Gigamon GigaVue 420 Hardware TourGigamon GigaVue 420 Hardware Tour
Gigamon GigaVue 420 Hardware Tour
 
Metro High-Speed Product Line Manager
Metro High-Speed Product Line ManagerMetro High-Speed Product Line Manager
Metro High-Speed Product Line Manager
 
Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systems
 

Similar to Visibility and Automation for Enhanced Security

cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
Sergiy Pitel
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 

Similar to Visibility and Automation for Enhanced Security (20)

Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Wavefront presentation-May-2019
Wavefront presentation-May-2019Wavefront presentation-May-2019
Wavefront presentation-May-2019
 
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
THE ESSENTIAL ELEMENT OF YOUR SECURITY
THE ESSENTIAL  ELEMENT OF YOUR SECURITYTHE ESSENTIAL  ELEMENT OF YOUR SECURITY
THE ESSENTIAL ELEMENT OF YOUR SECURITY
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Key Elements of a Security Delivery Platform
Key Elements of a Security Delivery PlatformKey Elements of a Security Delivery Platform
Key Elements of a Security Delivery Platform
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in Azure
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...
 

More from patmisasi

Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
patmisasi
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
patmisasi
 
Scalar Whiteboard
Scalar WhiteboardScalar Whiteboard
Scalar Whiteboard
patmisasi
 
Power of Leasing for Pat Misasi at Scalar
Power of Leasing for Pat Misasi at ScalarPower of Leasing for Pat Misasi at Scalar
Power of Leasing for Pat Misasi at Scalar
patmisasi
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015
patmisasi
 
ScalarTASK_One-Pager_FINAL
ScalarTASK_One-Pager_FINALScalarTASK_One-Pager_FINAL
ScalarTASK_One-Pager_FINAL
patmisasi
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
patmisasi
 
corp-overview-about-us-FY15
corp-overview-about-us-FY15corp-overview-about-us-FY15
corp-overview-about-us-FY15
patmisasi
 

More from patmisasi (20)

Scalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services OverviewScalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services Overview
 
Scalar Corporate Overview FY17 patmisasi
Scalar Corporate Overview FY17 patmisasiScalar Corporate Overview FY17 patmisasi
Scalar Corporate Overview FY17 patmisasi
 
Scalar Cloud Consulting Advisory Services
Scalar Cloud Consulting Advisory ServicesScalar Cloud Consulting Advisory Services
Scalar Cloud Consulting Advisory Services
 
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
Scalar Whiteboard
Scalar WhiteboardScalar Whiteboard
Scalar Whiteboard
 
Top 10 Executive IT concerns in 2016
Top 10 Executive IT concerns in 2016Top 10 Executive IT concerns in 2016
Top 10 Executive IT concerns in 2016
 
Top Executive IT concerns in 2016
Top Executive IT concerns in 2016Top Executive IT concerns in 2016
Top Executive IT concerns in 2016
 
Power of Leasing for Pat Misasi at Scalar
Power of Leasing for Pat Misasi at ScalarPower of Leasing for Pat Misasi at Scalar
Power of Leasing for Pat Misasi at Scalar
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015
 
ScalarTASK_One-Pager_FINAL
ScalarTASK_One-Pager_FINALScalarTASK_One-Pager_FINAL
ScalarTASK_One-Pager_FINAL
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
corp-overview-about-us-FY15
corp-overview-about-us-FY15corp-overview-about-us-FY15
corp-overview-about-us-FY15
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storage
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
 
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisions
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisionsVdi storage challenges_presented at vmug_toronto 2014 by scalar decisions
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisions
 
Scalar Decisions Sunnybrook Health Sciences VDI Case Study
Scalar Decisions Sunnybrook Health Sciences VDI Case Study Scalar Decisions Sunnybrook Health Sciences VDI Case Study
Scalar Decisions Sunnybrook Health Sciences VDI Case Study
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Visibility and Automation for Enhanced Security

  • 1. Visibility and Automation for Enhanced Security VP, Product Line Management Ananda Rajagopal
  • 2. 3©2015 Gigamon. All rights reserved. Pervasive Monitoring for Pervasive Visibility WHAT IS DRIVING THIS EMERGING NEED? • Increasing Security Threats • “Zero Trust” Security model: network traffic monitoring • Distributed applications create east-west traffic patterns • Dynamically changing traffic patterns demand better visibility • Maintain visibility through emerging network architecture changes • E.g. White Box, SDN, VMware NSX, Cisco ACI, OpenFlow • Eliminate blind spots due to new encapsulations, encryption* • E.g. VXLAN, SSL traffic Security, Distributed Apps, SDN, New Blind Spots Driving Pervasive Monitoring * ‘Avoid These "Dirty Dozen" Network Security Worst Practices’, Andrew Lerner and Jeremy D'Hoinne, Gartner, January 2015
  • 3. 4©2015 Gigamon. All rights reserved. Gaps in Traditional Security Model Perimeter or Endpoint Based Simple Trust Model Static Environment • Inside vs. outside • Focus on prevention • Trusted vs Un-trusted • Corporate vs. personal asset • Fixed locations, zones, perimeters • Rule based • Signature based • Insider-outsider boundary dissolved • BYOD • Mobility of users, devices and applications
  • 4. 5©2015 Gigamon. All rights reserved. ©2015 Gigamon. All rights reserved. Gaps in Traditional Security Model Perimeter or Endpoint Based Simple Trust Model Static Environment • Inside vs. outside • Focus on prevention • Trusted vs Un-trusted • Corporate vs. personal asset • Fixed locations, zones, perimeters • Rule based • Signature based • Insider-outsider boundary dissolved • BYOD • Mobility of users, devices and applications More importantly … THE VERY NATURE OF CYBER THREATS HAS CHANGED!
  • 5. 6©2015 Gigamon. All rights reserved. Source: RSA Anatomy of an Advanced Persistent Threat (APT) 65432 In Many Cases the System Stays Breached After Exfiltration! Phishing & zero day attack Back door Lateral movement Data gathering Exfiltrate 1 Reconnaissance
  • 6. 7©2015 Gigamon. All rights reserved. *Trustwave 2014 global security report **FireEye: Maginot revisited Current State of Global Security The mean number of days from initial intrusion to detection* The average lifespan of a zero-day before it is discovered or disclosed* of organizations had active Command & Control (C&C) communications** of organizations in the study were breached during the test period**
  • 7. 8©2015 Gigamon. All rights reserved. Internet Firewall DMZ IPS Spine Leaf IDS Server Farm Core Switch What Else Has Changed That Impacts Security? FUNDAMENTAL SHIFT IN TRAFFIC PATTERNS No visibility into lateral propagation of threats!
  • 8. 9©2015 Gigamon. All rights reserved. What Else Has Changed That Impacts Security? DISSOLVING BOUNDARIES BETWEEN THE EDGE AND THE DATA CENTER Internet Firewall DMZ IPS Spine Leaf IDS Server Farm Core Switch Virtual Desktop
  • 9. 10©2015 Gigamon. All rights reserved. What Else Has Changed That Impacts Security? MOBILITY Internet Firewall DMZ IPS Spine Leaf IDS Server Farm Core Switch Virtual Desktop
  • 10. 11©2015 Gigamon. All rights reserved. Visibility: Catalyst for the Right Security Architecture WHAT IS NEEDED? Deliver network wide view, regardless of mobility Take the guesswork out of where to place security tools! Condense large volumes of data into manageable data Peek into encrypted traffic
  • 11. 12©2015 Gigamon. All rights reserved. • Proliferation of tools • Contention for access to traffic • Extraordinary costs • Inconsistent view of traffic • Model breaks down during a network upgrade The Spaghetti of Today’s Monitoring Infrastructure WHY HAS IT NOT BEEN DONE YET? Core Switches Access Switches Internet Internet Distribution Switches ANTI- MALWARE SIEM DLP IDS IPS FORENSICS APT ANALYTIC S
  • 12. 13©2015 Gigamon. All rights reserved. Example Security Delivery Architecture OFFERED BY GIGAMON TODAY Leaf switch Spine switch Spine switch Core switch Core switch Leaf switch APM IPS (Inline) Anti-Malware (Inline) Network Forensics Web Analytics SIEM DLP IDS APT Detection Security Tool Rack GigaVUE-VM Inline Bypass SSL Decryption NetFlow Generation GigaVUE-FM
  • 13. 14©2015 Gigamon. All rights reserved. Third Party Applications, SDN Controller Integration, etc… Applications & Tools Infrastructure, User Community Unified Visibility Fabric™ FOR PERVASIVE VISIBILITY INTO BUSINESS INFRASTRUCTURE Traffic Intelligence Visibility Fabric Nodes (Pervasive visibility across physical, virtual, remote sites, and future SDN/NFV production networks) Fabric Services Flow Mapping® Fabric Control (Management) Applications Inline Bypass GigaVUE-HD8 GigaVUE-HD4 GigaVUE-HB1 GigaVUE-HC2 HSeries TASeries GigaVUE-TA1 GigaVUE-OS on white box* VirtualVisibility GigaVUE-VM TAPs G-TAP G-TAP A Series G-TAP BiDi Embedded TAPs GSeries GigaVUE-2404 GigaVUE-420 G-SECURE-0216 Deduplication Packet Slicing FlowVUE™ Masking GTP Correlation Header Stripping NetFlow Generation Tunneling SSL Decryption Adaptive Packet Filtering GigaVUE-FM Clustering API API API API API
  • 14. 15©2015 Gigamon. All rights reserved. Physical • Service chain GigaSMART® applications • Leverage hybrid port capability • Create flexible service chains Advanced Traffic Intelligence Using GigaSMART MULTIPLE APPLICATIONS CAN BE SERVICE CHAINED TOGETHER Flow Mapping® Tunnel Termination SSL Decryption Adaptive Packet Filtering Virtual GigaVUE-VM GigaVUE-VM Remote site traffic to DLP Web Server Connect Requests to NPM / CEM East-West traffic between virtual workloads to IDS
  • 15. Visibility Fabric: A Customer’s Journey A Programmable Fabric to Detect, React and Respond 16
  • 16. 17©2015 Gigamon. All rights reserved. The Customer Journey Visibility Enables Consolidation & Optimization Cost, Network & Tool Efficiency, Traffic Productivity Visibility Fabric: Physical & Virtual Nodes Ability to Manage Fabric Clusters Themes Pain Point/ Value Business Value Gigamon Solutions Best Practices Visibility Assures Security & Compliance Risk Management: Compliance, Security, Privacy, Data Integrity Visibility Platform Ability to Tie IT Teams Together Visibility Delivers Insight & Action Business Agility to Anticipate, React, and Respond Active Visibility: Detect & Respond Ability to Have the Platform Act as a Real-time Sensor CAPEX OPEX ASSURANCE CAPEX OPEX ASSURANCE CAPEX OPEX AGILITY + + Stages of Customer Adoption and Maturity
  • 17. 18©2015 Gigamon. All rights reserved. DAY 1 ROI ASSURED! NPM NPM NPM NPM Edge Switches Internet Routers Core Switches Distribution Switches Case Study: Large Utility 18 $6.25M $3.1M NPM NPM NPM NPM NPM NPM NPM NPM NPM NPM NPM NPM  New data center with NPM deployment  Original Quote for NPM: $6.25M  Rejected by Utility’s Budget Approvers  NPM + Gigamon: $3.1M  Results: 1. Better deployment 2. Improved 4-5 additional tools 3. Visibility Fabric architecture now in place 4. 50% savings in CAPEX
  • 19. 20©2015 Gigamon. All rights reserved. The Case for a Programmable Visibility Fabric USE CASE: SECURITY (PROVISIONING AND NOTIFICATIONS) ‘Suspicious’ Pattern • Generate NetFlow • Change Flow Map • Decrypt SSL APIs Software Defined Data Center Virtual Workloads Production Network Internet Security Tools and Analytics GigaVUE-FM APIs to Provision Visibility Fabric™
  • 20. 21©2015 Gigamon. All rights reserved. The Case for a Programmable Visibility Fabric USE CASE – INVENTORY, ANALYTICS, PROVISIONING AND ADMINISTRATION Customer / Partner Applications (Auto Provisioning) GigaVUE-FM Production Network Tools and Analytics Application Performance Network Management • Configure Network Port • Create / Update Flow Map APIsAPIs Customer Application (CMDB) Vendor APIs (Inventory, Stats) Use Case 2 (Inventory/Stats): • Heterogeneous monitoring • Reporting • Capacity Planning Use Case 3 (Ticketing/Provisioning): • Configure network port • Monitor new IP subnet / VLANs • Upgrade SW image • Get Inventory / Status • Get Statistics Security APIs to Provision Visibility Fabric
  • 21. 22©2015 Gigamon. All rights reserved. The Case for a Programmable Visibility Fabric USE CASE – PRIVATE CLOUD PROVISIONING Software Defined Data Center Virtual Workloads Internet Use Case 4 (Private Cloud Orchestration): 1. Create new Workloads / VMs 2. Enable Virtual Visibility vCenter APIs vCenter APIs APIs • Deploy GigaVUE-VM • Create Traffic Policies GigaVUE-FM Production Network Tools and Analytics Application Performance Network Management Security APIs to Provision Visibility Fabric™
  • 22. 23©2015 Gigamon. All rights reserved. The Programmable Fabric AGILE VISIBILITY FABRIC Inventory Provisioning Analytics Notifications Administration Inventory / Orchestration (OSS, Homegrown) SDN Controllers (OpenStack, NSX, ODL) Monitoring Tools (NPM, APM, SEIM) North Bound Integration (NBI) APIs . . . . . . GigaVUE-FM
  • 24. 25©2015 Gigamon. All rights reserved. As of Q4 2014 Gigamon Customers Today A BROAD SPECTRUM OF BRAND-NAME CUSTOMERS Enterprise TECHNOLOGY INDUSTRIAL RETAIL FINANCE HEALTHCARE & INSURANCE GOVERNMENT 50 of the Top 100 Global SPs Service Providers 1600+ End Customers 67 of the Fortune-100
  • 25. 26©2015 Gigamon. All rights reserved. The Complete Visibility Ecosystem INTEROPERABILITY WITH ANY TOOL AND ANY NETWORK
  • 26. 27©2015 Gigamon. All rights reserved. • One architecture, One Software, One Management Platform for all visibility • Holistic Physical + Virtual Visibility • Zero packet loss through patented hardware filtering and asymmetric reassembly • Clustering: Extend scale beyond a single node • GigaSMART: Common platform for advanced traffic intelligence, service chaining • Best De-duplication in the market: 100x better • Only vendor with advanced visibility: SSL Decryption, Adaptive Packet Filtering, … • High fidelity NetFlow for advanced traffic insight • Advanced Traffic Visualization and Automation with GigaVUE-FM • Multi-tiered security architecture vs. standalone bypass Why Gigamon? PROVEN ACROSS MORE THAN 1600 CUSTOMERS INCLUDING 67 FORTUNE 100
  • 27. 28©2015 Gigamon. All rights reserved. VISIBILITY MATTERS