SEIZE THE DATA SEIZE THE DATA. 2015
|
|
- Archibald Ward
- 5 years ago
- Views:
Transcription
1 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
2 Machine Data Log Text Search Malu Castellanos & Jörn Schimmelpfeng August 11, 2015
3 Forward-looking statements This is a rolling (up to three year) Roadmap and is subject to change without notice. This document contains forward looking statements regarding future operations, product development, product capabilities and availability dates. This information is subject to substantial uncertainties and is subject to change at any time without prior notification. Statements contained in this document concerning these matters only reflect Hewlett Packard's predictions and / or expectations as of the date of this document and actual results and future plans of Hewlett-Packard may differ significantly as a result of, among other things, changes in product strategy resulting from technological, internal corporate, market and other changes. This is not a commitment to deliver any material, code or functionality and should not be relied upon in making purchasing decisions. 3 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
4 HP confidential information This is a rolling (up to three year) Roadmap and is subject to change without notice. This Roadmap contains HP Confidential Information. If you have a valid Confidential Disclosure Agreement with HP, disclosure of the Roadmap is subject to that CDA. If not, it is subject to the following terms: for a period of 3 years after the date of disclosure, you may use the Roadmap solely for the purpose of evaluating purchase decisions from HP and use a reasonable standard of care to prevent disclosures. You will not disclose the contents of the Roadmap to any third party unless it becomes publically known, rightfully received by you from a third party without duty of confidentiality, or disclosed with HP s prior written approval. 4 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
5 What is new? Single-system solution for text search on machine log data High performance Customizable Enables queries that combine log text search data with structured data No need to move data around 5 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
6 Machine data valuable asset of IT management and analytics Application logs Clickstream Data Web Access Logs Database logs File system logs OS logs Network logs Wire data Packet Data Web Proxy Logs... Mobile devices logs Call Detail Records Configurations Diagnostics output Change Events Log analysis is critical to understand, diagnose, and deploy systems in large operational environments Source of the truth of what is happening in the IT infrastructure User activity analysis Digital marketing Fraud detection App performance and availability Data modification history I Infrastructure set-up Failures debug Backdoor attacks Read access audit DNS lookups Threats detection Timeouts Bottlenecks Suspicious activity Monitor terms of service Investigate data leakage incidents Proof of compliance with regulatory and corporate governance mandates 6 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
7 Machine data text How does it look? Alert(id:1f407960afe#4d9fdbdb078a6108edc42 customer id: 1 name: AST-EL-YGA Eagle QA GMAM_Portal: Login-transaction-response-time is greater than 20 seconds) was sent :00: %ASA : Built outbound TCP connection for outside: /443 ( /443) Lightweight, this laptop weighs 2 something pounds and is easy to pick up and hold in one hand. Keyboard, the keys are great and feel a lot like a Mac keyboard they are also easy to type on. It took me probably less than 5 minutes to get accustomed to the size of the keyboard and where the keys are. Size, I like that it is the same size as a Notebook, but it's totally a laptop. 7 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
8 Text index support for log search Text indices are essential to accelerate text/log search Indices are maintained transactionally consistent with their base tables Ability to search the index with regular SQL Ability to join search result with base table (and other tables) to retrieve other data Load data Log messages & other data Log table Search query result join tokenize Search matches Index table Search query: Retrieve the unique_id, message, host and time of the log records containing transaction response time Tokenization is the process of breaking a stream of text up into words, phrases, symbols, or other meaningful elements called tokens. The list of tokens becomes input for further processing such as parsing or text mining 8 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
9 Tokenization for text indexing :00: %ASA : Built outbound TCP connection for outside: /443 ( /443) Tokenization Vertica basic tokenizer can separate strings by space only Indexing Token Doc_id :00: %ASA : 1 Built 1 outbound 1 TCP 1 connection for 1 outside: /443 1 ( /443) 1 Text/log table Index table SQL Query SELECT count(*) FROM public.la_unique_msg WHERE unique_id IN (SELECT doc_id FROM public.whitespace_index WHERE token = outside ) No match found 9 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
10 Advanced tokenization* and indexing (1/5) Configurable tokenizers Vertica basic tokenizer separates tokens by space only Advanced configurable tokenizer: o Which special characters to use as token separators 2 tier separators o Which words to ignore stop words o What are the size limits that a token can have min and max length Supports UTF-8 encoding Supports English but can be extended to other languages * Tokenization is the process of breaking a stream of text up into words, phrases, symbols, or other meaningful elements called tokens. The list of tokens becomes input for further processing such as parsing or text mining. 10 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
11 Advanced tokenization and indexing (2/5) Configurable tokenizers with two-tier separators Text to tokenize: login url ( Basic tokenizer: login url /57625( Issue: special characters glued to words, leads to mismatch With two-tier separator tokenizers: o Tier 1 Major separators - Default: [ ] < > ( ) { }! ;, ' " * \n \r \s \t &? + o Tokens: login url o Tier 2 Minor separators - Default: / : - $ # % \ _ o Tokens: http www hp com Benefit: Improved search accuracy and search performance o E.g., both tokens hp and are indexed and fast searchable 11 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
12 Extended tokenization and indexing (3/5) With tier 1 & 2 (major + minor) Larger indices with two-tier separator tokenizers With only tier 1 (major separators) :00: %ASA : Built outbound TCP connection for outside: /443 ( /443) index has 11 rows Index has 23 rows 12 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
13 Advanced tokenization and indexing (4/5) Multi-column Indices with Position Info Indices with position support phrasal and proximity search: Token and its position (i.e., first token will have position 0, second token position 1, etc.) Example: Doc 1: transaction exceeded required time -> transaction 1, exceeded 2, required 3, time 4 Search string transaction required time exceeded -> transaction 1, required 2, time 3, exceeded 4 No match found: keywords match but the sequence given by their relative positions don t! Benefit improve performance of phrasal search 13 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
14 What s new: Advanced tokenization and indexing (5/5) N-gram Tokenizers N-gram indices are available (in addition to word indices) Indices with ngram tokens can support regex and wildcard search: o Example string: transaction-code o N-gram (tri-gram) tokens: tra, ran, ans, nsa, sac, act, cti, tio, ion, on-, n-c, -co, cod, ode If tri-gram index exists, text search can find matching strings that contain a partial word tra Benefit: accelerate wildcard and regex search. * An n-gram is a contiguous sequence of n items from a given sequence of text or speech. An n-gram of size 1 is referred to as a "unigram"; size 2 is a "bigram" (or, less commonly, a "digram"); size 3 is a "trigram". Larger sizes are sometimes referred to by the value of n, e.g., "four-gram", "five-gram", and so on. 14 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
15 Create a text index using pre-configured tokenizer Given a preconfigured tokenizer instance advancedlogtokenizer, a user creates a text index using the following vsql Statement: CREATE TEXT INDEX myconfigurable_basic_lower ON la_unique_msg (unique_id, message) TOKENIZER (public.advancedlogtokenizer) STEMMER (v_txtindx.caseinsensitivenostemming); 15 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
16 Advanced log search supported by advanced text indices Text Search Expressions response time Keyword Search: Find text that contain both words response and time transaction response time Phrasal search: Find text that contain the word transaction immediately followed by the word response and then word time REGEX (www www8)\.hp\..*?\.com greater than * seconds Keyword with wildcard search: Find text that contain words of greater than, seconds, and any characters in between transaction response time 2* Phrasal with wildcard search : Find text that contain the word response followed by the word time followed by any word that starts with the number 2 help ( error & REGEX www[8].hp.*.com ) Regular expression search: Find text that contain a substring that starts with www or www8, follows by hp with any numbers of characters, ends by.com Boolean search: Find text that either contain the keyword help or contain both the phrase error code and a substring that satisfies the regex pattern 16 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
17 Keyword search basics Single keyword: brian Base table Primary key of base table SELECT count(*) FROM public.la_unique_msg WHERE unique_id IN (SELECT doc_id FROM public.whitespace_index_lower WHERE token = v_txtindex.caseinsensitivenostemming('brian')) text index In general there are multiple ways to formulate the SQL query for a given search expression Built-in strategies to generate the one with best performance are on the roadmap 17 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
18 Different query shapes for search expressions Instead of referencing index m times, reference it 1 time then use a count the number of times the doc-id appears (i.e. use count/group-by to verify) 3 keywords: brian time. AST-EL-YGA SELECT count(*) FROM public.la_unique_msg WHERE (unique_id IN (SELECT doc_id FROM (SELECT doc_id, count(*) AS count FROM public.whitespace_index_lower WHERE token IN (v_txtindex.caseinsensitivenostemming( Brian ),v_txtindex.caseinsensitivenostemming(time.'),v_txtindex.caseinsensitivenostemming( AST-EL-YGA')) GROUP BY doc_id) r WHERE count>=4)) In general there are multiple ways to formulate the SQL query for a given search expression It is important to choose the one with best performance 18 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
19 Demo 19 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
20 Machine Data Log Text Search Use Case HP Operations Analytics - Log Search and Analysis Jörn Schimmelpfeng 20 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
21 You are challenged to stay out of the headlines: But how do you? Ensure the technology can sustain the business Understand what is happening when things begin to go wrong Triage and remediate before the business is affected Add value to your business 1 Minyanville 2 - UsaToday 21 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
22 The answer lies in your data but how do you make sense of it? Data Immense volumes of data (up to 2Gb/server/day) Thousands of servers Many different types (log data, events, topology, etc.) Numerous siloed data sources (apps, storage, servers, networks, mobile, etc.) And the complexity is growing 22 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
23 Introducing HP Operations Analytics Application HP Operations Analytics Standalone, scalable platform Mobile app Storage Network Metrics Events Intelligent search Guided troubleshooting Fewer outages Faster problem resolution System Cloud Third-party tools Non IT data Topology Logs Big Data Store HP Vertica Visual analytics Predictive analytics Automated log analytics Real time alerting Optimized resources Higher staff productivity LOB data 23 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
24 Unique self learning machine analytics HP Operations Analytics Clustering Text relevance Anomaly detection not complete login customer ID severity error exception ID exceeded SME input keywords 24 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
25 Machine analytics drives log and predictive analytics Find the root cause faster and prevent issues from happening Behavior assessment Clustering Text relevance SME input Log analytics Pattern detection Data seasonality Predictive analytics 25 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
26 Troubleshooting with Ops Analytics All relevant data in a single dashboard Near real time data collection Data easily viewed in visual analytics Historical view of data instantly available Faster time to identify root cause with fewer people involved Application ecosystem Physical or virtual server Network Business application Metrics Events Operations Analytics Logs Topology Operation support Storage 26 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
27 Analyze database metrics to isolate problems Correlate related metrics in a common sleeve of time Correlate related metrics in a common sleeve of time 27 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
28 Log analytics used to reveal the root cause Automatically reveals time and count of most significant log events. 28 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
29 Drill down to the actual logs View the log message content to identify root cause Automatically reveals time and count of most significant log events. Number of occurrences of significant log data over time 29 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
30 Summary HP IT order management system outage Before HP Ops Analytics After HP Ops Analytics Time to reveal the root cause 36 hours 30 minutes Resources engaged 5 experts from Application, Database, UNIX, Network, and Storage 1 expert Revenue impact (to clear order backlog) 2 weeks 4.5 hours 99 % 30 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
31 Vertica combines the world of metrics and logs! 31 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
32 From noise to value Start to make meaning out of your logs Who are your users? Where do they connect from? What are the common errors? No problem with HP Operations Analytics and Vertica! 32 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
33 Fast search and field extraction New User First query language Very powerful but easy to learn Language translated into Vertical SQL (vsql) This guarantees the power and speed of Vertica for analytical oprations 33 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
34 Next generation log search Simple Search AccountService Status lasthour Advanced Search transactionid: (.+) failed hostname=myhost AND (severity=major OR severity=critical) Charting error lasthour movingcount Log Processing error countby hostname where count> 20 Field Extraction failed to login rex user:%{username} failed to login top USERNAME Command List: top, bottom, movingcount, movingaverage, rex, sort, head, tail, between, dedup, lasthour, count, countby, distinctcount, genericsql 34 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
35 HP Operations Analytics architecture Monitored nodes Databases Mail server Corporate network Vertica nodes Opsa Server Log ingestion Operator / data scientist Network Erp Log analytics Vsql Gen. Log Search Web shop Vertica Text Index 35 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
36 36 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
37 37 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
38 38 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
39 39 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
40 40 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
41 41 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
42 42 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
43 43 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
44 HP Vertica First choice DB for Operations Analytics HP Vertica 44 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
45
All about actors in HP ArcSight ESM Anurag Singla Sr. Manager, Software Development Sep 2012
All about actors in HP ArcSight ESM Anurag Singla Sr. Manager, Software Development Sep 2012 Forward-looking statements This is a rolling (up to three year) Roadmap and is subject to change without notice.
More informationREST access to ESM Web Services
REST access to ESM Web Services Dmitry Udalov, Sr. Software Engineer #HPProtect Forward-looking statements This is a rolling (up to three year) Roadmap and is subject to change without notice. This document
More informationSecurity analytics: From data to action Visual and analytical approaches to detecting modern adversaries
Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development
More informationConverged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products
Converged security Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products Increased risk and wasted resources Gartner estimates more than $1B in
More informationHP Automation Insight
HP Automation Insight For the Red Hat Enterprise Linux and SUSE Enterprise Linux operating systems AI SA Compliance User Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal Notices
More informationForeScout Extended Module for Carbon Black
ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent
More informationBITUG Big Sig December 2013 NonStop Performance Update David Sly HP UK Tech Services
BITUG Big Sig December 2013 NonStop Performance Update David Sly HP UK Tech Services 1 HP confidential information This is a rolling (up to three year) Roadmap and is subject to change without notice.
More informationCloudsourced Network Analytics
Cloudsourced Network Analytics GT HILL Director Technical Marketing We are Nyansa o Silicon Valley startup o Founded September, 2013 o MIT, Meraki, Aruba Networks, Google o Revenue generating o Deployed
More informationApplication monitoring with BELK. Nishant Sahay, Sr. Architect Bhavani Ananth, Architect
Application monitoring with BELK Nishant Sahay, Sr. Architect Bhavani Ananth, Architect Why logs Business PoV Input Data Analytics User Interactions /Behavior End user Experience/ Improvements 2017 Wipro
More informationCopyright 2018, Oracle and/or its affiliates. All rights reserved.
Beyond SQL Tuning: Insider's Guide to Maximizing SQL Performance Monday, Oct 22 10:30 a.m. - 11:15 a.m. Marriott Marquis (Golden Gate Level) - Golden Gate A Ashish Agrawal Group Product Manager Oracle
More informationService Manager. Ops Console On-Premise User Guide
Service Manager powered by HEAT Ops Console On-Premise User Guide 2017.2.1 Copyright Notice This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates
More informationProtecting Your SaaS Investment: Monitoring Office 365 Performance
Protecting Your SaaS Investment: Monitoring Office 365 Performance Utilizing the ExtraHop platform to ensure high performance from your Office 365 applications Achieving Higher Productivity and Business
More informationTransforming IT: From Silos To Services
Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New
More informationHow to Troubleshoot Databases and Exadata Using Oracle Log Analytics
How to Troubleshoot Databases and Exadata Using Oracle Log Analytics Nima Haddadkaveh Director, Product Management Oracle Management Cloud October, 2018 Copyright 2018, Oracle and/or its affiliates. All
More informationIntelligent and Secure Network
Intelligent and Secure Network BIG-IP IP Global Delivery Intelligence v11.2 IP Intelligence Service Brian Boyan - b.boyan@f5.com Tony Ganzer t.ganzer@f5.com 2 Agenda Welcome & Intro Introduce F5 IP Intelligence
More informationDetect Cyber Threats with Securonix Proxy Traffic Analyzer
Detect Cyber Threats with Securonix Proxy Traffic Analyzer Introduction Many organizations encounter an extremely high volume of proxy data on a daily basis. The volume of proxy data can range from 100
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become
More informationWinning on Windows with a WiNC and a smile
Winning on Windows with a WiNC and a smile Vianney Boncorps Nanjoo Ban Forward-looking statements This is a rolling (up to three year) Roadmap and is subject to change without notice. This document contains
More informationMicrosoft Azure Databricks for data engineering. Building production data pipelines with Apache Spark in the cloud
Microsoft Azure Databricks for data engineering Building production data pipelines with Apache Spark in the cloud Azure Databricks As companies continue to set their sights on making data-driven decisions
More informationForeScout Extended Module for Splunk
Version 2.8 Table of Contents About Splunk Integration... 5 Support for Splunk Enterprise and Splunk Enterprise Security... 6 What's New... 6 Support for Splunk Cloud... 6 Support for Batch Messaging...
More informationSOLUTION TRACK Finding the Needle in a Big Data Innovator & Problem Solver Cloudera
SOLUTION TRACK Finding the Needle in a Big Data Haystack @EvaAndreasson, Innovator & Problem Solver Cloudera Agenda Problem (Solving) Apache Solr + Apache Hadoop et al Real-world examples Q&A Problem Solving
More informationA Real-world Demonstration of NetSocket Cloud Experience Manager for Microsoft Lync
A Real-world Demonstration of NetSocket Cloud Experience Manager for Microsoft Lync Introduction Microsoft Lync connects people everywhere as part of their everyday productivity experience. When issues
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationIBM Security SiteProtector System User Guide for Security Analysts
IBM Security IBM Security SiteProtector System User Guide for Security Analysts Version 2.9 Note Before using this information and the product it supports, read the information in Notices on page 83. This
More informationBarry D. Lamkin Executive IT Specialist Capitalware's MQ Technical Conference v
What happened to my Transaction? Barry D. Lamkin Executive IT Specialist blamkin@us.ibm.com Transaction Tracking - APM Transaction Tracking is a major part of Application Performance Monitoring To ensure
More informationForeScout Extended Module for MobileIron
Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationRSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief
RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security
More informationForeScout Extended Module for Splunk
ForeScout Extended Module for Splunk Version 2.7.0 Table of Contents About Splunk Integration... 5 Support for Splunk Enterprise and Splunk Enterprise Security... 7 What's New... 7 Support for Splunk Cloud...
More informationNovetta Cyber Analytics
Know your network. Arm your analysts. Introduction Novetta Cyber Analytics is an advanced network traffic analytics solution that empowers analysts with comprehensive, near real time cyber security visibility
More informationTRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald
TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE John McDonald 1 What is Trust? Can I trust that my assets will be available when I need them? Availability Critical Assets Security Can I trust
More informationForeScout Extended Module for IBM BigFix
Version 1.1 Table of Contents About BigFix Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 About Support for Dual Stack Environments... 5 Concepts, Components,
More informationHP Integration with Incorta: Connection Guide. HP Vertica Analytic Database
HP Integration with Incorta: Connection Guide HP Vertica Analytic Database HP Big Data Document Release Date: July, 2015 Legal Notices Warranty The only warranties for HP products and services are set
More informationOracle Enterprise Manager 12c IBM DB2 Database Plug-in
Oracle Enterprise Manager 12c IBM DB2 Database Plug-in May 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationTop 10 use cases of HP ArcSight Logger
Top 10 use cases of HP ArcSight Logger Sridhar Karnam @Sri747 Karnam@hp.com #HPSecure Big data is driving innovation The Big Data will continue to expand Collect Big Data for analytics Store Big Data for
More informationThe Infrastructure Management Imperative. Smart Grid Infrastructure Management Challenges and Solutions
The Infrastructure Management Imperative Smart Grid Infrastructure Management Challenges and Solutions Which is most important Infrastructure, applications or the user experience? They all are. There is
More informationUsing Threat Analytics to Protect Privileged Access and Prevent Breaches
Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationSecurity. Made Smarter.
Security. Made Smarter. Your job is to keep your organization safe from cyberattacks. To do so, your team has to review a monumental amount of data that is growing exponentially by the minute. Your team
More informationAdditional License Authorizations
Additional License Authorizations For HPE Cloud Center software products Products and suites covered PRODUCTS E-LTU OR E-MEDIA AVAILABLE * NON-PRODUCTION USE CATEGORY ** HPE Cloud Service Automation (previously
More informationForescout. eyeextend for Carbon Black. Configuration Guide. Version 1.1
Forescout Version 1.1 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationProCurve Network Immunity
ProCurve Network Immunity Hans-Jörg Elias Key Account Manager hans-joerg.elias@hp.com 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
More informationHP0-Y16. ProCurve Network Immunity Solutions. Download Full Version :
HP HP0-Y16 ProCurve Network Immunity Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-y16 Which challenges does a unified NIM + IDS deployment meet? (Select two.) A. Reducing
More informationAdditional License Authorizations
Additional License Authorizations For HPE Cloud Center and HPE Helion Cloud Suite software products Products and suites covered PRODUCTS E-LTU OR E-MEDIA AVAILABLE * NON-PRODUCTION USE CATEGORY ** HPE
More information2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows,
2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, Windows Server, and other product names are or may be registered
More informationOMi Management Pack for Microsoft SQL Server. Software Version: For the Operations Manager i for Linux and Windows operating systems.
OMi Management Pack for Microsoft Software Version: 1.01 For the Operations Manager i for Linux and Windows operating systems User Guide Document Release Date: April 2017 Software Release Date: December
More informationHP Operations Manager
HP Operations Manager Software Version: 9.22 UNIX and Linux operating systems Java GUI Operator s Guide Document Release Date: December 2016 Software Release Date: December 2016 Legal Notices Warranty
More informationTRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany
TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE Ralf Kaltenbach, Regional Director RSA Germany 1 TRUSTED IT Continuous Availability of Applications, Systems and Data Data Protection with Integrated
More informationITSM SERVICES. Delivering Technology Solutions With Passion
ITSM SERVICES Delivering Technology Solutions With Passion 02 CONTENTS OVERVIEW CLIENTS SOLUTIONS WHAT WE DO PROFESSIONAL SERVICES Overview IT Pillars is a dynamic company, which has served, over the past
More informationHP Device as a Service (DaaS)
HP Device as a Service (DaaS) Smart, simplified computing solutions for today s world. Proud Technology Services Industry Association (TSIA) award winner Managing and securing multi-os environments can
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationCisco Crosswork Network Automation
Cisco Crosswork Network Introduction Communication Service Providers (CSPs) are at an inflexion point. Digitization and virtualization continue to disrupt the way services are configured and delivered.
More informationPopular SIEM vs aisiem
Popular SIEM vs aisiem You cannot flip a page in any Cybersecurity magazine, or scroll through security blogging sites without a mention of Next Gen SIEM. You can understand why traditional SIEM vendors
More informationBring Context To Your Machine Data With Hadoop, RDBMS & Splunk
Bring Context To Your Machine Data With Hadoop, RDBMS & Splunk Raanan Dagan and Rohit Pujari September 25, 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may
More informationMonitor Qlik Sense sites. Qlik Sense Copyright QlikTech International AB. All rights reserved.
Monitor Qlik Sense sites Qlik Sense 2.1.2 Copyright 1993-2015 QlikTech International AB. All rights reserved. Copyright 1993-2015 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense,
More informationSmart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center
Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Leverage Analytics To Protect and Optimize Your Business Infrastructure SOLUTION PROFILE Managing a data center and the
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationPALANTIR CYBERMESH INTRODUCTION
100 Hamilton Avenue Palo Alto, California 94301 PALANTIR CYBERMESH INTRODUCTION Cyber attacks expose organizations to significant security, regulatory, and reputational risks, including the potential for
More informationExplore metrics in the ExtraHop system to investigate DNS failures
Explore metrics in the ExtraHop system to investigate DNS failures Published: 2018-02-06 The DNS (domain name system) protocol is critical for supporting internet traffic. It often works without issues.
More informationHP Service Manager. Software Version: 9.41 For the supported Windows and UNIX operating systems. SM Reports help topics for printing
HP Service Manager Software Version: 9.41 For the supported Windows and UNIX operating systems SM Reports help topics for printing Document Release Date: September 2015 Software Release Date: September
More informationForeScout Extended Module for IBM BigFix
ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...
More informationIntroduction to the Azure Portal
Page 1 of 17 Introduction to the Azure Portal The new Azure portal is an all-in-one, work-anywhere experience. Now you can manage App Service Apps, databases and Visual Studio Team Services projects in
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationForescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2
Forescout Version 2.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationSIEMLESS THREAT MANAGEMENT
SOLUTION BRIEF: SIEMLESS THREAT MANAGEMENT SECURITY AND COMPLIANCE COVERAGE FOR APPLICATIONS IN ANY ENVIRONMENT Evolving threats, expanding compliance risks, and resource constraints require a new approach.
More informationBoston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018
Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your
More informationTroubleshooting WLAN with NSight HOW TO GUIDE
Troubleshooting WLAN with NSight HOW TO GUIDE September 2015 2015 ZIH Corp. All rights reserved. Zebra and the Stylized Zebra Head are trademarks of ZIH Corp, registered in many jurisdictions worldwide.
More informationHow Real Time Are Your Analytics?
How Real Time Are Your Analytics? Min Xiao Solutions Architect, VoltDB Table of Contents Your Big Data Analytics.... 1 Turning Analytics into Real Time Decisions....2 Bridging the Gap...3 How VoltDB Helps....4
More informationHPE Intelligent Management Center
HPE Intelligent Management Center Service Health Manager Administrator Guide Abstract This guide provides introductory, configuration, and usage information for Service Health Manager (SHM). It is for
More informationMcAfee Skyhigh Security Cloud for Citrix ShareFile
McAfee Skyhigh Security Cloud for Citrix ShareFile McAfee Skyhigh Security Cloud for Citrix ShareFile helps organizations securely accelerate their business by providing industry-best Data Loss Prevention
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationAdditional License Authorizations. For Cloud Center and Helion Cloud Suite software products
Additional License Authorizations For Cloud Center and Helion Cloud Suite software products Products and suites covered Products E-LTU or E-Media available * Non-production use category ** HPE Cloud Service
More informationForeScout Extended Module for MaaS360
Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationIntent Driven Network Operations with AppFormix Advanced Analytics Platform. Joseph Li
Intent Driven Network Operations with AppFormix Advanced Analytics Platform Joseph Li This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without
More informationNote. Some History 8/8/2011. TECH 6 Approaches in Network Monitoring ip/f: A Novel Architecture for Programmable Network Visibility
TECH 6 Approaches in Network Monitoring ip/f: A Novel Architecture for Programmable Network Visibility Steve McCanne - CTO riverbed Note This presentation is for information purposes only and is not a
More informationDATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure
DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure AlienVault USM Anywhere accelerates and centralizes threat detection, incident response,
More informationGDPR: An Opportunity to Transform Your Security Operations
GDPR: An Opportunity to Transform Your Security Operations McAfee SIEM solutions improve breach detection and response Is your security operations GDPR ready? General Data Protection Regulation (GDPR)
More informationCONTENTS. Technology Overview. Workflow Integration. Sample Customers. How It Works
NetBrain s Adaptive Network Automation platform integrates with existing IT workflows to improve data visibility and streamline network assessment. NetBrain relieves engineers from manual CLIdigging and
More informationData-Driven DevOps: Bringing Visibility to Any Cloud, Any App, & Any Device. Erik Giesa SVP of Marketing and Business Development, ExtraHop Networks
Data-Driven DevOps: Bringing Visibility to Any Cloud, Any App, & Any Device Erik Giesa SVP of Marketing and Business Development, ExtraHop Networks Your Monitoring Strategy Must Change How can you maintain
More informationAbstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight
ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group
More informationThe Convergence of Management and Security. Stephen Brown, Sr. Product Manager December 2008
The Convergence of Management and Security Stephen Brown, Sr. Product Manager December 2008 Agenda 1 A Robust Management Foundation 2 The Value of Security and Management Convergence 3 Symantec Endpoint
More informationVisibility: The Foundation of your Cybersecurity Infrastructure. Marlin McFate Federal CTO, Riverbed
Visibility: The Foundation of your Cybersecurity Infrastructure Marlin McFate Federal CTO, Riverbed Detection is Only One Part of the Story Planning and Remediation are just as critical 20 18 Hackers Went
More informationSIEM Product Comparison
SIEM Product Comparison SIEM Technology Space SIEM market analysis of the last 3 years suggest: Market consolidation of SIEM players (25 vendors in 2011 to 16 vendors in 2013) Only products with technology
More informationVARONIS DATALERT APP FOR IBM QRADAR
VARONIS DATALERT APP FOR IBM QRADAR Integration Guide Publishing Information Software version 0 Document version 1 Publication date October 9, 2018 Copyright 2005-2018 Varonis Systems Inc. All rights reserved.
More informationUnlocking the Power of the Cloud
TRANSFORM YOUR BUSINESS With Smarter IT Unlocking the Power of the Cloud Hybrid Networking Managed Security Cloud Communications Software-defined solutions that adapt to the shape of your business The
More informationWith Aruba Central, you get anywhere-anytime access to ensure that your network is up and performing efficiently.
Product overview Aruba Central, a cloud platform for managing Aruba Instant wireless LANs and Aruba Mobility Access Switches, offers IT organizations a simple and effective way to manage and monitor their
More informationGarantierte Serviceverfügbarkeit in einer hybriden IT
2. März 2016 Garantierte Serviceverfügbarkeit in einer hybriden IT Klaus Holthaus, Eduard Spiegel Presales Consultants, HPE Software Are you getting that mobile moment? - End users satisfied - Business
More informationTable of Contents HOL-SDC-1635
Table of Contents Lab Overview - - vrealize Log Insight... 2 Lab Guidance... 3 Module 1 - Log Management with vrealize Log Insight - (45 Minutes)... 7 Overview of vrealize Log Insight... 8 Video Overview
More informationUptime and Proactive Support Services
Uptime and Proactive Support Services We ll accelerate your journey to sustainable IT optimisation and ensure that your technology is delivering all that it can. We ll keep your IT infrastructure up and
More informationBuild a system health check for Db2 using IBM Machine Learning for z/os
Build a system health check for Db2 using IBM Machine Learning for z/os Jonathan Sloan Senior Analytics Architect, IBM Analytics Agenda A brief machine learning overview The Db2 ITOA model solutions template
More informationHPE Intelligent Management Center
HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM
More informationTable of Contents HOL-PRT-1463
Table of Contents Lab Overview - - vcenter Operations Manager Management Pack for Oracle Enterprise Manager... 2 Lab Guidance... 3 Module 1 - Oracle Enterprise Manager Management Pack Introduction (15
More informationWITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,
More informationOptimize Your Databases Using Foglight for Oracle s Performance Investigator
Optimize Your Databases Using Foglight for Oracle s Performance Investigator Solve performance issues faster with deep SQL workload visibility and lock analytics Abstract Get all the information you need
More informationAgari App for Splunk Quick-Start Guide
Agari App for Splunk Quick-Start Guide Initial Release (v1.1.0) This document describes how to get started with the Agari App for Splunk. This release is available to Agari customers via SplunkBase (https://splunkbase.splunk.com/app/3568/).
More informationMojo Aware Feature Brief
Mojo Aware 2.1.1 Feature Brief Whitepaper Whitepaper 2 Overview Mojo s Cognitive WiFi solution, Aware, uniquely harnesses the power of the cloud, big data analytics, and self-awareness to automate WiFi
More information10 FOCUS AREAS FOR BREACH PREVENTION
10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual
More informationSaaS Providers. ThousandEyes for. Summary
USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications
More informationSIEMLESS THREAT DETECTION FOR AWS
SOLUTION OVERVIEW: ALERT LOGIC FOR AMAZON WEB SERVICES (AWS) SIEMLESS THREAT DETECTION FOR AWS Few things are as important to your business as maintaining the security of your sensitive data. Protecting
More informationDatasheet. Cover. Datasheet. (Enterprise Edition) Copyright 2016 Colasoft. All rights reserved. 0
Cover Datasheet Datasheet (Enterprise Edition) Copyright 2016 Colasoft. All rights reserved. 0 Colasoft Capsa Enterprise enables you to: Identify the root cause of performance issues; Provide 24/7 surveillance
More information