Click to edit Master title style
|
|
- Hortense Cook
- 5 years ago
- Views:
Transcription
1 Click to edit Master title style SCALING NETWORK MONITORING IN A LARGE ENTERPRISE BroCon 2016 Austin, TX
2 Click to edit Master Who title am style I? I work for Amazon s Worldwide Consumer Information Security group
3 What Click are to we edit going Master to talk title about? style How we scaled our network monitoring solution while the network is continuously growing
4 Click Why to edit do Master we even title do this? style Understanding what is occurring on our corporate network is important to us
5 Click to edit In Master the beginning title style
6 Click How to do edit we Master approach title this? style We originally decided on using vendor network sensors to get visibility in to what was occurring on our network
7 Click to edit How Master we started title style off Decided a vendor appliance was an effective way of gathering the data we needed We can buy network sensors, right? So we bought network sensors and plugged them into our network
8 Click to Vendor edit Master network title sensor style Life was much simpler back then... 1Gb/s capable firewalls SPAN sessions from our routers to vendor network sensors Small number of firewalls to monitor We got layer 3 and layer 4 header information from this network sensor
9 Click It looked to edit something Master title like style this Authorized users Vendor appliance Corporate network Netflow export SPAN session Router Firewall The Internet Netflow collector
10 Click to edit What Master is a SPAN title port? style
11 Click Where to edit do we Master go from title here? style Our network traffic volume kept growing Our sensor vendor stopped selling and supporting the platform we were using Increased internal maturity about using this data Vendor Management platform can t scale Driven by API usage by internal customers Started getting close to the limit of network sensors the management platform could handle
12 Click to edit Master Future proofing? title style We have a vendor s system we re starting to push the limits on What features do we need? Do we continue to buy or do we look at building instead?
13 Click to edit Master Build title vs style Buy Build Buy Speed of execution Control Vendor support Logistics Performance
14 Click Pushing to edit for Master the next title style level My co-workers evaluated various options nprobe Snort Suricata Bro
15 Click to edit Bro Master Generation title style One Ran on a single host Connected to our router via a 10G fiber link SPAN session from the router to our Bro host
16 Bro Click Generation to edit Master One looks title like style Authorized users Log store Bro Corporate network Netflow export SPAN session Router Firewall The Internet Netflow collector
17 The Click challenges to edit Master of Generation title style One The Bro host was a single point of failure Individual host installs have high operational costs High traffic volumes on our SPAN sessions caused our router to reboot Will this continue to scale with the growth of our network?
18 Click to edit Master Scorecard title style Vendor solution Generation One Single point of failure? Data collected via SPAN SPAN Control Scalability Logistics / Install effort Cost per Gb/s $$$ $
19 Click to edit And Master we are title done! style Or so we thought.
20 Click to edit Along Master came title Seth style Seth spotted everything in the history field was in upper case Turned out to be a trivial configuration change We started off with 32GB of RAM in our hosts and ended up upgrading to 128GB
21 Scaling Click to to edit infinity Master and title beyond! style Capture loss levels (as reported by Bro) started rising beyond acceptable levels once we were past 3Gb/s of traffic on our existing hardware platform We knew that traffic levels were going to continue to increase so our design needed to evolve as well
22 Introducing Click to edit Bro Master Generation title style 1.5 We migrated to optical taps over SPAN sessions SPAN sessions were good for speed of deployment but not for long term use Introduced a method to allow us load balance traffic among physical hosts Similar outcome to the work done by LBNL Eliminated the SPOF with our Bro host
23 Click to Bro edit horizontal Master title scaling style While we do run Bro in a cluster, it is limited to a single physical host We don t want to share state across hosts The Bro manager process being a single point of failure isn t all that appealing to us Keep the hosts simple and consistent
24 Click to And edit here Master is how title looks style Bro host #1 Bro host #2 Bro host #3 Load balancer Corporate network Router Optical tap The Internet Netflow export Firewall Netflow collector
25 Click to edit Master Scorecard title style Single point of failure? Data collected via Vendor solution Generation One Generation 1.5 SPAN SPAN Optical taps Control Scalability Logistics/ Install effort Cost per Gb/s $$$ $ $
26 Click to Optical edit Master taps title overview style TX RX Optical tap RX TX Router TX 10Gb/s TX 10Gb/s Firewall Load balancer
27 Click to edit Still Master some work title to style do This was a great step forward, but it was only an incremental improvement We can now scale out but it is still time consuming to get individual hosts deployed Migrating to an integrated solution would help solve these challenges
28 Click to edit Bro Master Generation title style 2.0 Combined our hosts, load balancers and optical taps into a cookie cutter rack design We now just order a small, medium or large rack depending expected traffic volumes
29 Bro Generation Click to edit 2.0 Master physical title layout style Network rack Bro rack Load balancer Load balancer Optical tap Router Firewall Bro host #1 Bro host #2 Bro host #n
30 Scaling Click Bro Generation to edit Master 2.0 title footprint style Bro rack #1 Load balancer Network rack Load balancer Bro host #1 Bro host #2 Bro host #n Router Optical tap Firewall Bro rack #2 Load balancer Bro host #1 Bro host #2 Bro host #n
31 Click to edit Master Scorecard title style Vendor solution Generation One Generation 1.5 Single point of failure? Data collected via Control Scalability SPAN SPAN Optical taps Logistics/ Install effort Generation 2 Optical taps Cost per Gb/s $$$ $ $ $
32 What Click do we to edit do with Master all this title data? style We stream the logs to our central log store
33 Click to edit Central Master log title storage style
34 Learn Click from to some edit of Master our mistakes title style Our original ETL jobs were based on the Bro 2.3 field order (output in TSV) Bro 2.4 changed the ordering of some of the fields Use JSON if you re loading this data elsewhere One line configuration change!
35 Click to edit Master Wrapping title style up
36 Click to edit Master Lessons title learnt style Scale horizontally and not vertically Stateless sensors Decouple dependencies Plan up-front Lab testing is never overrated Get experts on-site to validate Document wins Know your customers
37 Click to edit Master Thanks title style to Industry peers Thanks to LBNL, Mozilla and the others who responded to our queries and everyone who has publicly spoke or documented their install
38 Click to edit Master Thank title style you!
Scaling DreamFactory
Scaling DreamFactory This white paper is designed to provide information to enterprise customers about how to scale a DreamFactory Instance. The sections below talk about horizontal, vertical, and cloud
More informationHOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network
More informationRethinking Security: The Need For A Security Delivery Platform
Rethinking Security: The Need For A Security Delivery Platform Cybercrime In Asia: A Changing Environment & Shifting Focus Asia, more vulnerable to cybercrime because of diversity and breadth of countries
More informationForeScout CounterACT. Configuration Guide. Version 1.2
ForeScout CounterACT Core Extensions Module: NetFlow Plugin Version 1.2 Table of Contents About NetFlow Integration... 3 How it Works... 3 Supported NetFlow Versions... 3 What to Do... 3 Requirements...
More informationSoftware-Defined Secure Networks. Sergei Gotchev April 2016
Software-Defined Secure Networks Sergei Gotchev April 2016 Security Trends Today Network security landscape has changed. CISOs Treading Water Pouring money into security, yet not any more secure - Average
More informationHow Cisco IT Deployed Enterprise Messaging on Cisco UCS
Cisco IT Case Study July 2012 Enterprise Messaging on Cisco UCS How Cisco IT Deployed Enterprise Messaging on Cisco UCS Messaging platform upgrade and new servers reduce costs and improve management, availability,
More informationThe Future of Threat Prevention
The Future of Threat Prevention Bricata is the leading developer of Next Generation Intrusion Prevention Systems (NGIPS) technology, providing innovative, disruptive, high-speed, high-performance network
More informationFIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS
WHITE PAPER FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS Over the past 15 years, server virtualization has become the preferred method of application deployment in the enterprise datacenter.
More informationYou Probably DO Need RAC
You Probably DO Need RAC Delivered by: Matthew Zito, Chief Scientist 156 5th Avenue Penthouse New York, NY 10010 P: 646.452.4100 www.gridapp.com Introduction Who I Am Basics of Clustering and RAC The Value
More informationCounterACT NetFlow Plugin
Version 1.1.0 and Above Table of Contents About NetFlow Integration... 3 How it Works... 3 Supported NetFlow Versions... 3 What to Do... 3 Requirements... 4 CounterACT Requirements... 4 Networking Requirements...
More informationFeatures. HDX WAN optimization. QoS
May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified
More informationMcAfee Network Security Platform 8.3
Revision A McAfee Network Security Platform 8.3 (8.3.7.86-8.3.5.53 Manager-NS-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationAffordable High-Speed Sensors Everywhere. ntop Meetup Flocon 2016, Daytona Beach Jan 13th 2016
Affordable High-Speed Sensors Everywhere ntop Meetup Flocon 2016, Daytona Beach Jan 13th 2016 Welcome to the ntop Meetup Meeting Goals: Meet ntop users Describe our ideas and plans for 2016 Hear your comments
More informationTrends in Data Centre
Trends in Data Centre The impact on the IT infrastructure Thomas Ko Product Manager Market Situation Standards Update and Topology 40G and 100G Ethernet - Impact on IT Cabling Migration Options with Fiber
More informationQlik Sense Enterprise architecture and scalability
White Paper Qlik Sense Enterprise architecture and scalability June, 2017 qlik.com Platform Qlik Sense is an analytics platform powered by an associative, in-memory analytics engine. Based on users selections,
More informationenhance the network transform performance
enhance the network transform performance networking Your network is the backbone of your IT platform. Yet, it may be the oldest part of your infrastructure. Today networks are more complex than ever before
More informationLean Disaggregated Regional Optical Transport. Nick Plunket, Interconnection Engineer NANOG 74 October 2 or 3, 2018
Lean Disaggregated Regional Optical Transport Nick Plunket, Interconnection Engineer NANOG 74 October 2 or 3, 2018 CENIC is a 501(c)(3) with the mission to advance education and research
More informationAlways Keep IT Purely Simple
Always Keep IT Purely Simple Network Monitoring Software Page 1 CEO Message AKiPS is a scalable, fully featured monitoring tool that collects, reports and alerts on the performance of your network infrastructure.
More informationData Centers and Cloud Computing
Data Centers and Cloud Computing CS677 Guest Lecture Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationData Centers and Cloud Computing. Slides courtesy of Tim Wood
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationA man, a plan, an Arista, Panama? Bob Bregant BroCon 14
A man, a plan, an Arista, Panama? Bob Bregant BroCon 14 Bro/Arista Integration Bob Bregant BroCon 14 Bro Tap/Span Networking (with Arista-specific examples) Bob Bregant BroCon 14 Quick Introduction Bob
More informationOpen Connect: Starting from a Greenfield (a mostly Layer 0 talk) Dave Temkin 06/01/2015
Open Connect: Starting from a Greenfield (a mostly Layer 0 talk) Dave Temkin 06/01/2015 The story It all started with a discussion... After much debate, the Netflix CDN team was launched in mid-2011 We
More informationDATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure
DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure AlienVault USM Anywhere accelerates and centralizes threat detection, incident response,
More informationTransformation Through Innovation
Transformation Through Innovation A service provider strategy to prosper from digitization People will have 11.6 billion mobile-ready devices and connections by 2020. For service providers to thrive today
More informationData Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationSeven Criteria for a Sound Investment in WAN Optimization
Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs
More informationBuilding an on premise Kubernetes cluster DANNY TURNER
Building an on premise Kubernetes cluster DANNY TURNER Outline What is K8s? Why (not) run k8s? Why run our own cluster? Building what the public cloud provides 2 Kubernetes Open-Source Container Management
More informationDell EMC Hyper-Converged Infrastructure
Dell EMC Hyper-Converged Infrastructure New normal for the modern data center Nikolaos.Nikolaou@dell.com Sr. Systems Engineer Greece, Cyprus & Malta GLOBAL SPONSORS Traditional infrastructure and processes
More informationGOING FULLY SERVERLESS
GOING FULLY SERVERLESS Is it possible to never worry about servers? Jonathon Valentine CTO ThingCo Who am I? CTO & Co-founder of ThingCo, using next generation telematics and IoT to use driving data to
More informationThe smart choice for industrial switches
The smart choice for industrial switches Help your customers transform their smart cities, automated factories and wireless outdoor environments. A healthy margin and full support Specify D-Link industrial
More informationIntroduction to ArcGIS Server Architecture and Services. Amr Wahba
Introduction to ArcGIS Server 10.1 - Architecture and Services Amr Wahba awahba@esri.com Agenda Architecture Features Publishing Security Cloud Powerful GIS capabilities Delivered as Web services To help
More informationLeveraging Traditional Technologies in Non-Traditional Ways
Leveraging Traditional Technologies in Non-Traditional Ways Ben Rockwood Director of Systems Joyent, Inc. SNIA Winter Symposium 2009 Cloud Hype Cloud is marketing hype (and everyone knows it)... but so
More informationThe Bro Cluster The Bro Cluster
The Bro Cluster The Bro Cluster Intrusion Detection at 10 Gig and A High-Performance beyond using the NIDS Bro Architecture IDS for the Lawrence Berkeley National Lab Robin International Computer Science
More informationCore Network Upgrade RFP Project No Questions and Answers No. Questions Answers
Questions and Answers No. Questions Answers Core Network Upgrade RFP Project No. 11978 1. There is a costs impact to insuring this project with a bond, if you can please confirm if a bond will be required,
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationRIPE76 - Rebuilding a network data pipeline. Louis Poinsignon
RIPE76 - Rebuilding a network data pipeline Louis Poinsignon Who am I Louis Poinsignon Network Engineer @ Cloudflare. Building tools for data analysis and traffic engineering. What is Cloudflare? Content
More informationWhat is Remote PHY? Virtualization of the Core
What is Remote PHY? Virtualization of the Core Asaf Matatyaou VP, Solutions and Product Management, Cable Edge Traditional Deployment Challenges Traditional CMTS/HFC equipment does not sustainably address
More informationXcellis Technical Overview: A deep dive into the latest hardware designed for StorNext 5
TECHNOLOGY BRIEF Xcellis Technical Overview: A deep dive into the latest hardware designed for StorNext 5 ABSTRACT Xcellis represents the culmination of over 15 years of file system and data management
More informationObserver Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
More informationAtrium Webinar- What's new in ADDM Version 10
Atrium Webinar- What's new in ADDM Version 10 This document provides question and answers discussed during following webinar session: Atrium Webinar- What's new in ADDM Version 10 on May 8th, 2014 Q: Hi,
More informationWebspeed. I am back. Enhanced WebSpeed
Webspeed. I am back Enhanced WebSpeed OpenEdge 11.6 WebSpeed!!! Modernize your Progress OpenEdge web apps through enhanced Progress Application Server (PAS) support for WebSpeed Achieve improved performance
More informationMcAfee Network Security Platform 8.3
Revision A McAfee Network Security Platform 8.3 (8.3.7.86-8.3.7.59 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolves issues Installation instructions Known
More informationCisco NAC Profiler Architecture Overview
CHAPTER 2 Topics in this chapter include: Overview, page 2-1 Cisco NAC Profiler System Deployment Model, page 2-3 Cisco NAC Profiler Usage: Port Provisioning and Endpoint Directory, page 2-4 Overview Cisco
More informationReview of the 5 Criteria
Review of the 5 Criteria Howard Frazier Broadcom Corporation September, 2006 IEEE 802.3 HSSG 1 Outline Audience Purpose 5 Criteria Guidelines for responses Summary Successful examples IEEE 802.3 HSSG 2
More informationEnabling Performance & Stress Test throughout the Application Lifecycle
Enabling Performance & Stress Test throughout the Application Lifecycle March 2010 Poor application performance costs companies millions of dollars and their reputation every year. The simple challenge
More informationEthernet Wide Area Networking, Routers or Switches and Making the Right Choice
Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards
More informationPragmatic Clustering. Mike Cannon-Brookes CEO, Atlassian Software Systems
Pragmatic Clustering Mike Cannon-Brookes CEO, Atlassian Software Systems 1 Confluence Largest enterprise wiki in the world 2000 customers in 60 countries J2EE application, ~500k LOC Hibernate, Lucene,
More informationIntegrating NComputing Virtual Desktops with Citrix and VMware. April 21, 2010
Integrating NComputing Virtual Desktops with Citrix and VMware April 21, 2010 Topics Trends & Challenges in Desktop Virtualization NComputing Virtual Desktops Leveraging Best of Breed Technologies Cloud
More informationNew Features in VMware vsphere (ESX 4)
New Features in VMware vsphere (ESX 4) VMware vsphere Fault Tolerance FT VMware Fault Tolerance or FT is a new HA solution from VMware for VMs. It is only available in vsphere 4 and above and provides
More informationSIEM Solutions from McAfee
SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an
More informationCisco Nexus Data Broker
Data Sheet Cisco Nexus Data Broker Product Overview You used to monitor traffic mainly to manage network operations. Today, when you monitor traffic you can find out instantly what is happening throughout
More informationMcAfee Virtual Network Security Platform 8.4 Revision A
8.4.7.101-8.3.7.18 Manager-Virtual IPS Release Notes McAfee Virtual Network Security Platform 8.4 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions
More informationEnterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper
Enterprise-class desktop virtualization with NComputing Clear the hurdles that block you from getting ahead Whitepaper Introduction Enterprise IT departments are realizing virtualization is not just for
More informationComputing as a Service
IBM System & Technology Group Computing as a Service General Session Thursday, June 19, 2008 1:00 p.m. - 2:15 p.m. Conrad Room B/C (2nd Floor) Dave Gimpl, gimpl@us.ibm.com June 19, 08 Computing as a Service
More informationWindows Embedded Server Licensing Program
Windows Embedded Server Licensing Program 1 Windows Embedded Server Enhancing the Competitiveness of Solutions Information technology has provided many services and a great deal of convenience in our daily
More informationCASE STUDY: TRUHOME. TruHome Goes All-In on Cloud Telephony with Bigleaf SD-WAN as the Foundation
CASE STUDY: TRUHOME TruHome Goes All-In on Cloud Telephony with Bigleaf SD-WAN as the Foundation BIGLEAF NETWORKS CASE STUDY TRUHOME 2 Founded in 2004, TruHome is an award-winning mortgage credit union
More informationWIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS
WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to
More informationSubscriber Data Correlation
Subscriber Data Correlation Application of Cisco Stealthwatch to Service Provider mobility environment Introduction With the prevalence of smart mobile devices and the increase of application usage, Service
More informationLife as a Service. Scalability and Other Aspects. Dino Esposito JetBrains ARCHITECT, TRAINER AND CONSULTANT
Life as a Service Scalability and Other Aspects Dino Esposito JetBrains ARCHITECT, TRAINER AND CONSULTANT PART I Scalability and Measurable Tasks SCALABILITY Scalability is the ability of a system to expand
More informationPimp My Data Grid. Brian Oliver Senior Principal Solutions Architect <Insert Picture Here>
Pimp My Data Grid Brian Oliver Senior Principal Solutions Architect (brian.oliver@oracle.com) Oracle Coherence Oracle Fusion Middleware Agenda An Architectural Challenge Enter the
More informationWhat To Ask Your SD-WAN Vendor
#FutureWAN What To Ask Your SD-WAN Vendor Ramesh Prabagaran, VP of Product Management Twitter: @ramsba Motivation & Rationale Marketing vs Reality Network auto provisions, auto corrects, auto everything
More informationUpgrading to UrbanCode Deploy 7
Upgrading to UrbanCode Deploy 7 Published: February 19 th, 2019 {Contents} Introduction 2 Phase 1: Planning 3 1.1 Review help available from the UrbanCode team 3 1.2 Open a preemptive support ticket 3
More informationSIEM Product Comparison
SIEM Product Comparison SIEM Technology Space SIEM market analysis of the last 3 years suggest: Market consolidation of SIEM players (25 vendors in 2011 to 16 vendors in 2013) Only products with technology
More informationQlik Sense Certification Exam Study Guide
Qlik Sense Certification Exam Study Guide Abstract This document contains information about what you need to study as you prepare for your Qlik Sense Certification Exam. It covers all three roles: System
More informationTHE CHANGING WAN MATCHING THE WAN TO BUSINESS NEEDS. James Walker, Vice President Managed Network Services WAN Summit 7th October 2015
THE CHANGING WAN MATCHING THE WAN TO BUSINESS NEEDS James Walker, Vice President Managed Network Services WAN Summit 7th October 2015 tatacommunications.com @tata_comm tatacommunications-newworld.com youtube.com/user/tatacomms
More informationPrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps
PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : SAA-C01 Title : AWS Certified Solutions Architect - Associate (Released February 2018)
More informationDELL EMC VSCALE FABRIC
NETWORK DATA SHEET DELL EMC VSCALE FABRIC FIELD-PROVEN BENEFITS Increased utilization and ROI Create shared resource pools (compute, storage, and data protection) that connect to a common, automated network
More informationCitrix CloudBridge Product Overview
Product Overview Product Overview Businesses rely on branch offices to serve customers, to be near partners and suppliers and to expand into new markets. As server and desktop virtualization increase and
More informationNetFlow Optimizer. Overview. Version (Build ) May 2017
NetFlow Optimizer Overview Version 2.4.9 (Build 2.4.9.0.3) May 2017 Copyright 2013-2017 NetFlow Logic Corporation. All rights reserved. Patents both issued and pending. Contents About NetFlow Optimizer...
More informationMcAfee Network Security Platform 9.1
9.1.7.15-9.1.3.4 Manager-M-series, Mxx30-series, XC Cluster Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation
More informationApex REST API. SUMMER OF APIs. Sandeep Bhanot Developer Alex Toussaint Senior Product
SUMMER OF APIs Apex REST API Sandeep Bhanot Developer Evangelist @cloudysan Alex Toussaint Senior Product Manager @alextoussaint Got Twitter? @forcedotcom / #forcewebinar Facebook? facebook.com/forcedotcom
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become
More informationMcAfee Security Management Center
Data Sheet McAfee Security Management Center Unified management for next-generation devices Key advantages: Single pane of glass across the management lifecycle for McAfee next generation devices. Scalability
More informationEducation Brochure. Education. Accelerate your path to business discovery. qlik.com
Education Education Brochure Accelerate your path to business discovery Qlik Education Services offers expertly designed coursework, tools, and programs to give your organization the knowledge and skills
More informationMove, manage, and run SAP applications in the cloud. SAP-Certified Infrastructure from IBM Cloud
Move, manage, and run SAP applications in the cloud SAP-Certified Infrastructure from IBM Cloud 02 SAP Applications in the IBM Cloud Introduction The pace of business is skyrocketing. Data ingestion rates
More informationWindows Server 2016 Impact on VDI: Benchmark Results. By Mark Plettenberg, Ryan Bijkerk and Omar Bouhaj
Windows Server 2016 Impact on VDI: Benchmark Results By Mark Plettenberg, Ryan Bijkerk and Omar Bouhaj Disclosure and Warranty The information, concepts, and ideas contained in this document are the property
More informationLesson 14 SOA with REST (Part I)
Lesson 14 SOA with REST (Part I) Service Oriented Architectures Security Module 3 - Resource-oriented services Unit 1 REST Ernesto Damiani Università di Milano Web Sites (1992) WS-* Web Services (2000)
More informationRethinking Security CLOUDSEC2016. Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team
Rethinking Security CLOUDSEC2016 Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team Breaches Are The New Normal Only The Scale Surprises Us OPM will send notifications
More informationCLIENT SERVER ARCHITECTURE:
CLIENT SERVER ARCHITECTURE: Client-Server architecture is an architectural deployment style that describe the separation of functionality into layers with each segment being a tier that can be located
More informationIntelligence for the connected world How European First-Movers Manage IoT Analytics Projects Successfully
Intelligence for the connected world How European First-Movers Manage IoT Analytics Projects Successfully Thomas Rohrmann, Michael Probst Analytics Experience 2016, Rome #analyticsx C opyr i g ht 2016,
More informationSCRIPT: An Architecture for IPFIX Data Distribution
SCRIPT Public Workshop January 20, 2010, Zurich, Switzerland SCRIPT: An Architecture for IPFIX Data Distribution Peter Racz Communication Systems Group CSG Department of Informatics IFI University of Zürich
More informationMcAfee Network Security Platform 8.3
8.3.7.86-8.3.7.56 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationIf you like this guide and you want to support the community, you can sign up as a Founding Member here:
Introduction Hey Sam here. Thanks for getting access to Vid Invision Enterprise. I m super excited that you ve come on board This guide is to help you to understand how to navigate the Vid Invision Enterprise
More informationLessons Learned from SD-WAN Deployments on Six Continents. 21 September 2016 Tim Sullivan Co-founder & CEO
Lessons Learned from SD-WAN Deployments on Six Continents 21 September 2016 Tim Sullivan Co-founder & CEO Coevolve s perspective on SD-WAN Coevolve was established in 2014 to drive enterprise adoption
More informationSystem Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements
System Requirements This section contains information on the minimum system requirements for Foglight NMS. Before you can begin to download Foglight NMS, you must make sure that your computer meets the
More informationSOLUTION BRIEF RSA NETWITNESS SUITE & THE CLOUD PROTECTING AGAINST THREATS IN A PERIMETER-LESS WORLD
RSA NETWITNESS SUITE & THE CLOUD PROTECTING AGAINST THREATS IN A PERIMETER-LESS WORLD THE CLOUD MAKES THREAT HUNTING HARDER The explosion in cloud workloads is driving real, substantial business value.
More informationAIM. 10 September
AIM These two courses are aimed at introducing you to the World of Web Programming. These courses does NOT make you Master all the skills of a Web Programmer. You must learn and work MORE in this area
More informationLesson 5 Nimbits. Chapter-6 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 5 Nimbits 1 Cloud IoT cloud-based Service Using Server at the Edges A server can be deployed at the edges (device nodes) which communicates the feeds to the cloud service. The server also provisions
More informationAgenda Time (PT) 8:45 a.m. Event Platform Opening 9:00 a.m. Keynote - Java: Present and Future Java EE 7 Java SE 8 Java Embedded
Virtual Developer Day: Java 2014 May 6 th 9:00 a.m. - 1:00 p.m. PDT / 12:00 p.m. - 4:00 p.m. EDT / 1:00 p.m. 5:00 p.m. BRT Agenda Time (PT) 8:45 a.m. Event Platform Opening 9:00 a.m. Keynote - Java: Present
More informationSD-WAN Solution How to Make the Best Choice for Your Business
HOW-TO GUIDE Choosing the Right SD-WAN Solution How to Make the Best Choice for Your Business Section Title - 1 TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations are Choosing SD-WAN 4 CH. 2 What
More informationCreating Your Virtual Data Center
NET201 Creating Your Virtual Data Center VPC Fundamentals and Connectivity Options Becky Weiss, Principal Engineer, EC2 Networking October 2015 2015, Amazon Web Services, Inc. or its Affiliates. All rights
More informationReST 2000 Roy Fielding W3C
Outline What is ReST? Constraints in ReST REST Architecture Components Features of ReST applications Example of requests in REST & SOAP Complex REST request REST Server response Real REST examples REST
More informationebook ADVANCED LOAD BALANCING IN THE CLOUD 5 WAYS TO SIMPLIFY THE CHAOS
ebook ADVANCED LOAD BALANCING IN THE CLOUD 5 WAYS TO SIMPLIFY THE CHAOS Introduction Load balancing isn t just about managing traffic anymore. As your infrastructure expands to include applications in
More informationCLOUD-BASED DDOS PROTECTION FOR HOSTING PROVIDERS
CLOUD-BASED DDOS PROTECTION FOR HOSTING PROVIDERS A STRONG PARTNER OUR PORTFOLIO COMPANY Expand your own portfolio with an IT security expert that has redefined DDoS protection from the cloud. Link11 is
More informationUsing WireShark to support the Application June 16, 2011
Using WireShark to support the Application June 16, 2011 Tim Poth Senior Priority Response Analyst Bentley Systems, Inc. tim.poth@bentley.com SHARKFEST 11 Stanford University June 13-16, 2011 Agenda Quick
More informationPROTECT NETWORK EDGE WITH BGP, URPF AND S/RTBH. by John Brown, CityLink Telecommunications, LLC
PROTECT NETWORK EDGE WITH BGP, URPF AND S/RTBH by John Brown, CityLink Telecommunications, LLC About Me Based in Albuquerque, NM US Will travel for packet$, food, and good Scotch.! MikroTik Trainer CityLink
More informationMigration from Citrix. White Paper Parallels Remote Application Server
Migration from Citrix White Paper Parallels Remote Application Server Table of Contents Introduction... 3 Why Should You Migrate from Citrix to Parallels RAS?... 3 Migrating from Citrix to Parallels RAS...
More informationWhy can t I just do that with a switch? Joseph Magee Chief Security Officer Top Layer Networks
Why can t I just do that with a switch? Joseph Magee Chief Security Officer Top Layer Networks - 1 - Introduction In the field you may come across the following question: Why can t I do what your IDS Balancer
More informationIPv6 deployment at Google
IPv6 deployment at Google Lorenzo Colitti, Angus Lees {lorenzo,alees}@google.com Why? Why IPv6? When the day comes that users only have IPv6, Google needs to be there If we can serve our users better over
More informationReal-time Communications Security and SDN
Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,
More information