Cisco Tetration Analytics
|
|
- Sheryl Fowler
- 5 years ago
- Views:
Transcription
1 Cisco Tetration Analytics Enhanced security and operations with real time analytics Christopher Say (CCIE RS SP) Consulting System Engineer
2 Challenges in operating a hybrid data center Know your applications: what is running and what is critical Where is congestion, and which application flows are affected? Visibility into traffic path for every flow in real time Time-series view of events for faster diagnostics Which traffic is going through which links? Key performance indicators across the path workload <-> fabric Where are the packet drops happening? What is the latency?
3 Security Challenges in Modern Data Centers Securing applications has become complex Rapid application deployment Continuous development Application mobility Microservices Policy enforcement Heterogeneous network Zero-trust security Policy compliance Applications are driving modern data center infrastructure 2018 Cisco and/or its affiliates. All rights reserved.
4 2018 Cisco and/or its affiliates. All rights reserved.
5 Introducing Tetration Software & Network Sensors: See everything OS Sensor Windows Linux Mid-Range Universal Network Sensor Cloud-Scale Nexus Nexus 9000 X v Data Analytics & Machine Learning Engine Open Access Analytics Cluster Appliance model On-Premise or Cloud Billions of Events Meta-Data generated from every packet Ingest Store Analyse Learn Simulate Act APPLICATION INSIGHT FLOW SEARCH & FORENSICS SEGMENTATION & COMPLIANCE Web Rest API Event Bus Lab 2018 Cisco and/or its affiliates. All rights reserved.
6 Operations Security Cisco Tetration Use cases Visibility and forensics Policy Application insight Policy simulation Neighborhood graphs & Cloud Migration Cisco Tetration Application segmentation Process inventory Compliance 2018 Cisco and/or its affiliates. All rights reserved.
7 Cisco Tetration Architecture overview Access mechanism Web GUI REST API Event notification Cisco Tetration apps Analytics engine Third-party sources (configuration data) Bring your own data (streaming telemetry) Software sensor and enforcement Data collection layer Embedded network sensors (telemetry only)
8 Cisco Tetration data sources Software sensors Available today Network sensors Next-generation Cisco Nexus Series Switches Third-party sources Third-party data sources Linux servers (virtual machine and bare metal) Windows servers (virtual machines and bare metal) Windows Desktop VM (virtual desktop infrastructure only) Cisco Nexus 9300 EX* Cisco Nexus 9300 FX Asset tagging Load balancers IP address management CMDB *Note: Not all network performance functionality is supported on this switch series Main features Low CPU overhead (SLA enforced) Low network overhead New: Enforcement point (software agents) Highly secure (code signed and authenticated) Every flow (no sampling) and no payload
9 Real-time asset tagging
10 User-uploaded asset tags Discovered inventory User-uploaded inventory and metadata (32 arbitrary tags) Inventory tracked in real time, along with historical trends Cisco Tetration Analytics sensor feed VMware vcenter (virtual machine attributes) AWS attributes (AWS tags) User-uploaded tags Cisco Tetration Analytics merge operation Real-time inventory merged with information with historical trends
11 Virtual machine attributes and tags Virtual machine attributes Cisco Tetration Analytics Cisco Tetration Analytics can be configured to connect to VMware vcenter and AWS Virtual machine attributes from vcenter Instance tags from AWS Can connect to multiple vcenter instances and AWS regions Administrator provides necessary parameters to connect to vcenter and AWS Only read-only access required Information about all virtual machines is extracted Queries for updates and changes (default time is 10 seconds; this setting is configurable) Uses vcenter and AWS standard APIs
12 Fabric performance monitoring
13 Network performance features in Datacenter fabric Currently there is very little visibility into data plane traffic within the fabric, resulting in visibility and operational gaps Cisco Nexus 9000 Series Switches with the built-in hardware flow cache with Cisco Tetration platform enables the following Network Performance features: Provide visibility into fabric topology Map and trace every flow path on the fabric topology through switch ports and queues Search flows for individual fabric links or queues Provide per-link statistics and time series Provide per-queue statistics and time series Highlight important links for further diagnostics based on specified performance metrics Cisco ACI Infrastructure using Cisco Nexus 9300-FX leaf switches and Cisco Nexus 9300-FX line cards in spine Cisco Tetration Analytics
14 Network topology discovery Switches with analytics enabled have a Cisco Tetration agent running Switch reports its type (leaf or spine) and ports to Tetration Switch reports LLDP neighbors to Tetration For example, Leaf7 may report following neighbors P1 connected to (Spine1, P3) P2 connected to (Spine2, P3) P3 connected to (Host1, mac1) Fabric topology is built based on neighbors reported by all the switches on the ports Tetration platform also maintains a time-series view of the topology
15 Hop-by-hop view within the fabric Time-series hop-by-hop view for traffic flows: Forward path Reverse path Where available, includes ingress port, egress port, and queue information If software sensors are installed and LLDP is enabled on the host, path information also includes the workloads Launch in a topology view
16 Hop-by-hop view overlay in topology Click Fwd or Rev link to navigate to fabric page Hover on flow path to view class info and other details Path Only (default): A subset of fabric topology graph relevant to the flow path is shown Show All: Show full network topology with flow path highlighted Partial flow path if any of the fabric links does not exist in the current topology
17 Hop-by-hop latency information Switch reports latency information for each flow Cisco Tetration platform computes and provides the latency information for each link as well as across fabric Tetration provides forward and reverse latency information Average latency for each flow across each link is provided by Tetration Latency calculation requires PTP clock sync in the fabric Latency resolution is 0.1 microsecond Switch uses 16 bits for latency measurements, which means it wraps around at 6.8 ms
18 Packet drop indicators Switch provides indication of packet drops for a flow, along with the interface and queue information In a time-series view, Cisco Tetration platform shows the export intervals where packet drops where reported for the flow End-to-end drops flow in each direction Note: Switch does not provide information about how many packets where actually dropped within the export interval.
19 Fabric link statistics Link level statistics in the charts are bidirectional Time-series chart for each link shows: Transport throughput Average latency Drop indicators Per-class time series aggregates flow metrics that go through a particular egress queue of the fabric link Time-series information per fabric link for longlived flows (if available): Latency Drop indicators
20 Search for flows based on fabric details Fwd/Rev path information to find flows for a given: Fabric link ID Switch name Port name For a given link, we can narrow results by: Drops: True/false Latency buckets Class
21 Top n charts based on fabric performance Highlight top n links by performance metrics: Transport throughput: Average aggregation over selected time range Avg Latency: Maximum aggregation over selected time range Drop Indicators: Maximum aggregation over selected time range Histogram chart for distribution of nonzero metric values: Bucket values are percentage of links in the metric range Select an arbitrary range of values to update highlighted links Bandwidth with distribution (nonzero values) Drop Indicators distribution (nonzero values) Avg Latency distribution (nonzero values)
22 Performance monitoring using software sensors
23 Tracking process response times Correlate network traffic to a process on a server For each flow, track the process response times Drill down into flow details to get process information for forward and reverse direction (where available) Time-series view of the information allows you to go back in time and analyze the information
24 TCP handshake intervals Track processes with longer handshake times: Longer duration to establish connections Group by TCP handshake interval buckets Search for flows with longer handshake intervals
25 TCP retransmissions Track any TCP retransmissions for the flows Determine if the retransmissions are happening in forward or reverse direction Drill down to a single flow to identify retransmission details: Find details about number of packets retransmitted at any particular time along with direction Correlated to identifying broader network or application bottleneck
26 TCP window size changes Cisco Tetration platform tracks the following TCP window parameters: Forward and reverse congestion window reduced Forward and reverse MSS changed (Boolean) Forward and reverse TCP receive window zeroed (Boolean) Search based on these parameters to identify specific flows in time-series view
27 Identifying bottlenecks Identify where the potential bottleneck could be: Network Application (consumer or provider) Both Information is correlated based on: TCP retransmissions Window size changes Latency and other factors
28 Cisco Tetration application insight
29 Application dependency and cluster grouping BM VM VM VM BM Cisco Nexus 9000 Series VM BM Network-only sensors, host-only sensors, or both (preferred) Bare-metal, VM, and switch telemetry VM VM BM VM VM BM Brownfield Bare metal and VM Bare-metal and VM telemetry VM telemetry (AMI ) Cisco Tetration Analytics platform BM VM VM BM VM BM BM VM VM BM On-premises and cloud workloads (AWS) Unsupervised machine learning Behavior analysis VM BM BM
30 What is really running on my network? Cisco Tetration Analytics application insight dependency map (Service owner) Service category Use Cisco Tetration Analytics outcome to generate whitelist policies Service Service offering Application Dependencies Security
31 Server process inventory
32 Cisco Tetration: Server process and process hash Cisco Tetration Analytics Computed process hash for all the processes running on the server Search based on: Process Process ID All servers running a particular process Details for long-running processes User ID associated with process and process ID Use process hash information to search for suspicious processes against any indicators of compromise (IOCs)
33 Search for process and process hash Search for process command line or binary process hash across all servers Search for all servers that ran a certain process Search for all servers that ran a certain process binary hash
34 Server process inventory details Drill down to a specific host to look at the complete process inventory Process inventory accessed through the Process tab Search for process within a host Process details
35 Neighborhood graphs
36 Insight-based notification: Neighborhood graphs Neighborhood graphs Find up to two-hop communication neighbors for a selected workload Drill down into details about communication between these neighbors View dashboard display using graph database Determine the number of server hops between two workloads Get out-of-the-box and customer alerts through Kafka Cisco Tetration Analytics Message publish Kafka Kafka broker Northbound consumers Northbound consumers
37 Neighborhood graph and summary information Search for an Inventory filter, scope, or cluster Two-hop communication summary with network traffic details Nodes in radial tree are clickable for exploration
38 Neighborhood graphs: Path view Determine the number of hops between two entities in an application Quickly identify protocols connecting those entities Drill down to get the communication details between two entities Launch flow search view with relevant filters
39 Neighborhood application: Alerts Allows users to configure alerts in three scenarios: Path between two nodes has decreased below some minimum hop count Example: Database should never be directly communicate to Scope X Minimum path between two nodes is above threshold Example: Database should not be more than two hops away from Scope Y Path between two nodes must pass through a third node Example: Everything between Scope A and Scope B must pass through firewall or VPN
40 Bring your own data (BYOD)
41 Cisco Tetration: Bring your own data Northbound consumers Streaming JSON telemetry Data sink Public Cloud Main features Stream any JSON-based telemetry to a data sink Support up to 10 simultaneous streaming topics Bring up to 5 GB of data per hour per streaming topic Analyze and write your results through alerts or UI
42 Cisco Tetration: Bring your own data Data sink: Streaming data Securely stream data to Cisco Tetration through Kafka Ingested data can be written to data lake through data sink Dumper application Data sink Dumper application supports only JSON format Producer applications provided on the platform to work with Cisco Tetration data sink User application can be built on top of data lake Upload batch data Upload data through UI (maximum limit is 10 GB) Parquet, CSV, and JSON formats only Directories can be uploaded as tar.gz and gzip Uploaded data will be written to data lake Data available to all users under that specific tenant
43 Open API
44 Cisco Tetration Analytics: Open API Programmatic interface Rest API Cisco Tetration flow search Rest API Northbound application Sensor management Push notification Out-of-the-box events User-defined events Cisco Tetration applications Access to data lake Cisco Tetration Analytics platform Kafka Message publish Kafka broker Cisco Tetration applications Northbound consumers Northbound consumers Write your own application
45 Deployment options
46 Cisco Tetration: Deployment options On-premises options Public cloud Cisco Tetration Platform (large form factor) Suitable for deployments of more than 5,000 workloads Built-in redundancy Scales to up to 25,000 workloads Includes: 36 x Cisco UCS C220 servers 3 x Cisco Nexus 9300 platform switches Cisco Tetration-M (small form factor) Suitable for deployments of less than 5,000 workloads Includes: 6 x Cisco UCS C220 servers 2 x Cisco Nexus 9300 platform switches Cisco Tetration Cloud Software deployed in AWS Suitable for deployments of less than 1000 workloads AWS instance owned by customer Amazon Web Services Microsoft Azure
47 Cisco Tetration Analytics: Ecosystem Service visibility Layer 4-7 services integration Cisco Tetration Analytics Security orchestration Service assurance Insight exchange 2018 Cisco and/or its affiliates. All rights reserved.
48 Cisco IT: Business value Traditional Hire a consultant Collect logs, interview teams Identify application dependencies Verify with every group Static map, change requests Implement policy, apps break Cisco Tetration platform 70% reduction in cost and time 3600 person hours of skilled staff time saved for every 100 applications 20-40% reduction in virtual machine footprint US$1M-$5M project; several months 2018 Cisco and/or its affiliates. All rights reserved.
49 In summary: Platform built for scale and flexibility Real time and scalable Granular policy enforcement Easy to use Open Every packet, every flow Application segmentation for thousands of applications Consistent policy enforcement Identify policy deviations in near-real time One-touch deployment Self-monitoring Self-diagnostics Standard web UI REST API (pull) Event notification (push) Long-term data retention Support for workload mobility Cisco Tetration applications
50 FAQ Q. What is the difference between a software sensor and a hardware sensor? Software sensors are installed on the servers (virtual machine or bare metal) o full-visibility sensors collect telemetry data from every packet and every flow and also act as policy enforcement points o limited-visibility sensors provide only the conversation view required for application insights and policy generation on certain older operating systems Hardware sensors are embedded into the switch Application-Specific Integrated Circuit (ASIC) itself o collect flow data within the switch ASIC from all the ports o Supported on Nexus Cisco and/or its affiliates. All rights reserved.
51 FAQ Q. What is the impact of enabling telemetry capture on the server and switch CPU? Software sensors will consume no more than 3 percent of CPU This threshold is configurable Bandwidth consumption at about 1% only Hardware sensors are performed in the switch ASIC without any impact on the CPU 2018 Cisco and/or its affiliates. All rights reserved.
52 FAQ Q. How do users access information from the Cisco Tetration Analytics platform? Web GUI REST API Kafka-based push notification Custom applications using programming languages to access to the Hadoop data lake 2018 Cisco and/or its affiliates. All rights reserved.
53 FAQ Q. How does the Cisco Tetration platform work with existing data center infrastructure? Customers with existing data center infrastructure, which can be Cisco or third party, can deploy the Cisco Tetration platform. Deployment is achieved by installing software sensors on virtual machines or bare-metal servers. These sensors, installed on the servers themselves, collect the required telemetry data for the analytics platform and can also act as enforcement points for the segmentation policy. Another option is to use ERSPAN sensors to generate the telemetry data based on the copied traffic 2018 Cisco and/or its affiliates. All rights reserved.
54 FAQ Q. Is the policy information updated as the application behavior changes? Using the rich telemetry data, Cisco Tetration continuously monitors for policy compliance and deviation. For example, if additional instances of a specific application component are added, Cisco Tetration will enforce the same policy automatically on those instances. Also, if the workload moves, policy moves with it, and no additional action is required from administrators Q. Can the Cisco Tetration Analytics platform send notification when policy deviations are identified? Yes. Cisco Tetration Analytics supports northbound notification through the Kafka message bus. Any northbound system can subscribe to those notifications and take additional actions. For example, a Security Incident Event Management (SIEM) system could subscribe to those events and open tickets automatically 2018 Cisco and/or its affiliates. All rights reserved.
55
Cisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become
More informationPSOACI Tetration Overview. Mike Herbert
Tetration Overview Mike Herbert Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion
More informationTetration Hands-on Lab from Deployment to Operations Support
LTRACI-2184 Tetration Hands-on Lab from Deployment to Operations Support Furong Gisiger, Solutions Architect Lawrence Zhu, Sr. Solutions Architect Cisco Spark How Questions? Use Cisco Spark to communicate
More informationSelf-driving Datacenter: Analytics
Self-driving Datacenter: Analytics George Boulescu Consulting Systems Engineer 19/10/2016 Alvin Toffler is a former associate editor of Fortune magazine, known for his works discussing the digital revolution,
More informationThe Why, What, and How of Cisco Tetration
The Why, What, and How of Cisco Tetration Why Cisco Tetration? With the above trends as a backdrop, Cisco has seen specific changes within the multicloud data center. Infrastructure is changing. It is
More informationCisco Tetration Analytics Demo. Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH
Cisco Tetration Analytics Demo Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH Agenda Introduction Theory Demonstration Innovation Through Engineering
More informationCisco Tetration Platform: Network Performance Monitoring and Diagnostics
Data Sheet Cisco Tetration Platform: Network Performance Monitoring and Diagnostics The Cisco Tetration platform, extends machine learning capability to provide unprecedented insights into network performance
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationCisco Tetration Analytics + Demo. Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH
Cisco Tetration Analytics + Demo Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH Agenda Introduction Theory Demonstration Innovation Through Engineering
More informationCisco Tetration Analytics
Cisco Tetration Analytics Real-time application visibility and policy management using advanced analytics Yogesh Kaushik, Sr. Director Product Management PSOACI-2100 Agenda Market context Introduction:
More informationCisco Tetration Analytics, Release , Release Notes
Cisco Tetration Analytics, Release 2.3.1.41, Release Notes This document describes the features, caveats, and limitations for the Cisco Tetration Analytics software. The Cisco Tetration Analytics platform
More informationCisco Tetration Application Segmentation
Data Sheet Cisco Tetration Application Segmentation The Cisco Tetration platform using application insight and white-list based policy model, simplifies the implementation of zero-trust model. It enables
More informationCisco Tetration Platform
Data Sheet Cisco Tetration Platform The Cisco Tetration platform addresses data center operational and security challenges by providing comprehensive workload-protection capability and unprecedented insights
More informationCisco Tetration Platform
Data Sheet Cisco Tetration Platform The Cisco Tetration platform addresses data center operational and security challenges by providing comprehensive workload-protection capability and unprecedented insights
More informationCisco IT Tetration Deployment, Part 1 of 2
Cisco IT ACI Deployment White Papers Cisco IT Tetration Deployment, Part 1 of 2 This is the fifth white paper in a series of case studies that explain how Cisco IT deployed ACI to deliver improved business
More informationArchitectural overview Turbonomic accesses Cisco Tetration Analytics data through Representational State Transfer (REST) APIs. It uses telemetry data
Solution Overview Cisco Tetration Analytics and Turbonomic Solution Deploy intent-based networking for distributed applications. Highlights Provide performance assurance for distributed applications. Real-time
More informationQualys Cloud Platform
18 QUALYS SECURITY CONFERENCE 2018 Qualys Cloud Platform Looking Under the Hood: What Makes Our Cloud Platform so Scalable and Powerful Dilip Bachwani Vice President, Engineering, Qualys, Inc. Cloud Platform
More informationExploring Cloud Security, Operational Visibility & Elastic Datacenters. Kiran Mohandas Consulting Engineer
Exploring Cloud Security, Operational Visibility & Elastic Datacenters Kiran Mohandas Consulting Engineer The Ideal Goal of Network Access Policies People (Developers, Net Ops, CISO, ) V I S I O N Provide
More informationA10 HARMONY CONTROLLER
DATA SHEET A10 HARMONY CONTROLLER AGILE MANAGEMENT, AUTOMATION, ANALYTICS FOR MULTI-CLOUD ENVIRONMENTS PLATFORMS A10 Harmony Controller provides centralized agile management, automation and analytics for
More informationAlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment
BRKPAR-2488 AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment Edy Almer How to Secure and Automate Your Heterogeneous Cisco Environment Yogesh Kaushik, Senior Director Cisco Doug
More informationUnlock the Power of Data
INSDCT-2222 Unlock the Power of Data Tom Edsall, CTO, Data Center Networking Group Firaas Rashid, CTO - EMEAR, App Dynamics Goal: Extract Metadata and Create Value for Your Business Delivering Value: Policy
More informationDATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure
DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure AlienVault USM Anywhere accelerates and centralizes threat detection, incident response,
More information2018 Cisco and/or its affiliates. All rights reserved.
Beyond Data Center A Journey to self-driving Data Center with Analytics, Intelligent and Assurance Mohamad Imaduddin Systems Engineer Cisco Oct 2018 App is the new Business Developer is the new Customer
More informationSolution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and
Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and Compliance Management Through the integration of AlgoSec
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More informationModelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer
Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:
More informationPowerful Insights with Every Click. FixStream. Agentless Infrastructure Auto-Discovery for Modern IT Operations
Powerful Insights with Every Click FixStream Agentless Infrastructure Auto-Discovery for Modern IT Operations The Challenge AIOps is a big shift from traditional ITOA platforms. ITOA was focused on data
More informationCisco Application Centric Infrastructure
Data Sheet Cisco Application Centric Infrastructure What s Inside At a glance: Cisco ACI solution Main benefits Cisco ACI building blocks Main features Fabric Management and Automation Network Security
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More information70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure
70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure Slide 1 Creating the Virtualization Infrastructure Slide 2 Introducing Microsoft System Center
More informationNetwork Operations Analytics
Network Operations Analytics Solution Guide Version 2.4.4 (Build 2.4.4.0.x) June 2016 Copyright 2012-2016 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 2 Solution
More informationCisco ACI Simulator VM Installation Guide
Cisco ACI Simulator VM Installation Guide New and Changed Information 2 About the Application Policy Infrastructure Controller 2 About the ACI Simulator Virtual Machine 2 Simulator VM Topology and Connections
More informationCisco Application Centric Infrastructure (ACI) Simulator
Data Sheet Cisco Application Centric Infrastructure (ACI) Simulator Cisco Application Centric Infrastructure Overview Cisco Application Centric Infrastructure (ACI) is an innovative architecture that radically
More informationSEVONE END USER EXPERIENCE
Insight for the Connected World End User Experience [ DataSheet ] SEVONE END USER EXPERIENCE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure
More informationvrealize Operations Management Pack for NSX for Multi-Hypervisor
vrealize Operations Management Pack for This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more
More informationvcenter Operations Management Pack for NSX-vSphere
vcenter Operations Management Pack for NSX-vSphere vcenter Operations Manager 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationVirtualized Network Services SDN solution for service providers
Virtualized Network Services SDN solution for service providers Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise customers
More informationCisco Enterprise Cloud Suite Overview Cisco and/or its affiliates. All rights reserved.
Cisco Enterprise Cloud Suite Overview 2015 Cisco and/or its affiliates. All rights reserved. 1 CECS Components End User Service Catalog SERVICE PORTAL Orchestration and Management UCS Director Application
More informationOracle Enterprise Manager 12c IBM DB2 Database Plug-in
Oracle Enterprise Manager 12c IBM DB2 Database Plug-in May 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and
More information5 days lecture course and hands-on lab $3,295 USD 33 Digital Version
Course: Duration: Fees: Cisco Learning Credits: Kit: DCAC9K v1.1 Cisco Data Center Application Centric Infrastructure 5 days lecture course and hands-on lab $3,295 USD 33 Digital Version Course Details
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationTrends and challenges Managing the performance of a large-scale network was challenging enough when the infrastructure was fairly static. Now, with Ci
Solution Overview SevOne SDN Monitoring Solution 2.0: Automate the Operational Insight of Cisco ACI Based Infrastructure What if you could automate the operational insight of your Cisco Application Centric
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationStorage Networking Strategy for the Next Five Years
White Paper Storage Networking Strategy for the Next Five Years 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Top considerations for storage
More informationvrealize Operations Management Pack for NSX for vsphere 2.0
vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationTrisul Network Analytics - Traffic Analyzer
Trisul Network Analytics - Traffic Analyzer Using this information the Trisul Network Analytics Netfllow for ISP solution provides information to assist the following operation groups: Network Operations
More informationOracle Enterprise Manager 12c Sybase ASE Database Plug-in
Oracle Enterprise Manager 12c Sybase ASE Database Plug-in May 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only,
More informationfor Multi-Services Gateways
KURA an OSGi-basedApplication Framework for Multi-Services Gateways Introduction & Technical Overview Pierre Pitiot Grenoble 19 février 2014 Multi-Service Gateway Approach ESF / Increasing Value / Minimizing
More informationTHE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson
THE RSA NETWITNESS SUITE REINVENT YOUR SIEM Presented by: Walter Abeson 1 Reality Goals GOALS VERSUS REALITY OF SIEM 1.0 Single compliance & security interface Analyze & prioritize alerts across various
More informationJuniper Networks AppFormix /TRY Training Script
Juniper Networks AppFormix /TRY Training Script Revision: 1.5 Date: 14 May 2018 Infrastructure: Try Contrail and AppFormix Sandbox https://www.juniper.net/us/en/cloud-software/trial/index.html User Guide
More informationNetwork Behavior Analysis
N E T W O R K O P E R AT I O N S. S I M P L I F I E D. FORWARD ENTERPRISE HIGHLIGHTS Forward Networks is the leader in Intent-based Networking and network assurance to automate the analysis and verification
More informationWeiterentwicklung von OpenStack Netzen 25G/50G/100G, FW-Integration, umfassende Einbindung. Alexei Agueev, Systems Engineer
Weiterentwicklung von OpenStack Netzen 25G/50G/100G, FW-Integration, umfassende Einbindung Alexei Agueev, Systems Engineer ETHERNET MIGRATION 10G/40G à 25G/50G/100G Interface Parallelism Parallelism increases
More informationCisco SAN Analytics and SAN Telemetry Streaming
Cisco SAN Analytics and SAN Telemetry Streaming A deeper look at enterprise storage infrastructure The enterprise storage industry is going through a historic transformation. On one end, deep adoption
More informationSEVONE DATA APPLIANCE FOR EUE
Insight for the Connected World Data Appliance for EUE [ DataSheet ] SEVONE DATA APPLIANCE FOR EUE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationVideo-Aware Networking: Automating Networks and Applications to Simplify the Future of Video
Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video The future of video is in the network We live in a world where more and more video is shifting to IP and mobile.
More informationCisco Extensible Network Controller
Data Sheet Cisco Extensible Network Controller Product Overview Today s resource intensive applications are making the network traffic grow exponentially putting high demands on the existing network. Companies
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationEBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud
EBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud Contents Introduction... 3 What is VMware Cloud on AWS?... 5 Customer Benefits of Adopting VMware Cloud on AWS... 6 VMware Cloud
More informationAzure Learning Circles
Azure Learning Circles Azure Management Session 1: Logs, Diagnostics & Metrics Presented By: Shane Creamer shanec@microsoft.com Typical Customer Narratives Most customers know how to operate on-premises,
More informationUSM Anywhere AlienApps Guide
USM Anywhere AlienApps Guide Updated April 23, 2018 Copyright 2018 AlienVault. All rights reserved. AlienVault, AlienApp, AlienApps, AlienVault OSSIM, Open Threat Exchange, OTX, Unified Security Management,
More informationCisco UCS Performance Manager
Data Sheet Cisco UCS Performance Manager Introduction Today s integrated infrastructure data centers must be highly responsive, with heightened levels of flexibility and visibility. Personnel are responsible
More informationCisco ACI Virtual Machine Networking
This chapter contains the following sections: Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers, page 1 Virtual Machine Manager Domain Main Components, page 2 Virtual Machine
More informationvrealize Operations Management Pack for NSX for vsphere 3.0
vrealize Operations Management Pack for NSX for vsphere 3.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationOverview SENTINET 3.1
Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7
More informationCisco Unified Computing System Delivering on Cisco's Unified Computing Vision
Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision At-A-Glance Unified Computing Realized Today, IT organizations assemble their data center environments from individual components.
More informationCisco Application Centric Infrastructure
Cisco Application Centric Infrastructure Cisco Application Centric Infrastructure (Cisco ACI ) is the industry s most secure, open, and comprehensive Software-Defined Networking (SDN) solution. It radically
More informationCisco Nexus Data Broker
Data Sheet Cisco Nexus Data Broker Product Overview You used to monitor traffic mainly to manage network operations. Today, when you monitor traffic you can find out instantly what is happening throughout
More informationvrealize Operations Management Pack for NSX for vsphere 3.5.0
vrealize Operations Management Pack for NSX for vsphere 3.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationVirtualized Network Services SDN solution for enterprises
Virtualized Network Services SDN solution for enterprises Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise s locations
More informationAssure the Health of Your Network
DNA Center Assurance Overview, on page 1 Monitor and Troubleshoot the Overall Health of Your Enterprise, on page 4 Monitor and Troubleshoot the Health of Your Network, on page 7 Monitor and Troubleshoot
More informationStratusphere Solutions
Stratusphere Solutions Deployment Best Practices Guide Introduction This guide has been authored by experts at Liquidware to provide a baseline as well as recommendations for a best practices deployment
More informationIntuit Application Centric ACI Deployment Case Study
Intuit Application Centric ACI Deployment Case Study Joon Cho, Principal Network Engineer, Intuit Lawrence Zhu, Solutions Architect, Cisco Agenda Introduction Architecture / Principle Design Rollout Key
More informationCommunity Edition Getting Started Guide. July 25, 2018
Community Edition Getting Started Guide July 25, 2018 Copyright 2018 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the
More informationData Sheet. Monitoring Automation for Web-Scale Networks MONITORING AUTOMATION FOR WEB-SCALE NETWORKS -
Data Sheet Monitoring Automation for Web-Scale Networks CLOUD-BASED MONITORING AUTOMATION FOR WEB-SCALE NETWORKS NetSpyGlass (NSG) is cloud-based, network monitoring automation for network operators seeking
More informationCisco Tetration Analytics Platform: A Dive into Blazing Fast Deep Storage
White Paper Cisco Tetration Analytics Platform: A Dive into Blazing Fast Deep Storage What You Will Learn A Cisco Tetration Analytics appliance bundles computing, networking, and storage resources in one
More informationCisco CloudCenter Solution with Cisco ACI: Common Use Cases
Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco ACI increases network security, automates communication policies based on business-relevant application requirements, and decreases developer
More informationTechnologies for the future of Network Insight and Automation
Technologies for the future of Network Insight and Automation Richard Wade (ricwade@cisco.com) Technical Leader, Asia-Pacific Infrastructure Programmability This Session s Context Service Creation Service
More informationFundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites
Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites The recommended knowledge and skills that a learner must have before attending this course are as follows: Knowledge
More informationVMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN
VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN-000213-01 VMware vcenter AppSpeed User s Guide You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/
More informationTetration Analytics - Network Analytics & Machine Learning Enhancing Data Center Security and Operations
Tetration Analytics - Network Analytics & Machine Learning Enhancing Data Center Security and Operations Mike Herbert, Principal Engineer, INSBU BRKDCN-2040 Okay what does Tetration Mean? Tetration (or
More informationMulti-Cloud and Application Centric Modeling, Deployment and Management with Cisco CloudCenter (CliQr)
Multi-Cloud and Application Centric Modeling, Deployment and Management with Cisco CloudCenter (CliQr) Jeremy Oakey - Sr. Director, Technical Marketing & Integrations BRKCLD-2008 Agenda Introduction Architecture
More information2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
2018 Cisco and/or its affiliates. All rights reserved. Cisco Public PSODCN-1030 Intent Based Systems Deliver Automation Dave Malik Cisco Fellow and Chief Architect Advanced Services @dmalik2 2018 Cisco
More informationPluribus UNUM Platform
Data Sheet Pluribus UNUM Platform Unified Management, Automation and Analytics for the Adaptive Cloud Fabric Highlights Advanced management platform that enhances the intrinsic automation of the Adaptive
More informationDeploy Microsoft SQL Server 2014 on a Cisco Application Centric Infrastructure Policy Framework
White Paper Deploy Microsoft SQL Server 2014 on a Cisco Application Centric Infrastructure Policy Framework August 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
More informationQualys Cloud Platform
Qualys Cloud Platform Our Journey into the Cloud: The Qualys Cloud Platform & Architecture Thomas Wendt Regional Manager Post-Sales, DACH, Qualys Inc. Digital Transformation More than just adopting new
More informationCisco ACI Virtual Machine Networking
This chapter contains the following sections: Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers, page 1 Virtual Machine Manager Domain Main Components, page 2 Virtual Machine
More informationCloudHealth. AWS and Azure On-Boarding
CloudHealth AWS and Azure On-Boarding Contents 1. Enabling AWS Accounts... 3 1.1 Setup Usage & Billing Reports... 3 1.2 Setting Up a Read-Only IAM Role... 3 1.3 CloudTrail Setup... 5 1.4 Cost and Usage
More informationNetFlow Optimizer. Overview. Version (Build ) May 2017
NetFlow Optimizer Overview Version 2.4.9 (Build 2.4.9.0.3) May 2017 Copyright 2013-2017 NetFlow Logic Corporation. All rights reserved. Patents both issued and pending. Contents About NetFlow Optimizer...
More informationInstallation Guide Revision B. McAfee Cloud Workload Security 5.0.0
Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More information70-532: Developing Microsoft Azure Solutions
70-532: Developing Microsoft Azure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Create and Manage Azure Resource Manager Virtual Machines
More informationNFV Infrastructure for Media Data Center Applications
NFV Infrastructure for Media Data Center Applications Today s Presenters Roger Sherwood Global Strategy & Business Development, Cisco Systems Damion Desai Account Manager for Datacenter, SDN, NFV and Mobility,
More informationCisco ACI Simulator Release Notes, Release 1.1(1j)
Cisco ACI Simulator Release Notes, This document provides the compatibility information, usage guidelines, and the scale values that were validated in testing this Cisco ACI Simulator release. Use this
More informationCisco Data Center Network Manager 5.1
Cisco Data Center Network Manager 5.1 Product Overview Modern data centers are becoming increasingly large and complex. New technology architectures such as cloud computing and virtualization are adding
More informationMP-BGP VxLAN, ACI & Demo. Brian Kvisgaard System Engineer, CCIE SP #41039 November 2017
MP-BGP VxLAN, ACI & Demo Brian Kvisgaard System Engineer, CCIE SP #41039 November 2017 Datacenter solutions Programmable Fabric Classic Ethernet VxLAN-BGP EVPN standard-based Cisco DCNM Automation Modern
More informationVMware vsphere 4.0 The best platform for building cloud infrastructures
VMware vsphere 4.0 The best platform for building cloud infrastructures VMware Intelligence Community Team Rob Amos - Intelligence Programs Manager ramos@vmware.com (703) 209-6480 Harold Hinson - Intelligence
More informationSubscriber Data Correlation
Subscriber Data Correlation Application of Cisco Stealthwatch to Service Provider mobility environment Introduction With the prevalence of smart mobile devices and the increase of application usage, Service
More informationExam : Implementing Microsoft Azure Infrastructure Solutions
Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service
More informationData Center and Cloud Automation
Data Center and Cloud Automation Tanja Hess Systems Engineer September, 2014 AGENDA Challenges and Opportunities Manual vs. Automated IT Operations What problem are we trying to solve and how do we solve
More informationTransform to Your Cloud
Transform to Your Cloud Presented by VMware 2012 VMware Inc. All rights reserved Agenda Corporate Overview Cloud Infrastructure & Management Cloud Application Platform End User Computing The Journey to
More information