The Gigamon Visibility Platform
|
|
- Tiffany Watts
- 6 years ago
- Views:
Transcription
1 The Gigamon Visibility Platform See what matters. Andrea Baraldi - Sales Engineer Marco Romagnoli Sales Director 1
2 Safe Harbor Statement Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. Any future release of products or planned modifications to product capability, functionality, or features are subject to ongoing evaluation by Gigamon, and may or may not be implemented and should not be considered firm commitments by Gigamon and should not be relied upon in making purchasing decisions. This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of Forward-looking statements generally relate to future events or our future financial or operating performance. In some cases, you can identify forward-looking statements because they contain words such as "may," "will," "should," "expects," "plans," "anticipates," "could," "intends," "target," "projects," "contemplates," "believes," "estimates," "predicts," "potential" or "continue" or the negative of these words or other similar terms or expressions that concern our expectations, strategy, plans or intentions. Forward-looking statements in this presentation include, but are not limited to, our expectations that the market for our products will continue to grow and develop; and our expectations regarding product developments and enhancements and adoption of those products by our customers. Our expectations and beliefs regarding these matters may not materialize, and actual results in future periods are subject to risks and uncertainties that could cause actual results to differ materially from those projected. These risks include our ability to continue to deliver and improve our products and successfully develop new products; customer acceptance and purchase of our existing products and new products; our ability to retain existing customers and generate new customers; the market for network traffic visibility solutions not continuing to develop; competition from other products and services; and general market, political, economic and business conditions. The forward-looking statements contained in this presentation are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Prospectus for our public offering of common stock filed pursuant to Rule 424(b) under the Securities Act of 1933 (Registration No ) and our Quarterly Report on Form 10-Q for the most recent quarterly period. The forward-looking statements in this presentation are based on information available to Gigamon as of the date hereof, and Gigamon disclaims any obligation to update any forward-looking statements, except as required by law. 6/2014 2
3 Corporate Overview See what matters. Gigamon Visibility Platform provides pervasive visibility into data in motion across your entire network, enabling stronger security and network performance. Founded in 2004 IPO in 2013, NYSE: GIMO Headquarters: Santa Clara, CA, U.S. Global Offices: 30 countries 750 employees As of FY2017 CEO: Paul Hooper Over 2,300 customers Verticals: Federal, Financial Services, Healthcare, Retail, Technology, Service Providers Global Patents Issued: 35 3
4 The World s Top Organizations Rely on Gigamon for Their Business Fortune 100 and 1000 statistics from FY 16-Q3 Top 50 Banks in the World." Banks around the World. June 30, Web. Laura Lorenzetti "The 10 biggest health-care companies in the Fortune 500." Fortune. June 20, Web. Pablo Erbar "20 Largest Stock Exchanges in the World." Insider Monkey. November Web. Liyan Chen "The World's Largest Tech Companies: Apple Beats Samsung, Microsoft, Google. Forbes. May 11, Web. Kantar Retail "Top 100 Retailers Chart 2015." National Retail Federation Web. Liyan Chen "The World's Largest Telecom Companies: China Mobile Beats Verizon, AT&T Again." Forbes. June 1, Web. 4
5 See what matters. Tools & Applications Security Experience Management Monitoring Analysis Gigamon Visibility Platform Manage Secure Understand Any Network Data Center and Private Cloud Public Cloud Service Provider Networks Remote Sites 5
6 Gigamon Product Portfolio A P I Tools & Applications Security Experience Management Monitoring Analysis Orchestration GigaVUE-FM API Gigamon Visibility Platform NSX Manager vcenter Traffic Intelligence Adaptive Packet Filtering GTP Correlation Application Session Filtering Header Stripping De-duplication Masking FlowVUE NetFlow and Metadata Generation Slicing SSL Decryption Tunneling Visibility Nodes Flow Mapping Clustering Inline Bypass GigaStream Manage Secure Understand Intelligent Visibility Public Cloud Virtual Traffic Aggregators Network TAPs Any Network Data Center and Private Cloud Public Cloud Service Provider Networks Remote Sites 6
7 The Defender Lifecycle Model A New Security Model
8 Real-time Threat Prevention May Not Be Possible PARTICULARLY FOR UNKNOWN THREATS Too Little Time 6.7ns inter-packet gap at 100Gb Insufficient time for decision making on unknown, potential threats Too Many Bad Guys Large established ecosystem of distributors for malware With sophisticated kits for rent Along with support infrastructure Breaches are inevitable! 8
9 What Can Be Done BREAK THE CHAIN, DON T JUST TRY TO PREVENT IT Reconnaissance Phishing and Zero Day Attack Back Door Lateral Movement Data Gathering Exfiltrate Traditional security focus: PREVENTION The new security focus : DETECT, PREDICT, CONTAIN 9
10 Legacy Approaches Provide Limited Visibility VISIBILITY LIMITED TO A POINT IN TIME OR PLACE Public Cloud User Behavior Analytics User Behavior Analytics User Behavior Analytics Internet Next-Generation Firewall Next-Generation Next-Generation Firewall Firewall Significant blind spots Extraordinary costs Data Loss Prevention Data Loss Prevention Data Loss Prevention Routers Spine Switches Advanced Persistent Threat Advanced Advanced Persistent Persistent Threat Threat Contention for access to traffic Inconsistent view of traffic Blind to encrypted traffic Threat Detection Threat Detection Leaf Switches SIEM SIEM SIEM Too many false positives Threat Detection Virtualized Server Farm 10
11 Transform Security: The Security Delivery Platform LOOK INSIDE THE NETWORK Public Cloud User Behavior Analytics User Behavior Analytics User Behavior Analytics Internet Next-Generation Firewall Next-Generation Next-Generation Firewall Advanced Firewall Persistent Threat Data Loss Prevention User Behavior Analytics SIEM Threat Detection Data Loss Prevention Data Loss Prevention Data Loss Prevention On-premiseRouters Data Center Remote Sites Spine Switches Advanced Persistent Threat Advanced Advanced Persistent Persistent Threat Threat Security Delivery Platform Threat Detection Threat Detection Threat Detection Private Leaf Switches Cloud Public Virtualized Cloud Server Farm SIEM Reach physical and virtual networks SIEM SIEM Metadata for Improved Forensics Targeted inspection Detection of encrypted threats Inline mode for visibility and control Security Delivery Platform: A Foundation for Effective Network Security 11
12 GigaSECURE THE INDUSTRY S FIRST SECURITY DELIVERY PLATFORM Shifting the advantage from the attacker to the defender 12
13 The Current Security Model Basic Hygiene: Firewall, Endpoint, Segmentation, etc. Building Context: Big Data and Machine Learning Triangulating Intent: Artificial Intelligence and Cognitive Solutions Taking Action: Firewalls, IPS, Endpoints, Routers Prevention Detection Prediction Containment Automated Manual 13
14 A New Security Model: The Defender Lifecycle Basic Hygiene: Firewall, Endpoint, Segmentation, etc. Building Context: Big Data and Machine Learning Triangulating Intent: Artificial Intelligence and Cognitive Solutions Taking Action: Firewalls, IPS, Endpoints, Routers Prevention Detection Prediction Containment Automated Automated Manual Inline Bypass SSL Decryption Metadata Engine App Session Filtering SSL Decryption Metadata Engine, App Session Filtering, SSL Decryption Inline Bypass REST API Physical Virtual Cloud 14
15 Gigamon Visibility Platform Gigamon Partner Ecosystem Security and Vulnerability Management Service Provider Network & Application Performance Management Infrastructure 15
16 Gigamon Product Portfolio A P I Tools & Applications Security Experience Management Monitoring Analysis Orchestration GigaVUE-FM API NSX Manager vcenter Traffic Intelligence Adaptive Packet Filtering GTP Correlation Application Session Filtering Header Stripping De-duplication Masking FlowVUE NetFlow and Metadata Generation Slicing SSL Decryption Tunneling Flow Mapping Clustering Inline Bypass GigaStream Visibility Nodes Intelligent Visibility Public Cloud Virtual Traffic Aggregators Network TAPs Any Network Data Center and Private Cloud Public Cloud Service Provider Networks Remote Sites 16
17 GigaSmart features
18 GigaSMART Summary SSL Decryption De-duplication Adaptive Packet Filtering Application Session Filtering Packet Slicing Masking NetFlow/IPFIX Generation Header Stripping IP Tunneling ERSPAN Termination GTP Correlation FlowVUE 18
19 Security delivery platform
20 GigaSECURE INDUSTRY S FIRST SECURITY DELIVERY PLATFORM Internet IPS (Inline) Anti-Malware (Inline) Data Loss Prevention Intrusion Detection System Forensics Threat Detection Routers Spine Switches Security Delivery Platform Leaf Switches GigaVUE-VM A completeand network-wide GIgaVUE Nodes reach: physical and virtual Scalable Metadata metadata extraction Enginefor improved forensics Application Isolation of Session applications Filtering for targeted inspection Visibility SSL to encrypted Decryption traffic for threat detection Inline Inline bypass for connected Bypassecurity applications Virtualized Server Farm All tools still connected Fewer network touch points Enhanced tool efficiency Decreased OPEX costs 20
21 Inline Bypass to Scale Security Delivery SOLVING PAIN POINTS OF BOTH SECURITY & NETWORK TEAMS Inline Bypass Link Aggregtion HA Designs Add, remove, and upgrade tools seamlessly Consolidate multiple points of failure into a single, bypass-protected solution Integrate Inline, Out-of-Band, and Flow-based tools via the GigaSECURE Security Delivery Platform 21
22 SSL Decryption on Gigamon Products Encrypted Traffic Decrypted / Unencrypted Traffic 1 Corporate servers Clients Internet Servers Enterprise has server keys RSA key exchange Supported Since 2014 Internet 3 RSA/DH 2 Corporate servers Diffie-Hellman (DH) key exchange Active, Inline Appliance(s) Passive, Out-of-Band Appliance(s) Emerging TLS 1.3 standard Need to be inline to decrypt SSL NGFW IPS Network Forensics Anti-malware 3 Internet Servers or SaaS services Enterprise does not have server keys Need to be inline to decrypt SSL Corporate Servers Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. 1 RSA 2 DH, PFS? Clients 22
23 Gigamon Inline SSL Visibility Solution 3 SSL Session Leg 2 (encrypted) Inline Tool Group (decrypted traffic) 4 1 SSL Session Leg 1 (encrypted) 2 Web Monitor Tool (decrypted traffic) Highlights Servers and clients located internally or externally Private keys not needed RSA, DH, PFS can be used Supports inline and out-of-band tools 2 Out-of-Band Tool (decrypted traffic) Encrypted traffic Decrypted traffic Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change. 23
24 Cloud and Virtual visibility
25 Virtual Visibility: More Important Than Ever 5 REASONS WHY YOU MUST CARE 1. Security no longer an after-thought during virtualization 2. Increasing VM density with mission-critical workloads 3. Visibility into VM-VM traffic needed for Security and Application Performance Monitoring (APM) 4. Creating new virtual instances of tools affects workload performance 5. Automated visibility after VM migration GigaVUE-VM IDS VIRTUAL IDS VM1 VIRTUAL ANTI- MALWARE VIRTUAL APM VM VIRTUAL SWITCH HYPERVISOR SERVER VIRTUAL SWITCH HYPERVISOR SERVER ANTI-MALWARE APM 25
26 GigaVUE-VM - Virtual Workload Monitoring EXTENDING VISIBILITY INTO VIRTUAL DATA CENTERS Small footprint Virtual Tap guest VM appliance Access, Select, Transform, and Deliver Virtual traffic Visibility into Hosted Applications Visibility into Physical to Virtual traffic Advanced Traffic Intelligence De-duplication Packet Masking Packet Slicing Header Stripping NetFlow Generation SSL Decryption Adaptive Packet Filtering Application Session Filtering Centralized tools Core Core DB Server GigaVUE-VM Flow Mapping Filter on VM, application ports Packet slicing at any offset Tunneling for multi-tenant Leaf Spine Leaf Spine Leaf Network Tunnel Port Leaf Application Performance Network Performance DB OS Tunneling Security 26
27 Dynamic Traffic Visibility Service Insertion Monitoring Policy GigaVUE-FM Security/Monitor Admin Internet Copy Packet Tools and Analytics Application Performance Network Management Security 27
28 Partner Solution Categories and Integration Options Automated Traffic Visibility for VMware powered SDDC Solution Category SDDC Operations and Visibility Integration Options Port Mirroring, NSX-API, NetX 28
29 Public Cloud Visibility Challenges and Gigamon Solution AWS AWS Region Region VPC ELB VPC ELB Web Tier ELB Tool Tier Gigamon Visibility Platform Web Tier ELB Visibility Tool Tier Tier GigaVUE-FM App Tier App Tier RDS RDS Tool Tier AZ AZ Inability to access all traffic Discreet vendor monitoring agents per instance Impacts workload and VPC performance Increases complexity Static visibility with heavy disruption Consistent way to access network traffic Distribute traffic to multiple tools Customize traffic to specific tools Elastic Visibility as workloads scale-out Elastic Load Balancing (ELB) Subnet Instances Tool Amazon Relational Database Service (RDS) Availability Zone (AZ) 29
30 Private & Confidential Deployment Examples: Hybrid Clouds USE CASE 1: TOOLS IN THE ENTERPRISE DATA CENTER AWS VPC AWS EC2 Integration Virtual Traffic Policies Enterprise Data Center GigaVUE-FM GigaVUE V Series L2 GRE Tunnel Tools Monitored traffic backhauled from AWS to tools in an enterprise s data center VPC: Virtual Private Cloud Control Traffic Monitored Data Traffic 30
31 Private & Confidential Deployment Examples: Tools in the Same VPC USE CASE 2: TOOLS IN THE SAME AWS VPC AWS Management Console AWS VPC Virtual Traffic Policies GigaVUE V Series GigaVUE-FM AWS EC2 Integration Corporate Data Center L2 GRE Tunnel Virtual Tools Monitored traffic in AWS sent to virtual tools located in the same VPC 31
32 Virtual Physical Service Chain with Other GigaSMART Apps DELIVER RELEVANT TRAFFIC AFTER DECRYPTION Filter on decrypted data and send to tools using ASF Adaptive Packet Filtering GigaVUE-VM GigaVUE-VM Tunnel Termination Flow Mapping Inline SSL Decryption METADATA Generate metadata and feed to SIEM Select target network for decryption with Flow Mapping, Decrypt and Filter on decrypted data with ASF, Generate metadata and forward to tools 32
33 VISIBILITY MATTERS 33
Rethinking Security CLOUDSEC2016. Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team
Rethinking Security CLOUDSEC2016 Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team Breaches Are The New Normal Only The Scale Surprises Us OPM will send notifications
More informationSolution Overview Gigamon Visibility Platform for AWS
Solution Overview Gigamon Visibility Platform for Background With the rapid evolution of the public cloud that brings instant advantages of economies of scale, elasticity and agility, IT and data center
More informationRethinking Security: The Need For A Security Delivery Platform
Rethinking Security: The Need For A Security Delivery Platform Cybercrime In Asia: A Changing Environment & Shifting Focus Asia, more vulnerable to cybercrime because of diversity and breadth of countries
More informationMan kann nur schützen was man sieht - oder Zentrales Entschlüsseln von SSL/TLS Verkehr Rethinking Security
Man kann nur schützen was man sieht - oder Zentrales Entschlüsseln von SSL/TLS Verkehr Rethinking Security Stepan Svihla Sr. Sales Engineer Central & Eastern Europe Corporate Overview THE ESSENTIAL ELEMENT
More informationProduct Brief GigaVUE-VM
Product Brief GigaVUE-VM Active Visibility for Virtual Workloads With exponential growth in virtualized traffic within the data center, a primary challenge for the centralized monitoring infrastructure
More informationData Sheet Gigamon Visibility Platform for AWS
Data Sheet Gigamon Visibility Platform for Overview The rapid evolution of Infrastructure-as-a-Service (IaaS), or public clouds, brings instant advantages of economies of scale, elasticity, and agility
More informationAutomated Traffic Visibility for SDDC Solution Guide
Automated Traffic Visibility for SDDC Solution Guide COPYRIGHT Copyright 2016 Gigamon. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationSecurity inside out. The top seven reasons to optimize your network security model with a security delivery platform. See what matters.
Security inside out. The top seven reasons to optimize your network security model with a security delivery platform. See what matters. This is not a USB drive. It is a delivery vehicle for uncontrolled
More informationData Sheet GigaSECURE Cloud
Data Sheet GigaSECURE Cloud Intelligent network traffic visibility that enables enterprises to extend their security posture to Microsoft The rapid evolution of Infrastructure-as-a-Service (IaaS) brings
More informationTop Five Reasons You Need an. Elemental Shift in Your Security
Top Five Reasons You Need an Elemental Shift in Your Security It s Time for a New Vision of Network Security Securing an IT infrastructure across physical, virtual and cloud environments has become more
More informationThe Evolution of Data Center Security, Risk and Compliance
#SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and
More informationSOC AUTOMATION OF THREAT INVESTIGATION
SOC AUTOMATION OF THREAT INVESTIGATION White Paper When a Security Operations Center (SOC) is shown on TV, it has a specific portrayal. There is a large wall full of screens. World maps showing the threat
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationCLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY
CLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY ORGANIZATIONS NEED VISIBILITY TO SECURE AND MONITOR THEIR CLOUD ENVIRONMENTS Organizations are migrating workloads to the cloud because it offers
More informationCSP 2017 Network Virtualisation and Security Scott McKinnon
CSP 2017 Network Virtualisation and Security Scott McKinnon smckinnon@vmware.com Security Lead, Northern EMEA Network & Security, VMware Disclaimer This presentation may contain product features that are
More informationAligning Agency Cybersecurity Practices with the Cybersecurity Framework
POINT OF VIEW Aligning Agency Cybersecurity Practices with the Cybersecurity Framework Leveraging Gigamon to Align Cybersecurity Budgets with Desired Business Outcomes 2013-2017 Gigamon. All rights reserved.
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationBuild a Software-Defined Network to Defend your Business
Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net Kappa Data 2020 Software Defined Secure Networks Juniper s Innovation in Secure Networks
More informationIXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots Юлий Явич, IXIA 1 Enterprise Carriers/ Service Providers 74 45 15 of the Fortune 100 of the top 50 carriers of the top 15 NEMs NEMs Customer Focused
More informationCitrix SD-WAN for Optimal Office 365 Connectivity and Performance
Solution Brief Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Evolving Needs for WAN Network Architecture Enterprise networks have historically been architected to provide users access
More informationBIG MON CONTROLLERS BIG MON ANALYTICS NODE. Multi-Terabytes L2-GRE 1/10/25/40/100G ETHERNET SWITCH FABRIC. Optional BIG MON BIG MON SERVICE NODES
Modern Packet Recorder: Enhancing Data Security and Privacy Compliance OVERVIEW In response to the stringent corporate governance and compliance requirements for how IT data is secured, controlled, and
More informationCompute - 36 PCPUs (72 vcpus) - Intel Xeon E5 2686 v4 (Broadwell) - 512GB RAM - 8 x 2TB NVMe local SSD - Dedicated Host vsphere Features - vsphere HA - vmotion - DRS - Elastic DRS Storage - ESXi boot-from-ebs
More informationDisclaimer CONFIDENTIAL 2
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationAnalytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS
Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Overview Cyberattacks are increasingly getting more frequent, more sophisticated and more widespread than ever
More informationSECURING THE MULTICLOUD
SECURING THE MULTICLOUD Bahul Harikumar and Ali Bidabadi Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice.
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More informationWhite Paper. Why IDS Can t Adequately Protect Your IoT Devices
White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity
More informationUse Cases Application And Service Monitoring Eliminate contention for network data. Centralize Netflow/IPFIX Generation
X1/X2 X3/X4 X5/X6 X7/X8 X9/X10 X11/X12 X13/X14 X15/X16 X17/X18 X19/X20 X21/X22 X23/ C1 C2 C3 USB CON MGMT PTP C4 C5 STACK STACK P/S PPS(IN) C1 C2 C3 C4 C5 C6 C7 C8 X1/X2 X3/X4 X5/X6 X7/X8 X9/X10 X11/X12
More informationDATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure
DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure AlienVault USM Anywhere accelerates and centralizes threat detection, incident response,
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
NET2896BU Expanding Protection Across the Software Defined Data Center with Encryption VMworld 2017 Chris Corde Senior Director, Security Product Management Content: Not for publication #VMworld #NET2896BU
More informationThe Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec
The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product
More informationVM-SERIES FOR VMWARE VM VM
SERIES FOR WARE Virtualization technology from ware is fueling a significant change in today s modern data centers, resulting in architectures that are commonly a mix of private, public or hybrid cloud
More informationManaging Your Privileged Identities: The Choke Point of Advanced Attacks
Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC2103BU NSX and VMware Cloud on AWS: Deep Dive Ray Budavari, Senior Staff Technical Product Manager NSX @rbudavari #VMworld #LHC2103BU Disclaimer This presentation may contain product features that are
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationNetwork Behavior Analysis
N E T W O R K O P E R AT I O N S. S I M P L I F I E D. FORWARD ENTERPRISE HIGHLIGHTS Forward Networks is the leader in Intent-based Networking and network assurance to automate the analysis and verification
More informationAUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs
AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs WITH PALO ALTO NETWORKS AND REAN CLOUD 1 INTRODUCTION EXECUTIVE SUMMARY Organizations looking to provide developers with a free-range development environment
More informationExam Name: VMware Certified Associate Network Virtualization
Vendor: VMware Exam Code: VCAN610 Exam Name: VMware Certified Associate Network Virtualization Version: DEMO QUESTION 1 What is determined when an NSX Administrator creates a Segment ID Pool? A. The range
More informationPROTECT WORKLOADS IN THE HYBRID CLOUD
PROTECT WORKLOADS IN THE HYBRID CLOUD SPOTLIGHTS Industry Aviation Use Case Protect workloads in the hybrid cloud for the safety and integrity of mission-critical applications and sensitive data across
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SER2779BE What s New in vcenter Server Madhup Gulati Director, Product Management VMware VMworld 2017 Content: Not for publication #VMworld #SER2779BE Disclaimer This presentation may contain product features
More informationTransforming Security Part 2: From the Device to the Data Center
SESSION ID: SP01-R11 Transforming Security Part 2: From the Device to the Data Center John Britton Director, EUC Security VMware @RandomDevice The datacenter as a hospital 3 4 5 Digital transformation
More informationSecuring Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &
Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service
More informationBreaches are inevitable!
Whitepaper Disrupt the Machine-to-Human Fight with a New Defender Lifecycle Model in Security Operations A Defender Lifecycle Model Shifts Control and Advantage Away from the Attacker Synopsis: Traditional
More informationThe Next Opportunity in the Data Centre
The Next Opportunity in the Data Centre Application Centric Infrastructure Soni Jiandani Senior Vice President, Cisco THE NETWORK IS THE INFORMATION BROKER FOR ALL APPLICATIONS Applications Are Changing
More informationSecuring the Modern Data Center with Trend Micro Deep Security
Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public
More informationARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE
ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE Vectra Cognito HIGHLIGHTS Finds active attackers inside your network Automates security investigations with conclusive
More informationVMware Cloud on AWS Technical Deck VMware, Inc.
VMware Cloud on AWS Technical Deck # 2 Enterprise Adoption Driving Strong Growth of Public Cloud Infrastructure as a Service, According to IDC. Press release. IDC. July 14, 2016 3 Cloud Building Challenges
More informationVISIBILITY INTO CLOUD COMPUTING
VISIBILITY INTO CLOUD COMPUTING Brendan Leitch, Head of APAC Marketing 1 SECURITY AND PERFORMANCE DEPENDS ON DATA VISIBILITY Access Challenges: Get data access for tools VISIBILITY: Seeing the Traffic
More informationMODERNIZE INFRASTRUCTURE
SOLUTION OVERVIEW MODERNIZE INFRASTRUCTURE Support Digital Evolution in the Multi-Cloud Era Agility and Innovation Are Top of Mind for IT As digital transformation gains momentum, it s making every business
More informationHOW CLOUD, MOBILITY AND SHIFTING APP ARCHITECTURES WILL TRANSFORM SECURITY: GAINING THE HOME-COURT ADVANTAGE
#RSAC SESSION ID: SPO3-T07 HOW CLOUD, MOBILITY AND SHIFTING APP ARCHITECTURES WILL TRANSFORM SECURITY: GAINING THE HOME-COURT ADVANTAGE Tom Corn Senior Vice President/GM Security Products VMware @therealtomcorn
More informationThe Cognito automated threat detection and response platform
Overview The Cognito automated threat detection and response platform HIGHLIGHTS Finds active cyberattackers inside cloud, data center and enterprise environments Automates security investigations with
More informationSecuring Your Amazon Web Services Virtual Networks
Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,
More informationVMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017
: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017 Table of Contents Executive Summary 3 A Single Architecture for Hybrid Cloud 4 Introducing VMware Cloud Foundation 4 Deploying on Premises 6
More informationCopyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationEBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud
EBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud Contents Introduction... 3 What is VMware Cloud on AWS?... 5 Customer Benefits of Adopting VMware Cloud on AWS... 6 VMware Cloud
More informationIBM Cloud for VMware Solutions
Introduction 2 IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager VMware on IBM Cloud Mehran Hadipour Director Business Development - Zerto Internal Use Only Do not distribute 3
More informationBorderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity
Borderless security engineered for your elastic hybrid cloud Kaspersky Hybrid Cloud Security www.kaspersky.com #truecybersecurity Borderless security engineered for your hybrid cloud environment Data
More informationDatacenter Security: Protection Beyond OS LifeCycle
Section Datacenter Security: Protection Beyond OS LifeCycle 1 Not so fun Facts from the Symantec ISTR 2017 Report Zero-Day Vulnerability, annual total Legitimate tools, annual total 6,000 5 5,000 4,000
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become
More informationPolicy Enforcer. Product Description. Data Sheet. Product Overview
Policy Enforcer Product Overview Juniper s Software-Defined Secure Network (SDSN) platform leverages the entire network, not just perimeter firewalls, as a threat detection and security enforcement domain.
More informationCogniFit Technical Security Details
Security Details CogniFit Technical Security Details CogniFit 2018 Table of Contents 1. Security 1.1 Servers........................ 3 1.2 Databases............................3 1.3 Network configuration......................
More informationAutomated Threat Management - in Real Time. Vectra Networks
Automated Threat Management - in Real Time Security investment has traditionally been in two areas Prevention Phase Active Phase Clean-up Phase Initial Infection Key assets found in the wild $$$$ $$$ $$
More informationToday s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps
Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationThe Future of Threat Prevention
The Future of Threat Prevention Bricata is the leading developer of Next Generation Intrusion Prevention Systems (NGIPS) technology, providing innovative, disruptive, high-speed, high-performance network
More informationIXVISION: VISIBILITY ARCHITECTURE Eliminating Blind spots
IXVISION: VISIBILITY ARCHITECTURE Eliminating Blind spots Ernst Hillerkus, Regional Sales Manager Germany 2016 IXIA AN D /OR IT S AF FILIATES. ALL R IGH TS R ESERVED. 1 IXIA SOLUTIONS ARCHITECTURE IxTEST
More informationVMWARE CLOUD FOUNDATION: THE SIMPLEST PATH TO THE HYBRID CLOUD WHITE PAPER AUGUST 2018
VMWARE CLOUD FOUNDATION: THE SIMPLEST PATH TO THE HYBRID CLOUD WHITE PAPER AUGUST 2018 Table of Contents Executive Summary 3 A Single Architecture for Hybrid Cloud 4 Introducing VMware Cloud Foundation
More informationVision of the Software Defined Data Center (SDDC)
Vision of the Software Defined Data Center (SDDC) Raj Yavatkar, VMware Fellow Vijay Ramachandran, Sr. Director, Storage Product Management Business transformation and disruption A software business that
More informationSecuring the Software-Defined Data Center
Securing the Software-Defined Data Center The future of the data center is software defined Key Advantages McAfee Network Platform 8.4 Delivers best-in-class IPS security across physical and softwaredefined
More informationVMWARE ENTERPRISE PKS
DATASHEET AT A GLANCE VMware Enterprise PKS is a productiongrade Kubernetes-based container solution equipped with advanced networking, a private container registry, and full lifecycle management. VMware
More informationCisco Security Enterprise License Agreement
Cisco Security Enterprise License Agreement Deploy Software and Technology more easily The Cisco Security Enterprise Licensing Agreement (ELA) gives you a simpler way to manage your licenses. And it saves
More informationSoftware-Defined Secure Networks in Action
Software-Defined Secure Networks in Action Enabling automated threat remediation without impacting business continuity Challenge Businesses need to continuously evolve to fight the increasingly sophisticated
More informationCorrigendum 3. Tender Number: 10/ dated
(A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial
More informationExtending Enterprise Security to Multicloud and Public Cloud
Extending Enterprise Security to Multicloud and Public Cloud Paul Kofoid Sr. Consulting Engineer: Security & Cloud This statement of direction sets forth Juniper Networks current intention and is subject
More informationVectra Cognito. Brochure HIGHLIGHTS. Security analyst in software
Brochure Vectra Cognito HIGHLIGHTS Finds active attackers inside your network Automates security investigations with conclusive answers Persistently tracks threats across all phases of attack Monitors
More informationUse Cases Application And Service Monitoring Eliminate contention for network data. Centralize Netflow/IPFIX Generation
X1/X2 X3/X4 X5/X6 X7/X8 X9/X10 X11/X12 X13/X14 X15/X16 X17/X18 X19/X20 X21/X22 X23/ C1 C2 C3 USB CON MGMT PTP C4 C5 STACK STACK P/S PPS(IN) C1 C2 C3 C4 C5 C6 C7 C8 X1/X2 X3/X4 X5/X6 X7/X8 X9/X10 X11/X12
More informationHow SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes
How SD-WAN will Transform the Network And lead to innovative, profitable business outcomes By 2020, more than 50 percent of WAN edge infrastructure refresh initiatives will be based on SD-WAN versus traditional
More informationSIEM Product Comparison
SIEM Product Comparison SIEM Technology Space SIEM market analysis of the last 3 years suggest: Market consolidation of SIEM players (25 vendors in 2011 to 16 vendors in 2013) Only products with technology
More informationWIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS
WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to
More informationGLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications
GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter
More informationConverged Platforms and Solutions. Business Update and Portfolio Overview
Converged Platforms and Solutions Business Update and Portfolio Overview IT Drivers In Next 5 Years SCALE SCALE 30,000+ physical servers 500,000+ virtual servers Current tools won t work at this scale
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationKaspersky Security for Virtualization Frequently Asked Questions
Kaspersky Security for Virtualization Frequently Asked Questions 1. What is Kaspersky Security for Virtualization, and how does it work with vshield technology? Kaspersky Security for Virtualization for
More informationSIEM Solutions from McAfee
SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an
More informationSymantec & Blue Coat Technical Update Webinar 29. Juni 2017
Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication
More informationRSA NetWitness Suite Respond in Minutes, Not Months
RSA NetWitness Suite Respond in Minutes, Not Months Overview One can hardly pick up a newspaper or turn on the news without hearing about the latest security breaches. The Verizon 2015 Data Breach Investigations
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC2384BU VMware Cloud on AWS A Technical Deep Dive Ray Budavari @rbudavari Frank Denneman - @frankdenneman #VMworld #LHC2384BU Disclaimer This presentation may contain product features that are currently
More informationCloudVision Macro-Segmentation Service
CloudVision Macro-Segmentation Service Inside Address network-based security as a pool of resources, stitch security to applications and transactions, scale on-demand, automate deployment and mitigation,
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
NET1949BU Seamless Network Connectivity for Virtual and Bare-metal s with NSX Suresh Thiru Sridhar Subramanian VMworld 2017 Content: Not for publication VMworld 2017 - NET1949BU Disclaimer This presentation
More informationTech Data s Acquisition of Avnet Technology Solutions
Tech Data s Acquisition of Avnet Technology Solutions Creating a Premier Global IT Distributor: From the Data Center to the Living Room September 19, 2016 techdata.com 1 Forward-Looking Statements Safe
More informationOPEN COMPUTE PLATFORMS POWER SOFTWARE-DRIVEN PACKET FLOW VISIBILITY, PART 2 EXECUTIVE SUMMARY. Key Takeaways
OPEN COMPUTE PLATFORMS POWER SOFTWARE-DRIVEN PACKET FLOW VISIBILITY, PART 2 EXECUTIVE SUMMARY This is the second of two white papers that describe how the shift from monolithic, purpose-built, network
More informationPresenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe
Presenting the ware NSX ECO System May 2015 Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe Agenda 10:15-11:00 ware NSX, the Network Virtualization Platform 11.15-12.00 Palo Alto
More informationVMware Cloud on AWS The Next Generation Hybrid Cloud Architecture
ware Cloud on AWS The Next Generation Hybrid Cloud Architecture David Lim Head Consulting and MSP Partners, AWS APAC Frank Fan Partner Solution Architect, AWS ANZ Disclaimer This presentation may contain
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationCognito Detect is the most powerful way to find and stop cyberattackers in real time
Overview Cognito Detect is the most powerful way to find and stop cyberattackers in real time HIGHLIGHTS Always-learning behavioral models use AI to find hidden and unknown attackers, enable quick, decisive
More informationHOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network
More informationSichere Applikations- dienste
Sichere Applikations- dienste Innovate, Expand, Deliver Manny Rivelo Für SaaS und traditionelle Service-Modelle EVP, Strategic Solutions Carsten Langerbein Field Systems Engineer c.langerbein@f5.com Es
More information