Data-Driven DevOps: Bringing Visibility to Any Cloud, Any App, & Any Device. Erik Giesa SVP of Marketing and Business Development, ExtraHop Networks
|
|
- Brian Clarke
- 5 years ago
- Views:
Transcription
1 Data-Driven DevOps: Bringing Visibility to Any Cloud, Any App, & Any Device Erik Giesa SVP of Marketing and Business Development, ExtraHop Networks
2 Your Monitoring Strategy Must Change How can you maintain visibility for this Any Cloud, Any App, & Any Device when your performance and security monitoring was built for this? Traditional IT Architecture
3 Everything transacts on the wire Brad Hedlund, Networking is a Service, and you are the Service Provider:
4 Infrastructure Monitoring Application Performance Network Performance Business Process Monitoring...The complexity, modularity, and volatility of modern systems make it impossible to predict global states from local states. Will Cappelli and Vivek Bhalla, Gartner March 2016 Web Services Monitoring Cloud Monitoring Virtualization Monitoring Packet Capture Log Management Database Monitoring
5 APP IT VM DBA NETWORK STORAGE OPS
6 You Can t Orchestrate or Automate What You Can t See Software-defined datacenters Containerization Rapid deployments Orchestration & automation Zero-day events Security exposures/ data breaches Poor user experience Slow application roll-outs Application downtime War rooms
7 Data-Driven DevOps Taxonomy: See with Data it is wire data radically rethought and used in new ways that will prove to be the most critical source of data for availability and performance management over the next five years.... WIRE DATA REAL-TIME OBSERVED AND EMPIRICAL MACHINE DATA SYSTEM SELFREPORTED AGENT DATA PROBE DATA HOST INSTRUMENTED PERIODIC AND SCRITPED Will Cappelli and Vivek Bhalla, Gartner March 2016 Use Data and Analytics-Centric Processes with a Focus on Wire Data to Future Proof Availability and Performance Management GLOBAL STATE ALL L2-L7 COMMUNICATION AND ALL TRANSACTION L2-L7 COMMUNICATION AND DATA TRANSACTION DATA LOCAL STATE LOCAL STATE SAMPLED STATE LOGS, SNMP, WMI LOGS, SNMP, WMI NETFLOW, IPFIX, ETC. NETFLOW, IPFIX, ETC. HARDWARE, O/S, APPLICATION HARDWARE, O/S, APPLICATION CODE-LEVEL CODE-LEVEL EXTERNAL / INTERNAL EXTERNAL / INTERNAL SERVICE AVAILABILITY SERVICE AVAILABILITY
8
9 Real-Time Visibility for Any Cloud, Any App, & Any Device Automatic Discovery & Classification Unification Across Physical, Virtual, and Cloud Visibility & Event-Driven Orchestration Any device, app, or cloud Any network, VLAN, VXLAN or micro-segment Auto-map dependencies & relationships across full stack Automatically learn and build baselines for all devices and workloads Understand effects of cloud and SDN orchestration Measure and compare app performance before and after migration Track VMs as they move across the SDDC Fabric Cloud scale up to 40 Gbps throughput and 1.3 million HTTP TPS End-user experience monitoring End-to-end visibility for every transaction across the stack Validate security policies with continuous L2-L7 behavioral analysis Data-Driven DevOps Rapid customization: measure any information from the data stream in real-time.
10 To Structured Wire Data From Unstructured Packets Stream processing pre-processes All L2-L7 and communication analyzes all data-inflight the creating network on structured wire data Application Data Business Data Availability Data Security Data Performance Metrics Capacity Data POST Content AJAX Data Product ID Customer ID HTTP status codes Application errors Command and Control Shadow IT (SaaS, cloud) Caching Behavior Compression Behavior Throughput Transactions Section Sub-Section Page Title Session Cookie Shopping Cart ID Cart Items Cart Values Discounts Connection resets Heartbeats SSL certificate validity Synthetic pingers Network traversal Unauthorized outbound connections & protocols Storage/DB access Blacklisted traffic Base HTML Load Time Round Trip Time Client Request Time Server Reply Time Dropped packets Application stalls Application slowdowns Geolocation/ IP mapping Proxied IP Address Order ID SNMP traps Brute force attacks Server Send Time Storage Access (reads/writes) Error Message Abandoned? Authentication errors Surreptitious tunneling Total Time Taken SSL Offload
11 Simplified and Continuous Real-Time Visibility for the SDDC and DevOps REAL-TIME OPERATIONAL INTELLIGENCE NSX Manager vcenter Internet ER-SPAN Open Data Stream API ER-SPAN, SPAN, Network taps
12 VLANs Devices
13 Web LDAP Database DNS Storage Network
14 Orchestration & Migration Visibility for Any Workload VM APP cluster process time, network latency, and congestion analysis VM STORAGE cluster process time, network latency, and congestion analysis VM STORAGE cluster process time, network latency, and congestion analysis
15 Layer 2 Analysis Throughput, Frame Type, Frame Distribution etc. Layer 3 Analysis Packets/Bytes by Protocol, segments, Layer 4 Analysis Virtual Packet Loss, Top Talkers, Failures, TCP Analysis (RTO, Tinygrams, Zero Windows, Nagle Delays) Orchestration Policy Questions Can the existing network support a new workload? Should I create a new network? Should I vmotion a workload? Where should I vmotion?
16 Orchestration Policy ANSWERS Web performance & errors Did the migration work? Was there an impact on the end-user or workload? Is it performing better, worse or the same? Database performance and errors
17 Security Control Auditing for Any System, App, or Cloud EXPIRED certificates: where, when and how much SOON TO BE EXPIRED certificates: where, when and how much COMPLIANT and NON- COMPLIANT Ciphers, SSL, and TLS versions: where, who, how much, when
18 BEHAVIORAL Anomaly Detection Unusual data transfers? Anomalous methods used? Unauthorized protocols? Failed and successful login attempts: who, when, where, and what? Is all PII data encrypted while in flight? Any behavior can now be observed and analyzed.
19 Web Services SLA Governance
20
21 Real-Time Business Analytics for Any App or Business Real-time revenue analysis Correlate infrastructure and app performance with business processes Understand and correlate IT investment with business performance
22
23 ExtraHop Open Data Stream Wire Data VMware REAL-TIME stream processing, analysis, and visualization Visualization Tools Other ITOA Data Sources Non-Proprietary NoSQL DB Machine Agent Probe Human AND/OR
24 Delivering Performance, Security, and Business Analysis for Any Cloud, App, or Device REAL-TIME OPERATIONAL INTELLIGENCE FOR SDDC PROACTIVE MONITORING & REMEDIATION OPTIMIZATION & CONTINUOUS IMPROVEMENT PERVASIVE SECURITY MONITORING & COMPLIANCE BUSINESS & OPERATIONS ANALYTICS
25 NEXT STEPS Visit us in our booth to see an in-person demo OR Try our interactive online demo:
Rethink the Network It is more than just transport
Rethink the Network It is more than just transport Christian Buhrow cbuhrow@extrahop.com Founded in 2007 in Seattle (USA) ; well-funded, rapidly emerging market leader Global leadership in wire data analysis
More informationThe S in IoT is for Security Owning all the Things
Raja Mukerji Co-Founder, ExtraHop Networks @rajamukerji The S in IoT is for Security Owning all the Things Why Now? Topics of Discussion Why should you care about the Internet of Things? What challenges
More informationProtecting Your SaaS Investment: Monitoring Office 365 Performance
Protecting Your SaaS Investment: Monitoring Office 365 Performance Utilizing the ExtraHop platform to ensure high performance from your Office 365 applications Achieving Higher Productivity and Business
More informationVMware Cloud on AWS Technical Deck VMware, Inc.
VMware Cloud on AWS Technical Deck # 2 Enterprise Adoption Driving Strong Growth of Public Cloud Infrastructure as a Service, According to IDC. Press release. IDC. July 14, 2016 3 Cloud Building Challenges
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationWEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM
SECURITY ANALYTICS WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM BLAZING PERFORMANCE, HIGH AVAILABILITY AND ROBUST SECURITY FOR YOUR CRITICAL WEB APPLICATIONS OVERVIEW Webscale is a converged multi-cloud
More informationPowerful Insights with Every Click. FixStream. Agentless Infrastructure Auto-Discovery for Modern IT Operations
Powerful Insights with Every Click FixStream Agentless Infrastructure Auto-Discovery for Modern IT Operations The Challenge AIOps is a big shift from traditional ITOA platforms. ITOA was focused on data
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure, page 1 Cisco ISE Administration Node Ports, page 2 Cisco ISE Monitoring Node Ports, page 4 Cisco ISE Policy Service Node Ports, page 5 Cisco ISE pxgrid Service Ports, page 10
More informationExploring Cloud Security, Operational Visibility & Elastic Datacenters. Kiran Mohandas Consulting Engineer
Exploring Cloud Security, Operational Visibility & Elastic Datacenters Kiran Mohandas Consulting Engineer The Ideal Goal of Network Access Policies People (Developers, Net Ops, CISO, ) V I S I O N Provide
More informationThe Business Case for Network Segmentation
Modern network segmentation to reduce risk and cost Abstract Modern network segmentation, also known as microsegmentation, offers a new way of managing and securing your network, offering tremendous benefits
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 6 Cisco
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationCisco CloudCenter Solution with Cisco ACI: Common Use Cases
Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco ACI increases network security, automates communication policies based on business-relevant application requirements, and decreases developer
More informationPluribus Adaptive Cloud Fabric
Product Overview Adaptive Cloud Fabric Powering the Software-Defined Enterprise Highlights Completely software enabled and built on open networking platforms Powered by the Netvisor ONE network Operating
More informationThe Software Defined Data Centre & vsphere 6.5 The foundation of the hybrid cloud Barry Coombs
The Software Defined Data Centre & vsphere 6.5 The foundation of the hybrid cloud Barry Coombs What s New in vsphere 6.5? Dramatically Simplified Experience Comprehensive Built-in Security Universal
More informationThe Why, What, and How of Cisco Tetration
The Why, What, and How of Cisco Tetration Why Cisco Tetration? With the above trends as a backdrop, Cisco has seen specific changes within the multicloud data center. Infrastructure is changing. It is
More informationCisco Tetration Analytics Demo. Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH
Cisco Tetration Analytics Demo Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH Agenda Introduction Theory Demonstration Innovation Through Engineering
More informationFeatures. HDX WAN optimization. QoS
May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified
More informationPluribus Adaptive Cloud Fabric Powering the Software-Defined Enterprise
Adaptive Cloud Fabric Powering the Software-Defined Enterprise Highlights Completely software enabled and built on open networking platforms Powered by the Netvisor ONE network Operating System Eliminates
More informationPasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP
Pasiruoškite ateičiai: modernus duomenų centras Laurynas Dovydaitis Microsoft Azure MVP 2016-05-17 Tension drives change The datacenter today Traditional datacenter Tight coupling between infrastructure
More informationOrchestration: Accelerate Deployments and Reduce Operational Risk. Nathan Pearce, Product Development SA Programmability & Orchestration Team
Orchestration: Accelerate Deployments and Reduce Operational Risk Nathan Pearce, Product Development SA Programmability & Orchestration Team Agenda 1 2 3 Industry Trends Customer Journey Use Cases 2016
More informationCorrigendum 3. Tender Number: 10/ dated
(A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial
More information2018 Cisco and/or its affiliates. All rights reserved.
Beyond Data Center A Journey to self-driving Data Center with Analytics, Intelligent and Assurance Mohamad Imaduddin Systems Engineer Cisco Oct 2018 App is the new Business Developer is the new Customer
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure, page 1 Cisco ISE Administration Node Ports, page 2 Cisco ISE Monitoring Node Ports, page 3 Cisco ISE Policy Service Node Ports, page 4 Cisco ISE pxgrid Service Ports, page 8 OCSP
More informationNSX Data Center Load Balancing and VPN Services
NET2761BU NSX Data Center Load Balancing and VPN Services Derek Deukyoon Kang, VMware, Inc. Vinay Reddy, VMware, Inc. #vmworld #NET2761BU Disclaimer This presentation may contain product features or functionality
More informationThe Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec
The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product
More informationDevOps CICD PopUp. Software Defined Application Delivery Fabric. Frey Khademi. Systems Engineering DACH. Avi Networks
DevOps CICD PopUp Software Defined Application Delivery Fabric Systems Engineering DACH Frey Khademi Avi Networks Agenda Avi Introduction - Overview - Architecture - Use Cases Demo Integration Building
More informationNetFlow Optimizer. Overview. Version (Build ) May 2017
NetFlow Optimizer Overview Version 2.4.9 (Build 2.4.9.0.3) May 2017 Copyright 2013-2017 NetFlow Logic Corporation. All rights reserved. Patents both issued and pending. Contents About NetFlow Optimizer...
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 5 Inline
More informationCopyright 2018, Oracle and/or its affiliates. All rights reserved.
Beyond SQL Tuning: Insider's Guide to Maximizing SQL Performance Monday, Oct 22 10:30 a.m. - 11:15 a.m. Marriott Marquis (Golden Gate Level) - Golden Gate A Ashish Agrawal Group Product Manager Oracle
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationTransform to Your Cloud
Transform to Your Cloud Presented by VMware 2012 VMware Inc. All rights reserved Agenda Corporate Overview Cloud Infrastructure & Management Cloud Application Platform End User Computing The Journey to
More informationCisco Tetration Analytics
Cisco Tetration Analytics Real-time application visibility and policy management using advanced analytics Yogesh Kaushik, Sr. Director Product Management PSOACI-2100 Agenda Market context Introduction:
More informationExtraHop Platform Overview: Gain Control With Real-Time IT Analytics
ExtraHop Platform Overview: Gain Control With Real-Time IT Analytics Abstract To overcome new challenges and achieve better outcomes, enterprise IT must rethink the network as a data source and not simply
More informationCloud, SDN and BIGIQ. Philippe Bogaerts Senior Field Systems Engineer
Cloud, SDN and BIGIQ Philippe Bogaerts Senior Field Systems Engineer Virtual Editions TMOS/LTM 12.0 Highlights 1 NIC support Azure Marketplace Kernel Independent driver Enhanced Hypervisor support F5 Networks,
More information1V0-642.exam.30q.
1V0-642.exam.30q Number: 1V0-642 Passing Score: 800 Time Limit: 120 min 1V0-642 VMware Certified Associate 6 Network Visualization Fundamentals Exam Exam A QUESTION 1 Which is NOT a benefit of virtualized
More informationSentryWire Next generation packet capture and network security.
Next generation packet capture and network security. 1 The data landscape 5 big cyber security trends for 2018 More data, more danger. Data proliferation brings many new opportunities but also many downsides:
More informationSentryWire Next generation packet capture and network security.
Next generation packet capture and network security. 1 The data landscape More data, more danger. Data proliferation brings many new opportunities but also many downsides: more data breaches, more sophisticated
More informationWar Stories from the Cloud Going Behind the Web Security Headlines. Emmanuel Mace Security Expert
War Stories from the Cloud Going Behind the Web Security Headlines Emmanuel Mace Security Expert The leading cloud platform for enabling secure, high-performing user experiences on any device, anywhere.
More informationSelf-driving Datacenter: Analytics
Self-driving Datacenter: Analytics George Boulescu Consulting Systems Engineer 19/10/2016 Alvin Toffler is a former associate editor of Fortune magazine, known for his works discussing the digital revolution,
More informationOrdering and deleting Single-node Trial for VMware vcenter Server on IBM Cloud instances
Ordering and deleting Single-node Trial for VMware vcenter Server on IBM Cloud instances The Single-node Trial for VMware vcenter Server on IBM Cloud is a single-tenant hosted private cloud that delivers
More informationSecurity Automation. Challenge: Automatizzare le azioni di isolamento e contenimento delle minacce rilevate tramite soluzioni di malware analysis
Security Automation Challenge: Automatizzare le azioni di isolamento e contenimento delle minacce rilevate tramite soluzioni di malware analysis Network Admission Control See Managed Unmanaged Computing
More informationA10 HARMONY CONTROLLER
DATA SHEET A10 HARMONY CONTROLLER AGILE MANAGEMENT, AUTOMATION, ANALYTICS FOR MULTI-CLOUD ENVIRONMENTS PLATFORMS A10 Harmony Controller provides centralized agile management, automation and analytics for
More informationAvi Vantage Platform Architecture
WHITE PAPER WHITE PAPER Avi Vantage Platform Architecture Industry s first intent-based application services platform based on a software-defined scale-out architecture for multi-cloud environments EXECUTIVE
More informationTable of Contents HOL SLN
Table of Contents Lab Overview - - Modernizing Your Data Center with VMware Cloud Foundation... 3 Lab Guidance... 4 Module 1 - Deploying VMware Cloud Foundation (15 Minutes)... 7 Introduction... 8 Hands-on
More informationAll Events. One Platform.
All Events. One Platform. Industry s first IT ops platform that truly correlates the metric, flow and log events and turns them into actionable insights. Correlate Integrate Analyze www.motadata.com Motadata
More informationCloudsourced Network Analytics
Cloudsourced Network Analytics GT HILL Director Technical Marketing We are Nyansa o Silicon Valley startup o Founded September, 2013 o MIT, Meraki, Aruba Networks, Google o Revenue generating o Deployed
More informationManaging Your Privileged Identities: The Choke Point of Advanced Attacks
Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why
More informationF5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe
F5 comprehensive protection against application attacks Jakub Sumpich Territory Manager Eastern Europe j.sumpich@f5.com Evolving Security Threat Landscape cookie tampering Identity Extraction DNS Cache
More informationSEVONE END USER EXPERIENCE
Insight for the Connected World End User Experience [ DataSheet ] SEVONE END USER EXPERIENCE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure
More informationZero to Microservices in 5 minutes using Docker Containers. Mathew Lodge Weaveworks
Zero to Microservices in 5 minutes using Docker Containers Mathew Lodge (@mathewlodge) Weaveworks (@weaveworks) https://www.weave.works/ 2 Going faster with software delivery is now a business issue Software
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationCisco Application Centric Infrastructure
Data Sheet Cisco Application Centric Infrastructure What s Inside At a glance: Cisco ACI solution Main benefits Cisco ACI building blocks Main features Fabric Management and Automation Network Security
More informationVMworld disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no
LHC3296BUS OVH: Shields Up! Building a True Security Barrier in the Cloud Chris Romano, Principal Systems Engineer #VMworld #LHC3296BUS VMworld disclaimer This presentation may contain product features
More informationData Sheet GigaSECURE Cloud
Data Sheet GigaSECURE Cloud Intelligent network traffic visibility that enables enterprises to extend their security posture to Microsoft The rapid evolution of Infrastructure-as-a-Service (IaaS) brings
More informationCloudamize Agents FAQ
Cloudamize Agents FAQ Cloudamize is a cloud infrastructure analytics platform that provides data analysis and recommendations to speed and simplify cloud migration and management. Our platform helps you
More informationAAA (Authentication, Authorization, and Accounting) is a framework that contains protocols that control user access and resource tracking.
ExtraHop Glossary Published: 2019-02-09 AAA AAA (Authentication, Authorization, and Accounting) is a framework that contains protocols that control user access and resource tracking. ActiveMQ ActiveMQ
More informationWHITEPAPER Linking ExtraHop Wire Data Analytics solution with the compliance module of macmon NAC
WHITEPAPER Linking ExtraHop Wire Data Analytics solution with the compliance module of macmon NAC TABLE OF CONTENTS 1. Introduction 2. Configuration ExtraHop 3. Configuration macmon 4. Course in case of
More informationElevate the Conversation: Put IT Resilience into Practice for Cloud Service Providers
Elevate the Conversation: Put IT Resilience into Practice for Cloud Service Providers Don Wales, VP, Global Cloud Sales Mariah West, Director, Global Marketing Programs & Operations IT Resilience Protect
More informationADC im Cloud - Zeitalter
ADC im Cloud - Zeitalter Applikationsdienste für Hybrid-Cloud- und Microservice-Szenarien Ralf Sydekum, SE Manager DACH, F5 Networks GmbH Some of the Public Cloud Related Questions You May Have.. It s
More informationData Sheet Gigamon Visibility Platform for AWS
Data Sheet Gigamon Visibility Platform for Overview The rapid evolution of Infrastructure-as-a-Service (IaaS), or public clouds, brings instant advantages of economies of scale, elasticity, and agility
More informationCloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 5th March 2015 Duration 2 Days Location Dublin Course Code SS15-13 Programme Overview Cloud Computing is gaining increasing attention
More informationDatacenter Security: Protection Beyond OS LifeCycle
Section Datacenter Security: Protection Beyond OS LifeCycle 1 Not so fun Facts from the Symantec ISTR 2017 Report Zero-Day Vulnerability, annual total Legitimate tools, annual total 6,000 5 5,000 4,000
More informationGarantierte Serviceverfügbarkeit in einer hybriden IT
2. März 2016 Garantierte Serviceverfügbarkeit in einer hybriden IT Klaus Holthaus, Eduard Spiegel Presales Consultants, HPE Software Are you getting that mobile moment? - End users satisfied - Business
More informationVMware vsphere: Install, Configure, Manage plus Optimize and Scale- V 6.5. VMware vsphere 6.5 VMware vcenter 6.5 VMware ESXi 6.
VMware vsphere V 6.5 VMware vsphere: Install, Configure, Manage plus Optimize and Scale- V 6.5 vsphere VMware vsphere 6.5 VMware vcenter 6.5 VMware ESXi 6.5 VMware vsphere vcenter ESXi ESXi VMware vcenter
More informationHow to Troubleshoot Databases and Exadata Using Oracle Log Analytics
How to Troubleshoot Databases and Exadata Using Oracle Log Analytics Nima Haddadkaveh Director, Product Management Oracle Management Cloud October, 2018 Copyright 2018, Oracle and/or its affiliates. All
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become
More informationExam : Implementing Microsoft Azure Infrastructure Solutions
Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
STO1297BE Stretched Clusters or VMware Site Recovery Manager? We Say Both! Jeff Hunter, VMware, @jhuntervmware GS Khalsa, VMware, @gurusimran #VMworld Disclaimer This presentation may contain product features
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationVMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Efficient, Agile and Extensible Software-Defined Networks and Security WHITE PAPER Overview Organizations worldwide have gained significant efficiency and
More informationSD-WAN / Hybrid WAN : Leveraging SDN-NFV for Networks Agility
SD-WAN / Hybrid WAN : Leveraging SDN-NFV for Networks Agility Laurent Perrin, Director International Product Management, Orange Business Services Sylvain Quartier, SVP Enterprise Products Strategy & Alliances
More informationVMWARE ENTERPRISE PKS
DATASHEET AT A GLANCE VMware Enterprise PKS is a productiongrade Kubernetes-based container solution equipped with advanced networking, a private container registry, and full lifecycle management. VMware
More informationIntelligent Edge Protection
Intelligent Edge Protection Sicherheit im Zeitalter von IoT und Mobility September 26, 2017 Flexible consumption Beacons, sensors and geo-positioning Driven by agile DevOps Mobile users, apps and devices
More informationThe Critical Assets Filter for the SOC Focus discovery and analytics to expedite security investigations
White Paper Focus discovery and analytics to expedite security investigations By Barbara Kay, CISSP With limited analyst time and many alerts going untriaged, security operation centers are getting more
More informationVMWARE VSPHERE FEATURE COMPARISON
DATASHEET VMWARE VSPHERE FEATURE COMPARISON ACROSS VERSIONS KEY SCALE METRICS: MAXIMUMS Host per Cluster VMs per Cluster CPUs per Host RAM per Host VMs per Host vcpus per VM vram per VM 32 64 64 4000 8000
More informationSharkFest 17 Europe. Defining a Requirements Based Packet Capture Strategy. John Pittle. 9 november Riverbed Technologies
SharkFest 17 Europe Defining a Requirements Based Packet Capture Strategy 9 november 2017 John Pittle Riverbed Technologies #sf17eu Estoril, Portugal#sf17eu Defining Estoril, Portugal requirements 7-10
More informationSDN Security BRKSEC Alok Mittal Security Business Group, Cisco
SDN Security Alok Mittal Security Business Group, Cisco Security at the Speed of the Network Automating and Accelerating Security Through SDN Countering threats is complex and difficult. Software Defined
More informationTable of Contents HOL-SDC-1415
Table of Contents Lab Overview - - IT Outcomes Security Controls Native to Infrastructure. 2 Lab Guidance... 3 Module 1 - Policy-Based Compliance... 5 Introduction... 6 Manage vcenter Server Virtual Machines...
More informationDelivering Visibility for Your Risk Management Framework
Delivering Visibility for Your Risk Management Framework Abstract For organizations that have prioritized the Risk Management Framework, there still remains much work to be done, particularly when it comes
More informationIdentity Based Network Access
Identity Based Network Access Identity Based Network Access - Agenda What are my issues Cisco ISE Power training What have I achieved What do I want to do What are the issues? Guest Student Staff Contractor
More informationSAS and F5 integration at F5 Networks. Updates for Version 11.6
SAS and F5 integration at F5 Networks Updates for Version 11.6 Managing access based on Identity Employees Partner Customer Administrator IT challenges: Control access based on user-type and role Unify
More informationSecuring Your Cloud Introduction Presentation
Securing Your Cloud Introduction Presentation Slides originally created by IBM Partial deck derived by Continental Resources, Inc. (ConRes) Security Division Revision March 17, 2017 1 IBM Security Today
More informationPrivate Cloud Public Cloud Edge. Consistent Infrastructure & Consistent Operations
Hybrid Cloud Native Public Cloud Private Cloud Public Cloud Edge Consistent Infrastructure & Consistent Operations VMs and Containers Management and Automation Cloud Ops DevOps Existing Apps Cost Management
More informationThe Evolution of Data Center Security, Risk and Compliance
#SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and
More informationDynamic App Services in Containerized Environments
Dynamic App Services in Containerized Environments F5 Government Technology Symposium Mark Dittmer Sr Product Management Engineer Understanding the Container Market and Customer Challenges 1 Organization
More informationPLEXXI HCN FOR VMWARE ENVIRONMENTS
PLEXXI HCN FOR VMWARE ENVIRONMENTS SOLUTION BRIEF FEATURING Plexxi s pre-built, VMware Integration Pack makes Plexxi integration with VMware simple and straightforward. Fully-automated network configuration,
More informationjetnexus Load Balancer
Mitigate the Risk of Downtime and Optimise Application Delivery jetnexus load balancers improve the performance, scalability and reliability of applications for a superb end user experience. Our business
More informationIntroducing VMware Validated Designs for Software-Defined Data Center
Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design 4.0 VMware Validated Design for Software-Defined Data Center 4.0 You can find the most up-to-date technical
More informationTrust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved
Trust in the Cloud Mike Foley RSA Virtualization Evangelist 2009/2010/2011 1 2010 VMware Inc. All rights reserved Agenda How do you solve for Trust = Visibility + Control? What s needed to build a Trusted
More informationSEVONE DATA APPLIANCE FOR EUE
Insight for the Connected World Data Appliance for EUE [ DataSheet ] SEVONE DATA APPLIANCE FOR EUE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure
More informationIntroducing VMware Validated Designs for Software-Defined Data Center
Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design for Software-Defined Data Center 4.0 This document supports the version of each product listed and supports
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
MGT1758BE Effectively Operating an Automated Cloud Jad El-Zein @virtualjad Vincent Meoc @vmeoc #VMworld #MGT1758BE Disclaimer This presentation may contain product features that are currently under development.
More informationThe Intent based Data Center. Kim In-Sook Manager, ASEAN Data Center Architect Team Jan 11, 2018
The Intent based Data Center Kim In-Sook Manager, ASEAN Data Center Architect Team Jan 11, 2018 30,000+ Application developers. 7200+ Apps. 32 data centers. More software developers than Google, and more
More informationjetnexus Virtual Load Balancer
jetnexus Virtual Load Balancer Mitigate the Risk of Downtime and Optimise Application Delivery We were looking for a robust yet easy to use solution that would fit in with our virtualisation policy and
More informationPSOACI Tetration Overview. Mike Herbert
Tetration Overview Mike Herbert Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion
More informationCheck Point DDoS Protector Introduction
Check Point DDoS Protector Introduction Petr Kadrmas SE Eastern Europe pkadrmas@checkpoint.com Agenda 1 (D)DoS Trends 2 3 4 DDoS Protector Overview Protections in Details Summary 2 (D)DoS Attack Methods
More informationIntent Driven Network Operations with AppFormix Advanced Analytics Platform. Joseph Li
Intent Driven Network Operations with AppFormix Advanced Analytics Platform Joseph Li This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without
More information