Data Sheet Gigamon Visibility Platform for AWS
|
|
- Elijah Hardy
- 5 years ago
- Views:
Transcription
1 Data Sheet Gigamon Visibility Platform for Overview The rapid evolution of Infrastructure-as-a-Service (IaaS), or public clouds, brings instant advantages of economies of scale, elasticity, and agility to organizations seeking to modernize their IT infrastructures. Migrating workloads into the public cloud, however, introduces a new set of responsibilities and challenges for the teams that manage this move. How does an enterprise manage, secure and understand all of its data now traversing the public cloud? The obvious challenges include the inability to access all traffic and data in support of forensics, customer experience management, advanced threat detection, and monitoring tools, but also includes the lack of visibility into East-West (i.e. web-tier-to-app tier or app tier-to-database) traffic needed for compliancy, lateral threat mitigation, and more. Current security tools that operate in public clouds are lacking complete access to this data of interest. In an on-premise deployment, there are options to get access to traffic from the infrastructure for real-time analysis via TAPs (physical or virtual), SPAN sessions although TAPs are usually the favored method to gain reliable, non-intrusive access to mission-critical data in motion or a network visibility solution. When deploying applications and workloads in the public cloud, none of these options are available. Agent-based monitoring is an option for monitoring in public clouds, but it could lead to a very complex architecture, especially if multiple tools need access to the same traffic for inspection and analysis, as depicted below. Region Region Tool Public Cloud Visibility Visibility RDS RDS Tool AZ AZ IaaS Visibility Challenges Inability to access all traffic Discreet vendor monitoring agents per instance Impacts workload and performance Increases complexity Static visibility with heavy disruption Visibility Solution with Gigamon Consistent way to access network traffic Distribute traffic to multiple tools Customize traffic to specific tools Elastic visibility as workloads scale out Elastic Load Balancing () Subnet Instances Tool Amazon Relational Database Service (RDS) Availability Zone (AZ) Traffic distribution Management and control 1
2 The Solution Gigamon Visibility Platform for Amazon Services () An efficient and optimal solution to overcome these challenges is to use the Gigamon Visibility Platform for, the industry s first pervasive visibility platform that provides consistent visibility into data in motion across the entire enterprise: on-premise, remote sites, public, private and hybrid clouds. Use Cases Gigamon s Visibility Platform extends its capabilities to the following real-world, flexible cloud deployment models: 1. Hybrid clouds for large enterprises providing on-premise visibility, while preserving tool investment. 2. Scale-out public cloud model with multiple Virtual Public Clouds (s) for applications, business units, or tenants. 3. Enterprises with an all-in approach and have migrated and deployed all their applications to the cloud. Region A lications SecOps Business Units Visibility Tool Visibility Visibility Amazon EC2 APIs Amazon CloudWatch On-premise Data Center Visibility Platform Security, Performance Management, and Analytics Tools Subnet Instances peering Tool Data center Traffic distribution Management and control 2
3 Features and Benefits Features Traffic Access (G-vTAP Agent) Traffic Aggregation and Intelligence (GigaVUE V Series) Orchestration () Elastic and Automated Visibility (Automatic Target Selection) Benefits A user space agent deployed in the elastic compute cloud (EC2) instance to mirror selected traffic and deliver to GigaVUE V Series visibility nodes Single agent that can replace multiple vendor agents to consistently access and forward traffic Visibility node [available as an Amazon Machine Image (AMI)] that aggregates traffic from multiple agents lies intelligence and optimization to the aggregated traffic Flow Mapping Select and filter traffic Slicing Reduce packet size at a specified offset to conserve network backhaul Sampling Conserve network backhaul by selecting packet rates, for ex. 1 in 10 or 1 in 100 Masking Can provide compliancy and privacy of the traffic by masking specific offsets Distributes optimized traffic to cloud-based tools or backhaul to on-premise Gigamon Visibility Platform using standard IP GRE Tunnels Centralized management application can be deployed either on-premise or in the cloud Defines traffic policies using simple drag-n-drop UI Integrates with APIs for EC2 inventory and network topology Monitors CloudWatch events to identify EC2 instances spin-up Elastically scales-out GigaVUE V Series nodes based on traffic access points Automatically selects new EC2 instances as part of traffic policies Allows for continuous and automated visibility, while identifying any lateral propagation of threats In support of flexible deployment models, the Gigamon Visibility Platform for provides pervasive visibility into data in motion across the entire enterprise: on-premise, remote sites, public, private, and hybrid clouds. Visibility Deployment Architecture Most deployments in use private IP addresses for EC2 instances within a, thereby shielding public or elastic IP access to the instances. To support multiple and flexible deployment models (hybrid, single, multi-) at scale and to control the agents (G-vTAP) and visibility nodes (V Series) within a, the Gigamon Visibility Platform supports a controller-based architecture to proxy the command-and-control APIs while preserving existing NAT or IP Addressing schemes. EC2 APIs Amazon CloudWatch Integration G-vTAP Controller G-vTAPs GigaVUE V Series Controller The command-and-control proxy components are: 1. G-vTAP Controller Controller AMI to proxy commands from to the G-vTAP agents. 2. GigaVUE V Series Controller Controller AMI to proxy commands from to the GigaVUE V Series nodes. Tunneling Target VM app to be monitored Tools Monitored data traffic Control traffic 3
4 Requirements for the Gigamon Visibility Platform Components Table 1: EC2 Computing Requirements for the Solution Solution Component Minimum EC2 Instance Type Description G-vTAP Agent t2.medium with additional ENI Available as rpm or debian package. Additional ENI (Elastic Network Interface) is required for the mirrored/monitored traffic. G-vTAP Controller t2.medium Based on the number of agents being monitored, multiple controllers will be required to scale out horizontally. V Series Node c4.large (2 ENIs) c4.large supports throughput up to 500 Mbps. ENI 1: Monitored Network IP (mirrored traffic from G-vTAP) ENI 2: Tunnel IP (traffic to tools or on prem GigaVUE H/W) ENI 2: Management IP (commands from the controller) V Series Controller t2.medium Based on the number of GigaVUE V Series nodes being monitored, multiple controllers will be required to scale out horizontally. m4.large 40GB root disk 40GB data disk needs to be able to access both the controller instances for relaying the commands. automatically spins up additional EC2 instances for GigaVUE V Series nodes based on a pre-defined configuration in the user interface. For on-premise requirements and ordering information, please refer to the Data Sheet. Table 2: Recommended EC2 Computing Requirements for the Visibility Platform Platform Component 100 Virtual TAP Points 1000 Virtual TAP Points 1 m4.large 1 m4.xlarge G-vTAP Controller 1 t2.medium 10 t2.medium GigaVUE V Series Nodes 2 c4.large 20 c4.large GigaVUE V Series Controller 1 t2.medium 2 t2.medium Based on the number of virtual TAP points, GigaVUE V Series nodes will be auto-launched by fabric manager. Refer to the Gigamon Visibility Platform for Getting Started Guide for deployment instructions for the visibility components of. Customers can access this guide in our Customer Portal. Support and Services Gigamon offers a range of support and maintenance services. For details regarding Gigamon s Limited Warranty and its Product Support and Software Maintenance Programs, visit 4
5 Ordering Information, Renewals The Visibility Platform is activated using a Term Bring Your Own License (BYOL). Table 3: Part Numbers for the Solution Part Number GFM--100 GFM Description Monthly Term license for traffic visibility up to 100 virtual TAP points in. Min Term is 3 months with a max of 12 months Monthly Term license for traffic visibility up to 1000 virtual TAP Points in. Min Term is 3 months with a max of 12 months Note: 1. Virtual TAP Point: Any end point from which traffic can be mirrored using the G-vTAP agent, for example, an Elastic Network Interface (ENI) in a EC2 instance. A single Amazon Machine Image (AMI) could have multiple ENIs that can be tapped. For example, if a application uses 10 EC2 instances with 2 ENIs each, then the total Virtual Tap Points are Try-and-Buy: To try Visibility for 10 vtaps for 30-days, launch as a community AMI or download it from the Gigamon customer portal. Refer to the ordering section to purchase additional term-based visibility. 3. Licensing: Licenses are activated from. 4. Renewal: notifies the customer of term license expiration with advance notice of 30 days. Contact Gigamon for renewals. Gigamon and the Gigamon logo are trademarks of Gigamon in the United States and/or other countries. Gigamon trademarks can be found at All other trademarks are the trademarks of their respective owners. Gigamon reserves the right to change, modify, transfer, or otherwise revise this publication without notice / Olcott Street, Santa Clara, CA USA +1 (408)
Solution Overview Gigamon Visibility Platform for AWS
Solution Overview Gigamon Visibility Platform for Background With the rapid evolution of the public cloud that brings instant advantages of economies of scale, elasticity and agility, IT and data center
More informationData Sheet GigaSECURE Cloud
Data Sheet GigaSECURE Cloud Intelligent network traffic visibility that enables enterprises to extend their security posture to Microsoft The rapid evolution of Infrastructure-as-a-Service (IaaS) brings
More informationProduct Brief GigaVUE-VM
Product Brief GigaVUE-VM Active Visibility for Virtual Workloads With exponential growth in virtualized traffic within the data center, a primary challenge for the centralized monitoring infrastructure
More informationGigaVUE-FM. Data Sheet
SAS 1TB 7.2x Data Sheet Available as a virtual or hardware appliance 6 Orchestration and Management of the Gigamon Visibility Platform The Gigamon Visibility Platform delivers pervasive visibility across
More informationEdgeConnect for Amazon Web Services (AWS)
Silver Peak Systems EdgeConnect for Amazon Web Services (AWS) Dinesh Fernando 2-22-2018 Contents EdgeConnect for Amazon Web Services (AWS) Overview... 1 Deploying EC-V Router Mode... 2 Topology... 2 Assumptions
More informationLive traffic feeds are increasingly being used by the modern enterprise to gain visibility for security and operations management
Overview The transition from an age of systems of record to an age of systems of engagement has led to profound changes in the way information is used in an organization. These changes have now become
More informationCisco CloudCenter Solution with Cisco ACI: Common Use Cases
Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco ACI increases network security, automates communication policies based on business-relevant application requirements, and decreases developer
More informationSecuring Your Amazon Web Services Virtual Networks
Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,
More informationDATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure
DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure AlienVault USM Anywhere accelerates and centralizes threat detection, incident response,
More informationThe Gigamon Visibility Platform
The Gigamon Visibility Platform See what matters. Andrea Baraldi - Sales Engineer Marco Romagnoli Sales Director 1 Safe Harbor Statement Any forward-looking indication of plans for products is preliminary
More informationAutomated Traffic Visibility for SDDC Solution Guide
Automated Traffic Visibility for SDDC Solution Guide COPYRIGHT Copyright 2016 Gigamon. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationAgenda. This Session: Azure Networking Basics, On-prem connectivity options DEMO Create VNET/Gateway Cost-estimation for VNET/Gateways
Onur Dogruoz Agenda Previous Sessions: Introduction to Azure Infrastructure as a Service (IaaS), Azure portal, role-based access control (RBAC), calculator overview VM Types, Azure Hybrid Use Benefits(AHUB),
More informationBIG MON CONTROLLERS BIG MON ANALYTICS NODE. Multi-Terabytes L2-GRE 1/10/25/40/100G ETHERNET SWITCH FABRIC. Optional BIG MON BIG MON SERVICE NODES
Modern Packet Recorder: Enhancing Data Security and Privacy Compliance OVERVIEW In response to the stringent corporate governance and compliance requirements for how IT data is secured, controlled, and
More informationCheck Point vsec for Microsoft Azure
Check Point vsec for Microsoft Azure Test Drive User Guide 2017 Check Point Software Technologies Ltd. All rights reserved Page 1 Learn More: checkpoint.com Content 1 INTRODUCTION... 3 2 TEST DRIVE OVERVIEW...
More informationNGF0502 AWS Student Slides
NextGen Firewall AWS Use Cases Barracuda NextGen Firewall F Implementation Guide Architectures and Deployments Based on four use cases Edge Firewall Secure Remote Access Office to Cloud / Hybrid Cloud
More informationCompute - 36 PCPUs (72 vcpus) - Intel Xeon E5 2686 v4 (Broadwell) - 512GB RAM - 8 x 2TB NVMe local SSD - Dedicated Host vsphere Features - vsphere HA - vmotion - DRS - Elastic DRS Storage - ESXi boot-from-ebs
More informationAWS Reference Design Document
AWS Reference Design Document Contents Overview... 1 Amazon Web Services (AWS), Public Cloud and the New Security Challenges... 1 Security at the Speed of DevOps... 2 Securing East-West and North-South
More informationVISIBILITY INTO CLOUD COMPUTING
VISIBILITY INTO CLOUD COMPUTING Brendan Leitch, Head of APAC Marketing 1 SECURITY AND PERFORMANCE DEPENDS ON DATA VISIBILITY Access Challenges: Get data access for tools VISIBILITY: Seeing the Traffic
More informationSecuring Your Microsoft Azure Virtual Networks
Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationMan kann nur schützen was man sieht - oder Zentrales Entschlüsseln von SSL/TLS Verkehr Rethinking Security
Man kann nur schützen was man sieht - oder Zentrales Entschlüsseln von SSL/TLS Verkehr Rethinking Security Stepan Svihla Sr. Sales Engineer Central & Eastern Europe Corporate Overview THE ESSENTIAL ELEMENT
More informationCisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY
Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY CASE STUDY ADOBE 2 About Adobe Adobe Systems provides digital media and marketing solutions to customers around the world including
More informationAWS Solutions Architect Associate (SAA-C01) Sample Exam Questions
1) A company is storing an access key (access key ID and secret access key) in a text file on a custom AMI. The company uses the access key to access DynamoDB tables from instances created from the AMI.
More informationBest Practices for Extending the WAN into AWS (IaaS) with SD-WAN
Best Practices for Extending the WAN into AWS (IaaS) with SD-WAN Ariful Huq Product Management @arifulhuq & Rob McBride Marketing @digitalmcb Industry trends impacting networking Cloud Mobile Social 2
More informationCisco CloudCenter Solution Use Case: Application Migration and Management
Cisco CloudCenter Solution Use Case: Application Migration and Management Application migration and management Cloud computing is here to stay. According to recent Gartner research 1, from 2011 to 2014
More informationAUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs
AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs WITH PALO ALTO NETWORKS AND REAN CLOUD 1 INTRODUCTION EXECUTIVE SUMMARY Organizations looking to provide developers with a free-range development environment
More informationCheck Point 4800 with Gigamon Inline Deployment Guide
Check Point 4800 with Gigamon Inline Deployment Guide COPYRIGHT Copyright 2016 Gigamon. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationExtending Enterprise Security to Multicloud and Public Cloud
Extending Enterprise Security to Multicloud and Public Cloud Paul Kofoid Sr. Consulting Engineer: Security & Cloud This statement of direction sets forth Juniper Networks current intention and is subject
More informationSECURING THE MULTICLOUD
SECURING THE MULTICLOUD Bahul Harikumar and Ali Bidabadi Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice.
More informationDevOps and Continuous Delivery USE CASE
DevOps and Continuous Delivery USE CASE CliQr DevOps and Continuous Delivery Page 2 DevOps and Continuous Delivery In the digital economy, increasing application velocity is key to success. In order to
More informationSilver Peak EC-V and Microsoft Azure Deployment Guide
Silver Peak EC-V and Microsoft Azure Deployment Guide How to deploy an EC-V in Microsoft Azure 201422-001 Rev. A September 2018 2 Table of Contents Table of Contents 3 Copyright and Trademarks 5 Support
More informationNetwork Behavior Analysis
N E T W O R K O P E R AT I O N S. S I M P L I F I E D. FORWARD ENTERPRISE HIGHLIGHTS Forward Networks is the leader in Intent-based Networking and network assurance to automate the analysis and verification
More informationEBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud
EBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud Contents Introduction... 3 What is VMware Cloud on AWS?... 5 Customer Benefits of Adopting VMware Cloud on AWS... 6 VMware Cloud
More informationCLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY
CLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY ORGANIZATIONS NEED VISIBILITY TO SECURE AND MONITOR THEIR CLOUD ENVIRONMENTS Organizations are migrating workloads to the cloud because it offers
More informationCisco Enterprise Cloud Suite Overview Cisco and/or its affiliates. All rights reserved.
Cisco Enterprise Cloud Suite Overview 2015 Cisco and/or its affiliates. All rights reserved. 1 CECS Components End User Service Catalog SERVICE PORTAL Orchestration and Management UCS Director Application
More informationCitrix SD-WAN for Optimal Office 365 Connectivity and Performance
Solution Brief Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Evolving Needs for WAN Network Architecture Enterprise networks have historically been architected to provide users access
More informationHosting DesktopNow in Amazon Web Services. Ivanti DesktopNow powered by AppSense
Hosting DesktopNow in Amazon Web Services Ivanti DesktopNow powered by AppSense Contents Purpose of this Document... 3 Overview... 3 1 Non load balanced Amazon Web Services Environment... 4 Amazon Web
More informationSaaS. Public Cloud. Co-located SaaS Containers. Cloud
SaaS On-prem Private Cloud Public Cloud Co-located SaaS Containers APP SERVICES ACCESS TLS/SSL DNS NETWORK WAF LOAD BALANCING DNS ACCESS CONTROL SECURITY POLICIES F5 Beside the Cloud Why Get Closer to
More informationVM-SERIES FOR VMWARE VM VM
SERIES FOR WARE Virtualization technology from ware is fueling a significant change in today s modern data centers, resulting in architectures that are commonly a mix of private, public or hybrid cloud
More informationAligning Agency Cybersecurity Practices with the Cybersecurity Framework
POINT OF VIEW Aligning Agency Cybersecurity Practices with the Cybersecurity Framework Leveraging Gigamon to Align Cybersecurity Budgets with Desired Business Outcomes 2013-2017 Gigamon. All rights reserved.
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationAWS Integration Guide
AWS Integration Guide Cloud-Native Security www.aporeto.com AWS Integration Guide Aporeto integrates with AWS to help enterprises efficiently deploy, manage, and secure applications at scale and the compute
More information21CTL Disaster Recovery, Workload Mobility and Infrastructure as a Service Proposal. By Adeyemi Ademola E. Cloud Engineer
21CTL Disaster Recovery, Workload Mobility and Infrastructure as a Service Proposal By Adeyemi Ademola E. Cloud Engineer 1 Contents Introduction... 5 1.2 Document Purpose and Scope...5 Service Definition...
More informationUnity EdgeConnect SP SD-WAN Solution
As cloud-based application adoption continues to accelerate, geographically distributed enterprises increasingly view the wide area network (WAN) as critical to connecting users to applications. As enterprise
More informationCyberPosture Intelligence for Your Hybrid Infrastructure
VALUE BRIEF CyberPosture Intelligence for Your Hybrid Infrastructure CyberPosture is a consolidated risk score, based on configuration and workload analysis, that executives can present to their board,
More informationRethinking Security CLOUDSEC2016. Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team
Rethinking Security CLOUDSEC2016 Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team Breaches Are The New Normal Only The Scale Surprises Us OPM will send notifications
More informationSECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011
SECURING THE NEXT GENERATION DATA CENTER Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011 JUNIPER SECURITY LEADERSHIP Market Leadership Data Center with High-End
More informationThe ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery. Citrix.com ebook Align Cloud Strategy to Business Goals 1
The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery Citrix.com ebook Align Cloud Strategy to Business Goals 1 Contents Digital transformation is changing the way that applications are
More informationGetting Started Guide. VMware NSX Cloud services
VMware NSX Cloud services You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback
More informationIXIA PHANTOM VTAP WITH TAPFLOW FILTERING
IXIA PHANTOM VTAP WITH TAPFLOW FILTERING DATA SHEET OVERVIEW The Ixia Phantom vtap with TapFlow filtering is a software solution providing crystal-clear visibility into virtual data center network traffic.
More informationBERLIN. 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved
BERLIN 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Introduction to Amazon EC2 Danilo Poccia Technical Evangelist @danilop 2015, Amazon Web Services, Inc. or its affiliates. All
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More informationMcAfee Virtual Network Security Platform
McAfee Virtual Network Security Platform Complete threat detection for cloud networks McAfee Virtual Network Security Platform is a complete network threat and intrusion prevention system (IPS) solution
More informationAWS: Basic Architecture Session SUNEY SHARMA Solutions Architect: AWS
AWS: Basic Architecture Session SUNEY SHARMA Solutions Architect: AWS suneys@amazon.com AWS Core Infrastructure and Services Traditional Infrastructure Amazon Web Services Security Security Firewalls ACLs
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationIntroduction to Cloud Computing
You will learn how to: Build and deploy cloud applications and develop an effective implementation strategy Leverage cloud vendors Amazon EC2 and Amazon S3 Exploit Software as a Service (SaaS) to optimize
More informationEdgeConnectSP The Premier SD-WAN Solution
SERVICE PROVIDER EdgeConnectSP The Premier SD-WAN Solution Build High-Performance Managed SD-WAN Services Challenges with Legacy WANs Significant shifts in application and traffic patterns, including the
More informationTHE IMPACT OF HYBRID AND MULTI CLOUDS TO CYBERSECURITY PRIORITIES
SESSION ID: STR-R14 THE IMPACT OF HYBRID AND MULTI CLOUDS TO CYBERSECURITY PRIORITIES Doug Cahill Group Director and Senior Analyst Enterprise Strategy Group @dougcahill WHO IS THIS GUY? Topics The Composition
More informationCross-Site Virtual Network Provisioning in Cloud and Fog Computing
This paper was accepted for publication in the IEEE Cloud Computing. The copyright was transferred to IEEE. The final version of the paper will be made available on IEEE Xplore via http://dx.doi.org/10.1109/mcc.2017.28
More informationTALK THUNDER SOFTWARE FOR BARE METAL HIGH-PERFORMANCE SOFTWARE FOR THE MODERN DATA CENTER WITH A10 DATASHEET YOUR CHOICE OF HARDWARE
DATASHEET THUNDER SOFTWARE FOR BARE METAL YOUR CHOICE OF HARDWARE A10 Networks application networking and security solutions for bare metal raise the bar on performance with an industryleading software
More informationSoftware Defined Storage for the Evolving Data Center
Software Defined Storage for the Evolving Data Center Petter Sveum Information Availability Solution Lead EMEA Technology Practice ATTENTION Forward-looking Statements: Any forward-looking indication of
More informationSecurely Access Services Over AWS PrivateLink. January 2019
Securely Access Services Over AWS PrivateLink January 2019 Notices This document is provided for informational purposes only. It represents AWS s current product offerings and practices as of the date
More informationPROTECT WORKLOADS IN THE HYBRID CLOUD
PROTECT WORKLOADS IN THE HYBRID CLOUD SPOTLIGHTS Industry Aviation Use Case Protect workloads in the hybrid cloud for the safety and integrity of mission-critical applications and sensitive data across
More informationand public cloud infrastructure, including Amazon Web Services (AWS) and AWS GovCloud, Microsoft Azure and Azure Government Cloud.
DATA SHEET vthunder SOFTWARE FOR VIRTUAL & CLOUD INFRASTRUCTURE A10 vthunder software appliances enable organizations to SUPPORTED SOLUTIONS gain flexible, easy-to-deploy and high-performance secure application
More informationPrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps
PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : SAA-C01 Title : AWS Certified Solutions Architect - Associate (Released February 2018)
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC2103BU NSX and VMware Cloud on AWS: Deep Dive Ray Budavari, Senior Staff Technical Product Manager NSX @rbudavari #VMworld #LHC2103BU Disclaimer This presentation may contain product features that are
More informationAmazon AWS-Solution-Architect-Associate Exam
Volume: 858 Questions Question: 1 You are trying to launch an EC2 instance, however the instance seems to go into a terminated status immediately. What would probably not be a reason that this is happening?
More informationWorkload Mobility and Disaster Recovery to VMware Cloud IaaS Providers
VMware vcloud Architecture Toolkit for Service Providers Workload Mobility and Disaster Recovery to VMware Cloud IaaS Providers Version 2.9 January 2018 Adrian Roberts 2018 VMware, Inc. All rights reserved.
More informationThe ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery
The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery Digital Transformation Is Changing the Way that Applications Are Managed and Delivered To meet the growing challenges of a competitive
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become
More informationAdvanced CSR Lab with High Availability and Transit VPC
Advanced CSR Lab with High Availability and Transit VPC Fan Yang, Cisco, Engineer, Technical Marketing Nikolai Pitaev, Cisco, Engineer, Technical Marketing LTRVIR-3004 Agenda Slides (30 Min.): CSR 1000V
More informationWhat is. Thomas and Lori Duncan
What is Thomas and Lori Duncan Definition of Cloud computing Cloud storage is a model of data storage where the digital data is stored in logical pools, the physical storage spans multiple servers (and
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationCisco Cloud Application Centric Infrastructure
Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified
More informationApigee Edge Cloud. Supported browsers:
Apigee Edge Cloud Description Apigee Edge Cloud is an API management platform to securely deliver and manage all APIs. Apigee Edge Cloud manages the API lifecycle with capabilities that include, but are
More informationEnabling Long Distance Live Migration with F5 and VMware vmotion
Enabling Long Distance Live Migration with F5 and VMware vmotion F5 Networks and VMware partner to enable live application and storage migrations between data centers and clouds, over short or long distances.
More informationDeploying the Cisco CSR 1000v on Amazon Web Services
Deploying the Cisco CSR 1000v on Amazon Web Services This section contains the following topics: Prerequisites, page 1 Information About Launching Cisco CSR 1000v on AWS, page 1 Launching the Cisco CSR
More informationTransit VPC Deployment Using AWS CloudFormation Templates. White Paper
Transit VPC Deployment Using AWS CloudFormation Templates White Paper Introduction Amazon Web Services(AWS) customers with globally distributed networks commonly need to securely exchange data between
More informationPass4test Certification IT garanti, The Easy Way!
Pass4test Certification IT garanti, The Easy Way! http://www.pass4test.fr Service de mise à jour gratuit pendant un an Exam : SOA-C01 Title : AWS Certified SysOps Administrator - Associate Vendor : Amazon
More informationDeploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform
Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,
More informationAmazon Web Services. Block 402, 4 th Floor, Saptagiri Towers, Above Pantaloons, Begumpet Main Road, Hyderabad Telangana India
(AWS) Overview: AWS is a cloud service from Amazon, which provides services in the form of building blocks, these building blocks can be used to create and deploy various types of application in the cloud.
More informationApigee Edge Cloud. Supported browsers:
Apigee Edge Cloud Description Apigee Edge Cloud is an API management platform to securely deliver and manage all APIs. Apigee Edge Cloud manages the API lifecycle with capabilities that include, but are
More informationCHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING
www.hcltech.com CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING Why Next-Gen Networks? The rapid and large scale adoption of new age disruptive digital technologies has resulted in astronomical growth
More informationTraining on Amazon AWS Cloud Computing. Course Content
Training on Amazon AWS Cloud Computing Course Content 15 Amazon Web Services (AWS) Cloud Computing 1) Introduction to cloud computing Introduction to Cloud Computing Why Cloud Computing? Benefits of Cloud
More informationManaged Platform for Adaptive Computing mpac
Brochure Managed Platform for Adaptive Computing mpac mpac for IT - ImPACT Managed Platform for Adaptive Computing - mpac Creating Adaptive Infrastructure In this digital era, there is a need for datacenters
More informationvcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationTransform Your Business with Hybrid Cloud
Transform Your Business with Hybrid Cloud Cisco gives you greater choice and cost savings, so you can transform IT operations in a way that works best for your organization. We offer an open framework
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
MMC1532BE Using VMware NSX Cloud for Enhanced Networking and Security for AWS Native Workloads Percy Wadia Amol Tipnis VMworld 2017 Content: Not for publication #VMworld #MMC1532BE Disclaimer This presentation
More informationBuilding your Castle in the Cloud for Flash Memory
Building your Castle in the Cloud for Flash Memory Effectively using flash in the cloud Steve Knipple Principal Consultant CloudShift Advisors Santa Clara, CA 1 Agenda Speaker Perspective State of Cloud
More informationEnroll Now to Take online Course Contact: Demo video By Chandra sir
Enroll Now to Take online Course www.vlrtraining.in/register-for-aws Contact:9059868766 9985269518 Demo video By Chandra sir www.youtube.com/watch?v=8pu1who2j_k Chandra sir Class 01 https://www.youtube.com/watch?v=fccgwstm-cc
More informationPROTECT YOUR DATA FROM MALWARE AND ENSURE BUSINESS CONTINUITY ON THE CLOUD WITH NAVLINK MANAGED AMAZON WEB SERVICES MANAGED AWS
PROTECT YOUR DATA FROM MALWARE AND ENSURE BUSINESS CONTINUITY ON THE CLOUD WITH NAVLINK MANAGED AMAZON WEB SERVICES MANAGED AWS Improved performance Faster go-to-market Better security In today s disruptive
More informationVMware Cloud on AWS. A Closer Look. Frank Denneman Senior Staff Architect Cloud Platform BU
VMware Cloud on AWS A Closer Look Frank Denneman Senior Staff Architect Cloud Platform BU Speed is the New Currency Cloud Computing We are in the 3 rd fundamental structural transition in the history of
More informationEasily Managing Hybrid IT with Transformation Technology
White Paper White Paper Managing Public Cloud Computing in the Enterprise Easily Managing Hybrid IT with Transformation Technology A Quick Start Guide 1 Table of Contents Abstract... 3 Traditional Approaches
More informationHitachi Enterprise Cloud Family of Solutions
Hitachi Enterprise Cloud Family of Solutions Accelerate Enterprise Cloud Initiatives and Lower Costs SOLUTION PROFILE Companies are looking to lower the cost of IT management. They seek to achieve faster
More informationCloud Computing. Amazon Web Services (AWS)
Cloud Computing What is Cloud Computing? Benefit of cloud computing Overview of IAAS, PAAS, SAAS Types Of Cloud private, public & hybrid Amazon Web Services (AWS) Introduction to Cloud Computing. Introduction
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationCisco SD-WAN and DNA-C
Cisco SD-WAN and DNA-C SD-WAN Cisco SD-WAN Intent-based networking for the branch and WAN 4x Improved application experience Better user experience Deploy applications in minutes on any platform with consistent
More informationVMWARE ENTERPRISE PKS
DATASHEET AT A GLANCE VMware Enterprise PKS is a productiongrade Kubernetes-based container solution equipped with advanced networking, a private container registry, and full lifecycle management. VMware
More informationArchitectural overview Turbonomic accesses Cisco Tetration Analytics data through Representational State Transfer (REST) APIs. It uses telemetry data
Solution Overview Cisco Tetration Analytics and Turbonomic Solution Deploy intent-based networking for distributed applications. Highlights Provide performance assurance for distributed applications. Real-time
More information