Empowering a More Collaborative Workforce with Network Automation

Similar documents
NetBrain Technologies: Achieving Agile Network Operations: How Automation Can Improve Visibility Across Hybrid Infrastructures

CONTENTS. Technology Overview. Workflow Integration. Sample Customers. How It Works

Toward an Automated Future

Transforming the Network for the Digital Business

WHY SIEMS WITH ADVANCED NETWORK- TRAFFIC ANALYTICS IS A POWERFUL COMBINATION. A Novetta Cyber Analytics Brief

NetBrain Automation Procedures

NEXT GENERATION SECURITY OPERATIONS CENTER

Enhanced Threat Detection, Investigation, and Response

Sustainable Security Operations

Security. Made Smarter.

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Unauthorized Access

Arbor Networks Spectrum. Wim De Niel Consulting Engineer EMEA

empow s Security Platform The SIEM that Gives SIEM a Good Name

Sobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse.

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

Reinvent Your 2013 Security Management Strategy

Automated Threat Management - in Real Time. Vectra Networks

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

4-6 Opportunities Significant value in using SPARKL for Security

securing your network perimeter with SIEM

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure

INTEGRATION BRIEF DFLabs and Jira: Streamline Incident Management and Issue Tracking.

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

ForeScout ControlFabric TM Architecture

Help Your Security Team Sleep at Night

Integrated, Intelligence driven Cyber Threat Hunting

McAfee MVISION Cloud. Data Security for the Cloud Era

Cyber Resilience - Protecting your Business 1

The Resilient Incident Response Platform

CYBER THREAT INTELLIGENCE TOWARDS A MATURE CTI PRACTICE

Mastering The Endpoint

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

Title DC Automation: It s a MARVEL!

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

ITSM SERVICES. Delivering Technology Solutions With Passion

C A S E S T U D Y D E C E M B E R P R E P A R E D B Y : Iftah Bratspiess

How-to Guide: Tenable Nessus for BeyondTrust. Last Revised: November 13, 2018

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Driving more value from your Security Operations Center (SOC) Platform. James Hanlon Director, Splunk Security Markets Specialization, EMEA

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

Accelerate Your Enterprise Private Cloud Initiative

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

Microsoft SharePoint Server 2013 Plan, Configure & Manage

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

ALIENVAULT USM FOR AWS SOLUTION GUIDE

SIEM: Five Requirements that Solve the Bigger Business Issues

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

Demystifying Governance, Risk, and Compliance (GRC) with 4 Simple Use Cases. Gen Fields Senior Solution Consultant, Federal Government ServiceNow

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Additional Security Services on AWS

Continuous Integration & Continuous Deployment (CI/CD) with a Cloud Delivery Platform

The Why, What, and How of Cisco Tetration

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

A Data-Centric Approach to Endpoint Security

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall

Compare Security Analytics Solutions

Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure

DEFINITIONS AND REFERENCES

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Cisco Cyber Range. Paul Qiu Senior Solutions Architect

Preparing your network for the next wave of innovation

ICS Security Monitoring

CONFIDENTLY INTEGRATE VMWARE CLOUD ON AWS WITH INTELLIGENT OPERATIONS

2017 Ethics & Compliance Hotline & Incident Management Benchmark Report Webinar

Tenable.io for Thycotic

Tenable for Google Cloud Platform

CyberArk Privileged Threat Analytics

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Industrial Defender ASM. for Automation Systems Management

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

The SD-WAN security guide

The State of Data Center Health Management Strategy 2017

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

How AlienVault ICS SIEM Supports Compliance with CFATS

How-to Guide: Tenable.io for Lieberman. Last Revised: August 14, 2018

SANS 2017 SOC Survey. A Mile of Numbers and a Ton of Stats. Christopher Crowley All Rights Reserved All Wrongs Reversed

Retail Stores & Restaurant Chains

CLOUD WORKLOAD SECURITY

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

A Practical Guide to Efficient Security Response

WHITEPAPER ATTIVO NETWORKS DECEPTION TECHNOLOGY FOR MERGERS AND ACQUISITIONS

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Cyber Resilience: Developing a Shared Culture. Sponsor Guide

How-to Guide: Tenable Core Web Application Scanner for Microsoft Azure. Last Updated: May 16, 2018

GUIDE. Navigating the General Data Protection Regulation Mini Guide

ebook ADVANCED LOAD BALANCING IN THE CLOUD 5 WAYS TO SIMPLIFY THE CHAOS

5 Steps to Government IT Modernization

THE EVOLUTION OF SIEM

Transcription:

Empowering a More Collaborative Workforce with Network Automation Grant Ho SVP, Global Marketing NetBrain Technologies 15 Network Drive Burlington, MA 01803 +1 800.605.7964 info@netbraintech.com www.netbraintech.com

Today s Workflows Face Key Challenges COMMAND LINE 43% of engineers* report CLI as too limiting (one device a t time) KNOWLEDGE SHARING 1/3 of engineers* rely on tribal leaders to troubleshoot, citing lack of know-how. STARE & COMPARE Difficult to quickly find data as it is spread across many tools Manual Data Collection & Analysis Ineffective Collaboration DATA SHARING Text-based data dumps and logs limit the ability of teams to share key insights 2 NetBrain *Independent survey conducted in collaboration with NetBrain in 2017

Visibility and Automation are Keys to Better Collaboration Get Everyone on the Same Page Share the Knowledge and Learnings Imagine visualizing critical IT data at the moment it s needed, contextualized to the task at hand. Imagine an easy wat to codify knowledge, making it executable, and ultimately shareable across teams. 3 NetBrain

Collaboration More Critical as Workflow Complexity Increases Network Documentation Design and Change Management Network Troubleshooting Network Security Management Application Performance Management Number of IT boundaries crossed 4 NetBrain

In the Network Operations Center: Today Escalation Escalation Level 1 Engineer Level 2 Engineer Level 3 Engineer Level-1: Diagnosis via Manual Playbooks A level-1 Engineer typically follows a pre-defined playbook to perform basic network diagnostics. Data is collected as raw text. Level-2: Data Review & Diagnosis In the event of escalation, a Level-2 Engineer receives either too little or too much information (via log dumps). Level-3: Data Review and Diagnosis A Level-3 Engineer often duplicates a lot of the work performed at the previous tiers because the data is hard to verify. 5 NetBrain

In the Network Operations Center: Survey Says Source: 2017 NetBrain survey 6 NetBrain

In the Network Operations Center: Tomorrow More Visibility, Automation, and Integration 1 ITSM-generated diagnosis When a ticket is created, ITSM automatically triggers map creation and problem diagnosis. 3 Improved knowledge management After problem resolution, senior engineer enhances knowledge DB with lessons-learned. 2 Level 1 / 2 / 3 collaboration Level 1 and 2 engineers collaborate using single map no need to email log and text files. 7 NetBrain

Across Security and Network Teams: Today Manual Security Assessments To prove compliance to security standards, Network and Security teams perform spot checks to validate golden configs are used. Overwhelmed with IDS False-Positives Intrusion Detection Systems overwhelm engineers with alarms. It is difficult to separate a real attack from a false-positive. Forced to Wait Out the Attack It can take days to isolate and mitigate an attack. Often, the attacker stops sending malicious traffic before the attack is actually mitigated. 8 NetBrain

Across Security and Network Teams: Survey Says 72% cited collaboration as #1 issue Source: 2017 NetBrain survey 9 NetBrain

Across Security and Network Teams: Tomorrow More Visibility, Automation, and Integration 1 Isolation of attack radius IDS or SIEM triggers diagnosis to automatically create a map of the attack path and initial diagnosis. 2 NetOps / SecOps collaboration NetOps and SecOps teams review data collected inside collaborate using the map as a shared analytics console. 3 Security fortification Once threat is mitigated, Threat Prevention teams enhance network hardening knowledge with lessons learned. 10 NetBrain

NetBrain: Network Automation Platform Integrate Rich API Framework Integrate with ITSM, SIEM, and into existing workflows Automate Executable Runbooks Program and automate network tasks, share results Visualize Visualize Dynamic Map Visualize all data across your hybrid networks Hybrid networks (Physical, virtual, and SDN) 11 NetBrain

NetBrain in Action Visualize any data, in context Event-triggered automation Enhance any Hybrid Network Visualize network design, in context Automation and analytics Dynamic Map o Visualize any data o Map any path o For any task Runbook Automation o Automate complex tasks o Codify tribal knowledge o Improve collaboration workflow 12 NetBrain

Visit NetBrain at Booth #1951 Telecommunications Technology Software Retail Manufacturing Higher Education Health Government Entertainment Energy Consulting Banking Finance 13 NetBrain

Thank you! NetBrain Technologies 15 Network Drive Burlington, MA 01803 #1 800 605 7964 info@netbraintech.com www.netbraintech.com