CLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY

Similar documents
IXIA PHANTOM VTAP WITH TAPFLOW FILTERING

Ixia ibypass: Avoid 5 Common Security Risks in One Easy Step

NETWORK VISIBILITY NETWORK PACKET BROKER COMPARISON TABLE KEY VISIBILITY ATTRIBUTES SYSTEM SPECIFICATIONS SYSTEM CAPACITY.

VISIBILITY INTO CLOUD COMPUTING

IXIA FLEX TAP TM DATA SHEET PASSIVE NETWORK MONITORING KEY FEATURES HIGHLIGHTS

WHITE PAPER. Monitoring Converged Networks: Link Aggregation

CloudStorm TM 100GE Application and Security Test Load Module

WHITE PAPER. Fail-Safe IPS Integration with Bypass Technology

IXIA IBYPASS HD DATA SHEET PROBLEM: INLINE TOOLS ARE A SINGLE POINT OF FAILURE IN THE NETWORK

Solution Overview Gigamon Visibility Platform for AWS

Ixia Flex Tap PASSIVE NETWORK MONITORING HIGHLIGHTS KEY FEATURES. Data Sheet

Peering as a Cloud enabler for Enterprises

YOUR APPLICATION S JOURNEY TO THE CLOUD. What s the best way to get cloud native capabilities for your existing applications?

Private Cloud Public Cloud Edge. Consistent Infrastructure & Consistent Operations

VISION ONE: SECURITY WITHOUT SACRIFICE

WI-FI AND LTE COEXISTENCE VALIDATION METHODS

Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY

IBM Bluemix compute capabilities IBM Corporation

NGY 10GE FUSION LOAD MODULES

How CloudEndure Works

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Design and deliver cloud-based apps and data for flexible, on-demand IT

How CloudEndure Works

How CloudEndure Disaster Recovery Works

ebook ADVANCED LOAD BALANCING IN THE CLOUD 5 WAYS TO SIMPLIFY THE CHAOS

RELEASE 6.6/6.7 EA RELEASE 6.8/6.9 EA RELEASE 6.10/6.10.1EA NEW FEATURES/ENHANCEMENTS IMPLEMENTED

HARNESSING THE HYBRID CLOUD TO DRIVE GREATER BUSINESS AGILITY

Data Sheet Gigamon Visibility Platform for AWS

IXIA NET TOOL OPTIMIZER 5204

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure

XGS2 CHASSIS PLATFORM

How CloudEndure Disaster Recovery Works

SteelConnect. The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN

OpenNebula on VMware: Cloud Reference Architecture

When (and how) to move applications from VMware to Cisco Metacloud

SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN

Introduction To Cloud Computing

SaaS. Public Cloud. Co-located SaaS Containers. Cloud

VMware Hybrid Cloud Solution

VirtuLocity VLN Software Acceleration Service Virtualized acceleration wherever and whenever you need it

Running MarkLogic in Containers (Both Docker and Kubernetes)

APPLICATION NOTE IXIA NOVUS 25GE SPEED OPTION INDUSTRY SPECIFICATIONS AND INTEROPERABILITY OVERVIEW

THE WORLD S BEST- CONNECTED DATA CENTERS EQUINIX MIDDLE EAST & NORTH AFRICA (MENA) Equinix.com

The State of Cloud Monitoring

CLOUD COMPUTING. Rajesh Kumar. DevOps Architect.

The Cisco HyperFlex Dynamic Data Fabric Advantage

SYMANTEC DATA CENTER SECURITY

XGS2 CHASSIS PLATFORM

Hedvig as backup target for Veeam

VirtuLocity VLNCloud Software Acceleration Service Virtualized acceleration wherever and whenever you need it

Migrating Enterprise Applications to the Cloud Session 672. Leighton L. Nelson

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview

VMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017

Pulse Secure Application Delivery

FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS

Designing MQ deployments for the cloud generation

SOLUTION BRIEF RSA NETWITNESS SUITE & THE CLOUD PROTECTING AGAINST THREATS IN A PERIMETER-LESS WORLD

PCI DSS Compliance. White Paper Parallels Remote Application Server

MICRO-SEGMENTATION FOR CLOUD-SCALE SECURITY TECHNICAL WHITE PAPER

Product Brief GigaVUE-VM

Introduction to Amazon Cloud & EC2 Overview

NGF0502 AWS Student Slides

Cloud Connect. Gain highly secure, performance-optimized access to third-party public and private cloud providers

MICRO-SEGMENTATION FOR CLOUD-SCALE SECURITY TECHNICAL WHITE PAPER

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati

BMC Remedyforce Discovery and Client Management. Frequently asked questions

CloudVision Macro-Segmentation Service

NTT Com Press Conference March 1, 2016 #enterprisecloud

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Global IP Network (GIN) Connects You to the World

Defining Security for an AWS EKS deployment

Capgemini Dynamic Services

IBM Security Access Manager

Easily Managing Hybrid IT with Transformation Technology

Exam : Title : IBM Cloud Computing Infrastructure Architect V1. Version : Demo

Resiliency Replication Appliance Installation Guide Version 7.2

GIGABIT ETHERNET XMVR LAN SERVICES MODULES

SteelConnect. The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN

CHEM-E Process Automation and Information Systems: Applications

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

Cloud & container monitoring , Lars Michelsen Check_MK Conference #4

Implementing Microsoft Azure Infrastructure Solutions (20533)

Module Day Topic. 1 Definition of Cloud Computing and its Basics

Best Practices in Securing a Multicloud World

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

by Cisco Intercloud Fabric and the Cisco

VMWARE CLOUD FOUNDATION: THE SIMPLEST PATH TO THE HYBRID CLOUD WHITE PAPER AUGUST 2018

Oracle IaaS, a modern felhő infrastruktúra

Cisco CloudCenter Solution with VMware

Data Sheet GigaSECURE Cloud

Build your own Cloud on Christof Westhues

HySecure Quick Start Guide. HySecure 5.0

Multi Packed Security Addressing Challenges in Cloud Computing

Transform Your Enterprise Search and ediscovery on the AWS Cloud.

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust

RELEASE SUMMARY IXIA BREAKINGPOINT 8.10, 8.13, AND 8.20 FEATURES

Modernizing Business Intelligence and Analytics

Cloud Computing: Making the Right Choice for Your Organization

Transcription:

CLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY ORGANIZATIONS NEED VISIBILITY TO SECURE AND MONITOR THEIR CLOUD ENVIRONMENTS Organizations are migrating workloads to the cloud because it offers scale, agility and flexibility. These organizations require visibility to adhere to their security, compliance and monitoring policies in the public, private and hybrid cloud. However, traditional visibility solutions are unable to address the key considerations of providing visibility in the cloud: Customers do not have access to the physical infrastructure or hypervisors so traditional, physical visibility solutions cannot be used Public cloud is a multi-tenant, distributed architecture. There is no defined space where an organization s data exists, making it difficult to capture data Public cloud security is a shared and often misunderstood responsibility between CSPs and customers Cloud is dynamic, so instances are transient by nature a moving target that is hard to track Many organizations use multiple cloud vendors, to avoid vendor lock-in, along with private data centers requiring visibility across a complex environment HIGHLIGHTS Multi-platform capable, cloud service provider and platform agnostic Auto-scales elastically, on-demand with cloud instances Handles cloud scale tested to thousands of instances No additional infrastructure or any architectural changes Provided Software-as-a-Service (SaaS) requires minimal management and is always available. Reduces error with minimal setup and ongoing management Easy-to-use, drag-and-drop interface with a network to tools layout Pay-per-use model Organizations may need to move data from one cloud service provider to another, or backhaul to the data center Any visibility solution must retain the cloud benefits of flexibility, elasticity, and agility CLOUDLENS PUBLIC IS THE FIRST SOFTWARE-AS-A-SERVICE NETWORK VISIBILITY SOLUTION Ixia's CloudLens is the first software-as-aservice (SaaS), network-level solution 915-3734-01 Rev C Page 1

that provides Visibility-as-a-Service (VaaS) for public, private and hybrid cloud. Designed from scratch for those environments, it is able to deliver the elastic scale, flexibility, and agility benefits of the cloud in a visibility platform. CloudLens provides users an intelligent and automated cloud visibility platform: It is multi-platform capable and supports all leading platforms. o o CloudLens cloud service provider or platform agnostic and supports Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform, IBM Bluemix, Alibaba Cloud, Century Link Cloud, and any other CSP platform. Supports leading hypervisors including VMware and KVM/Openstack for on-premises and private cloud environments Supports both Windows and Linux workloads It is low impact it requires no architectural changes or additional infrastructure Has a cloud visibility ecosystem for seamless operation with leading security, performance and monitoring tools, both open-source and commercial. USE CASES: Large enterprises applying a hybrid model using public cloud, private cloud and on premises environments CloudLens can backhaul data securely to existing tools or route to cloud-native tools Organizations with a many or multi-cloud strategy, orchestrated or not, because CloudLens is cloud service provider and agnostic. It can securely send data cross-csp or collect data concurrently from multi-cloud application deployments Organization that have fully migrated to a public cloud implementation CloudLens is cloud-native and offers the scale, flexibility and agility of cloud. HOW IT WORKS: There are two components of CloudLens which work together to enable visibility in the cloud: A SaaS visibility management platform. This is where users can configure visibility and define filtering. It is accessible from anywhere and always available. Sensors and connectors: software that sits within the source and tool instances respectively. The sensors and connectors are how CloudLens has full access to rich metadata because they sit within instances. They can be Docker-container or Agent based versions, and they all communicate over a secure VPN tunnel. 915-3734-01 Rev C Page 2

Using CloudLens is simple Load sensors within the source and tool instances, create source and tool groups based on their characteristics, draw a visibility path and configure filters. After that, the solution is ready to auto-scale. Since CloudLens has Docker-containers or Agents that sit in a customer s instances, it has access to metadata, which is information about the instances that a cloud service provider provides. From the source instance, they can identify the Cloud Service Provider (AWS, Azure, IBM), Region, Availability Zone, Kernel module, CPU and memory etc. and from the tool instance, they can determine if the tool is an APM, NPM, IDS or SIEM. This metadata is sent from the sensors to the management platform. CloudLens uses this metadata and makes it available to users as searchable criteria a way for users to easily organize their instances into named groups. Once instances are grouped, data paths are easily configured in the SaaS management platform and filters can be applied. Filters are set at the sensor in the source instance, so only filtered packet data goes to the tools. No packet data is ever sent to the management portal. Also, because CloudLens Public uses metadata, when a new instance appears or disappears, the platform automatically knows where it belongs based on group criteria. Consequently, the correct security and monitoring policies will be applied: for example, which instances traffic need to go an IDS vs. a SIEM. That data is then routed to the correct tools without the need for human intervention reducing chance of error and saving time. The sensors also have built-in load balancing and recognize immediately if a monitoring tool is taken out of service. This also means that customers are only using and paying for what they need, which eliminates the guesswork around peak-demand sizing. Filtered packet data is sent from source to tool instances via a secure visibility path an encrypted overlay tunnel via a peer-to-peer VPN. This guarantees security and confidentiality when data goes any-cloud service provider (AWS, Azure, IBM etc.) to anycloud (public, private or hybrid). Finally, Ixia further simplifies use with its growing Cloud Visibility Ecosystem technology partners who have pre-validated CloudLens, so the connector is already loaded to their tool instances. All users need to do is set up their source instances and the rest is done. Again, this reduces error and eliminates manual configuration. The sensors and connectors also work in private cloud environments and data centers, allowing seamless visibility integration across public cloud and virtualized private environments. 915-3734-01 Rev C Page 3

KEY FEATURES: CLOUD-NATIVE SERVERLESS ARCHITECTURE Elastic scale, on-demand Elastically scales on-demand so visibility auto-scales along with the instances monitored and the cluster of instances that are needed to do the monitoring Tested to handle thousands of instances in large-scale implementations Pay for only what you use Cloud service provider agnostic Capable of using metadata from any cloud service provider platform to provide visibility Does not require architectural changes SaaS implementation means Ixia does the heavy lifting behind the scenes. So, you don t have to change anything. DOCKER CONTAINER / AGENT-BASED COMPONENT Inherent security Uses a secure visibility path to transfer filtered packets. It is an encrypted overlay tunnel via a peer-to-peer VPN tunnel Embedded within the instance structure, so it eliminates the risk of cross tenant violations Runs from behind SSL offload services, eliminating the need for decryption Works in private cloud & data center Easy installation of Docker-based component or Windows agent in public, hybrid, or private environments for seamless visibility Filter at the source Eliminates single point of failure: filters and load-balances packet data at each source instance, so an inline virtual packet broker does not become a single point of failure in the network Reduces bandwidth to tools by filtering packets at the source instances, eliminating unwanted traffic so tools operate optimally Metadata Access Improves scalability because instances can be grouped automatically as they spin-up, ensuring the correct security monitoring policies are affected immediately EASY TO USE INTERFACE Easy setup & management Simple setup process that takes minutes not hours. Reduce Error No CLI, mapping or per-instance configuration. Just drag-and-drop. CLOUD VISIBILITY ECOSYSTEM Streamline setup One less step in the setup process. Best in class solution Leading security, monitoring and performance tools, pre-configured to work with CloudLens. 915-3734-01 Rev C Page 4

SPECIFICATIONS Browsers Operating Systems Cloud Service Provider platforms Chrome & Firefox Linux OS: Amazon AMI, CentOS 7, Ubuntu, RHEL o All Linux AMI are tested on x86_64 architect o Host Linux kernel must be version 3.1 or higher Windows OS o All 64-bit Windows OS Amazon Web Services (AWS) Microsoft Azure Google Cloud Platform IBM Bluemix Alibaba Cloud Century Link Cloud Other CloudLens can support any cloud, contact us to learn more IXIA WORLDWIDE 26601 W. AGOURA ROAD CALABASAS, CA 91302 (TOLL FREE NORTH AMERICA) 1.877.367.4942 (OUTSIDE NORTH AMERICA) +1.818.871.1800 (FAX) 818.871.1805 www.ixiacom.com Keysight Technologies, 2017 IXIA EUROPE CLARION HOUSE, NORREYS DRIVE MAIDENHEAD SL6 4FL UNITED KINGDOM SALES +44.1628.408750 (FAX) +44.1628.639916 IXIA ASIA PACIFIC 101 THOMSON ROAD, #29-04/05 UNITED SQUARE, SINGAPORE 307591 SALES +65.6332.0125 (FAX) +65.6332.0127 915-3734-01 Rev C Page 5