Data-Driven DevOps: Bringing Visibility to Any Cloud, Any App, & Any Device. Erik Giesa SVP of Marketing and Business Development, ExtraHop Networks

Similar documents
Rethink the Network It is more than just transport

The S in IoT is for Security Owning all the Things

Protecting Your SaaS Investment: Monitoring Office 365 Performance

VMware Cloud on AWS Technical Deck VMware, Inc.

Title DC Automation: It s a MARVEL!

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM

Powerful Insights with Every Click. FixStream. Agentless Infrastructure Auto-Discovery for Modern IT Operations

Cisco ISE Ports Reference

Exploring Cloud Security, Operational Visibility & Elastic Datacenters. Kiran Mohandas Consulting Engineer

The Business Case for Network Segmentation

Cisco ISE Ports Reference

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

Compare Security Analytics Solutions

Cisco CloudCenter Solution with Cisco ACI: Common Use Cases

Pluribus Adaptive Cloud Fabric

The Software Defined Data Centre & vsphere 6.5 The foundation of the hybrid cloud Barry Coombs

The Why, What, and How of Cisco Tetration

Cisco Tetration Analytics Demo. Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH

Features. HDX WAN optimization. QoS

Pluribus Adaptive Cloud Fabric Powering the Software-Defined Enterprise

Pasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP

Orchestration: Accelerate Deployments and Reduce Operational Risk. Nathan Pearce, Product Development SA Programmability & Orchestration Team

Corrigendum 3. Tender Number: 10/ dated

2018 Cisco and/or its affiliates. All rights reserved.

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Cisco ISE Ports Reference

NSX Data Center Load Balancing and VPN Services

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec

DevOps CICD PopUp. Software Defined Application Delivery Fabric. Frey Khademi. Systems Engineering DACH. Avi Networks

NetFlow Optimizer. Overview. Version (Build ) May 2017

Cisco ISE Ports Reference

Copyright 2018, Oracle and/or its affiliates. All rights reserved.

SYMANTEC DATA CENTER SECURITY

Transform to Your Cloud

Cisco Tetration Analytics

ExtraHop Platform Overview: Gain Control With Real-Time IT Analytics

Cloud, SDN and BIGIQ. Philippe Bogaerts Senior Field Systems Engineer

1V0-642.exam.30q.

SentryWire Next generation packet capture and network security.

SentryWire Next generation packet capture and network security.

War Stories from the Cloud Going Behind the Web Security Headlines. Emmanuel Mace Security Expert

Self-driving Datacenter: Analytics

Ordering and deleting Single-node Trial for VMware vcenter Server on IBM Cloud instances

Security Automation. Challenge: Automatizzare le azioni di isolamento e contenimento delle minacce rilevate tramite soluzioni di malware analysis

A10 HARMONY CONTROLLER

Avi Vantage Platform Architecture

Table of Contents HOL SLN

All Events. One Platform.

Cloudsourced Network Analytics

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

SEVONE END USER EXPERIENCE

Zero to Microservices in 5 minutes using Docker Containers. Mathew Lodge Weaveworks

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Cisco Application Centric Infrastructure

VMworld disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no

Data Sheet GigaSECURE Cloud

Cloudamize Agents FAQ

AAA (Authentication, Authorization, and Accounting) is a framework that contains protocols that control user access and resource tracking.

WHITEPAPER Linking ExtraHop Wire Data Analytics solution with the compliance module of macmon NAC

Elevate the Conversation: Put IT Resilience into Practice for Cloud Service Providers

ADC im Cloud - Zeitalter

Data Sheet Gigamon Visibility Platform for AWS

Cloud Essentials for Architects using OpenStack

Datacenter Security: Protection Beyond OS LifeCycle

Garantierte Serviceverfügbarkeit in einer hybriden IT

VMware vsphere: Install, Configure, Manage plus Optimize and Scale- V 6.5. VMware vsphere 6.5 VMware vcenter 6.5 VMware ESXi 6.

How to Troubleshoot Databases and Exadata Using Oracle Log Analytics

Cisco Tetration Analytics

Exam : Implementing Microsoft Azure Infrastructure Solutions

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Cisco Firepower NGFW. Anticipate, block, and respond to threats

VMware vcloud Networking and Security Overview

SD-WAN / Hybrid WAN : Leveraging SDN-NFV for Networks Agility

VMWARE ENTERPRISE PKS

Intelligent Edge Protection

The Critical Assets Filter for the SOC Focus discovery and analytics to expedite security investigations

VMWARE VSPHERE FEATURE COMPARISON

SharkFest 17 Europe. Defining a Requirements Based Packet Capture Strategy. John Pittle. 9 november Riverbed Technologies

SDN Security BRKSEC Alok Mittal Security Business Group, Cisco

Table of Contents HOL-SDC-1415

Delivering Visibility for Your Risk Management Framework

Identity Based Network Access

SAS and F5 integration at F5 Networks. Updates for Version 11.6

Securing Your Cloud Introduction Presentation

Private Cloud Public Cloud Edge. Consistent Infrastructure & Consistent Operations

The Evolution of Data Center Security, Risk and Compliance

Dynamic App Services in Containerized Environments

PLEXXI HCN FOR VMWARE ENVIRONMENTS

jetnexus Load Balancer

Introducing VMware Validated Designs for Software-Defined Data Center

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

SEVONE DATA APPLIANCE FOR EUE

Introducing VMware Validated Designs for Software-Defined Data Center

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

The Intent based Data Center. Kim In-Sook Manager, ASEAN Data Center Architect Team Jan 11, 2018

jetnexus Virtual Load Balancer

PSOACI Tetration Overview. Mike Herbert

Check Point DDoS Protector Introduction

Intent Driven Network Operations with AppFormix Advanced Analytics Platform. Joseph Li

Transcription:

Data-Driven DevOps: Bringing Visibility to Any Cloud, Any App, & Any Device Erik Giesa SVP of Marketing and Business Development, ExtraHop Networks

Your Monitoring Strategy Must Change How can you maintain visibility for this Any Cloud, Any App, & Any Device when your performance and security monitoring was built for this? Traditional IT Architecture

Everything transacts on the wire Brad Hedlund, Networking is a Service, and you are the Service Provider: http://bradhedlund.com/page/3/

Infrastructure Monitoring Application Performance Network Performance Business Process Monitoring...The complexity, modularity, and volatility of modern systems make it impossible to predict global states from local states. Will Cappelli and Vivek Bhalla, Gartner March 2016 Web Services Monitoring Cloud Monitoring Virtualization Monitoring Packet Capture Log Management Database Monitoring

APP IT VM DBA NETWORK STORAGE OPS

You Can t Orchestrate or Automate What You Can t See Software-defined datacenters Containerization Rapid deployments Orchestration & automation Zero-day events Security exposures/ data breaches Poor user experience Slow application roll-outs Application downtime War rooms

Data-Driven DevOps Taxonomy: See with Data it is wire data radically rethought and used in new ways that will prove to be the most critical source of data for availability and performance management over the next five years.... WIRE DATA REAL-TIME OBSERVED AND EMPIRICAL MACHINE DATA SYSTEM SELFREPORTED AGENT DATA PROBE DATA HOST INSTRUMENTED PERIODIC AND SCRITPED Will Cappelli and Vivek Bhalla, Gartner March 2016 Use Data and Analytics-Centric Processes with a Focus on Wire Data to Future Proof Availability and Performance Management GLOBAL STATE ALL L2-L7 COMMUNICATION AND ALL TRANSACTION L2-L7 COMMUNICATION AND DATA TRANSACTION DATA LOCAL STATE LOCAL STATE SAMPLED STATE LOGS, SNMP, WMI LOGS, SNMP, WMI NETFLOW, IPFIX, ETC. NETFLOW, IPFIX, ETC. HARDWARE, O/S, APPLICATION HARDWARE, O/S, APPLICATION CODE-LEVEL CODE-LEVEL EXTERNAL / INTERNAL EXTERNAL / INTERNAL SERVICE AVAILABILITY SERVICE AVAILABILITY

Real-Time Visibility for Any Cloud, Any App, & Any Device Automatic Discovery & Classification Unification Across Physical, Virtual, and Cloud Visibility & Event-Driven Orchestration Any device, app, or cloud Any network, VLAN, VXLAN or micro-segment Auto-map dependencies & relationships across full stack Automatically learn and build baselines for all devices and workloads Understand effects of cloud and SDN orchestration Measure and compare app performance before and after migration Track VMs as they move across the SDDC Fabric Cloud scale up to 40 Gbps throughput and 1.3 million HTTP TPS End-user experience monitoring End-to-end visibility for every transaction across the stack Validate security policies with continuous L2-L7 behavioral analysis Data-Driven DevOps Rapid customization: measure any information from the data stream in real-time.

To Structured Wire Data From Unstructured Packets Stream processing pre-processes All L2-L7 and communication analyzes all data-inflight the creating network on structured wire data Application Data Business Data Availability Data Security Data Performance Metrics Capacity Data POST Content AJAX Data Product ID Customer ID HTTP status codes Application errors Command and Control Shadow IT (SaaS, cloud) Caching Behavior Compression Behavior Throughput Transactions Section Sub-Section Page Title Session Cookie Shopping Cart ID Cart Items Cart Values Discounts Connection resets Heartbeats SSL certificate validity Synthetic pingers Network traversal Unauthorized outbound connections & protocols Storage/DB access Blacklisted traffic Base HTML Load Time Round Trip Time Client Request Time Server Reply Time Dropped packets Application stalls Application slowdowns Geolocation/ IP mapping Proxied IP Address Order ID SNMP traps Brute force attacks Server Send Time Storage Access (reads/writes) Error Message Abandoned? Authentication errors Surreptitious tunneling Total Time Taken SSL Offload

Simplified and Continuous Real-Time Visibility for the SDDC and DevOps REAL-TIME OPERATIONAL INTELLIGENCE NSX Manager vcenter Internet ER-SPAN Open Data Stream API ER-SPAN, SPAN, Network taps

VLANs Devices

Web LDAP Database DNS Storage Network

Orchestration & Migration Visibility for Any Workload VM APP cluster process time, network latency, and congestion analysis VM STORAGE cluster process time, network latency, and congestion analysis VM STORAGE cluster process time, network latency, and congestion analysis

Layer 2 Analysis Throughput, Frame Type, Frame Distribution etc. Layer 3 Analysis Packets/Bytes by Protocol, segments, Layer 4 Analysis Virtual Packet Loss, Top Talkers, Failures, TCP Analysis (RTO, Tinygrams, Zero Windows, Nagle Delays) Orchestration Policy Questions Can the existing network support a new workload? Should I create a new network? Should I vmotion a workload? Where should I vmotion?

Orchestration Policy ANSWERS Web performance & errors Did the migration work? Was there an impact on the end-user or workload? Is it performing better, worse or the same? Database performance and errors

Security Control Auditing for Any System, App, or Cloud EXPIRED certificates: where, when and how much SOON TO BE EXPIRED certificates: where, when and how much COMPLIANT and NON- COMPLIANT Ciphers, SSL, and TLS versions: where, who, how much, when

BEHAVIORAL Anomaly Detection Unusual data transfers? Anomalous methods used? Unauthorized protocols? Failed and successful login attempts: who, when, where, and what? Is all PII data encrypted while in flight? Any behavior can now be observed and analyzed.

Web Services SLA Governance

Real-Time Business Analytics for Any App or Business Real-time revenue analysis Correlate infrastructure and app performance with business processes Understand and correlate IT investment with business performance

ExtraHop Open Data Stream Wire Data VMware REAL-TIME stream processing, analysis, and visualization Visualization Tools Other ITOA Data Sources Non-Proprietary NoSQL DB Machine Agent Probe Human AND/OR

Delivering Performance, Security, and Business Analysis for Any Cloud, App, or Device REAL-TIME OPERATIONAL INTELLIGENCE FOR SDDC PROACTIVE MONITORING & REMEDIATION OPTIMIZATION & CONTINUOUS IMPROVEMENT PERVASIVE SECURITY MONITORING & COMPLIANCE BUSINESS & OPERATIONS ANALYTICS

NEXT STEPS Visit us in our booth to see an in-person demo OR Try our interactive online demo: www.extrahop.com/demo