SlideShare une entreprise Scribd logo
1  sur  39
SecurActive workshop "Why a network behaviour analysis solution is now indispensable for the management of your network?“ 18th November, 2009
Agenda 9.00: Welcome - Coffee and croissants  9.35 : Conference and Exchanges: "Why a network behaviour analysis solution is now indispensable for the management of your network?“ the new challenges for Network and Security managers NBA solutions: vital tools for your daily network management SecurActive NSS, an innovative Network Behavior Analysis solution  10h30 : Overview of SecurActive NSS in a real environment © 2009 SecurActive. Proprietary and Confidential
© 2009 SecurActive. Proprietary and Confidential SecurActive overview
Corporate Profile ,[object Object]
 Develop and sell SecurActive NSS, the new network & application performance analysis solutions
 Distributed throughout Western Europe through a1 tier channel
European leader of the Network Behavior AnalysisMarket (“Red Herring 100 Europe Winner” 2008)© 2009 SecurActive. Proprietary and Confidential
More than 450 customers in Western Europe © 2009 SecurActive. Proprietary and Confidential
© 2009 SecurActive. Proprietary and Confidential The new challenges of your daily network  management
NBA addresses the growing complexity of network administration © 2009 SecurActive. Proprietary and Confidential Fast changing  & unclear perimeters  of private networks  (remote users, partners,  remote sites, providers, etc.) Change in user behaviour (more demanding, varied usages ,  growing autonomy)‏ Most varied usage of  network and frequent  deployment of new  applications Increased need for permanent view on network behaviour Frequent modifications  of network architecture (fusion, acquisition,  new venture, etc.)‏
© 2009 SecurActive. Proprietary and Confidential Unclear perimeters  of private networks  Change in user behaviour New Network Usage More demanding Networks are growing up and are much more complex to manage Varied usages Growing autonomy Frequent modifications  of network architecture
© 2009 SecurActive. Proprietary and Confidential Complexity Visibility
Network  Behaviour  Analysis NBA stands for © 2009 SecurActive. Proprietary and Confidential
© 2009 SecurActive. Proprietary and Confidential Overview of NBA solutions
© 2009 SecurActive. Proprietary and Confidential Capture of strategic  flows on the  corporate network Private network security Track non compliant usage,  incidents and security breaches Diagnosis Analysis & network / security  incident resolution  Analysis of Network  and Application behaviour Monitoring, planning & decision making Main features of a NBA solution NBA Solution IP Flow analysis Storage, presentation
Main features of a NBA solution © 2009 SecurActive. Proprietary and Confidential Capture of strategic flows NBA Solution IP Flow analysis Storage, presentation Diagnostic  and Troubleshooting Private  network security Analysis of Network  and Application behaviours
How should a perfect NBA solutions be? Increase the effectiveness of an IT team and make network management easier Simple and intuitive to use Configuration of the solution has to be made according to your business context Understand the real behaviour of the network No change in the network architecture (no additional point of failure) A passive implementation Personalised reports and alerting modules Work free-minded
© 2009 SecurActive. Proprietary and Confidential SecurActive NSS, a NBA solution
Dashboard Network map Graphs Details SecurActive NSS’s  - Our Approach SecurActive NSS approach Classical network analysis approach Large volume of data to be analysed 1 to 5 clicks from synthesis to detail Report © 2009 SecurActive. Proprietary and Confidential
SecurActive, a NBA solution Network usage  and flow mapping Security/Network Application  Performance Capture of strategic flows
SecurActive How it works? © 2009 SecurActive. Proprietary and Confidential Dashboard Network map Graphs Details Queryengine GUI Report Alert Storage Alertengine Business Context Network aggregation Security aggregation NSS Sniffer
SecurActive NSS, a NBA Solution © 2009 SecurActive. Proprietary and Confidential
A passive, agentless deployment in your Network © 2009 SecurActive. Proprietary and Confidential ,[object Object]
Agentless deployment
Appliance with 2 to 9 listening ports
Implementation via either a port mirroring or a TAPSecurActive Management SecurActive NSS SecurActive reporting Synthetic presentation based on client network ,[object Object]
IP Zones
Network and Security alertsListening ports Administration port
SecurActive – Range of solutions © 2009 SecurActive. Proprietary and Confidential NSS-800 8 GE + 2 SPF + 1 additional interface NSS-500 8 GE + 2 additional interfaces Performance NSS-200 7 GE (+1GE) Set of appliances to address every kind of needs. NSS-100 2GE +1FE (+1FE) NSS-10 2FE (+1 FE) Large Enterprise Remote Office/ Medium Enterprise
© 2009 SecurActive. Proprietary and Confidential Demonstration
Example of a Proof of Concept Analysis of your strategical traffic Switch – port mirroring SecurActive’s tuning ,[object Object]
IP Zones
Network and Security alerts
Reporting© 2009 SecurActive. Proprietary and Confidential Half a day
I want to centralise one of my vital applications
Server WAN network ERP ERP Wb Wa Main network Remote site
Server WAN network Wb ERP Wa Remote site Main network
Server WAN network Wb  Bandwidth analysis ERP Wa ,[object Object]
Application

Contenu connexe

Tendances

Hospitality ruckus wireless
Hospitality ruckus wirelessHospitality ruckus wireless
Hospitality ruckus wirelessayman khder
 
Simplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with CiscoSimplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with CiscoCisco Canada
 
Innovation at Meraki
Innovation at MerakiInnovation at Meraki
Innovation at MerakiCisco Canada
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPTomar awad
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewallCisco Canada
 
Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017Maticmind
 
Winhon Network Solution
Winhon Network SolutionWinhon Network Solution
Winhon Network SolutionJinzdm
 
RUCKUS Technical Family Day: Migrating to RUCKUS Cloud
RUCKUS Technical Family Day: Migrating to RUCKUS CloudRUCKUS Technical Family Day: Migrating to RUCKUS Cloud
RUCKUS Technical Family Day: Migrating to RUCKUS CloudPurdicom
 
CommScope RUCKUS Technical Family
CommScope RUCKUS Technical FamilyCommScope RUCKUS Technical Family
CommScope RUCKUS Technical FamilyPurdicom
 
Accelerating Enterprise Small Cell Deployments
Accelerating Enterprise Small Cell DeploymentsAccelerating Enterprise Small Cell Deployments
Accelerating Enterprise Small Cell DeploymentsCisco Service Provider
 
Iwan advantage-v2-140330172853-phpapp01
Iwan advantage-v2-140330172853-phpapp01Iwan advantage-v2-140330172853-phpapp01
Iwan advantage-v2-140330172853-phpapp01Boris Rojas
 
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN StrategyFlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN StrategyAmir Zmora
 
Ignite your network digitize your business
Ignite your network digitize your businessIgnite your network digitize your business
Ignite your network digitize your businessCisco Canada
 
Introduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier SolutionsIntroduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier SolutionsMichal Jarski
 

Tendances (20)

Hospitality ruckus wireless
Hospitality ruckus wirelessHospitality ruckus wireless
Hospitality ruckus wireless
 
Simplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with CiscoSimplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with Cisco
 
Innovation at Meraki
Innovation at MerakiInnovation at Meraki
Innovation at Meraki
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewall
 
Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017
 
ClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirementsClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirements
 
Spectralink airheads 2013
Spectralink airheads 2013Spectralink airheads 2013
Spectralink airheads 2013
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
Winhon Network Solution
Winhon Network SolutionWinhon Network Solution
Winhon Network Solution
 
RUCKUS Technical Family Day: Migrating to RUCKUS Cloud
RUCKUS Technical Family Day: Migrating to RUCKUS CloudRUCKUS Technical Family Day: Migrating to RUCKUS Cloud
RUCKUS Technical Family Day: Migrating to RUCKUS Cloud
 
CommScope RUCKUS Technical Family
CommScope RUCKUS Technical FamilyCommScope RUCKUS Technical Family
CommScope RUCKUS Technical Family
 
Aruba Atmosphere / Airheads 2014 Keerti Melkote Keynote
Aruba Atmosphere / Airheads 2014 Keerti Melkote KeynoteAruba Atmosphere / Airheads 2014 Keerti Melkote Keynote
Aruba Atmosphere / Airheads 2014 Keerti Melkote Keynote
 
Zoneflex , Ruckus Wireless
Zoneflex , Ruckus WirelessZoneflex , Ruckus Wireless
Zoneflex , Ruckus Wireless
 
Accelerating Enterprise Small Cell Deployments
Accelerating Enterprise Small Cell DeploymentsAccelerating Enterprise Small Cell Deployments
Accelerating Enterprise Small Cell Deployments
 
Iwan advantage-v2-140330172853-phpapp01
Iwan advantage-v2-140330172853-phpapp01Iwan advantage-v2-140330172853-phpapp01
Iwan advantage-v2-140330172853-phpapp01
 
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN StrategyFlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
 
Ignite your network digitize your business
Ignite your network digitize your businessIgnite your network digitize your business
Ignite your network digitize your business
 
Introduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier SolutionsIntroduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier Solutions
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 

Similaire à SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions

Network Functions Virtualization – Our Strategy
Network Functions Virtualization – Our StrategyNetwork Functions Virtualization – Our Strategy
Network Functions Virtualization – Our StrategyADVA
 
Cloud Services: Is the Transport Network a Utility or Differentiator
Cloud Services: Is the Transport Network a Utility or DifferentiatorCloud Services: Is the Transport Network a Utility or Differentiator
Cloud Services: Is the Transport Network a Utility or DifferentiatorADVA
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerADVA
 
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...ADVA
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpnRajesh Porwal
 
Implementing Cisco IP Switched Networks
Implementing Cisco IP Switched NetworksImplementing Cisco IP Switched Networks
Implementing Cisco IP Switched NetworksArchana Parameshwari
 
Cloud Camp Milan 2K9 Juniper Networks: Great Network behind the Cloud
Cloud Camp  Milan 2K9 Juniper Networks: Great Network behind the CloudCloud Camp  Milan 2K9 Juniper Networks: Great Network behind the Cloud
Cloud Camp Milan 2K9 Juniper Networks: Great Network behind the CloudGabriele Bozzi
 
Creating New Business Services for the IoT With Network Functions Virtualization
Creating New Business Services for the IoT With Network Functions VirtualizationCreating New Business Services for the IoT With Network Functions Virtualization
Creating New Business Services for the IoT With Network Functions VirtualizationADVA
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoThousandEyes
 
Nub8 & Federated Wireless.pptx
Nub8 & Federated Wireless.pptxNub8 & Federated Wireless.pptx
Nub8 & Federated Wireless.pptxOrlando F. Delgado
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Canada
 
Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...Aruba, a Hewlett Packard Enterprise company
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANRobb Boyd
 
Secure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsSecure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsADVA
 
Pure-Play Virtualization for Rural Broadband
Pure-Play Virtualization for Rural BroadbandPure-Play Virtualization for Rural Broadband
Pure-Play Virtualization for Rural BroadbandADVA
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Laying the Right Foundation for a Successful NFV, Amir Erez
Laying the Right Foundation for a Successful NFV, Amir ErezLaying the Right Foundation for a Successful NFV, Amir Erez
Laying the Right Foundation for a Successful NFV, Amir ErezCloud Native Day Tel Aviv
 

Similaire à SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions (20)

Network Functions Virtualization – Our Strategy
Network Functions Virtualization – Our StrategyNetwork Functions Virtualization – Our Strategy
Network Functions Virtualization – Our Strategy
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
Cloud Services: Is the Transport Network a Utility or Differentiator
Cloud Services: Is the Transport Network a Utility or DifferentiatorCloud Services: Is the Transport Network a Utility or Differentiator
Cloud Services: Is the Transport Network a Utility or Differentiator
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
Implementing Cisco IP Switched Networks
Implementing Cisco IP Switched NetworksImplementing Cisco IP Switched Networks
Implementing Cisco IP Switched Networks
 
Cloud Camp Milan 2K9 Juniper Networks: Great Network behind the Cloud
Cloud Camp  Milan 2K9 Juniper Networks: Great Network behind the CloudCloud Camp  Milan 2K9 Juniper Networks: Great Network behind the Cloud
Cloud Camp Milan 2K9 Juniper Networks: Great Network behind the Cloud
 
Creating New Business Services for the IoT With Network Functions Virtualization
Creating New Business Services for the IoT With Network Functions VirtualizationCreating New Business Services for the IoT With Network Functions Virtualization
Creating New Business Services for the IoT With Network Functions Virtualization
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
 
Nub8 & Federated Wireless.pptx
Nub8 & Federated Wireless.pptxNub8 & Federated Wireless.pptx
Nub8 & Federated Wireless.pptx
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
 
Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...Extend mobility to remote branch networks with Aruba's new cloud services con...
Extend mobility to remote branch networks with Aruba's new cloud services con...
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
Secure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsSecure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth Applications
 
2012 ah apj wi fi design for voice & video
2012 ah apj   wi fi design for voice & video2012 ah apj   wi fi design for voice & video
2012 ah apj wi fi design for voice & video
 
Pure-Play Virtualization for Rural Broadband
Pure-Play Virtualization for Rural BroadbandPure-Play Virtualization for Rural Broadband
Pure-Play Virtualization for Rural Broadband
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Laying the Right Foundation for a Successful NFV, Amir Erez
Laying the Right Foundation for a Successful NFV, Amir ErezLaying the Right Foundation for a Successful NFV, Amir Erez
Laying the Right Foundation for a Successful NFV, Amir Erez
 

Dernier

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

SecurActive - Technical Workshop - Network Analyser & Application Performance Management Solutions

  • 1. SecurActive workshop "Why a network behaviour analysis solution is now indispensable for the management of your network?“ 18th November, 2009
  • 2. Agenda 9.00: Welcome - Coffee and croissants 9.35 : Conference and Exchanges: "Why a network behaviour analysis solution is now indispensable for the management of your network?“ the new challenges for Network and Security managers NBA solutions: vital tools for your daily network management SecurActive NSS, an innovative Network Behavior Analysis solution 10h30 : Overview of SecurActive NSS in a real environment © 2009 SecurActive. Proprietary and Confidential
  • 3. © 2009 SecurActive. Proprietary and Confidential SecurActive overview
  • 4.
  • 5. Develop and sell SecurActive NSS, the new network & application performance analysis solutions
  • 6. Distributed throughout Western Europe through a1 tier channel
  • 7. European leader of the Network Behavior AnalysisMarket (“Red Herring 100 Europe Winner” 2008)© 2009 SecurActive. Proprietary and Confidential
  • 8. More than 450 customers in Western Europe © 2009 SecurActive. Proprietary and Confidential
  • 9. © 2009 SecurActive. Proprietary and Confidential The new challenges of your daily network management
  • 10. NBA addresses the growing complexity of network administration © 2009 SecurActive. Proprietary and Confidential Fast changing & unclear perimeters of private networks (remote users, partners, remote sites, providers, etc.) Change in user behaviour (more demanding, varied usages , growing autonomy)‏ Most varied usage of network and frequent deployment of new applications Increased need for permanent view on network behaviour Frequent modifications of network architecture (fusion, acquisition, new venture, etc.)‏
  • 11. © 2009 SecurActive. Proprietary and Confidential Unclear perimeters of private networks Change in user behaviour New Network Usage More demanding Networks are growing up and are much more complex to manage Varied usages Growing autonomy Frequent modifications of network architecture
  • 12. © 2009 SecurActive. Proprietary and Confidential Complexity Visibility
  • 13. Network Behaviour Analysis NBA stands for © 2009 SecurActive. Proprietary and Confidential
  • 14. © 2009 SecurActive. Proprietary and Confidential Overview of NBA solutions
  • 15. © 2009 SecurActive. Proprietary and Confidential Capture of strategic flows on the corporate network Private network security Track non compliant usage, incidents and security breaches Diagnosis Analysis & network / security incident resolution Analysis of Network and Application behaviour Monitoring, planning & decision making Main features of a NBA solution NBA Solution IP Flow analysis Storage, presentation
  • 16. Main features of a NBA solution © 2009 SecurActive. Proprietary and Confidential Capture of strategic flows NBA Solution IP Flow analysis Storage, presentation Diagnostic and Troubleshooting Private network security Analysis of Network and Application behaviours
  • 17. How should a perfect NBA solutions be? Increase the effectiveness of an IT team and make network management easier Simple and intuitive to use Configuration of the solution has to be made according to your business context Understand the real behaviour of the network No change in the network architecture (no additional point of failure) A passive implementation Personalised reports and alerting modules Work free-minded
  • 18. © 2009 SecurActive. Proprietary and Confidential SecurActive NSS, a NBA solution
  • 19. Dashboard Network map Graphs Details SecurActive NSS’s - Our Approach SecurActive NSS approach Classical network analysis approach Large volume of data to be analysed 1 to 5 clicks from synthesis to detail Report © 2009 SecurActive. Proprietary and Confidential
  • 20. SecurActive, a NBA solution Network usage and flow mapping Security/Network Application Performance Capture of strategic flows
  • 21. SecurActive How it works? © 2009 SecurActive. Proprietary and Confidential Dashboard Network map Graphs Details Queryengine GUI Report Alert Storage Alertengine Business Context Network aggregation Security aggregation NSS Sniffer
  • 22. SecurActive NSS, a NBA Solution © 2009 SecurActive. Proprietary and Confidential
  • 23.
  • 25. Appliance with 2 to 9 listening ports
  • 26.
  • 28. Network and Security alertsListening ports Administration port
  • 29. SecurActive – Range of solutions © 2009 SecurActive. Proprietary and Confidential NSS-800 8 GE + 2 SPF + 1 additional interface NSS-500 8 GE + 2 additional interfaces Performance NSS-200 7 GE (+1GE) Set of appliances to address every kind of needs. NSS-100 2GE +1FE (+1FE) NSS-10 2FE (+1 FE) Large Enterprise Remote Office/ Medium Enterprise
  • 30. © 2009 SecurActive. Proprietary and Confidential Demonstration
  • 31.
  • 34. Reporting© 2009 SecurActive. Proprietary and Confidential Half a day
  • 35. I want to centralise one of my vital applications
  • 36. Server WAN network ERP ERP Wb Wa Main network Remote site
  • 37. Server WAN network Wb ERP Wa Remote site Main network
  • 38.
  • 40. LAN
  • 42. The network does not have correct configuration for its back-up program.
  • 43. Situation Regional French newspaper group Has numerous news agencies, some of which are located in zones that are not equipped with high speed Internet access Some journalists have difficulties transmitting their articles on time because of a slow network. Without SecurActive No one is able to determine the cause of the slowdown. Simple ping measures are made and obtain normal results on the network’s lines at 64kbps. The problem persists for weeks. © 2009 SecurActive. Proprietary and Confidential
  • 44. People are complaining about my ERP. Why?
  • 45. TCP Connection Time © 2009 SecurActive. Proprietary and Confidential SYN SYNACK Connection Time ACK time Server Client WAN network
  • 46. Round Trip Time In © 2009 SecurActive. Proprietary and Confidential Data RTTin ACK time Server Client WAN network
  • 47. Round Trip Time Out © 2009 SecurActive. Proprietary and Confidential Data RTTout ACK time Server Client WAN network
  • 48. Application Response Time © 2009 SecurActive. Proprietary and Confidential Applicative request Applicative treatment ART 1stpacket of applicative response time Server Client WAN network
  • 49. Retransmission delay © 2009 SecurActive. Proprietary and Confidential Non-acknowledgedpacket RD time Server Client WAN network First acknowledgedpacket ACK
  • 50. Where are my misconfigured devices in my LAN?
  • 51. ICMP Errors © 2009 SecurActive. Proprietary and Confidential Client Server « Host unreachable »
  • 52. Why is my internet so slow?
  • 53. Situation This is a service company The work culture is liberal and there is complete trust on network users. Access to the Internet is usually slow Without SecurActive: poor quality of the link? the illegal use of the Internet? or the insufficient bandwidth? © 2009 SecurActive. Proprietary and Confidential
  • 54. © 2009 SecurActive. Proprietary and Confidential Conclusion
  • 55.
  • 57. Maximise the quality of your network
  • 58. Management of network suppliers (telcos) & SLAs
  • 59. Make best decisions on your network architecture
  • 61. Reduce costs and limit inefficient investments
  • 68. Have a proactive approach to quality of service
  • 69.