SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
Don’t Let History Repeat Itself
     Network Monitoring and Reporting with
                 WatchPoint
                                    Show us your tweets!
                                       Use today’s webinar hashtag:
Jay Botelho
Director of Product Management          #wp_watchpoint
WildPackets                      with any questions, comments, or feedback.
jbotelho@wildpackets.com                   Follow us @wildpackets

                                                   © WildPackets, Inc.   www.wildpackets.com
Agenda
•   Key Technologies in Network Reporting
•   Limitations in Single Technology Approaches
•   Why WatchPoint
•   WatchPoint v2.0 Demo
     ‒   Determining long-term trends using WatchPoint
     ‒   Troubleshooting ongoing issues with WatchPoint
     ‒   Generating detailed, scheduled reports
     ‒   Linking directly from high-level reporting to detailed packet
         analysis
• Company Overview
• Product Line Overview
                                  WatchPoint v2.0            © WildPackets, Inc.   2
Key Technologies in Network
        Reporting




                     © WildPackets, Inc.   www.wildpackets.com
Choices and Comprises


                                                  Packet-based
Data Granularity




                            Flow-based


                     SNMP


                              Data Accuracy
                              Overhead???
                              Cost???
                                WatchPoint v2.0                  © WildPackets, Inc.   4
SNMP
• Best used to identify and describe system
 configuration
• Monitor network-attached devices for high-level
 conditions
   ‒ Up/Down
   ‒ Total traffic (bytes, packets)
   ‒ Number of users
• Typically polling-based – heavy bandwidth impact
• Typically 5 second granularity
• Trouble-shooting/root cause analysis not possible


                               WatchPoint v2.0   © WildPackets, Inc.   5
"Go With the Flow"
• Flows, or flow records, have become the default
  element used in centralized network monitoring
• A ―flow‖ is a sequence of packets that has the
  following seven identical characteristics:
   ‒   Source IP address
   ‒   Destination IP address
   ‒   Source port
   ‒   Destination port
   ‒   Layer 3 protocol type
   ‒   TOS byte
   ‒   Input logical interface
• By implication, a flow is unidirectional


                                 WatchPoint v2.0   © WildPackets, Inc.   6
Packet-based - OmniFlow
• Developed by WildPackets
• Analysis of every packet AND payload
• Unrivaled info for each flow
• Layer 3 - 7
• 100% accurate
• Minimal network impact – 10’s of Kbps
• Monitor AND troubleshoot



                        WatchPoint v2.0   © WildPackets, Inc.   7
Limitations in Single Technology
          Approaches




                        © WildPackets, Inc.   www.wildpackets.com
Not All Data Sources Are Created Equal
      Netflow                 sFlow                        OmniFlow              Packets
• Developed by         • RFC 3176                 • Developed by         • RFC 1122
  Cisco                • sFlow agents               WildPackets

• Transit and          • Statistical              • Analysis of every    • Every packet
  terminated traffic     sampling                   packet AND             recorded
                       • Higher speed               payload              • Detailed
                         networks                                          troubleshooting
• Detailed info for    • Time-based               • Unrivaled info for   • Layer 2 - 7
  each flow              sampling of                each flow            • Apdex, Latency,
                         interface counters                                Reconstruction, …
• NO packets           • NO packets               • Links to packets     • Packets with
                                                                           network forensics
• Sampled – not        • Sampled – not            • 100% accurate        • 100% accurate
  100% accurate          100% accurate


                                         WatchPoint v2.0                    © WildPackets, Inc.   9
It’s All In The Packets
                                            Detailed errors
                                            automatically
                                            identified, with
                                            alerts


One click identifies
the user and
application
                                                    One more click
                                                    identifies the root
                                                    cause of the issue




                          WatchPoint v2.0                 © WildPackets, Inc.   10
Why WatchPoint?




              © WildPackets, Inc.   www.wildpackets.com
WatchPoint v2.0 Delivers
• 100% data accuracy
   ‒ Stop wondering if your monitoring solution is missing key results
• Detailed network history
   ‒ No loss of granularity for historical data
• Complete visibility
   ‒ From global network usage to detailed packet analysis for root-
     cause analysis in a single solution
   ‒ SNMP, NetFlow, sFlow, OmniFlow integrated into a single
     solution
• Immediate access to worldwide network data
   ‒ Monitor network usage and drill-down into specifics at the speed
     of a click

                               WatchPoint v2.0         © WildPackets, Inc.   12
WildPackets Comprehensive Solutions




                WatchPoint v2.0   © WildPackets, Inc.   13
Enterprise-wide Network Management




               WatchPoint v2.0   © WildPackets, Inc.   14
WatchPoint Benefits
• For CIOs
   ‒ High-level, instantaneous view of entire enterprise-wide network
   ‒ Quickly identify anomalistic network behavior
   ‒ Network usage, compliance, SLA reporting
• For IT Managers
   ‒ Centrally managed monitoring solution
   ‒ Configure access based on role and usage
   ‒ Modify reports on-the-fly to see the data you need
• For Network Engineers
   ‒ Find and fix network issues before they become major problems
   ‒ Correlate WatchPoint data with OmniEngine packet files for
     detailed, post-capture analysis

                             WatchPoint v2.0              © WildPackets, Inc.   15
What’s New in WatchPoint v2
• Comprehensive network monitoring via SNMP,
 NetFlow, sFlow and OmniFlow
• Pre-built and custom reports
• SLA monitoring of key network elements
   ‒ Alerts, Alarms, Notifications
• Detailed drill-down into utilization, flows, and
 conversations
• OmniFlow enhancements
   ‒ Direct access to packets
   ‒ Aggregated reporting of Expert events
   ‒ Aggregated reporting of VoIP statistics

                               WatchPoint v2.0   © WildPackets, Inc.   16
WatchPoint v2.0 Demo




                 © WildPackets, Inc.   www.wildpackets.com
WatchPoint 2.0 At-A-Glance
• Detailed, precise, conversation-based analysis
   ‒ Eliminates inaccuracies from polling/sampling-based solutions
• 1 minute history – ALWAYS
   ‒ Never time-averaged historical data
• Tight integration into packet analysis – one solution
• Global reporting of Expert and VoIP analysis for
 investigation of real-time or historical problems




                             WatchPoint v2.0          © WildPackets, Inc.   18
Company Overview




               © WildPackets, Inc.   www.wildpackets.com
Corporate Background
• Experts in network monitoring, analysis, and troubleshooting
   ‒ Founded: 1990 / Headquarters: Walnut Creek, CA
   ‒ Offices throughout the US, EMEA, and APAC


• Our customers are leading edge organizations
   ‒ Mid-market, and enterprise lines of business
   ‒ Financial, manufacturing, ISPs, major federal agencies,
     state and local governments, and universities
   ‒ Over 7,000 customers / 60+ countries / 80% of Fortune 1,000


• Award-winning solutions that improve network performance
   ‒ Internet Telephony, Network Magazine, Network Computing Awards
   ‒ United States Patent 5,787,253 issued July 28, 1998
        • Different approach to maintaining availability of network services

                                  WatchPoint v2.0              © WildPackets, Inc.   20
Real-World Deployments
    Education          Financial          Government




Health Care / Retail   Telecom            Technology




                        WatchPoint v2.0    © WildPackets, Inc.   21
Product Line Overview




                  © WildPackets, Inc.   www.wildpackets.com
Product Line Overview
              OmniPeek/Compass
Enterprise Packet Capture, Decode and Analysis
    • 10/100/1000 Ethernet, Wireless, WAN, 10G
    • Portable capture and OmniEngine console
    • VoIP analysis and call playback


                Omnipliance / TimeLine
     Distributed Enterprise Network Forensics
            • Packet capture and real-time analysis
            • Stream-to-disk for forensics analysis
            • Integrated OmniAdapter network analysis cards


                             WatchPoint
  Centralized Enterprise Network Monitoring Appliance
          • Aggregation and graphical display of network data
          • WildPackets OmniEngines
          • NetFlow and sFlow

                                    WatchPoint v2.0             © WildPackets, Inc.   24
OmniPeek Network Analyzer
• OmniEngine Manager
   – Connect and configure distributed OmniEngines/Omnipliances
• Comprehensive dashboards present network traffic in real-time
   – Vital statistics and graphs display trends on network and application
     performance
   – Visual peer-map shows conversations and protocols
   – Intuitive drill-down for root-cause analysis of performance bottlenecks
• Visual Expert diagnosis speeds problem resolution
   – Packet and Payload visualizers provide business-centric views
• Automated analytics and problem detection 24/7
   – Easily create filters, triggers, scripting, advanced alarms and alerts




                                  WatchPoint v2.0              © WildPackets, Inc.   25
Omnipliance Network Recorders
•   Captures and analyzes all network traffic 24x7
     – Runs our OmniEngine software probe
     – Generates vital statistics on network and application performance
     – Intuitive root-cause analysis of performance bottlenecks
•   Expert analysis speeds problem resolution
     – Fault analysis, statistical analysis, and independent notification
•   Multiple Issue Digital Forensics
     – Real-time and post capture data mining for compliance and troubleshooting
•   Intelligent data transport
     –   Network data analyzed locally
     –   Detailed analysis passed to OmniPeek on demand
     –   Summary statistics sent to WatchPoint for long term trending and reporting
     –   Efficient use of network bandwidth
•   User-Extensible Platform
     – Plug-in architecture and SDK

                                       WatchPoint v2.0                  © WildPackets, Inc.   26
Omnipliance Network Recorders
Price/performance solutions for every application




        Portable                        Edge                        Core
        Ruggedized                 Small Networks         Datacenter Workhorse
      Troubleshooting              Remote Offices          Easily Expandable
 Aluminum chassis / 17” LCD   1U rack mountable chassis   3U rack mountable chassis
 Quad-Core Xeon 2.5GHz        Quad-Core Intel Xeon        Two Quad-Core Intel Xeon
                              X3460 2.80Ghz               E5530 2.4Ghz
 4GB RAM                      4GB RAM                     6GB RAM
 2 PCI-E Slots                2 PCI-E Slots               4 PCI-E Slots
 2 Built-in Ethernet Ports    2 Built-in Ethernet Ports   2 Built-in Ethernet Ports
 500GB and 2.5TB SATA         1TB SATA storage capacity   2TB SATA storage capacity
 storage capacity
                                        WatchPoint v2.0                        © WildPackets, Inc.   27
TimeLine
• Fastest network recording and real-time statistical
 display — simultaneously
   ‒ 11.7Gbps sustained capture with zero packet loss
   ‒ Network statistics display in TimeLine visualization format
• Rapid, intuitive forensics search and retrieval
   ‒ Historical network traffic analysis and quick data rewinding
   ‒ Several pre-defined forensics search templates making
     searches easy and fast
• A natural extension to the WildPackets product line
• Turnkey bundled solution
   ‒ Appliance + OmniEngine, OmniAdapter, OmniPeek Connect


                              WatchPoint v2.0           © WildPackets, Inc.   28
TimeLine
For the most demanding network analysis tasks




                             TimeLine

                        10g Network Forensics

        3U rack mountable chassis
        Two Quad-Core Intel Xeon 5560 2.8Ghz
        18GB RAM
        4 PCI-E Slots
        2 Built-in Ethernet Ports
        8/16/32TB SATA storage capacity



                                    WatchPoint v2.0   © WildPackets, Inc.   29
WatchPoint
Centralized Monitoring for Distributed Enterprise Networks

                                            •   High-level, aggregated
                                                view of all network
                                                segments
                                                 – Monitor per campus, per
                                                   region, per country
                                            •   Wide range of network
                                                data
                                                 – NetFlow, sFlow, OmniFlow
                                            •   Web-based, customizable
                                                network dashboards
                                            •   Flexible detailed reports
                                            •   Omnipliances must be
                                                configured for continuous
                                                capture
                          WatchPoint v2.0                   © WildPackets, Inc.   30
WildPackets Key Differentiators
• Visual Expert Intelligence with Intuitive Drill-down
    – Let computer do the hard work, and return results, real-time
    – Packet / Payload Visualizers are faster than packet-per-packet diagnostics
    – Experts and analytics can be memorized and automated
• Automated Capture Analytics
    – Filters, triggers, scripting and advanced alarming system combine to provide
      automated network problem detection 24x7
• Multiple Issue Network Forensics
    – Can be tracked by one or more people simultaneously
    – Real-time or post capture
• User-Extensible Platform
    – Plug-in architecture and SDK
• Aggregated Network Views and Reporting
    – NetFlow, sFlow, and OmniFlow


                                     WatchPoint v2.0                © WildPackets, Inc.   31
Thank You!


WildPackets, Inc.
1340 Treat Boulevard, Suite 500
Walnut Creek, CA 94597
(925) 937-3200

                                    © WildPackets, Inc.   www.wildpackets.com

Contenu connexe

Tendances

Cisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation BranchCisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation BranchCisco Canada
 
PathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TVPathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TVAndrew Tram
 
Too soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessmentToo soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessmentSergey Gordeychik
 
Brocade/VMware Customer Presentation
Brocade/VMware Customer Presentation Brocade/VMware Customer Presentation
Brocade/VMware Customer Presentation Brocade
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking PointMUK Extreme
 
Innovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceInnovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceCisco Canada
 
Technical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesTechnical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesCisco Mobility
 
Ignite your network digitize your business
Ignite your network digitize your businessIgnite your network digitize your business
Ignite your network digitize your businessCisco Canada
 
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Canada
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Cisco Enterprise Networks
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the NetworkCisco Canada
 
Nss labs-report-Palo_Alto_Networks-2011
Nss labs-report-Palo_Alto_Networks-2011Nss labs-report-Palo_Alto_Networks-2011
Nss labs-report-Palo_Alto_Networks-2011He Hariyadi
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileAliza Ayub
 
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and SolutionsSecuring NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and SolutionsTrinath Somanchi
 
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabNSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabCisco Canada
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 

Tendances (20)

Juniper Services and Support
Juniper Services and SupportJuniper Services and Support
Juniper Services and Support
 
Cisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation BranchCisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation Branch
 
PathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TVPathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TV
 
Too soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessmentToo soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessment
 
Brocade/VMware Customer Presentation
Brocade/VMware Customer Presentation Brocade/VMware Customer Presentation
Brocade/VMware Customer Presentation
 
CV Steve Shawcross
CV Steve ShawcrossCV Steve Shawcross
CV Steve Shawcross
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking Point
 
Innovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceInnovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching Space
 
Technical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesTechnical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switches
 
Preparing Your Network for 802.11ac Wave 2
Preparing Your Network for 802.11ac Wave 2Preparing Your Network for 802.11ac Wave 2
Preparing Your Network for 802.11ac Wave 2
 
Ignite your network digitize your business
Ignite your network digitize your businessIgnite your network digitize your business
Ignite your network digitize your business
 
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the Network
 
Nss labs-report-Palo_Alto_Networks-2011
Nss labs-report-Palo_Alto_Networks-2011Nss labs-report-Palo_Alto_Networks-2011
Nss labs-report-Palo_Alto_Networks-2011
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_Profile
 
Vision one-customer
Vision one-customerVision one-customer
Vision one-customer
 
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and SolutionsSecuring NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
Securing NFV and SDN Integrated OpenStack Cloud: Challenges and Solutions
 
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabNSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 

Similaire à Don't Let History Repeat Itself – Network Monitoring and Reporting with WatchPoint

Just two clicks away - from monitoring and reporting to root-cause analysis
Just two clicks away - from monitoring and reporting to root-cause analysisJust two clicks away - from monitoring and reporting to root-cause analysis
Just two clicks away - from monitoring and reporting to root-cause analysisSavvius, Inc
 
The blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysisThe blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysisSavvius, Inc
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksSavvius, Inc
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Savvius, Inc
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshopSTelligence Company
 
Best Practices for Analyzing VoIP at 10G
Best Practices for Analyzing VoIP at 10GBest Practices for Analyzing VoIP at 10G
Best Practices for Analyzing VoIP at 10GSavvius, Inc
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network Savvius, Inc
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Savvius, Inc
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acSavvius, Inc
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?Savvius, Inc
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableSavvius, Inc
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisSavvius, Inc
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New YearSavvius, Inc
 
Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac DataSavvius, Inc
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Ixia NVS Group
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Savvius, Inc
 
Netrounds Product Sheet
Netrounds Product SheetNetrounds Product Sheet
Netrounds Product SheetMarcus Friman
 
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini SummitF5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summitkimw001
 

Similaire à Don't Let History Repeat Itself – Network Monitoring and Reporting with WatchPoint (20)

Just two clicks away - from monitoring and reporting to root-cause analysis
Just two clicks away - from monitoring and reporting to root-cause analysisJust two clicks away - from monitoring and reporting to root-cause analysis
Just two clicks away - from monitoring and reporting to root-cause analysis
 
The blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysisThe blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysis
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed Networks
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshop
 
Best Practices for Analyzing VoIP at 10G
Best Practices for Analyzing VoIP at 10GBest Practices for Analyzing VoIP at 10G
Best Practices for Analyzing VoIP at 10G
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11ac
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise Affordable
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac Data
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?
 
Netrounds Product Sheet
Netrounds Product SheetNetrounds Product Sheet
Netrounds Product Sheet
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini SummitF5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
 

Plus de Savvius, Inc

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius VigilSavvius, Inc
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkSavvius, Inc
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsSavvius, Inc
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersSavvius, Inc
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?Savvius, Inc
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewSavvius, Inc
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisSavvius, Inc
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Savvius, Inc
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring Savvius, Inc
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint GroupSavvius, Inc
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringSavvius, Inc
 
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless AnalysisSavvius, Inc
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 UpdateSavvius, Inc
 

Plus de Savvius, Inc (16)

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN Analysis
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network Monitoring
 
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 Update
 

Dernier

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Dernier (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Don't Let History Repeat Itself – Network Monitoring and Reporting with WatchPoint

  • 1. Don’t Let History Repeat Itself Network Monitoring and Reporting with WatchPoint Show us your tweets! Use today’s webinar hashtag: Jay Botelho Director of Product Management #wp_watchpoint WildPackets with any questions, comments, or feedback. jbotelho@wildpackets.com Follow us @wildpackets © WildPackets, Inc. www.wildpackets.com
  • 2. Agenda • Key Technologies in Network Reporting • Limitations in Single Technology Approaches • Why WatchPoint • WatchPoint v2.0 Demo ‒ Determining long-term trends using WatchPoint ‒ Troubleshooting ongoing issues with WatchPoint ‒ Generating detailed, scheduled reports ‒ Linking directly from high-level reporting to detailed packet analysis • Company Overview • Product Line Overview WatchPoint v2.0 © WildPackets, Inc. 2
  • 3. Key Technologies in Network Reporting © WildPackets, Inc. www.wildpackets.com
  • 4. Choices and Comprises Packet-based Data Granularity Flow-based SNMP Data Accuracy Overhead??? Cost??? WatchPoint v2.0 © WildPackets, Inc. 4
  • 5. SNMP • Best used to identify and describe system configuration • Monitor network-attached devices for high-level conditions ‒ Up/Down ‒ Total traffic (bytes, packets) ‒ Number of users • Typically polling-based – heavy bandwidth impact • Typically 5 second granularity • Trouble-shooting/root cause analysis not possible WatchPoint v2.0 © WildPackets, Inc. 5
  • 6. "Go With the Flow" • Flows, or flow records, have become the default element used in centralized network monitoring • A ―flow‖ is a sequence of packets that has the following seven identical characteristics: ‒ Source IP address ‒ Destination IP address ‒ Source port ‒ Destination port ‒ Layer 3 protocol type ‒ TOS byte ‒ Input logical interface • By implication, a flow is unidirectional WatchPoint v2.0 © WildPackets, Inc. 6
  • 7. Packet-based - OmniFlow • Developed by WildPackets • Analysis of every packet AND payload • Unrivaled info for each flow • Layer 3 - 7 • 100% accurate • Minimal network impact – 10’s of Kbps • Monitor AND troubleshoot WatchPoint v2.0 © WildPackets, Inc. 7
  • 8. Limitations in Single Technology Approaches © WildPackets, Inc. www.wildpackets.com
  • 9. Not All Data Sources Are Created Equal Netflow sFlow OmniFlow Packets • Developed by • RFC 3176 • Developed by • RFC 1122 Cisco • sFlow agents WildPackets • Transit and • Statistical • Analysis of every • Every packet terminated traffic sampling packet AND recorded • Higher speed payload • Detailed networks troubleshooting • Detailed info for • Time-based • Unrivaled info for • Layer 2 - 7 each flow sampling of each flow • Apdex, Latency, interface counters Reconstruction, … • NO packets • NO packets • Links to packets • Packets with network forensics • Sampled – not • Sampled – not • 100% accurate • 100% accurate 100% accurate 100% accurate WatchPoint v2.0 © WildPackets, Inc. 9
  • 10. It’s All In The Packets Detailed errors automatically identified, with alerts One click identifies the user and application One more click identifies the root cause of the issue WatchPoint v2.0 © WildPackets, Inc. 10
  • 11. Why WatchPoint? © WildPackets, Inc. www.wildpackets.com
  • 12. WatchPoint v2.0 Delivers • 100% data accuracy ‒ Stop wondering if your monitoring solution is missing key results • Detailed network history ‒ No loss of granularity for historical data • Complete visibility ‒ From global network usage to detailed packet analysis for root- cause analysis in a single solution ‒ SNMP, NetFlow, sFlow, OmniFlow integrated into a single solution • Immediate access to worldwide network data ‒ Monitor network usage and drill-down into specifics at the speed of a click WatchPoint v2.0 © WildPackets, Inc. 12
  • 13. WildPackets Comprehensive Solutions WatchPoint v2.0 © WildPackets, Inc. 13
  • 14. Enterprise-wide Network Management WatchPoint v2.0 © WildPackets, Inc. 14
  • 15. WatchPoint Benefits • For CIOs ‒ High-level, instantaneous view of entire enterprise-wide network ‒ Quickly identify anomalistic network behavior ‒ Network usage, compliance, SLA reporting • For IT Managers ‒ Centrally managed monitoring solution ‒ Configure access based on role and usage ‒ Modify reports on-the-fly to see the data you need • For Network Engineers ‒ Find and fix network issues before they become major problems ‒ Correlate WatchPoint data with OmniEngine packet files for detailed, post-capture analysis WatchPoint v2.0 © WildPackets, Inc. 15
  • 16. What’s New in WatchPoint v2 • Comprehensive network monitoring via SNMP, NetFlow, sFlow and OmniFlow • Pre-built and custom reports • SLA monitoring of key network elements ‒ Alerts, Alarms, Notifications • Detailed drill-down into utilization, flows, and conversations • OmniFlow enhancements ‒ Direct access to packets ‒ Aggregated reporting of Expert events ‒ Aggregated reporting of VoIP statistics WatchPoint v2.0 © WildPackets, Inc. 16
  • 17. WatchPoint v2.0 Demo © WildPackets, Inc. www.wildpackets.com
  • 18. WatchPoint 2.0 At-A-Glance • Detailed, precise, conversation-based analysis ‒ Eliminates inaccuracies from polling/sampling-based solutions • 1 minute history – ALWAYS ‒ Never time-averaged historical data • Tight integration into packet analysis – one solution • Global reporting of Expert and VoIP analysis for investigation of real-time or historical problems WatchPoint v2.0 © WildPackets, Inc. 18
  • 19. Company Overview © WildPackets, Inc. www.wildpackets.com
  • 20. Corporate Background • Experts in network monitoring, analysis, and troubleshooting ‒ Founded: 1990 / Headquarters: Walnut Creek, CA ‒ Offices throughout the US, EMEA, and APAC • Our customers are leading edge organizations ‒ Mid-market, and enterprise lines of business ‒ Financial, manufacturing, ISPs, major federal agencies, state and local governments, and universities ‒ Over 7,000 customers / 60+ countries / 80% of Fortune 1,000 • Award-winning solutions that improve network performance ‒ Internet Telephony, Network Magazine, Network Computing Awards ‒ United States Patent 5,787,253 issued July 28, 1998 • Different approach to maintaining availability of network services WatchPoint v2.0 © WildPackets, Inc. 20
  • 21. Real-World Deployments Education Financial Government Health Care / Retail Telecom Technology WatchPoint v2.0 © WildPackets, Inc. 21
  • 22. Product Line Overview © WildPackets, Inc. www.wildpackets.com
  • 23. Product Line Overview OmniPeek/Compass Enterprise Packet Capture, Decode and Analysis • 10/100/1000 Ethernet, Wireless, WAN, 10G • Portable capture and OmniEngine console • VoIP analysis and call playback Omnipliance / TimeLine Distributed Enterprise Network Forensics • Packet capture and real-time analysis • Stream-to-disk for forensics analysis • Integrated OmniAdapter network analysis cards WatchPoint Centralized Enterprise Network Monitoring Appliance • Aggregation and graphical display of network data • WildPackets OmniEngines • NetFlow and sFlow WatchPoint v2.0 © WildPackets, Inc. 24
  • 24. OmniPeek Network Analyzer • OmniEngine Manager – Connect and configure distributed OmniEngines/Omnipliances • Comprehensive dashboards present network traffic in real-time – Vital statistics and graphs display trends on network and application performance – Visual peer-map shows conversations and protocols – Intuitive drill-down for root-cause analysis of performance bottlenecks • Visual Expert diagnosis speeds problem resolution – Packet and Payload visualizers provide business-centric views • Automated analytics and problem detection 24/7 – Easily create filters, triggers, scripting, advanced alarms and alerts WatchPoint v2.0 © WildPackets, Inc. 25
  • 25. Omnipliance Network Recorders • Captures and analyzes all network traffic 24x7 – Runs our OmniEngine software probe – Generates vital statistics on network and application performance – Intuitive root-cause analysis of performance bottlenecks • Expert analysis speeds problem resolution – Fault analysis, statistical analysis, and independent notification • Multiple Issue Digital Forensics – Real-time and post capture data mining for compliance and troubleshooting • Intelligent data transport – Network data analyzed locally – Detailed analysis passed to OmniPeek on demand – Summary statistics sent to WatchPoint for long term trending and reporting – Efficient use of network bandwidth • User-Extensible Platform – Plug-in architecture and SDK WatchPoint v2.0 © WildPackets, Inc. 26
  • 26. Omnipliance Network Recorders Price/performance solutions for every application Portable Edge Core Ruggedized Small Networks Datacenter Workhorse Troubleshooting Remote Offices Easily Expandable Aluminum chassis / 17” LCD 1U rack mountable chassis 3U rack mountable chassis Quad-Core Xeon 2.5GHz Quad-Core Intel Xeon Two Quad-Core Intel Xeon X3460 2.80Ghz E5530 2.4Ghz 4GB RAM 4GB RAM 6GB RAM 2 PCI-E Slots 2 PCI-E Slots 4 PCI-E Slots 2 Built-in Ethernet Ports 2 Built-in Ethernet Ports 2 Built-in Ethernet Ports 500GB and 2.5TB SATA 1TB SATA storage capacity 2TB SATA storage capacity storage capacity WatchPoint v2.0 © WildPackets, Inc. 27
  • 27. TimeLine • Fastest network recording and real-time statistical display — simultaneously ‒ 11.7Gbps sustained capture with zero packet loss ‒ Network statistics display in TimeLine visualization format • Rapid, intuitive forensics search and retrieval ‒ Historical network traffic analysis and quick data rewinding ‒ Several pre-defined forensics search templates making searches easy and fast • A natural extension to the WildPackets product line • Turnkey bundled solution ‒ Appliance + OmniEngine, OmniAdapter, OmniPeek Connect WatchPoint v2.0 © WildPackets, Inc. 28
  • 28. TimeLine For the most demanding network analysis tasks TimeLine 10g Network Forensics 3U rack mountable chassis Two Quad-Core Intel Xeon 5560 2.8Ghz 18GB RAM 4 PCI-E Slots 2 Built-in Ethernet Ports 8/16/32TB SATA storage capacity WatchPoint v2.0 © WildPackets, Inc. 29
  • 29. WatchPoint Centralized Monitoring for Distributed Enterprise Networks • High-level, aggregated view of all network segments – Monitor per campus, per region, per country • Wide range of network data – NetFlow, sFlow, OmniFlow • Web-based, customizable network dashboards • Flexible detailed reports • Omnipliances must be configured for continuous capture WatchPoint v2.0 © WildPackets, Inc. 30
  • 30. WildPackets Key Differentiators • Visual Expert Intelligence with Intuitive Drill-down – Let computer do the hard work, and return results, real-time – Packet / Payload Visualizers are faster than packet-per-packet diagnostics – Experts and analytics can be memorized and automated • Automated Capture Analytics – Filters, triggers, scripting and advanced alarming system combine to provide automated network problem detection 24x7 • Multiple Issue Network Forensics – Can be tracked by one or more people simultaneously – Real-time or post capture • User-Extensible Platform – Plug-in architecture and SDK • Aggregated Network Views and Reporting – NetFlow, sFlow, and OmniFlow WatchPoint v2.0 © WildPackets, Inc. 31
  • 31. Thank You! WildPackets, Inc. 1340 Treat Boulevard, Suite 500 Walnut Creek, CA 94597 (925) 937-3200 © WildPackets, Inc. www.wildpackets.com