SlideShare une entreprise Scribd logo
1  sur  23
How to Use Big Data to
Transform IT Operations
Jesse Rothstein, CEO, ExtraHop
Doug McMartin, Director of Product Development Standards, McKesson
Introduction
Doug McMartin
Director of Product Development Standards
Jesse Rothstein
CEO
Data Gravity
Signal-to-Noise
Motion of Data
Agenda
• The next-generation IT Big Data approach
• Moving toward real-time observational
data
• Key considerations for IT Big Data
• IT Big Data use cases
• Q&A
A Tool-Centric Approach = IT Silos
Network
Administrators
Virtualization
Team
Database
Administrators
VDI
Administrators
Application
Owners
Business
Analysts
Storage
Administrators
Security
Operations
A Tool-Centric Approach = IT Silos
Network
Administrators
Virtualization
Team
Database
Administrators
VDI
Administrators
Application
Owners
Business
Analysts
Storage
Administrators
Security
Operations
Big Data
for IT
Data-Driven Ops: “See with Data”
BUSINESS &
OPERATIONS
ANALYTICS
OPTIMIZATION &
CONTINUOUS
IMPROVEMENT
PROACTIVE
MONITORING &
REMEDIATION
PERVASIVE SECURITY
MONITORING &
COMPLIANCE
Tapping New Sources of Visibility
Driven by
Big Data
Technology
Machine Data
Wire Data
Wire Data
• All communication
on the network from
packets to payload
• 1000 x bigger
than machine data
• Definitive
source of truth
• Data you
already have
Wire Data: Real-Time Observational
Analysis
A small sample of what wire data contains…
All L2-L7
communication
on the network
From Unstructured Packets
To Structured Wire Data
Extracting real-time
insight from all
communication and
data streams
Business Data
Product ID
Customer ID
Shopping Cart ID
Cart Items
Cart Values
Discounts
Order ID
Abandoned?
Application Data
POST Content
AJAX Data
Section
Sub-Section
Page Title
Session Cookie
Proxied IP Address
Error Message
Availability Data
HTTP status codes
Application errors
Connection resets
Heartbeats
SSL certificate validity
Synthetic pingers
SNMP traps
Authentication errors
Capacity Data
Throughput
Transactions
Dropped packets
Application stalls
Application slowdowns
Geolocation/
IP mapping
Storage Access
(reads/writes)
SSL Offload
Security Data
Command and Control
Shadow IT
(SaaS, cloud)
Network traversal
Unauthorized outbound
connections & protocols
Storage/DB access
Blacklisted traffic
Brute force attacks
Surreptitious tunneling
Performance Metrics
Caching Behavior
Compression Behavior
Base HTML Load Time
Round Trip Time
Client Request Time
Server Reply Time
Server Send Time
Total Time Taken
Self Reporting + Observation =
Insight
• Self-reported data
(machine data)
– “What are your symptoms?”
– “When did this start?”
– “Does this hurt?”
• Observational data
(wire data)
– MRI
– Blood tests
– Heart rate, pupil dilation,
appearance, etc.
IT Operations Analytics Survey
ExtraHop and TechValidate partnered to survey 88 respondents from
65 organizations that use the ExtraHop platform.
• 65% of respondents are combining data sources for ITOA now, or plan to do so
within one year
• 54% of respondents are currently integrating wire data and machine data in
some manner
• 67% of respondents saw ITOA capabilities as important for IT security
Key Considerations for IT Big Data
Moving data around can
be expensive
Data Gravity
Pull out more of the
signal, filter out more of
the noise
Signal-to-Noise
Understand when real-
time access to data is
important
Motion of Data
Data Gravity
DATA
Signal-to-Noise Ratio
Signal
• Garbage in; garbage out
• Examples of data
sources with poor quality
– Threat detection
– Verbose logging
• Time is required to
separate signal from
noise
Motion of Data
Data at Rest
(Batch processing)
Example: MapReduce
in Hadoop
Data in Motion
(Stream processing)
Example: Apache Spark,
ExtraHop
DB
DB
DB
Data
mart
user
report
query
source
source
source
Batch 1Batch 2
user
SOLUTION
CHALLENGE
McKesson Managed Services
BACKGROUND
“ ExtraHop enables us to solve
incredibly complex problems in a
matter of hours. Extrapolated
across our business, we’re saving
at least $400,000 annually in
terms of time spent
troubleshooting.”
─ Scott Checkoway,
Director of Application Hosting
• Citrix application launch times dropped 75% (40 to 12 sec)
• Staff optimization: from 2.6 to 1 engineer for every 4
hospitals - $260,000 savings in first year
• Reduced MSFT SQL licenses - $200,000 savings annually
• Understand the impact of application updates
• Complex: Hospitals’ and McKesson’s IT environments
• Equip IT generalists; lessen reliance on specialists
• High coordination costs, slow troubleshooting processes
• Operational costs increased while user satisfaction
decreased
• Hosted healthcare applications for hospitals
• 7x24x365 mission critical operations
• Rapidly growing customer base
• Stringent and costly performance-based SLAs
Citrix Environments Are Complex!
• Is there latency between the user and web server?
• Slow Active Directory server?
• Network issues in the Citrix cluster?
• Contention in the SAN?
See across
Citrix, web,
database,
storage, LDAP,
DNS, etc.
Visibility on the Wire
Correlate activity across all tiers with wire data
Monitor SLAs in
real time.
Drill into critical
KPIs (launch,
load times, etc.)
per user.
Visibility Into Citrix Application
Delivery
McKesson improved Citrix
application launch times by
75% with ExtraHop.
McKesson avoided more than
$260,000 in staffing costs in
its first year with ExtraHop.
Understand the Impact of Application
Updates
• Improved user
experience
• Fewer surprises for IT
Ops
• Faster feedback for
app teams
BENEFIT
Drill down to see
how SQL queries
are performing.
Compare performance
across versions and
across time periods.
Identify Active/Inactive Databases
Saved $200,000
annually in reduced
database license costs.
BENEFIT
See all database
transactions.
Show all activity by
every database and
degree of usage.
Operations Analytics: Real-Time Patient
Tracking Observe admittance, discharge, and
transfers (ADTs) in real time.
Who and how many are being
admitted right now? Do we need to
adjust staff?
Track admissions by location and
gender.
Why are so many males being
admitted in Kent? Is it an epidemic?
• Optimize processes and staffing
for improved patient quality.
• Identify potential epidemics.
BENEFIT
Questions?
Explore the Power of
Real-Time Operational
Intelligence
www.extrahop.com/demo

Contenu connexe

Tendances

How to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in SplunkHow to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in SplunkSplunk
 
SplunkLive! Utrecht 2016 - NXP
SplunkLive! Utrecht 2016 - NXPSplunkLive! Utrecht 2016 - NXP
SplunkLive! Utrecht 2016 - NXPSplunk
 
Operational Analytics at Credit Suisse from ThousandEyes Connect
Operational Analytics at Credit Suisse from ThousandEyes ConnectOperational Analytics at Credit Suisse from ThousandEyes Connect
Operational Analytics at Credit Suisse from ThousandEyes ConnectThousandEyes
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionSplunk
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT OperationsSplunk
 
Affecto Informatica World Tour 2015: The Age of Engagement
Affecto Informatica World Tour 2015: The Age of EngagementAffecto Informatica World Tour 2015: The Age of Engagement
Affecto Informatica World Tour 2015: The Age of EngagementAffecto
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT OperationsSplunk
 
Keynote Presentation
Keynote PresentationKeynote Presentation
Keynote PresentationSplunk
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT OperationsSplunk
 
Cisco UCS and Splunk Workshop
Cisco UCS and Splunk WorkshopCisco UCS and Splunk Workshop
Cisco UCS and Splunk WorkshopRobb Boyd
 
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Splunk
 
Splunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk
 
How to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in SplunkHow to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in SplunkSplunk
 
Atlas Services Remote Analysis Report Sample
Atlas Services Remote Analysis Report SampleAtlas Services Remote Analysis Report Sample
Atlas Services Remote Analysis Report SampleExtraHop Networks
 
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream Splunk
 
Getting Started with IT Service Intelligence
Getting Started with IT Service IntelligenceGetting Started with IT Service Intelligence
Getting Started with IT Service IntelligenceSplunk
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTSplunk
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for CybersecurityVMware Tanzu
 

Tendances (20)

How to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in SplunkHow to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in Splunk
 
SplunkLive! Utrecht 2016 - NXP
SplunkLive! Utrecht 2016 - NXPSplunkLive! Utrecht 2016 - NXP
SplunkLive! Utrecht 2016 - NXP
 
Operational Analytics at Credit Suisse from ThousandEyes Connect
Operational Analytics at Credit Suisse from ThousandEyes ConnectOperational Analytics at Credit Suisse from ThousandEyes Connect
Operational Analytics at Credit Suisse from ThousandEyes Connect
 
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout SessionTaking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management Breakout Session
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
 
Big Data Application Architectures - Fraud Detection
Big Data Application Architectures - Fraud DetectionBig Data Application Architectures - Fraud Detection
Big Data Application Architectures - Fraud Detection
 
Affecto Informatica World Tour 2015: The Age of Engagement
Affecto Informatica World Tour 2015: The Age of EngagementAffecto Informatica World Tour 2015: The Age of Engagement
Affecto Informatica World Tour 2015: The Age of Engagement
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
 
Keynote Presentation
Keynote PresentationKeynote Presentation
Keynote Presentation
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
 
The Life of an Internet of Things Electron
The Life of an Internet of Things ElectronThe Life of an Internet of Things Electron
The Life of an Internet of Things Electron
 
Cisco UCS and Splunk Workshop
Cisco UCS and Splunk WorkshopCisco UCS and Splunk Workshop
Cisco UCS and Splunk Workshop
 
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
 
Splunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-On
 
How to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in SplunkHow to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in Splunk
 
Atlas Services Remote Analysis Report Sample
Atlas Services Remote Analysis Report SampleAtlas Services Remote Analysis Report Sample
Atlas Services Remote Analysis Report Sample
 
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
 
Getting Started with IT Service Intelligence
Getting Started with IT Service IntelligenceGetting Started with IT Service Intelligence
Getting Started with IT Service Intelligence
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINT
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for Cybersecurity
 

En vedette

Snaplogic Live: Big Data in Motion
Snaplogic Live: Big Data in MotionSnaplogic Live: Big Data in Motion
Snaplogic Live: Big Data in MotionSnapLogic
 
Big Data Expo 2015 - Savision Optimizing IT Operations
Big Data Expo 2015 - Savision Optimizing IT OperationsBig Data Expo 2015 - Savision Optimizing IT Operations
Big Data Expo 2015 - Savision Optimizing IT OperationsBigDataExpo
 
DevOps Powered by Splunk Hands-On
DevOps Powered by Splunk Hands-OnDevOps Powered by Splunk Hands-On
DevOps Powered by Splunk Hands-OnSplunk
 
IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)stelligence
 
Business intelligence and data analytic for value realization
Business intelligence and data analytic for value realization Business intelligence and data analytic for value realization
Business intelligence and data analytic for value realization iyke ezeugo
 
Cloud Transformation: A Pragmatic Approach
Cloud Transformation: A Pragmatic ApproachCloud Transformation: A Pragmatic Approach
Cloud Transformation: A Pragmatic ApproachCapgemini
 
Transform IT Operations with CSC
Transform IT Operations with CSCTransform IT Operations with CSC
Transform IT Operations with CSCAmazon Web Services
 
Transform IT Operations and Management
Transform IT Operations and ManagementTransform IT Operations and Management
Transform IT Operations and ManagementAmazon Web Services
 
(ISM205) A Framework for IT and Business Transformation
(ISM205) A Framework for IT and Business Transformation(ISM205) A Framework for IT and Business Transformation
(ISM205) A Framework for IT and Business TransformationAmazon Web Services
 
Plateforme centralisée d’analyse des logs des frontaux http en temps réel dan...
Plateforme centralisée d’analyse des logs des frontaux http en temps réel dan...Plateforme centralisée d’analyse des logs des frontaux http en temps réel dan...
Plateforme centralisée d’analyse des logs des frontaux http en temps réel dan...Guillaume MOCQUET
 
Next Generation Data Center - IT Transformation
Next Generation Data Center - IT TransformationNext Generation Data Center - IT Transformation
Next Generation Data Center - IT TransformationDamian Hamilton
 
The Why, How and What of Digital Business Transformation in the Cloud
The Why, How and What of Digital Business Transformation in the CloudThe Why, How and What of Digital Business Transformation in the Cloud
The Why, How and What of Digital Business Transformation in the CloudAmazon Web Services
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategiesSogetiLabs
 
Chapitre2 prise en_main_kibana
Chapitre2 prise en_main_kibanaChapitre2 prise en_main_kibana
Chapitre2 prise en_main_kibanaFabien SABATIER
 
Chapitre3 elk concepts_avances
Chapitre3 elk concepts_avancesChapitre3 elk concepts_avances
Chapitre3 elk concepts_avancesFabien SABATIER
 
Big data landscape v 3.0 - Matt Turck (FirstMark)
Big data landscape v 3.0 - Matt Turck (FirstMark) Big data landscape v 3.0 - Matt Turck (FirstMark)
Big data landscape v 3.0 - Matt Turck (FirstMark) Matt Turck
 

En vedette (20)

ExtraHop Splunk datasheet
ExtraHop Splunk datasheetExtraHop Splunk datasheet
ExtraHop Splunk datasheet
 
Snaplogic Live: Big Data in Motion
Snaplogic Live: Big Data in MotionSnaplogic Live: Big Data in Motion
Snaplogic Live: Big Data in Motion
 
Cloud = Business Transformation
Cloud = Business TransformationCloud = Business Transformation
Cloud = Business Transformation
 
Big Data Expo 2015 - Savision Optimizing IT Operations
Big Data Expo 2015 - Savision Optimizing IT OperationsBig Data Expo 2015 - Savision Optimizing IT Operations
Big Data Expo 2015 - Savision Optimizing IT Operations
 
DevOps Powered by Splunk Hands-On
DevOps Powered by Splunk Hands-OnDevOps Powered by Splunk Hands-On
DevOps Powered by Splunk Hands-On
 
IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)
 
Business intelligence and data analytic for value realization
Business intelligence and data analytic for value realization Business intelligence and data analytic for value realization
Business intelligence and data analytic for value realization
 
Cloud Transformation: A Pragmatic Approach
Cloud Transformation: A Pragmatic ApproachCloud Transformation: A Pragmatic Approach
Cloud Transformation: A Pragmatic Approach
 
Transform IT Operations with CSC
Transform IT Operations with CSCTransform IT Operations with CSC
Transform IT Operations with CSC
 
Transform IT Operations and Management
Transform IT Operations and ManagementTransform IT Operations and Management
Transform IT Operations and Management
 
(ISM205) A Framework for IT and Business Transformation
(ISM205) A Framework for IT and Business Transformation(ISM205) A Framework for IT and Business Transformation
(ISM205) A Framework for IT and Business Transformation
 
Plateforme centralisée d’analyse des logs des frontaux http en temps réel dan...
Plateforme centralisée d’analyse des logs des frontaux http en temps réel dan...Plateforme centralisée d’analyse des logs des frontaux http en temps réel dan...
Plateforme centralisée d’analyse des logs des frontaux http en temps réel dan...
 
Next Generation Data Center - IT Transformation
Next Generation Data Center - IT TransformationNext Generation Data Center - IT Transformation
Next Generation Data Center - IT Transformation
 
The Why, How and What of Digital Business Transformation in the Cloud
The Why, How and What of Digital Business Transformation in the CloudThe Why, How and What of Digital Business Transformation in the Cloud
The Why, How and What of Digital Business Transformation in the Cloud
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategies
 
Chapitre2 prise en_main_kibana
Chapitre2 prise en_main_kibanaChapitre2 prise en_main_kibana
Chapitre2 prise en_main_kibana
 
Cloud Transformations
Cloud TransformationsCloud Transformations
Cloud Transformations
 
Chapitre3 elk concepts_avances
Chapitre3 elk concepts_avancesChapitre3 elk concepts_avances
Chapitre3 elk concepts_avances
 
Cloud Migration Strategy - IT Transformation with Cloud
Cloud Migration Strategy - IT Transformation with CloudCloud Migration Strategy - IT Transformation with Cloud
Cloud Migration Strategy - IT Transformation with Cloud
 
Big data landscape v 3.0 - Matt Turck (FirstMark)
Big data landscape v 3.0 - Matt Turck (FirstMark) Big data landscape v 3.0 - Matt Turck (FirstMark)
Big data landscape v 3.0 - Matt Turck (FirstMark)
 

Similaire à Using Big Data to Transform IT Operations

Data Mesh using Microsoft Fabric
Data Mesh using Microsoft FabricData Mesh using Microsoft Fabric
Data Mesh using Microsoft FabricNathan Bijnens
 
IBM Relay 2015: Open for Data
IBM Relay 2015: Open for Data IBM Relay 2015: Open for Data
IBM Relay 2015: Open for Data IBM
 
Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...
Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...
Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...DataWorks Summit
 
Real Time Business Platform by Ivan Novick from Pivotal
Real Time Business Platform by Ivan Novick from PivotalReal Time Business Platform by Ivan Novick from Pivotal
Real Time Business Platform by Ivan Novick from PivotalVMware Tanzu Korea
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?Denodo
 
Deliveinrg explainable AI
Deliveinrg explainable AIDeliveinrg explainable AI
Deliveinrg explainable AIGary Allemann
 
Gse uk-cedrinemadera-2018-shared
Gse uk-cedrinemadera-2018-sharedGse uk-cedrinemadera-2018-shared
Gse uk-cedrinemadera-2018-sharedcedrinemadera
 
Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)Nathan Bijnens
 
Agile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachAgile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachSoftServe
 
Innovating With Data and Analytics
Innovating With Data and AnalyticsInnovating With Data and Analytics
Innovating With Data and AnalyticsVMware Tanzu
 
Assessing New Databases– Translytical Use Cases
Assessing New Databases– Translytical Use CasesAssessing New Databases– Translytical Use Cases
Assessing New Databases– Translytical Use CasesDATAVERSITY
 
Big Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementBig Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementTony Bain
 
Accelerate Cloud Migrations and Architecture with Data Virtualization
Accelerate Cloud Migrations and Architecture with Data VirtualizationAccelerate Cloud Migrations and Architecture with Data Virtualization
Accelerate Cloud Migrations and Architecture with Data VirtualizationDenodo
 
Big data unit 2
Big data unit 2Big data unit 2
Big data unit 2RojaT4
 
final oracle presentation
final oracle presentationfinal oracle presentation
final oracle presentationPriyesh Patel
 
Hybrid Transactional/Analytics Processing: Beyond the Big Database Hype
Hybrid Transactional/Analytics Processing: Beyond the Big Database HypeHybrid Transactional/Analytics Processing: Beyond the Big Database Hype
Hybrid Transactional/Analytics Processing: Beyond the Big Database HypeAli Hodroj
 
Customer value analysis of big data products
Customer value analysis of big data productsCustomer value analysis of big data products
Customer value analysis of big data productsVikas Sardana
 

Similaire à Using Big Data to Transform IT Operations (20)

Data Mesh using Microsoft Fabric
Data Mesh using Microsoft FabricData Mesh using Microsoft Fabric
Data Mesh using Microsoft Fabric
 
IBM Relay 2015: Open for Data
IBM Relay 2015: Open for Data IBM Relay 2015: Open for Data
IBM Relay 2015: Open for Data
 
Big Data and Analytics
Big Data and AnalyticsBig Data and Analytics
Big Data and Analytics
 
Big Data and Analytics
Big Data and AnalyticsBig Data and Analytics
Big Data and Analytics
 
Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...
Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...
Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...
 
Real Time Business Platform by Ivan Novick from Pivotal
Real Time Business Platform by Ivan Novick from PivotalReal Time Business Platform by Ivan Novick from Pivotal
Real Time Business Platform by Ivan Novick from Pivotal
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
 
Deliveinrg explainable AI
Deliveinrg explainable AIDeliveinrg explainable AI
Deliveinrg explainable AI
 
Applying Big Data
Applying Big DataApplying Big Data
Applying Big Data
 
Gse uk-cedrinemadera-2018-shared
Gse uk-cedrinemadera-2018-sharedGse uk-cedrinemadera-2018-shared
Gse uk-cedrinemadera-2018-shared
 
Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)
 
Agile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachAgile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric Approach
 
Innovating With Data and Analytics
Innovating With Data and AnalyticsInnovating With Data and Analytics
Innovating With Data and Analytics
 
Assessing New Databases– Translytical Use Cases
Assessing New Databases– Translytical Use CasesAssessing New Databases– Translytical Use Cases
Assessing New Databases– Translytical Use Cases
 
Big Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementBig Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data Management
 
Accelerate Cloud Migrations and Architecture with Data Virtualization
Accelerate Cloud Migrations and Architecture with Data VirtualizationAccelerate Cloud Migrations and Architecture with Data Virtualization
Accelerate Cloud Migrations and Architecture with Data Virtualization
 
Big data unit 2
Big data unit 2Big data unit 2
Big data unit 2
 
final oracle presentation
final oracle presentationfinal oracle presentation
final oracle presentation
 
Hybrid Transactional/Analytics Processing: Beyond the Big Database Hype
Hybrid Transactional/Analytics Processing: Beyond the Big Database HypeHybrid Transactional/Analytics Processing: Beyond the Big Database Hype
Hybrid Transactional/Analytics Processing: Beyond the Big Database Hype
 
Customer value analysis of big data products
Customer value analysis of big data productsCustomer value analysis of big data products
Customer value analysis of big data products
 

Plus de ExtraHop Networks

Democratising Security: Update Your Policies or Update Your CV
Democratising Security: Update Your Policies or Update Your CVDemocratising Security: Update Your Policies or Update Your CV
Democratising Security: Update Your Policies or Update Your CVExtraHop Networks
 
Ransomware: Hard to Stop for Enterprises, Highly Profitable for Criminals
Ransomware: Hard to Stop for Enterprises, Highly Profitable for CriminalsRansomware: Hard to Stop for Enterprises, Highly Profitable for Criminals
Ransomware: Hard to Stop for Enterprises, Highly Profitable for CriminalsExtraHop Networks
 
ExtraHop Product Overview Datasheet
ExtraHop Product Overview DatasheetExtraHop Product Overview Datasheet
ExtraHop Product Overview DatasheetExtraHop Networks
 
Managed Services Provider Serves Customers Better with Wire Data
Managed Services Provider Serves Customers Better with Wire DataManaged Services Provider Serves Customers Better with Wire Data
Managed Services Provider Serves Customers Better with Wire DataExtraHop Networks
 
Conga case study: Application visibility in AWS with ExtraHop
Conga case study: Application visibility in AWS with ExtraHopConga case study: Application visibility in AWS with ExtraHop
Conga case study: Application visibility in AWS with ExtraHopExtraHop Networks
 
ExtraHop Atlas Services Operational Excellence datasheet
ExtraHop Atlas Services Operational Excellence datasheetExtraHop Atlas Services Operational Excellence datasheet
ExtraHop Atlas Services Operational Excellence datasheetExtraHop Networks
 
ExtraHop Atlas Services QuickStart datasheet
ExtraHop Atlas Services QuickStart datasheetExtraHop Atlas Services QuickStart datasheet
ExtraHop Atlas Services QuickStart datasheetExtraHop Networks
 
Web Application Troubleshooting Guide
Web Application Troubleshooting GuideWeb Application Troubleshooting Guide
Web Application Troubleshooting GuideExtraHop Networks
 

Plus de ExtraHop Networks (10)

Democratising Security: Update Your Policies or Update Your CV
Democratising Security: Update Your Policies or Update Your CVDemocratising Security: Update Your Policies or Update Your CV
Democratising Security: Update Your Policies or Update Your CV
 
Ransomware: Hard to Stop for Enterprises, Highly Profitable for Criminals
Ransomware: Hard to Stop for Enterprises, Highly Profitable for CriminalsRansomware: Hard to Stop for Enterprises, Highly Profitable for Criminals
Ransomware: Hard to Stop for Enterprises, Highly Profitable for Criminals
 
City of Geel Case Study
City of Geel Case StudyCity of Geel Case Study
City of Geel Case Study
 
Zonar Case Study
Zonar Case StudyZonar Case Study
Zonar Case Study
 
ExtraHop Product Overview Datasheet
ExtraHop Product Overview DatasheetExtraHop Product Overview Datasheet
ExtraHop Product Overview Datasheet
 
Managed Services Provider Serves Customers Better with Wire Data
Managed Services Provider Serves Customers Better with Wire DataManaged Services Provider Serves Customers Better with Wire Data
Managed Services Provider Serves Customers Better with Wire Data
 
Conga case study: Application visibility in AWS with ExtraHop
Conga case study: Application visibility in AWS with ExtraHopConga case study: Application visibility in AWS with ExtraHop
Conga case study: Application visibility in AWS with ExtraHop
 
ExtraHop Atlas Services Operational Excellence datasheet
ExtraHop Atlas Services Operational Excellence datasheetExtraHop Atlas Services Operational Excellence datasheet
ExtraHop Atlas Services Operational Excellence datasheet
 
ExtraHop Atlas Services QuickStart datasheet
ExtraHop Atlas Services QuickStart datasheetExtraHop Atlas Services QuickStart datasheet
ExtraHop Atlas Services QuickStart datasheet
 
Web Application Troubleshooting Guide
Web Application Troubleshooting GuideWeb Application Troubleshooting Guide
Web Application Troubleshooting Guide
 

Dernier

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Dernier (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Using Big Data to Transform IT Operations

  • 1. How to Use Big Data to Transform IT Operations Jesse Rothstein, CEO, ExtraHop Doug McMartin, Director of Product Development Standards, McKesson
  • 2. Introduction Doug McMartin Director of Product Development Standards Jesse Rothstein CEO Data Gravity Signal-to-Noise Motion of Data
  • 3. Agenda • The next-generation IT Big Data approach • Moving toward real-time observational data • Key considerations for IT Big Data • IT Big Data use cases • Q&A
  • 4. A Tool-Centric Approach = IT Silos Network Administrators Virtualization Team Database Administrators VDI Administrators Application Owners Business Analysts Storage Administrators Security Operations
  • 5. A Tool-Centric Approach = IT Silos Network Administrators Virtualization Team Database Administrators VDI Administrators Application Owners Business Analysts Storage Administrators Security Operations Big Data for IT
  • 6. Data-Driven Ops: “See with Data” BUSINESS & OPERATIONS ANALYTICS OPTIMIZATION & CONTINUOUS IMPROVEMENT PROACTIVE MONITORING & REMEDIATION PERVASIVE SECURITY MONITORING & COMPLIANCE
  • 7. Tapping New Sources of Visibility Driven by Big Data Technology Machine Data Wire Data
  • 8. Wire Data • All communication on the network from packets to payload • 1000 x bigger than machine data • Definitive source of truth • Data you already have
  • 9. Wire Data: Real-Time Observational Analysis A small sample of what wire data contains… All L2-L7 communication on the network From Unstructured Packets To Structured Wire Data Extracting real-time insight from all communication and data streams Business Data Product ID Customer ID Shopping Cart ID Cart Items Cart Values Discounts Order ID Abandoned? Application Data POST Content AJAX Data Section Sub-Section Page Title Session Cookie Proxied IP Address Error Message Availability Data HTTP status codes Application errors Connection resets Heartbeats SSL certificate validity Synthetic pingers SNMP traps Authentication errors Capacity Data Throughput Transactions Dropped packets Application stalls Application slowdowns Geolocation/ IP mapping Storage Access (reads/writes) SSL Offload Security Data Command and Control Shadow IT (SaaS, cloud) Network traversal Unauthorized outbound connections & protocols Storage/DB access Blacklisted traffic Brute force attacks Surreptitious tunneling Performance Metrics Caching Behavior Compression Behavior Base HTML Load Time Round Trip Time Client Request Time Server Reply Time Server Send Time Total Time Taken
  • 10. Self Reporting + Observation = Insight • Self-reported data (machine data) – “What are your symptoms?” – “When did this start?” – “Does this hurt?” • Observational data (wire data) – MRI – Blood tests – Heart rate, pupil dilation, appearance, etc.
  • 11. IT Operations Analytics Survey ExtraHop and TechValidate partnered to survey 88 respondents from 65 organizations that use the ExtraHop platform. • 65% of respondents are combining data sources for ITOA now, or plan to do so within one year • 54% of respondents are currently integrating wire data and machine data in some manner • 67% of respondents saw ITOA capabilities as important for IT security
  • 12. Key Considerations for IT Big Data Moving data around can be expensive Data Gravity Pull out more of the signal, filter out more of the noise Signal-to-Noise Understand when real- time access to data is important Motion of Data
  • 14. Signal-to-Noise Ratio Signal • Garbage in; garbage out • Examples of data sources with poor quality – Threat detection – Verbose logging • Time is required to separate signal from noise
  • 15. Motion of Data Data at Rest (Batch processing) Example: MapReduce in Hadoop Data in Motion (Stream processing) Example: Apache Spark, ExtraHop DB DB DB Data mart user report query source source source Batch 1Batch 2 user
  • 16. SOLUTION CHALLENGE McKesson Managed Services BACKGROUND “ ExtraHop enables us to solve incredibly complex problems in a matter of hours. Extrapolated across our business, we’re saving at least $400,000 annually in terms of time spent troubleshooting.” ─ Scott Checkoway, Director of Application Hosting • Citrix application launch times dropped 75% (40 to 12 sec) • Staff optimization: from 2.6 to 1 engineer for every 4 hospitals - $260,000 savings in first year • Reduced MSFT SQL licenses - $200,000 savings annually • Understand the impact of application updates • Complex: Hospitals’ and McKesson’s IT environments • Equip IT generalists; lessen reliance on specialists • High coordination costs, slow troubleshooting processes • Operational costs increased while user satisfaction decreased • Hosted healthcare applications for hospitals • 7x24x365 mission critical operations • Rapidly growing customer base • Stringent and costly performance-based SLAs
  • 17. Citrix Environments Are Complex! • Is there latency between the user and web server? • Slow Active Directory server? • Network issues in the Citrix cluster? • Contention in the SAN?
  • 18. See across Citrix, web, database, storage, LDAP, DNS, etc. Visibility on the Wire Correlate activity across all tiers with wire data Monitor SLAs in real time. Drill into critical KPIs (launch, load times, etc.) per user.
  • 19. Visibility Into Citrix Application Delivery McKesson improved Citrix application launch times by 75% with ExtraHop. McKesson avoided more than $260,000 in staffing costs in its first year with ExtraHop.
  • 20. Understand the Impact of Application Updates • Improved user experience • Fewer surprises for IT Ops • Faster feedback for app teams BENEFIT Drill down to see how SQL queries are performing. Compare performance across versions and across time periods.
  • 21. Identify Active/Inactive Databases Saved $200,000 annually in reduced database license costs. BENEFIT See all database transactions. Show all activity by every database and degree of usage.
  • 22. Operations Analytics: Real-Time Patient Tracking Observe admittance, discharge, and transfers (ADTs) in real time. Who and how many are being admitted right now? Do we need to adjust staff? Track admissions by location and gender. Why are so many males being admitted in Kent? Is it an epidemic? • Optimize processes and staffing for improved patient quality. • Identify potential epidemics. BENEFIT
  • 23. Questions? Explore the Power of Real-Time Operational Intelligence www.extrahop.com/demo

Notes de l'éditeur

  1. This slide explains why troubleshooting the Citrix delivery of the applications was so difficult. Even Citrix consultants could not solve the problem. In our Remote Hosting environment we are delivering McKesson application to a number of customers. We have 3500 VM’s running on a large number of physical machines. The Citrix environment alone is almost 1/3 of the infrastructure (XenApp servers, ZDC, Web Interface, Netscalers) all running on a common network and a few large storage arrays Each tier of the infrastructure (App, Network, and Storage) had their own tools and reporting to assist with issue resolution so when a problem occurred you were left asking questions like: Is there latency between the user and web server? Slow Active Directory server? Network issues in the Citrix cluster? Contention in the SAN?
  2. Although Doug’s team was very skeptical, ExtraHop proved its value by uncovering the root cause of the slowness. Customers were very unhappy with the performance of the Citrix application delivery – suffering from 40 second application launches. Internally we spent 2 months working on the network, Citrix server infrastructure, and storage tiers. Mostly we were looking at logs from all of the systems and individual system/vendor tools Using ExtraHop in a small POC we were able to detect the root cause (a bad AD design) and in 1 week and improved customer experience. The ability to see the full Citrix environment in a single tool allowed us to see the potential bottleneck within hours of the initial install and configuration. It allowed for collection and correlation of multiple data streams in real-time that an individual system log did not reveal the root cause.
  3. As a result of operationalizing the ExtraHop platform, the McKesson Managed Services team was able to realize some significant cost savings. A significant customer experience improvement and customer satisfaction scores improved in the months following the resolution Cost reduction in number of FTE’s required to support the Citrix infrastructure since the number of customer problem tickets decreased.
  4. One of the problems we faced in the hosting of McKesson applications was that not very customer was running the same release of the applications. We are not a true SaaS environment so variability in the applications and in a few cases the versions of the underlying infrastructure do exist. This variability leads to some problems in supporting the application mix especially performance related problems. We used Extrahop to track the response time for any database request and the number of times the DB request ran This allowed us to generate a list of our “top 10” long running queries by application version. This information was then sent to our development team to have them understand a few items: Total system wait – if a DB request runs 10,000 times a day and you were able to improve it by 5 seconds – you improve the total system wait time 13.3 hours a day Conversely if you focus the effort on a DB request that executes 10 times a day but improve performance by 30 seconds you only improve the total system wait time by 5 minutes It allowed McKesson to change where we wanted development to prioritize their limited time for performance optimization. Once we had the long running database request categorized by application we could then start a cross walk with the application development teams to determine if the same problems exist between application releases or if something new was introduced. By doing this in our QA environment during load testing it allowed us to catch some major problems prior to release the upgrade to the early upgrade customers
  5. As I stated earlier our infrastructure is several thousand VM;s and hundreds of physical servers. As we were growing people would stand up systems for some testing or QA purpose and but never retire them officially. Upgrade/migrations would occur and the source system would be left up just incase we needed to pull something over after go live…. This created a large number of orphan systems that we were paying to license. In the database world this was especially costly. Management wanted to retire the systems but was fearful in shutting something down inadvertently We used ExtraHop to monitor the data flow on the network in and out of the systems for a set duration. It allowed us to show management that the systems were truly not being used and could be scheduled for decommission. The result was a 200K annual reduction in the database licensing costs in our infrastructure.
  6. Looking to the future I see real promise in looking at wire data for real time Patient analytics In the healthcare space systems communicate across the wire using a number of standards (HL7, X12..) By pulling the data off the wire we gain a few big advantages. It can be done in real time. I do not have to wait for the data to be received and posted into a database before I can start looking at it I don’t add load to a system to generate a report or process a DB request. I can leave those systems to do their job of serving up end-user needs I don’t need to a team of resources (one for every application) Some of the potential uses would be a real time analysis of patient needs (increased ER admits) and shifting staff in the hospital to assist with a spike in activity. Trend at diagnosis codes to identify potential disease patterns