SlideShare une entreprise Scribd logo
1  sur  30
Lawful Interception in Virtual
Environment
Ran Nahmias
Director, Virtualization and Cloud solutions
Net Optics, Inc.




  Intelligent Access and Monitoring
  Architecture
Presenter

Ran Nahmias
Director, Virtualization and Cloud Solutions
Net Optics, Inc.

Over 15 years of experience in networking, security,
desktop and server virtualization in engineering, product
management and deployment roles for market leaders
such as Check Point Software Technologies, Nice Systems,
Microsoft and Net Optics.




                     Net Optics Confidential and Proprietary   2
Goal

Review how the growing adoption of Virtualization
and Cloud Services challenges Lawful Interception
compliance in converged (physical & virtual) or
homogeneous virtual environments.




                 Net Optics Confidential and Proprietary   3
Agenda

1. Intro
2. Virtualization adoption trends
3. The visibility challenge
4. The elasticity challenge
5. LI Compliance
6. Net Optics solutions
7. Q & A


                  Net Optics Confidential and Proprietary   4
Virtualization In The DC: More Than a Trend

Virtualization deployment increasing year
over year in data centers.

Gartner: over 30% of x86 architecture
servers workloads running on VMs

Double digit annual growth

Virtualization
     – Great CAPEX improvements, no visibility.
     – Passive monitoring of Inter-Virtual Machine Traffic
       is nonexistent.



                           Net Optics Confidential and Proprietary   5
Did You Know?

• Last year was the first year in which more virtual
  servers were shipped than physical servers.
• IDC estimates that today nearly 10% of the
  information running through servers is doing so on
  virtualized systems
• IDC estimates that number to grow to more than
  20% in 2015.
• This percentage increases along with the size of the
  organization. Some larger environments today operate
  with 100% virtualized systems.


  Source: EMC and IDC 10/2011

                            Net Optics Confidential and Proprietary   6
Did You Know?

• Cloud computing accounts for less than 2%
  of IT spending today, IDC estimates that by 2015
  nearly 20% of the information will be "touched"
  by cloud computing service
• Perhaps as much as 10% will be maintained in
  a cloud.
• Much of the current movement to cloud
  architectures is being enabled by pervasive
  adoption of virtualization.

  Source: EMC and IDC 10/2011

                            Net Optics Confidential and Proprietary   7
Why Should I Care About CLI/VLI


           With advanced LI tools, everyone knows you are a
           dog, unless you “anonymize” your identity
           through the cloud




           The secured perimeter no longer exist




           New technologies present challenges to observe
           and obtain the data



                  Net Optics Confidential and Proprietary     8
Reminder: What is ―The Cloud‖

 Monitor the hypervisor and you can monitor the cloud:




 Source: VMware

                   Net Optics Confidential and Proprietary
Virtualization = Invisibility




                    Net Optics Confidential and Proprietary
Hypervisor Virtual Network Monitoring Challenge

                                                              ESX Virtual Stack
                                                                vm1       vm2         vm3




                                                                                                             Physical Network
                                                                                                                Security &
     Virtualization Creates                                                                                     Monitoring
    Security, Monitoring and
       Compliance Risks                                                           Virtual Switch                  LI


•    No visibility into inter-VM traffic,                                                                         Infosec
     vulnerabilities or threats
•    Lacks auditing of data passing
     between virtual servers
                                                                                      Physical Host Server
•    Inability to pinpoint resource
     utilization issues




                                            Net Optics Confidential and Proprietary
Visualizing the blind spots


                            VM1                   VM2              VM3               VM4
                             App                  App               App              App
                                                                                                  Service
                                OS                OS                OS                   OS       Console
Virtual Ethernet
    Adapters



 ESX vSphere
  vSwitches


     Physical
     Ethernet
     Adapters

                            ?
                                     Production                             Production        Management
                                        LAN                                    LAN               LAN
           Tool of choice




                                       Net Optics Confidential and Proprietary
Cloud = elasticity




                     Net Optics Confidential and Proprietary
Virtualization, Clouds Are Elastic


Virtual
Machines
                                                                          Virtual
                                                                          Machines



                  Virtual
                  Machines
Data Center
                                                                           Data Center


                  Data Center                 Virtual
                                              Machines
                                                                                     Virtual
                                                                                     Machines



• LI Warrant issued by local WA                 Data Center
  authorities
                                                                                      Data Center
• What happens if the VM of target
  of interest transitions to NJ?

                                Net Optics Confidential and Proprietary
Virtualization, Clouds Are Global


Virtual
Machines
                                                                          Virtual
                                                                          Machines



                  Virtual
                  Machines
Data Center
                                                                           Data Center


                  Data Center                 Virtual
                                              Machines
                                                                                     Virtual
                                                                                     Machines



• LI Warrant issued by USA                      Data Center
  authorities
                                                                                      Data Center
• What happens if the VM of target
  of interest transitions to a
  different country?
                                Net Optics Confidential and Proprietary
CLI/VLI Solutions Requirments

           Monitor all blind spots


           Monitor VM migration


           Monitor Inter-VM traffic


           Multi Hypervisor support


            LI system agnostic


           Easily integrate with existing
           infrastructure
                  Net Optics Confidential and Proprietary   16   16
Existing Technology Solutions


                                                               PROBE
                        Server        Server      Server
                         VM            VM          VM
 Virtual Machine
      Layer
                                                                 Prod
                                                                Specific


 Virtual Ethernet
     Adapters


  Virtual Switch
       Layer
(VMware, Cisco)                             Virtual Switch



Physical Ethernet
   Adapters


                                  Network


                                                                           Physical Analysis
                                                                           Device


                     Net Optics Confidential and Proprietary
Limitations of Current Solutions
       All existing alternate solutions require promiscuous
                 mode and utilization of SPAN port

             Switch Level Monitoring
             • Degrades vSwitch throughput by up to 50%, may require
               multiple vSwitches to recreate needed throughput capacity
             • All or nothing solution (traffic mirrored)
             • Local operation does not provide ―big picture‖ visibility
             • Traffic sent out via tunnel or feeding local probe



             Local VM Probe
             • Most probes require dedicated core to operate
             • Probes are developed for specific product
             • Local operation does not provide ―big picture‖ visibility



                       Net Optics Confidential and Proprietary             18
A Different Approach for Hypervisor Monitoring

                                              Server       Server          Server     Phantom
                                               VM           VM              VM        Controller




     Enables Security,
Performance Monitoring and
       Compliance
 • 100% visibility of inter-VM                                               Hypervisor
                                                                             Virtual Tap
   traffic
 • Kernel implementation—no
   need for SPAN Ports /                                                            Virtual Switch
   Promiscuous Mode on Cisco
   1000V
 • Bridges virtual traffic to
   physical monitoring tools
                                                                    pNIC         pNIC


                                                                       Network


                                                                                    Physical Analysis Device


                                 Net Optics Confidential and Proprietary
Tunneling traffic of interest to the physical

            ESX
          ESX     vm1         vm2           vm3
        ESX     vm1         vm2           vm3
              vm1         vm2           vm3




                                        Activity
                                        Monitor
                                           V Switch
             Hypervisor




              Encapsulation
                    Tunnel
                                                                                 LEA




                                                                        Existing LEA
                                                                        infrastructure



                              Net Optics Confidential and Proprietary                    20
What do you
                                          do with all that
                                          virtual traffic?




Net Optics Confidential and Proprietary
There is light
at the end of
the tunnel…




                 Net Optics Confidential and Proprietary
Phantom HD

• A high-throughput
                                                                   ESX Virtual Hosts
  purpose built
  tunneling appliance                                        Phantom      vm1
                                                             Controller ESX 3
                                                               (VM)
                                                                                          vm2         vm3

                                                                    Phantom      vm1            vm2           vm3

• Developed to                                                     Controller ESX 4
                                                                       (VM)
                                                                           Phantom     vm1            vm2              vm3
                                                                           Controller
  handle                                                                     (VM)
                                                                                  Phantom
                                                                                 Controller
                                                                                              vm1            vm2                 vm3


  encapsulated                                                                      (VM)



  network traffic from                                                                            Phantom
                                                                                                  Monitor™
  Phantom monitors              LAN/WAN                                                                    Phantom
                                                                                                           Monitor™

• Optimized for point                                                                            Virtual
                                                                                                 Switch
                                                                                                                   Phantom
                                                                                                                   Monitor™


  to point transition of                                                                               Virtual
                                                                                                                             Phantom
                                                                                                                             Monitor™

                                                              Hypervisor                               Switch
  raw network traffic                                                Hypervisor
                                                                                                                 Virtual
                                                                                                                 Switch
                                                                                                                           Virtual
                                                                           Hypervisor                                      Switch


                                                                                  Hypervisor




                           Net Optics Confidential and Proprietary
Phantom HD–Single Location Deployment
                                          ESX
                                         ESX v          v       v
                                        ESX v m        vm      vm

• Decapsulates tunneled                     vm1
                                           m1
                                            1
                                                     vm2
                                                     m2
                                                     2
                                                             vm3
                                                             m3
                                                             3
                                                                          Physical Server           Physical Server
  traffic from Phantom
  Virtual Tap and other                                         Phantom
                                                                Monitor
                                                              Phantom     Physical Server           Physical Server
                                                                ™
                                                              Monitor
                                                            Phantom
  tunneling appliances                     Hypervisor
                                                              ™
                                                            Monitor
                                                              V
                                                                V
                                                            ™ Switch
                                         Hypervisor         V Switch

• Full Duplex 10GB wire
                                        Hypervisor          Switch




  speed performance                    Encapsulation
                                             Tunnel



• Augments physical Tap
  extensibility across
  LAN / WAN / Cloud                   Phantom HD™
  infrastructure                                                                              LAN/WA
                                                                                                N


                                                                             Net Optics Director™




                                                  LEA 1                               LEA 2




                                                  LEA 3                               LEA 4


                          Net Optics Confidential and Proprietary
Phantom HD–Global Deployment
       Remote Site / Branch Office                                                              Local Data Center

                                                                      ESX
                                                                     ESX v          v       v
                                                                    ESX v m        vm      vm
        Physical Server                                                 vm1      vm2     vm3
                                                                       m1        m2      m3
                                                                        1        2       3
                                                                                                        Physical Server           Physical Server
        Physical Server
                                                                                            Phantom
                                                                                            Monitor
                                                                                          Phantom       Physical Server           Physical Server
                                                                                            ™
                                                                                          Monitor
                                                                                        Phantom
                                                                                          ™
                                                                                        Monitor
                                                                                            V
                                                                        Hypervisor      ™ Switch
                                                                                          V
                                                                      Hypervisor        V Switch
     Phantom HD™                                                     Hypervisor         Switch


                                     Encapsulation
                                           Tunnel                   Encapsulation
                                                     LAN/WAN              Tunnel



• Remote locations capturing traffic
  of interest where low volume
  does not justify local                                                Phantom HD™
  instrumentation layer or IT staff                                                                                         LAN/WA
                                                                                                                              N

• Traffic of interest encapsulated
                                                                                                           Net Optics Director™
  and sent to central location
• Excellent for managed services                                              LEA 1                                 LEA 2

  providers
                                                                              LEA 3                                 LEA 4
                                             Net Optics Confidential and Proprietary
Virtualization Technologies,
    Cloud Infrastructure
     and the resulting
Lawful Interception challenge
Final Q&A, Wrap-up

Q&A

For additional information about Phantom Virtual Tap, including
access to the 30-day trial download:
http://gurl.im/1ca8290

For additional information about Phantom HD:
http://gurl.im/dc69291

Sign up for email notifications of future webinars:
http://gurl.im/dd29292




                       Net Optics Confidential and Proprietary    29
Thank You
   Visit us at:
www.netoptics.com

Contenu connexe

Tendances

Covmug v sphere 4.1 what's new
Covmug v sphere 4.1 what's newCovmug v sphere 4.1 what's new
Covmug v sphere 4.1 what's new
esarakaitis
 
9 dani künzli citrix cloud solution 2
9 dani künzli citrix cloud solution 29 dani künzli citrix cloud solution 2
9 dani künzli citrix cloud solution 2
Digicomp Academy AG
 
Virtual sharp cloud aware bc dr up 2012 cloud
Virtual sharp cloud aware bc dr up 2012 cloudVirtual sharp cloud aware bc dr up 2012 cloud
Virtual sharp cloud aware bc dr up 2012 cloud
Khazret Sapenov
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
Digicomp Academy AG
 
Track 3 - next generation computing
Track 3 - next generation computingTrack 3 - next generation computing
Track 3 - next generation computing
EMC Forum India
 
Virtual Insight 032609
Virtual Insight 032609Virtual Insight 032609
Virtual Insight 032609
patriciafriar
 
Using Server Virtualization for Manufacturing Operations
Using Server Virtualization for Manufacturing OperationsUsing Server Virtualization for Manufacturing Operations
Using Server Virtualization for Manufacturing Operations
ARC Advisory Group
 
Symantec VMworld 2011 News
Symantec VMworld 2011 NewsSymantec VMworld 2011 News
Symantec VMworld 2011 News
Symantec
 
Virsto Software Extends Storage Hypervisor Leadership with Release of Virsto ...
Virsto Software Extends Storage Hypervisor Leadership with Release of Virsto ...Virsto Software Extends Storage Hypervisor Leadership with Release of Virsto ...
Virsto Software Extends Storage Hypervisor Leadership with Release of Virsto ...
Virsto Software
 
Presentation enterprise cloud & v clouddatacenter
Presentation   enterprise cloud & v clouddatacenterPresentation   enterprise cloud & v clouddatacenter
Presentation enterprise cloud & v clouddatacenter
xKinAnx
 
Cloud Foundry Open Tour Keynote
Cloud Foundry Open Tour KeynoteCloud Foundry Open Tour Keynote
Cloud Foundry Open Tour Keynote
RamnivasLaddad
 
VMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell GroupwiseVMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell Groupwise
Mike K
 

Tendances (20)

DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...
DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...
 
Covmug v sphere 4.1 what's new
Covmug v sphere 4.1 what's newCovmug v sphere 4.1 what's new
Covmug v sphere 4.1 what's new
 
9 dani künzli citrix cloud solution 2
9 dani künzli citrix cloud solution 29 dani künzli citrix cloud solution 2
9 dani künzli citrix cloud solution 2
 
Virtual sharp cloud aware bc dr up 2012 cloud
Virtual sharp cloud aware bc dr up 2012 cloudVirtual sharp cloud aware bc dr up 2012 cloud
Virtual sharp cloud aware bc dr up 2012 cloud
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
 
Apresentações | Jantar Exclusivo Cisco e Netapp | 27 de Junho de 2012 | Spett...
Apresentações | Jantar Exclusivo Cisco e Netapp | 27 de Junho de 2012 | Spett...Apresentações | Jantar Exclusivo Cisco e Netapp | 27 de Junho de 2012 | Spett...
Apresentações | Jantar Exclusivo Cisco e Netapp | 27 de Junho de 2012 | Spett...
 
Track 3 - next generation computing
Track 3 - next generation computingTrack 3 - next generation computing
Track 3 - next generation computing
 
Virtual Insight 032609
Virtual Insight 032609Virtual Insight 032609
Virtual Insight 032609
 
Evolution of Network Virtualization
Evolution of Network VirtualizationEvolution of Network Virtualization
Evolution of Network Virtualization
 
Vm Ware Presentation Key Note
Vm Ware Presentation Key NoteVm Ware Presentation Key Note
Vm Ware Presentation Key Note
 
Using Server Virtualization for Manufacturing Operations
Using Server Virtualization for Manufacturing OperationsUsing Server Virtualization for Manufacturing Operations
Using Server Virtualization for Manufacturing Operations
 
comparative study of Cloud computing tools
comparative study of Cloud computing tools comparative study of Cloud computing tools
comparative study of Cloud computing tools
 
Symantec VMworld 2011 News
Symantec VMworld 2011 NewsSymantec VMworld 2011 News
Symantec VMworld 2011 News
 
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
 
Rfs4000 spec sheet
Rfs4000 spec sheetRfs4000 spec sheet
Rfs4000 spec sheet
 
Virsto Software Extends Storage Hypervisor Leadership with Release of Virsto ...
Virsto Software Extends Storage Hypervisor Leadership with Release of Virsto ...Virsto Software Extends Storage Hypervisor Leadership with Release of Virsto ...
Virsto Software Extends Storage Hypervisor Leadership with Release of Virsto ...
 
Rackforce the cloud
Rackforce the cloudRackforce the cloud
Rackforce the cloud
 
Presentation enterprise cloud & v clouddatacenter
Presentation   enterprise cloud & v clouddatacenterPresentation   enterprise cloud & v clouddatacenter
Presentation enterprise cloud & v clouddatacenter
 
Cloud Foundry Open Tour Keynote
Cloud Foundry Open Tour KeynoteCloud Foundry Open Tour Keynote
Cloud Foundry Open Tour Keynote
 
VMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell GroupwiseVMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell Groupwise
 

Similaire à Lawful Interception in Virtual Environments

Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
bjhutt
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
bjhutt
 
VMWorld 2009 Presentation
VMWorld 2009 PresentationVMWorld 2009 Presentation
VMWorld 2009 Presentation
Ahmed Sallam
 
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfIntegrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdf
OpenStack Foundation
 
Windows server 8 hyper v networking (aidan finn)
Windows server 8 hyper v networking (aidan finn)Windows server 8 hyper v networking (aidan finn)
Windows server 8 hyper v networking (aidan finn)
hypervnu
 
Data Center Convergentes - Carlos Spera - 20 de octubre - UY
Data Center Convergentes - Carlos Spera - 20 de octubre - UYData Center Convergentes - Carlos Spera - 20 de octubre - UY
Data Center Convergentes - Carlos Spera - 20 de octubre - UY
Logicalis Latam
 

Similaire à Lawful Interception in Virtual Environments (20)

Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
 
Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Cloud Security Topics: Network Intrusion Detection for Amazon EC2Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Cloud Security Topics: Network Intrusion Detection for Amazon EC2
 
Net Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case StudyNet Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case Study
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
 
Service Virtualization
Service VirtualizationService Virtualization
Service Virtualization
 
ITIL Virtualization - ITSM Academy Webinar
ITIL Virtualization - ITSM Academy WebinarITIL Virtualization - ITSM Academy Webinar
ITIL Virtualization - ITSM Academy Webinar
 
Layer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model RequirementsLayer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model Requirements
 
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
 
VMWorld 2009 Presentation
VMWorld 2009 PresentationVMWorld 2009 Presentation
VMWorld 2009 Presentation
 
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfIntegrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdf
 
Windows server 8 hyper v networking (aidan finn)
Windows server 8 hyper v networking (aidan finn)Windows server 8 hyper v networking (aidan finn)
Windows server 8 hyper v networking (aidan finn)
 
Cloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew TuckerCloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
 
Campus jueves
Campus juevesCampus jueves
Campus jueves
 
Keeping IT Real Webinar
Keeping IT Real WebinarKeeping IT Real Webinar
Keeping IT Real Webinar
 
Learn OpenStack from trystack.cn ——Folsom in practice
Learn OpenStack from trystack.cn  ——Folsom in practiceLearn OpenStack from trystack.cn  ——Folsom in practice
Learn OpenStack from trystack.cn ——Folsom in practice
 
Windows Server 8 Hyper V Networking
Windows Server 8 Hyper V NetworkingWindows Server 8 Hyper V Networking
Windows Server 8 Hyper V Networking
 
Performance Vision - What's new in version 2.9
Performance Vision - What's new in version 2.9Performance Vision - What's new in version 2.9
Performance Vision - What's new in version 2.9
 
Alcatellucentsdn2013
Alcatellucentsdn2013Alcatellucentsdn2013
Alcatellucentsdn2013
 
Data Center Convergentes - Carlos Spera - 20 de octubre - UY
Data Center Convergentes - Carlos Spera - 20 de octubre - UYData Center Convergentes - Carlos Spera - 20 de octubre - UY
Data Center Convergentes - Carlos Spera - 20 de octubre - UY
 
Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2
Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2
Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2
 

Plus de LiveAction Next Generation Network Management Software

Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
LiveAction Next Generation Network Management Software
 
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
LiveAction Next Generation Network Management Software
 

Plus de LiveAction Next Generation Network Management Software (20)

VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
 
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
 
Cisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution BriefCisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution Brief
 
Infographic: Aim Straight at Your Application Performance Issues
Infographic: Aim Straight at Your Application Performance IssuesInfographic: Aim Straight at Your Application Performance Issues
Infographic: Aim Straight at Your Application Performance Issues
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
Leveraging vSphere 5.0 For Optimal Visibility and EfficiencyLeveraging vSphere 5.0 For Optimal Visibility and Efficiency
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
 
Security-Centric Networking
Security-Centric NetworkingSecurity-Centric Networking
Security-Centric Networking
 
Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?
 
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring SwitchOverview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
 
High-Availability Security Monitoring Using Bypass Switches
High-Availability Security Monitoring Using Bypass SwitchesHigh-Availability Security Monitoring Using Bypass Switches
High-Availability Security Monitoring Using Bypass Switches
 
Tap Into the Health of Your Network
Tap Into the Health of Your NetworkTap Into the Health of Your Network
Tap Into the Health of Your Network
 
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
 
Compliance Challenges in a Virtualized Environment
Compliance Challenges in a Virtualized EnvironmentCompliance Challenges in a Virtualized Environment
Compliance Challenges in a Virtualized Environment
 
Network Security in a Virtualized Environment
Network Security in a Virtualized EnvironmentNetwork Security in a Virtualized Environment
Network Security in a Virtualized Environment
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Lawful Interception in Virtual Environments

  • 1. Lawful Interception in Virtual Environment Ran Nahmias Director, Virtualization and Cloud solutions Net Optics, Inc. Intelligent Access and Monitoring Architecture
  • 2. Presenter Ran Nahmias Director, Virtualization and Cloud Solutions Net Optics, Inc. Over 15 years of experience in networking, security, desktop and server virtualization in engineering, product management and deployment roles for market leaders such as Check Point Software Technologies, Nice Systems, Microsoft and Net Optics. Net Optics Confidential and Proprietary 2
  • 3. Goal Review how the growing adoption of Virtualization and Cloud Services challenges Lawful Interception compliance in converged (physical & virtual) or homogeneous virtual environments. Net Optics Confidential and Proprietary 3
  • 4. Agenda 1. Intro 2. Virtualization adoption trends 3. The visibility challenge 4. The elasticity challenge 5. LI Compliance 6. Net Optics solutions 7. Q & A Net Optics Confidential and Proprietary 4
  • 5. Virtualization In The DC: More Than a Trend Virtualization deployment increasing year over year in data centers. Gartner: over 30% of x86 architecture servers workloads running on VMs Double digit annual growth Virtualization – Great CAPEX improvements, no visibility. – Passive monitoring of Inter-Virtual Machine Traffic is nonexistent. Net Optics Confidential and Proprietary 5
  • 6. Did You Know? • Last year was the first year in which more virtual servers were shipped than physical servers. • IDC estimates that today nearly 10% of the information running through servers is doing so on virtualized systems • IDC estimates that number to grow to more than 20% in 2015. • This percentage increases along with the size of the organization. Some larger environments today operate with 100% virtualized systems. Source: EMC and IDC 10/2011 Net Optics Confidential and Proprietary 6
  • 7. Did You Know? • Cloud computing accounts for less than 2% of IT spending today, IDC estimates that by 2015 nearly 20% of the information will be "touched" by cloud computing service • Perhaps as much as 10% will be maintained in a cloud. • Much of the current movement to cloud architectures is being enabled by pervasive adoption of virtualization. Source: EMC and IDC 10/2011 Net Optics Confidential and Proprietary 7
  • 8. Why Should I Care About CLI/VLI With advanced LI tools, everyone knows you are a dog, unless you “anonymize” your identity through the cloud The secured perimeter no longer exist New technologies present challenges to observe and obtain the data Net Optics Confidential and Proprietary 8
  • 9. Reminder: What is ―The Cloud‖ Monitor the hypervisor and you can monitor the cloud: Source: VMware Net Optics Confidential and Proprietary
  • 10. Virtualization = Invisibility Net Optics Confidential and Proprietary
  • 11. Hypervisor Virtual Network Monitoring Challenge ESX Virtual Stack vm1 vm2 vm3 Physical Network Security & Virtualization Creates Monitoring Security, Monitoring and Compliance Risks Virtual Switch LI • No visibility into inter-VM traffic, Infosec vulnerabilities or threats • Lacks auditing of data passing between virtual servers Physical Host Server • Inability to pinpoint resource utilization issues Net Optics Confidential and Proprietary
  • 12. Visualizing the blind spots VM1 VM2 VM3 VM4 App App App App Service OS OS OS OS Console Virtual Ethernet Adapters ESX vSphere vSwitches Physical Ethernet Adapters ? Production Production Management LAN LAN LAN Tool of choice Net Optics Confidential and Proprietary
  • 13. Cloud = elasticity Net Optics Confidential and Proprietary
  • 14. Virtualization, Clouds Are Elastic Virtual Machines Virtual Machines Virtual Machines Data Center Data Center Data Center Virtual Machines Virtual Machines • LI Warrant issued by local WA Data Center authorities Data Center • What happens if the VM of target of interest transitions to NJ? Net Optics Confidential and Proprietary
  • 15. Virtualization, Clouds Are Global Virtual Machines Virtual Machines Virtual Machines Data Center Data Center Data Center Virtual Machines Virtual Machines • LI Warrant issued by USA Data Center authorities Data Center • What happens if the VM of target of interest transitions to a different country? Net Optics Confidential and Proprietary
  • 16. CLI/VLI Solutions Requirments Monitor all blind spots Monitor VM migration Monitor Inter-VM traffic Multi Hypervisor support LI system agnostic Easily integrate with existing infrastructure Net Optics Confidential and Proprietary 16 16
  • 17. Existing Technology Solutions PROBE Server Server Server VM VM VM Virtual Machine Layer Prod Specific Virtual Ethernet Adapters Virtual Switch Layer (VMware, Cisco) Virtual Switch Physical Ethernet Adapters Network Physical Analysis Device Net Optics Confidential and Proprietary
  • 18. Limitations of Current Solutions All existing alternate solutions require promiscuous mode and utilization of SPAN port Switch Level Monitoring • Degrades vSwitch throughput by up to 50%, may require multiple vSwitches to recreate needed throughput capacity • All or nothing solution (traffic mirrored) • Local operation does not provide ―big picture‖ visibility • Traffic sent out via tunnel or feeding local probe Local VM Probe • Most probes require dedicated core to operate • Probes are developed for specific product • Local operation does not provide ―big picture‖ visibility Net Optics Confidential and Proprietary 18
  • 19. A Different Approach for Hypervisor Monitoring Server Server Server Phantom VM VM VM Controller Enables Security, Performance Monitoring and Compliance • 100% visibility of inter-VM Hypervisor Virtual Tap traffic • Kernel implementation—no need for SPAN Ports / Virtual Switch Promiscuous Mode on Cisco 1000V • Bridges virtual traffic to physical monitoring tools pNIC pNIC Network Physical Analysis Device Net Optics Confidential and Proprietary
  • 20. Tunneling traffic of interest to the physical ESX ESX vm1 vm2 vm3 ESX vm1 vm2 vm3 vm1 vm2 vm3 Activity Monitor V Switch Hypervisor Encapsulation Tunnel LEA Existing LEA infrastructure Net Optics Confidential and Proprietary 20
  • 21. What do you do with all that virtual traffic? Net Optics Confidential and Proprietary
  • 22. There is light at the end of the tunnel… Net Optics Confidential and Proprietary
  • 23.
  • 24. Phantom HD • A high-throughput ESX Virtual Hosts purpose built tunneling appliance Phantom vm1 Controller ESX 3 (VM) vm2 vm3 Phantom vm1 vm2 vm3 • Developed to Controller ESX 4 (VM) Phantom vm1 vm2 vm3 Controller handle (VM) Phantom Controller vm1 vm2 vm3 encapsulated (VM) network traffic from Phantom Monitor™ Phantom monitors LAN/WAN Phantom Monitor™ • Optimized for point Virtual Switch Phantom Monitor™ to point transition of Virtual Phantom Monitor™ Hypervisor Switch raw network traffic Hypervisor Virtual Switch Virtual Hypervisor Switch Hypervisor Net Optics Confidential and Proprietary
  • 25. Phantom HD–Single Location Deployment ESX ESX v v v ESX v m vm vm • Decapsulates tunneled vm1 m1 1 vm2 m2 2 vm3 m3 3 Physical Server Physical Server traffic from Phantom Virtual Tap and other Phantom Monitor Phantom Physical Server Physical Server ™ Monitor Phantom tunneling appliances Hypervisor ™ Monitor V V ™ Switch Hypervisor V Switch • Full Duplex 10GB wire Hypervisor Switch speed performance Encapsulation Tunnel • Augments physical Tap extensibility across LAN / WAN / Cloud Phantom HD™ infrastructure LAN/WA N Net Optics Director™ LEA 1 LEA 2 LEA 3 LEA 4 Net Optics Confidential and Proprietary
  • 26. Phantom HD–Global Deployment Remote Site / Branch Office Local Data Center ESX ESX v v v ESX v m vm vm Physical Server vm1 vm2 vm3 m1 m2 m3 1 2 3 Physical Server Physical Server Physical Server Phantom Monitor Phantom Physical Server Physical Server ™ Monitor Phantom ™ Monitor V Hypervisor ™ Switch V Hypervisor V Switch Phantom HD™ Hypervisor Switch Encapsulation Tunnel Encapsulation LAN/WAN Tunnel • Remote locations capturing traffic of interest where low volume does not justify local Phantom HD™ instrumentation layer or IT staff LAN/WA N • Traffic of interest encapsulated Net Optics Director™ and sent to central location • Excellent for managed services LEA 1 LEA 2 providers LEA 3 LEA 4 Net Optics Confidential and Proprietary
  • 27. Virtualization Technologies, Cloud Infrastructure and the resulting Lawful Interception challenge
  • 28.
  • 29. Final Q&A, Wrap-up Q&A For additional information about Phantom Virtual Tap, including access to the 30-day trial download: http://gurl.im/1ca8290 For additional information about Phantom HD: http://gurl.im/dc69291 Sign up for email notifications of future webinars: http://gurl.im/dd29292 Net Optics Confidential and Proprietary 29
  • 30. Thank You Visit us at: www.netoptics.com

Notes de l'éditeur

  1. This diagram – Converged solution – where physical and virtual monitoring traffic is merged and monitored by your existing Physical Tools Phantom Monitor (Virtual Tap) installed in your ESX hypervisor sends GRE encapsulated traffic to the Phantom HD where it is decapsulated and sent to the Net Optics Director. At the same time, your physical monitoring traffic is sent directly to the Net Optics Director Data Monitoring Switch The Director then switches your converged monitoring traffic out to your existing tools. The benefit to you?: Your existing Monitoring Infrastructure extends to both Virtual and Physical traffic.
  2. The big BIG picture. Central offices and remote officesDevices and personnel not located at remote locationsUse Phantom HD to encapsulate traffic of choice from your remote location