SlideShare a Scribd company logo
1 of 24
How to Select a
Security Visibility
Solution
Are you asking the right
questions?
June 2016
AGENDA HIGHLIGHTS
• Why security visibility?
• The case for packet flow switching
• How to formulate your requirements
• Key requirements for inline security
• Case study and takeaways
Ksenia Coffman
Product Marketing Manager
NETSCOUT
SPEAKERS:
2©2016 NETSCOUT
SECURITY ATTACK TRENDS
3
Source: Arbor Networks (2016): Worldwide Infrastructure Security Report, vol. XI
©2016 NETSCOUT
EVOLVING NEEDS
©2016 NETSCOUT ° CONFIDENTIAL & PROPRIETARY 4
The need to
optimize packet flow
Complex security
scenarios
Active, passive
and hybrid security
Archiving and
spooling
New and more
security tools
Security threats: Bigger, faster, more complex
State of network security threats
Are we better off than
two years ago?
SECURITY WITHOUT VISIBILITY
• Individual silos of security and single points of failure
• Complex configuration and change management
6©2016 NETSCOUT
Why Security
Visibility: The
Case for Packet
Flow Switching
WHAT IS A PACKET FLOW SWITCH?
8
Network Centralized Tools
Application
Performance
Management
Network
Performance
Management
Customer
Experience
Management
Security
From the Network To the Tools
An Appliance to
Optimize Packet Flow
©2016 NETSCOUT
MATRIX SWITCHES
• Entry-level packet broker: NPB software + COTS
• Does not scale for advanced capabilities and performance
Application
Performance
Management
Network
Performance
Management
Customer
Experience
Management
Security
Packets Not Reaching Tools
ADVANCED FUNCTIONALITY
MISSING
9
Network Centralized Tools
SOFTWARE BASED MONITORING SWITCH
• The software based monitoring switch adds compute capabilities to matrix-switches
• Lack hardware acceleration behind every port
• Difficult and costly to scale
1010
PERFORMANCE
DEGRADES
Application
Performance
Management
Network
Performance
Management
Customer
Experience
Management
Security
Network Centralized Tools
TRUE PACKET FLOW SWITCHING
Network Centralized ToolsPFS
Security
NGFW
IDS
IPS
Network Centralized Tools
Application
Performance
Management
Network
Performance
Management
Customer
Experience
Management
Security
SLICING: Remove unnecessary payload
Slicing
PFS
Filtering
Replication
Slicing Stripping
Speed Conversion Aggregation Load Balance
De-Duplication
©2016 NETSCOUT
Network Centralized Tools
Application
Performance
Management
Network
Performance
Management
Customer
Experience
Management
Security
STRIPPING: Enable processing of encapsulated packets
Stripping
PFS
Filtering
Replication
Slicing Stripping
Speed Conversion Aggregation Load Balance
De-Duplication
©2016 NETSCOUT
Key Questions to
Ask About a
Security Visibility
Solution
WHAT ABOUT PERFORMANCE?
Traffic grows Performance degrades
CAN YOU HANDLE TRAFFIC GROWTH?
Traffic Grows
13
Tools overrun, limited load balancing
DO YOU SUPPORT INLINE SECURITY?
Inline tools Single Points of Failure
14©2016 NETSCOUT
WHAT ABOUT HEALTH CHECKS & TRIGGERS?
• Both positive and negative
health checks are required
• Conditional triggers are key
• Each security system in the
tool chain should have a
different trigger
17©2016 NETSCOUT
CAN YOUR SYSTEM SUPPORT TOOL CHAINING?
Inline Monitor
Inline
Network
Aggregated Traffic
2 4 6
7
1
3 5
Inline Tool Chain
NGFW
LB Group
1 Web
8
NGFW Web Gateway IPS
IPS
IN IN IN
18
IM IMIM IM IM IM
©2016 NETSCOUT
Case
study
CASE STUDY: Large Private Cloud
• Unified packet plane
achieves complete
visibility
21
PACKET FLOW SWITCHING FOR SECURITY VISIBILITY
Network Security Systems
Security
NGFW
IDS
IPS
PFS 2204
PFS 4204
Unified Packet Plane
TriggersNetwork bypass Health Check Tool chainingActive inline
Filtering
Replication
Slicing Stripping
Speed Conversion Aggregation Load Balance
De-Duplication
E N T E R P R I S E . N E T S C O U T. C O M
THE RIGHT SECURITY VISIBILITY SOLUTION:
• Helps retain investment in existing security systems
• Simplifies adds, tests and changes
• Supports both performance assurance and cybersecurity
Additional
Resources
E N T E R P R I S E . N E T S C O U T. C O M
• Listen to the live webinar here
• Enterprise Networks: No Tool Left Behind

More Related Content

What's hot

SplunkLive! Customer Presentation – Cox Automotive
SplunkLive! Customer Presentation – Cox AutomotiveSplunkLive! Customer Presentation – Cox Automotive
SplunkLive! Customer Presentation – Cox AutomotiveSplunk
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMwareVMUG IT
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitiveCisco Canada
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...AlgoSec
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple ITCisco Canada
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with merakiCisco Canada
 
Cloud migrations made simpler safe secure and successful migrations
Cloud migrations made simpler   safe secure and successful migrationsCloud migrations made simpler   safe secure and successful migrations
Cloud migrations made simpler safe secure and successful migrationsAlgoSec
 
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation MachineNETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation MachineNETSCOUT
 
Beyond the Radio: Exploring the terra incognita of mobile networks with the I...
Beyond the Radio: Exploring the terra incognita of mobile networks with the I...Beyond the Radio: Exploring the terra incognita of mobile networks with the I...
Beyond the Radio: Exploring the terra incognita of mobile networks with the I...Narseo Rodriguez
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...AlgoSec
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivityshira koper
 
Securing Your Cloud Transformation
Securing Your Cloud TransformationSecuring Your Cloud Transformation
Securing Your Cloud TransformationMarketingArrowECS_CZ
 
Intent Based Networking: turning intentions into reality with network securit...
Intent Based Networking: turning intentions into reality with network securit...Intent Based Networking: turning intentions into reality with network securit...
Intent Based Networking: turning intentions into reality with network securit...shira koper
 
Digital Transformation - Cisco's Journey
Digital Transformation - Cisco's JourneyDigital Transformation - Cisco's Journey
Digital Transformation - Cisco's JourneyCisco Canada
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloudAlgoSec
 
Endpoint Agent Part 3: LAN, Wireless, Gateways and Proxies
Endpoint Agent Part 3: LAN, Wireless, Gateways and ProxiesEndpoint Agent Part 3: LAN, Wireless, Gateways and Proxies
Endpoint Agent Part 3: LAN, Wireless, Gateways and ProxiesThousandEyes
 
Exhibitor session: Efficient IP
Exhibitor session: Efficient IPExhibitor session: Efficient IP
Exhibitor session: Efficient IPJisc
 
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Cisco Connect Halifax 2018   Application insight and zero trust policies with...Cisco Connect Halifax 2018   Application insight and zero trust policies with...
Cisco Connect Halifax 2018 Application insight and zero trust policies with...Cisco Canada
 
Cisco connect winnipeg 2018 simplifying cloud adoption with cisco ucs
Cisco connect winnipeg 2018   simplifying cloud adoption with cisco ucsCisco connect winnipeg 2018   simplifying cloud adoption with cisco ucs
Cisco connect winnipeg 2018 simplifying cloud adoption with cisco ucsCisco Canada
 
Detection, Response and the Azazel Rootkit
Detection, Response and the Azazel RootkitDetection, Response and the Azazel Rootkit
Detection, Response and the Azazel RootkitThreat Stack
 

What's hot (20)

SplunkLive! Customer Presentation – Cox Automotive
SplunkLive! Customer Presentation – Cox AutomotiveSplunkLive! Customer Presentation – Cox Automotive
SplunkLive! Customer Presentation – Cox Automotive
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitive
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple IT
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
 
Cloud migrations made simpler safe secure and successful migrations
Cloud migrations made simpler   safe secure and successful migrationsCloud migrations made simpler   safe secure and successful migrations
Cloud migrations made simpler safe secure and successful migrations
 
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation MachineNETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
 
Beyond the Radio: Exploring the terra incognita of mobile networks with the I...
Beyond the Radio: Exploring the terra incognita of mobile networks with the I...Beyond the Radio: Exploring the terra incognita of mobile networks with the I...
Beyond the Radio: Exploring the terra incognita of mobile networks with the I...
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
 
Securing Your Cloud Transformation
Securing Your Cloud TransformationSecuring Your Cloud Transformation
Securing Your Cloud Transformation
 
Intent Based Networking: turning intentions into reality with network securit...
Intent Based Networking: turning intentions into reality with network securit...Intent Based Networking: turning intentions into reality with network securit...
Intent Based Networking: turning intentions into reality with network securit...
 
Digital Transformation - Cisco's Journey
Digital Transformation - Cisco's JourneyDigital Transformation - Cisco's Journey
Digital Transformation - Cisco's Journey
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloud
 
Endpoint Agent Part 3: LAN, Wireless, Gateways and Proxies
Endpoint Agent Part 3: LAN, Wireless, Gateways and ProxiesEndpoint Agent Part 3: LAN, Wireless, Gateways and Proxies
Endpoint Agent Part 3: LAN, Wireless, Gateways and Proxies
 
Exhibitor session: Efficient IP
Exhibitor session: Efficient IPExhibitor session: Efficient IP
Exhibitor session: Efficient IP
 
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Cisco Connect Halifax 2018   Application insight and zero trust policies with...Cisco Connect Halifax 2018   Application insight and zero trust policies with...
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
 
Cisco connect winnipeg 2018 simplifying cloud adoption with cisco ucs
Cisco connect winnipeg 2018   simplifying cloud adoption with cisco ucsCisco connect winnipeg 2018   simplifying cloud adoption with cisco ucs
Cisco connect winnipeg 2018 simplifying cloud adoption with cisco ucs
 
Detection, Response and the Azazel Rootkit
Detection, Response and the Azazel RootkitDetection, Response and the Azazel Rootkit
Detection, Response and the Azazel Rootkit
 

Viewers also liked

Container con toronto
Container con torontoContainer con toronto
Container con torontoDan Lambright
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Bitglass
 
In Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationIn Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationItzik Kotler
 
20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trendsYi-Lang Tsai
 
Everything you wanted to know about cabling but were afraid to ask
Everything you wanted to know about cabling but were afraid to askEverything you wanted to know about cabling but were afraid to ask
Everything you wanted to know about cabling but were afraid to askEmulex Corporation
 
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Grant Swanson
 
Wired Update 7 22 09
Wired Update 7 22 09Wired Update 7 22 09
Wired Update 7 22 09bigalgonzo
 
Q1 fy15 earnings call slides draft 9-3-2014
Q1 fy15 earnings call slides draft 9-3-2014Q1 fy15 earnings call slides draft 9-3-2014
Q1 fy15 earnings call slides draft 9-3-2014Jo Thorgen
 
Fujitsu Iccad Presentation--Enable 100G
Fujitsu Iccad Presentation--Enable 100GFujitsu Iccad Presentation--Enable 100G
Fujitsu Iccad Presentation--Enable 100Gkennliu
 
WebEx Avago Presentation for Eccolo Media 2010
WebEx Avago Presentation for Eccolo Media 2010WebEx Avago Presentation for Eccolo Media 2010
WebEx Avago Presentation for Eccolo Media 2010Matthew McHale
 
Gigamon GigaVue 2404 Hardware Tour
Gigamon GigaVue 2404 Hardware TourGigamon GigaVue 2404 Hardware Tour
Gigamon GigaVue 2404 Hardware TourBill Sipovic
 
Derbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: SandboxesDerbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: SandboxesBromium Labs
 
Gigamon Systems GigaVUE-420 Hardware Tour
Gigamon Systems GigaVUE-420 Hardware TourGigamon Systems GigaVUE-420 Hardware Tour
Gigamon Systems GigaVUE-420 Hardware Tourgigamon_systems
 
2013 datwyler training 4 fibre product overview - info tech middle east
2013 datwyler training 4   fibre product overview - info tech middle east2013 datwyler training 4   fibre product overview - info tech middle east
2013 datwyler training 4 fibre product overview - info tech middle eastAli Shoaee
 
CASBs: Real World Use Cases
CASBs: Real World Use CasesCASBs: Real World Use Cases
CASBs: Real World Use CasesBitglass
 
NetScout Systems corporate overview
NetScout Systems corporate overviewNetScout Systems corporate overview
NetScout Systems corporate overviewBAKOTECH
 
Metro High-Speed Product Line Manager
Metro High-Speed Product Line ManagerMetro High-Speed Product Line Manager
Metro High-Speed Product Line ManagerCPqD
 

Viewers also liked (20)

WXRCTVYV
WXRCTVYVWXRCTVYV
WXRCTVYV
 
revisedhoneypot429
revisedhoneypot429revisedhoneypot429
revisedhoneypot429
 
Container con toronto
Container con torontoContainer con toronto
Container con toronto
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?
 
In Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationIn Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect Exfiltration
 
20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Everything you wanted to know about cabling but were afraid to ask
Everything you wanted to know about cabling but were afraid to askEverything you wanted to know about cabling but were afraid to ask
Everything you wanted to know about cabling but were afraid to ask
 
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
 
Wired Update 7 22 09
Wired Update 7 22 09Wired Update 7 22 09
Wired Update 7 22 09
 
Q1 fy15 earnings call slides draft 9-3-2014
Q1 fy15 earnings call slides draft 9-3-2014Q1 fy15 earnings call slides draft 9-3-2014
Q1 fy15 earnings call slides draft 9-3-2014
 
Fujitsu Iccad Presentation--Enable 100G
Fujitsu Iccad Presentation--Enable 100GFujitsu Iccad Presentation--Enable 100G
Fujitsu Iccad Presentation--Enable 100G
 
WebEx Avago Presentation for Eccolo Media 2010
WebEx Avago Presentation for Eccolo Media 2010WebEx Avago Presentation for Eccolo Media 2010
WebEx Avago Presentation for Eccolo Media 2010
 
Gigamon GigaVue 2404 Hardware Tour
Gigamon GigaVue 2404 Hardware TourGigamon GigaVue 2404 Hardware Tour
Gigamon GigaVue 2404 Hardware Tour
 
Derbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: SandboxesDerbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: Sandboxes
 
Gigamon Systems GigaVUE-420 Hardware Tour
Gigamon Systems GigaVUE-420 Hardware TourGigamon Systems GigaVUE-420 Hardware Tour
Gigamon Systems GigaVUE-420 Hardware Tour
 
2013 datwyler training 4 fibre product overview - info tech middle east
2013 datwyler training 4   fibre product overview - info tech middle east2013 datwyler training 4   fibre product overview - info tech middle east
2013 datwyler training 4 fibre product overview - info tech middle east
 
CASBs: Real World Use Cases
CASBs: Real World Use CasesCASBs: Real World Use Cases
CASBs: Real World Use Cases
 
NetScout Systems corporate overview
NetScout Systems corporate overviewNetScout Systems corporate overview
NetScout Systems corporate overview
 
Metro High-Speed Product Line Manager
Metro High-Speed Product Line ManagerMetro High-Speed Product Line Manager
Metro High-Speed Product Line Manager
 

Similar to How to Select a Security Visibility Solution

Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSLarry Austin
 
Itmgen 4317 security
Itmgen 4317 securityItmgen 4317 security
Itmgen 4317 securityCisco
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentAlgoSec
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldMark Nunnikhoven
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...Cohesive Networks
 
Juniper competitive cheatsheet
Juniper competitive cheatsheetJuniper competitive cheatsheet
Juniper competitive cheatsheetUsman Arif
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshopSTelligence Company
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
How a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessHow a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessSplunk
 
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPROIDEA
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersEnterprise Management Associates
 
Invea - Jiri Tobola
Invea - Jiri TobolaInvea - Jiri Tobola
Invea - Jiri TobolaJan Fried
 
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...Cisco Canada
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 

Similar to How to Select a Security Visibility Solution (20)

Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
 
Itmgen 4317 security
Itmgen 4317 securityItmgen 4317 security
Itmgen 4317 security
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Juniper competitive cheatsheet
Juniper competitive cheatsheetJuniper competitive cheatsheet
Juniper competitive cheatsheet
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshop
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
How a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessHow a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the Business
 
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet Brokers
 
Invea - Jiri Tobola
Invea - Jiri TobolaInvea - Jiri Tobola
Invea - Jiri Tobola
 
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 

More from NETSCOUT

There's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalThere's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalNETSCOUT
 
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseNETSCOUT
 
6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service ProvidersNETSCOUT
 
RF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and DesignRF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and DesignNETSCOUT
 
Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance NETSCOUT
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...NETSCOUT
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...NETSCOUT
 
nGeniusPULSE Quick Look
nGeniusPULSE Quick LooknGeniusPULSE Quick Look
nGeniusPULSE Quick LookNETSCOUT
 
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 NETSCOUT
 
Hybrid Cloud - Digital Transformatiom
Hybrid Cloud - Digital TransformatiomHybrid Cloud - Digital Transformatiom
Hybrid Cloud - Digital TransformatiomNETSCOUT
 
Digital Transformation starts with Service Assurance
Digital Transformation starts with Service AssuranceDigital Transformation starts with Service Assurance
Digital Transformation starts with Service AssuranceNETSCOUT
 
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiDeceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiNETSCOUT
 

More from NETSCOUT (12)

There's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalThere's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a Hospital
 
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in Defense
 
6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers6 Key Findings Security Findings for Service Providers
6 Key Findings Security Findings for Service Providers
 
RF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and DesignRF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and Design
 
Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
 
nGeniusPULSE Quick Look
nGeniusPULSE Quick LooknGeniusPULSE Quick Look
nGeniusPULSE Quick Look
 
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
 
Hybrid Cloud - Digital Transformatiom
Hybrid Cloud - Digital TransformatiomHybrid Cloud - Digital Transformatiom
Hybrid Cloud - Digital Transformatiom
 
Digital Transformation starts with Service Assurance
Digital Transformation starts with Service AssuranceDigital Transformation starts with Service Assurance
Digital Transformation starts with Service Assurance
 
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-FiDeceptive Speed: How to Fix Fast, Unstable Wi-Fi
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

How to Select a Security Visibility Solution

  • 1. How to Select a Security Visibility Solution Are you asking the right questions? June 2016
  • 2. AGENDA HIGHLIGHTS • Why security visibility? • The case for packet flow switching • How to formulate your requirements • Key requirements for inline security • Case study and takeaways Ksenia Coffman Product Marketing Manager NETSCOUT SPEAKERS: 2©2016 NETSCOUT
  • 3. SECURITY ATTACK TRENDS 3 Source: Arbor Networks (2016): Worldwide Infrastructure Security Report, vol. XI ©2016 NETSCOUT
  • 4. EVOLVING NEEDS ©2016 NETSCOUT ° CONFIDENTIAL & PROPRIETARY 4 The need to optimize packet flow Complex security scenarios Active, passive and hybrid security Archiving and spooling New and more security tools Security threats: Bigger, faster, more complex
  • 5. State of network security threats Are we better off than two years ago?
  • 6. SECURITY WITHOUT VISIBILITY • Individual silos of security and single points of failure • Complex configuration and change management 6©2016 NETSCOUT
  • 7. Why Security Visibility: The Case for Packet Flow Switching
  • 8. WHAT IS A PACKET FLOW SWITCH? 8 Network Centralized Tools Application Performance Management Network Performance Management Customer Experience Management Security From the Network To the Tools An Appliance to Optimize Packet Flow ©2016 NETSCOUT
  • 9. MATRIX SWITCHES • Entry-level packet broker: NPB software + COTS • Does not scale for advanced capabilities and performance Application Performance Management Network Performance Management Customer Experience Management Security Packets Not Reaching Tools ADVANCED FUNCTIONALITY MISSING 9 Network Centralized Tools
  • 10. SOFTWARE BASED MONITORING SWITCH • The software based monitoring switch adds compute capabilities to matrix-switches • Lack hardware acceleration behind every port • Difficult and costly to scale 1010 PERFORMANCE DEGRADES Application Performance Management Network Performance Management Customer Experience Management Security Network Centralized Tools
  • 11. TRUE PACKET FLOW SWITCHING Network Centralized ToolsPFS Security NGFW IDS IPS
  • 12. Network Centralized Tools Application Performance Management Network Performance Management Customer Experience Management Security SLICING: Remove unnecessary payload Slicing PFS Filtering Replication Slicing Stripping Speed Conversion Aggregation Load Balance De-Duplication ©2016 NETSCOUT
  • 13. Network Centralized Tools Application Performance Management Network Performance Management Customer Experience Management Security STRIPPING: Enable processing of encapsulated packets Stripping PFS Filtering Replication Slicing Stripping Speed Conversion Aggregation Load Balance De-Duplication ©2016 NETSCOUT
  • 14. Key Questions to Ask About a Security Visibility Solution
  • 15. WHAT ABOUT PERFORMANCE? Traffic grows Performance degrades
  • 16. CAN YOU HANDLE TRAFFIC GROWTH? Traffic Grows 13 Tools overrun, limited load balancing
  • 17. DO YOU SUPPORT INLINE SECURITY? Inline tools Single Points of Failure 14©2016 NETSCOUT
  • 18. WHAT ABOUT HEALTH CHECKS & TRIGGERS? • Both positive and negative health checks are required • Conditional triggers are key • Each security system in the tool chain should have a different trigger 17©2016 NETSCOUT
  • 19. CAN YOUR SYSTEM SUPPORT TOOL CHAINING? Inline Monitor Inline Network Aggregated Traffic 2 4 6 7 1 3 5 Inline Tool Chain NGFW LB Group 1 Web 8 NGFW Web Gateway IPS IPS IN IN IN 18 IM IMIM IM IM IM ©2016 NETSCOUT
  • 21. CASE STUDY: Large Private Cloud • Unified packet plane achieves complete visibility 21
  • 22. PACKET FLOW SWITCHING FOR SECURITY VISIBILITY Network Security Systems Security NGFW IDS IPS PFS 2204 PFS 4204 Unified Packet Plane TriggersNetwork bypass Health Check Tool chainingActive inline Filtering Replication Slicing Stripping Speed Conversion Aggregation Load Balance De-Duplication E N T E R P R I S E . N E T S C O U T. C O M
  • 23. THE RIGHT SECURITY VISIBILITY SOLUTION: • Helps retain investment in existing security systems • Simplifies adds, tests and changes • Supports both performance assurance and cybersecurity
  • 24. Additional Resources E N T E R P R I S E . N E T S C O U T. C O M • Listen to the live webinar here • Enterprise Networks: No Tool Left Behind