1 / 13

Gigamon enables your organization become more agile, secure

Download the whitepaper from http://www.gigamon.com/need-for-active-visibility Research shows stunning realities of modern IT transformation that amplify the need for more proactive network visibility and management. Through the adoption of new technologies the IT environment has become more complex, inhibiting pervasive visibility for IT and network security teams. Take a look at this presentation to learn more about Gigamon’s Unified Visibility FabricTM and how your organization can benefit from Active Visibility.

Gigamon
Télécharger la présentation

Gigamon enables your organization become more agile, secure

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Need forActive Visibility

  2. Demands on modern business infrastructure • Respond rapidly to changing conditions Creates pressure to… • Do more with less by increasing productivity • Protect data, customers, brand against increasing security attacks

  3. Impacts of demands on modern infrastructure Compliance requirements constrain business agility Growth in network usage demands more bandwidth These demands strain IT organizations Rise of targeted security breaches impact reputation New trends like virtualization and SDN, complicate IT management

  4. IT Transformation: Proactive infrastructure management requires responses to the following current IT issues >70% of server workloads are virtualized1 70% 76% >76% of datacenter traffic is east/west2 (server-to-server) 35% of enterprise network traffic is SSL encrypted4 75% of problems are first identified by end users, not by IT3 35% 75% 1 Gartner: Magic Quadrant for x86 Server Virtualization Infrastructure, July 2, 2014 2 Cisco Systems Global Cloud Index: Forecast and Methodology, 2012–2017 3 ZK Research 4 NSS Labs, SSL Performance Problems, June 12, 2013

  5. Increasing value of your network requires proactive strategy Network Value Mainframe 1960-1980 Client/Server 1980-1995 Internet 1995-2010 Mobile-Cloud 2010+ IT management challenge: Cost of Computing Infrastructure growth results in… Limited network-wide visibility (physical and virtual) Distributed ‘silo’ approach to problem solving Untapped information needed for real-time analytics

  6. Closing the gap with traffic intelligence Broad, General  Focused and Specific Tools Infrastructure SVM NPM APM CEM … Increased traffic intelligence helps close this gap Network & Applications Infrastructure Mobility, consumerization, virtualization, cloud, SDN, NFV

  7. Legacy methods to address IT challenges no longer work Problems with Legacy Methods IT Challenge Management tools become overwhelmed Network Speeds • Security & network analysis solutions may not be up to latest network speeds A rise in single points of failure, ‘blind spots’ Encryption and Virtualization • Technologies like SSL and SDN ‘hide’ traffic A decrease in key data delivered to key tools Topology and Port Limitations • Updates to the production network are disruptive to the business Impact to The Enterprise Reactive IT Operations Suboptimal return on investment

  8. Three principles of Active Visibility Intelligent • Enables real-time traffic collection for big data analytics • Provides agility to anticipate, react, respond • Context-aware to enable dynamic re-configuration based on real-time conditions Pervasive • Pervasive visibility from the physical to the virtual • Find problems faster • Tool agnostic = best-of-breed solutions Secure • Assure privacy and compliance • Extend the life of existing tools and reduce the cost of new tools

  9. Active Visibility brings flexibility, visibility and control Gain visibility for security and analytics tools Intelligently direct and groom traffic Provide visibility across physical and virtual infrastructure Distribute the right traffic to the right solution Enable real-time data capture and analysis Gain flexibility to integrate new best-of-breed network tools Shorten technology evaluation cycles

  10. Unified Visibility Fabric enables Active Visibility Internet CentralizedTools Routers Application Performance “Spine” switch Network Performance Customer Experience Management “Leaf” switch Security Virtualized Server Farm THE NETWORK ACTIVE VISIBILITY: VISIBILITY FABRIC

  11. Key benefits of Active Visibility…future-proofs your business Interface to other applications CentralizedTools GigaVUE-FM Single pane of glass across Visibility infrastructure Core De-duplication FlowVUE™ GTPCorrelation NetFlow Generation SSL Decryption Application Performance Network Performance Packet Slicing Masking HeaderStripping Adaptive Packet Filtering Tunneling GigaVUE-HB1 Edge GigaVUE-HD8 GigaVUE-HC2 Customer Experience Management Physical GigaVUE-OS on white box GigaVUE-TA1 Virtual Security GigaVUE-VM Data Center Racks

  12. Key benefits of Active Visibility…future-proofs your business Interface to other applications CentralizedTools GigaVUE-FM Single pane of glass across Visibility infrastructure Pervasive visibility across physical, virtual and remote networks Core Simplification of network troubleshooting De-duplication FlowVUE™ GTPCorrelation NetFlow Generation SSL Decryption Application Performance The right network data to best-of-breed solutions Network Performance Packet Slicing Masking HeaderStripping Adaptive Packet Filtering Tunneling GigaVUE-HB1 Edge SLA metrics and customer experience management GigaVUE-HD8 GigaVUE-HC2 Customer Experience Management Physical GigaVUE-OS on white box GigaVUE-TA1 Compliance – supports privacy, data capture, storage and monitoring Virtual Security GigaVUE-VM Data Center Racks

  13. Thank You To Learn More DOWNLOAD WHITEPAPER www.gigamon.com

More Related