• No results found

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style

N/A
N/A
Protected

Academic year: 2021

Share "An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style"

Copied!
22
0
0

Loading.... (view fulltext now)

Full text

(1)

Click  to  edit  Master  /tle  style  

An  Integrated  Approach  to  Manage  IT  Network  Traffic  

-­‐  An  Overview  

(2)

2  

§

A  quick  look  at  ManageEngine    

§

Tradi/onal  Traffic  Analysis  Techniques  &  Tools  

§

Changing  face  of  Network  Traffic  

§

A  Fresh  Look  –  Integrate  IT  all  

§

Benefits  of  a  single-­‐point  solu/on  

§

Use  cases    

§

Business  Benefits  

§

Summary  

(3)

3  

OEM  /  Telecom   division  is  also   the  World’s  #1   EMS     IT  Management   division  with   55K  +   customers   SAAS  solu/ons  

(Formerly  Adventnet  Inc.)  

(4)

4   • Complex  Integra/ons   • Expensive  Business   Model   Acquired   Products  

• Lower  Price  points   • No  integra/on   • Vendor  viability   Independent   Point  Products   • Single  Vendor   • Integrated  Value   • Affordable  Price  Point  

ManageEngine  

Vendor    Landscape  

ManageEngine  So`ware  is  used  by  over  55,000  customers  including  3  out  of  

(5)

5  

 

§ Network  Monitoring  Placorms  –  NMPs  

§ Monitoring  Tools  Integrated  with  NMP  

§ Commercial  Monitoring  Tools  not  Integrated  with  an  NMP  

§ Public  Domain  Network  Monitoring  Tools  

§ Web  Tools  

§ Ancillary  Tools  enabling  monitoring  

§ Analysis  Tools  

§ Report  Crea/on  or  Simula/on  

(6)

6  

Cri/cal  Factors  to  Look  for:  

§ Web  based  tool  

ü Availability  across  the  World  

ü Ease  &  convenience  

§ Report  Genera/on  

ü   Mul/ple  reports  for  mul/ple  factors  to  be  measured  

ü Alerts    

ü Troubleshoot  reports  

ü Compare  reports  

ü Good  search  op/ons  

§ Integra/on  with  NMPs  

ü Specific  to  organiza/on’s  IT  needs  

(7)

The    

Changing  Face    

of    

Network  Traffic  

 

(8)
(9)

9  

 

§ Hardware  probes  

ü Bulky  and  expensive  

ü Limited  scope  for  monitoring  

ü Space  &  Maintenance  constraints  

§ Packet  Analyzers  

ü Voluminous  data  

ü Speed  of  analysis  takes  a  hit  for  large  volumes  

ü Too  much  redundant  informa/on  

§ Flow-­‐based  monitoring  tools  

ü Web  based  tools    

ü No  addi/onal  infrastructure  or  expenditure  is  incurred  

ü Integrates  the  func/onality  and  not  the  physicality  

(10)

10  

§ Patented  flow  technology  from  Cisco    

§ Versions  available  are  v5(Tradi/onal)  and  v9(Flexible)  

§ Contains  a  wealth  of  informa/on  about  the  network  

§ Needs  a  tool  that  can  collect,  analyze  and  report  informa/on    

§ Needs  enabling  of  flows  at  the  routers  and  switches    

§ No  addi/onal  hardware  installa/ons  are  required  

§ Supported  by  all  major  device  types  used  widely  in  the  market  

§ Similar  flow  types  include  sflow,  j-­‐Flow,  IPFIX,  AppFlow  etc.    

 

(11)

11  

§ Cisco  provides  a  set  of  different  technologies  that  facilitate  complete  

monitoring  for  all  types  of  traffic  

§ The  following  are  examples  of  the  same:  

ü Cisco  IP  SLA    

ü Cisco  CBQoS  

ü Cisco  NBAR  

ü Cisco  Medianet  

ü Cisco  WAAS  

ü Cisco  Mediatrace  

•  Every  type  of  traffic  is  thus  covered  

•  If  there  is  one  tool  that  supports  all  of  these,  that  is  your  Integrated  Single-­‐

Point  Solu/on  to  Traffic  Monitoring  

(12)

12   § Conversa/ons   § Applica/ons   § Protocols   § Talkers   § QoS  reports  

§ SLA  reports  for  VoIP,  WAN  RTT  and  video  

§ WAN  Accelera/on  reports  

§ Security  reports  based  on  Network  Behavior  Analysis  

Flow-­‐based  Analysis  Tools  –  What  can  you  get?  

(13)

13  

 

§ Insighcul  Dashboards  

§ Zoomable  graphs    

§ Accurate  &  real-­‐/me  traffic  repor/ng  

§ Analysis  such  as  Trend  analysis,  Capacity  Planning  etc.  

§ Support  for  mul/ple  flow  formats  

§ Wide  Placorm  support  –  Windows,  Linux  etc.  

§ Network  Behavior  analysis  

§ Covers  the  different  aspects  seen  above  like  SLAs,  QoS  and  more  

What  is  expected  out  of  an  Integrated  tool?  

(14)

14  

§ Saves  troubleshoo/ng  /me  

§ Accelerates  problem  solving  

§ Quick  disaster  recovery  

§ Minimized  down/me  

§ Improved  RoI  –  1  tool  that  relieves  all  your  problems  

§ Smart(est)  alterna/ve  to  mul/ple  tools  from  mul/ple  vendors  

§ A  relief  from  silos  in  IT  network  management  

§ Improved  service  levels  

(15)

15  

§ Capacity  Planning  

ü Provisioning  sufficient  bandwidth  

ü Make  infrastructure  based  investment  decisions  

§ QoS  Monitoring  

ü To  ensure  prompt  delivery  of  delay  sensi/ve  applica/ons  and  associated  data  

ü Essen/al  part  in  today’s  networks    

§ Deep  Packet  Inspec/on  

ü   Iden/fies  applica/ons  using  dynamic  ports  

ü More  relevant  informa/on  about  packets  traversing  the  network  

§ Billing  

ü To  generate  bills  periodically  

ü Op/ons  for  speed  and  volume  based  billing  –  Special  significance  

(16)

16  

§ LIVE  Traffic  informa/on  

ü Top  sources  and  des/na/ons  

ü Volume  of  traffic  at  each  interface  

§ Protocol  Analysis  

ü Forensic  analysis  of  network  breaches  

ü Troubleshoo/ng  problems  in  the  network  

§ Network  Security  Anomaly  Detec/on  

ü To  secure  the  datacentre  

ü Classify  and  prevent  possible  zero-­‐day  aracks  

§ Graphical  Representa/on    

ü Special  significance  in  network  spanning  geographical  boundaries  

ü Easy  management  and  monitoring  with  insighcul  reports  

(17)

17  

§ Troubleshoot  Network  Sluggishness  

ü Perform  RCA  in  the  shortest  /me  

ü Iden/fy  applica/ons  causing  sluggishness  instantly  

§ Minimize  Down/me  

ü Quick  restora/on  leads  to  minimized  down/me  

ü Cuts  cost  due  to  accelerated  troubleshoo/ng  

§ Alerts  based  on  Configurable  Thresholds  

ü Prevents  viola/on  of  traffic  beyond  allowed  levels  

ü Classify  and  prevent  possible  zero-­‐day  aracks  

§ Con/nuous  Availability  

ü WAN  RTT  Monitoring  

ü Ensures  business  con/nuity  

(18)

18  

§ Complete  control  of  your  network  infrastructure  

§ Up  to  80%  savings  in  terms  of  bandwidth  op/miza/on    

§ Berer  resource  alloca/on  

§ Improved  produc/vity  

§ Cost  cuvng  due  to  quick  recovery  from  sluggishness  

§ Assured  service  levels  of  the  best  class  

§ Business-­‐cri/cal  applica/ons  receive  highest  priority  

§ Op/mized  resource  usage  

§ Minimum  down/me  

(19)

19  

 

§ Flow-­‐based  Web  Tools  are  the  best  op/on  

ü Easy  to  install  

ü Most  tools  offer  a  free  trial  

ü Instant  download  and  installa/on  

§ Integrated  Approach  

ü The  tool  supports  different  flow  formats(sflow,  jflow,  NetFlow,  AppFlow,  IPFIX  etc.)  

ü Wide  placorm  support  

ü Monitors  QoS,  SLAs,  Security  aspects,  WAN  accelerators  besides  mere  traffic  sta/s/cs  

ü Analy/cal  solu/on  with  insighcul  reports  

§ Benefits  

ü Assured  availability  of  network  resources  to  your  business-­‐cri/cal  apps  

ü Maximizes  RoI  at  no  addi/onal  cost  except  the  tool’s  license  fee  

(20)

20  

Everyone  creates  products.    

 

(21)

21  

(22)

22  

Got  more  ques/ons?    

 

Email  us  at  nfs@manageengine.com  

&  

Do  follow  our  blogs,  forums,  Facebook  page  and  on  

twirer(@manageengine)  

 

Looking  forward  to  see  you  soon  in  our  next  webinar!      

References

Related documents

deficiencies for Counterfeit Parts Detection and Avoidance Systems (Level II or III CAR, Disapproved Purchasing. System, System Withhold, etc.)

Hercules Point Hercules Point Bay Trail Bay Trail Multi‐use Trail Multi‐use Trail Creekside  Creekside Park Park Bayfront Park Bayfront Park

Depending on the size of the central measure, we observe cases in which a vNM–Stable Set is uniquely defined to be either the core or the convex hull of the core plus a

Click to edit Master title style EVOLUTION OF CYBERSECURITY IDENTIFYING BEST PRACTICES.. PHILIP DIEKHOFF, IT

• The IEEE Standards patent policy as stated in the IEEE-SA Standards Board Bylaws, section 6, http://standards.ieee.org/guides/ bylaws/sect6-7.html#6 , and the IEEE-SA Standards

• In ensuring they are delivering TCF, firms should have good management information on their claims handling, number of complaints and persistency data and have arrangements in

► It is therefore important to define the relevant market in order to determine whether a firm has such a dominant position.. ► In the case of Malta, several cases required that the

Reworded 4.A.1 Understand risk management concepts (e.g., impacts, threats, vulnerabilities) Reworded 4.A.3 Support mitigation activity (e.g., safeguards, countermeasures). New