Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2012 Gigamon. All rights reserved. The Dynamic World of Threat Detection, Containment & Response 1.

Similar presentations


Presentation on theme: "© 2012 Gigamon. All rights reserved. The Dynamic World of Threat Detection, Containment & Response 1."— Presentation transcript:

1 © 2012 Gigamon. All rights reserved. The Dynamic World of Threat Detection, Containment & Response 1

2 © 2012 Gigamon. All rights reserved. Devices IT owned Data Contained Opportunities and Challenges The World of IT continues to evolve 2 Dynamic Infrastructure Static Management and Security Tools Network Fixed Mobile Servers Physical Applications In house Virtual User owned Cloud Limitless

3 © 2012 Gigamon. All rights reserved. Devices IT owned Data Contained Opportunities and Challenges The World of IT continues to evolve 3 Dynamic Infrastructure Static Management and Security Tools Network Fixed Mobile Servers Physical Applications In house Virtual User owned Cloud Limitless

4 © 2012 Gigamon. All rights reserved. Visibility: The Enabler for Security Anatomy of an Attack 4 Window of Exposure The Golden Hour Attack identified Alert & notification Early stage containment Damage & scale assessment Infrastructure wide response Second-wave detection Assessing the infrastructure Identifying targets Pilot probe attack Intrusion commences Cloaking starts Anomaly detected Information extraction Cloning & go mobile Cloaking complete Data extraction or manipulation Security established Elimination Attack commences

5 © 2012 Gigamon. All rights reserved. Two Architectures; Two Approaches Wall and Watch 5 Watch – out of bandWall – in band Limit the opportunities Block the known attacks Monitor traffic profiles Alert to anomalies Broad-scale monitoring Signature behavior Leverage multiple measures The front-line against the unknown Limitations Single point of failure Potential bottleneck Dependent upon Maintenance windows Risk of over-subscription Famine or Feast: SPAN or TAP Increasing tooling demand & expanding network scale Limitations Highly available architecture Line-rate performance Infrequent configuration changes Requirements Powerful filtering capability Multi-point triangulation The more pervasive, the greater the value Requirements

6 © 2012 Gigamon. All rights reserved. Two Architectures; Two Approaches Wall and Watch 6 Watch – out of bandWall – in band Highly available architecture Line-rate performance Infrequent configuration changes Requirements Powerful filtering capability Multi-point triangulation The more pervasive the greater the value Requirements Single point of failure Potential bottleneck Dependent upon Maintenance windows Limitations Risk of over-subscription Famine or Feast: SPAN or TAP Increasing tooling demand & expanding network scale Limitations

7 © 2012 Gigamon. All rights reserved. Two Architectures; Two Approaches Wall and Watch 7 Watch – out of bandWall – in band Single point of failure Potential bottleneck Dependent upon Maintenance windows Limitations Risk of over-subscription Famine or Feast: SPAN or TAP Increasing tooling demand & expanding network scale Limitations

8 © 2012 Gigamon. All rights reserved. Networks were Static and Simple 8 TOOLS Application Performance Security Network Management

9 © 2012 Gigamon. All rights reserved. Networks are Dynamic and Complex 9 TOOLS Application Performance Security Network Management

10 © 2012 Gigamon. All rights reserved. Application Performance Network Management Security TOOLS Networks demand a New Approach 10 CENTRALIZED TOOLS Application Performance Network Management Security

11 © 2012 Gigamon. All rights reserved. Packet Modification, Manipulation and Transformation GigaSMART The Fabric Intelligence 11 Dynamic power to control traffic selection Packet Identification, Filtering and Forwarding ToolsNetwork Flow Mapping Physical Virtual Application Performance Network Management Security Deduplication ABACCABACB ABC Packet Slicing A B C Time Stamp A B C

12 © 2012 Gigamon. All rights reserved. The Benefits of Visibility Fabric 12 Visibility Fabric Pervasive Simple Cost Effective Centralized Scalable Legacy Approach Limited Visibility Static Expensive Distributed Constrained

13 © 2012 Gigamon. All rights reserved. Tools Network Network ManagementApplication MonitoringSecurity Enabling Best-of-Breed Selections 13 The Middleware with Any Network, and Any Tool

14 © 2012 Gigamon. All rights reserved. The Advantages of Gigamon – GigaBPS Traffic offload – Application-aware traffic profile 14

15 © 2012 Gigamon. All rights reserved. The Demand is Clear 15 Independent Survey Results from December 2011

16 © 2012 Gigamon. All rights reserved. Wall – in band Visibility Fabric Addressing the Limitations 16 Single point of failure Potential bottleneck Dependent upon Maintenance windows Limitations Watch – out of band Risk of over-subscription Famine or Feast: SPAN or TAP Increasing tooling demand & expanding network scale Limitations Heartbeat monitoring Intelligent traffic distribution Establishes a Dynamic DMZ enabling rapid response Flow Mapping filtering Selective traffic forwarding Scalability to serve some of the largest networks on the planet

17 © 2012 Gigamon. All rights reserved. Thank you 17


Download ppt "© 2012 Gigamon. All rights reserved. The Dynamic World of Threat Detection, Containment & Response 1."

Similar presentations


Ads by Google