We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byArianna Olley
Modified about 1 year ago
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Next Generation Monitoring in Cisco Security Cloud Leon De Jager and Nitin Thakur
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 What is Cisco Security Cloud Operations? Challenges faced Scale of the Solution How AppDynamics was selected Speed & Ease of deployment Issues identified so far What next?
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Many organizations want the savings and efficiency benefits of cloud computing, but don’t want to sacrifice traditional levels of control and security. Security is traditionally applied at the network perimeter; this disappears in cloud-based computing, in which borderless networks connect many types of users with enterprise private data centers and cloud-based resources. Some transactions, such as a remote worker accessing Salesforce.com, don’t even pass through the corporate network or scanning systems The Cisco Borderless Network architecture addresses this challenge, securing cloud computing by placing intelligent control points and endpoints throughout the network. Cisco ScanSafe Web Security Cisco IronPort® Cloud Email Security, Hybrid Email Security and Managed Email Security Cisco Registered Envelope Service Cisco AnyConnect Secure Mobility Solution Cisco Security Intelligence Operations Cisco Cloud Web Security (CWS) provides industry-leading security and control for the distributed enterprise. Users are protected everywhere, all the time when using CWS through Cisco worldwide threat intelligence, advanced threat defense capabilities, and roaming user protection. http://www.cisco.com/c/en/us/products/security/cloud-web-security/index.html
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Mobile App Monitoring NO VENDOR Diagnostics End User Experience Monitoring DotCom + EC2 Database Monitoring Business Transaction Monitoring NO VENDOR Tier-1 + Run Book Automation Application Monitoring HOMEBREWSynthetic Monitoring Server Monitoring HOMEBREWAlerting Network Monitoring Cacti, Nagios, OpenNMS HOMEBREWLog Monitoring Big Data MonitoringKibanaHOMEBREWCloud Monitoring Cisco currently uses a limited number of multiple standalone technologies from homegrown tools and multiple vendors. These separate implementations have created an expensive, fragmented amalgamation of independent products that: Limits – visibility into apps & the business transaction functions performed Strains – capital and manpower budgets Dilutes – a clear-cut root-cause of an issue by the confusion of multiple tools Delays – time to remediation
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Current State Mobile App Monitoring NO VENDOR Real User Monitoring DotCom + EC2 ? Business Transaction Monitoring NO VENDOR Application Monitoring Server Monitoring Network Monitoring Cacti, Nagios, OpenNMS Big Data Monitoring Kibana AppDynamics will add missing capabilities and help consolidate and compliment our existing monitoring solution In a single tool, AppDynamics provides complete end-to-end transactional visibility for rapid troubleshooting of Production and Development application performance issues. The in-depth features of our product and the power of their integration will allow your teams to: Unify – various teams by providing the same relevant view into apps Saves – capital and manpower budgets Simplify – NO manual configuration when changes are introduced Enables – teams to focus on new, more relevant projects instead of firefighting Current State Application Diagnostics Database Diagnostics Tier-1 +Run Book Automation HOMEBRE W Alerting HOMEBRE W Synthetic Monitoring HOMEBRE W Log Monitoring HOMEBRE W Cloud Monitoring CUSTOM ROADMAP
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Requirement gathering from multiple teams and end users Some high level requirements which we looked at: Compute requirements to be minimal for running the APM solution Ease of auto detection of business transactions Future roadmap from AppDynamics more aligned with business requirements PoC run for an extended period, including performance tests to ensure no negative impact on applications Runbook automation functionality to help reduce false positives from existing monitoring infrastructure
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 23 Datacenters Globally Hub & Spoke Architecture Design
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 23 Datacenters Globally 6.3 Billion Web Requests scanned per day 200 Million Threats blocked per day Reporting Database contains 500 billion rows on average. Reporting Database is approximately 220TB in size 4000+ Web Scanning Hosts distributed globally AppDynamics deployed onto 14000 JVMs globally
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Global deployment across 23 datacenters covering 4000+ hosts in less than a week. Example puppet module available on GitHub. GitHub
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Some of the issues we’ve been able to identify with the use of AppDynamics:- Unique Slow Business Transactions affecting services: Identified Configuration errors in applications: Identified and remediated (Prevented 70M Slow transaction from occurring) Unique behavior of the service dependent on end user usage Identified, further analysis undertaking Inter application communication and failure in the network stack Identified and remediated
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Nagios used for existing application monitoring, approximately 25 service checks configured per host. AppDynamics Monitoring Extensions to be used to replace Nagios application checks Runbook Automation Further integration into more Security Cloud Operations Products Chaos Monkey vs Runbook Automation
Dell Connected Security Solutions Simplify & unify.
Microsoft Operations Management Suite. Management as a Service Micro-services and containers Shifting landscape at play Modern management Data analytics.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco CloudVerse for Government: Helping Agencies Reduce Costs and Respond.
Paul King Director, Threat Intelligence CiscoSystems.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Managing LOB Applications by Using System Center Operations Manager Published: March 2007.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
Citrix Partner Update The Citrix Delivery Centre.
1 © 2009 Cisco | EMC | VMware. All rights reserved. Virtual Computing Environment Accelerating Deployment of the Private Cloud Cisco and EMC, together.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Ravi Sankar Technology Evangelist | Microsoft Corporation
Srinivas L Technology Specialist – Security | Microsoft
Complete Cloud Security Anyone, anywhere, any app, any device.
Microsoft Operations Management Suite John Wieda Microsoft Datacenter TSP.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
WMU GNL Automation How to make my IT life easier CHRISTOPHER KEYAERT CONSULTANT AT INOVATIV CLOUD AND DATACENTER MANAGEMENT MVP.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
- Company Confidential - Corporate Overview March 2015.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
What Is Desktop Virtualization? How Does Application Virtualization Help? How does V3 Systems help? Getting Started AGENDA.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Presented by: Mike Silva. Who is Ipswitch Develop easy to use software for: Network Management Positioning 100 Million+ users in over 60 countries 10.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
1 Real-time End-to-End Transaction Visibility into Distributed and Mainframe Applications Steve Saville Mainframe Technical Account Manager – Compuware.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
SAM for SQL Workloads Presenter Name. SAM supports your datacenter strategy The datacenter is the hub of everything you offer your business. You need.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
BMC Software confidential. BMC Performance Manager Will Brown.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
WINDOWS AZURE AND THE HYBRID CLOUD. Hybrid Concepts and Cloud Services.
Motorola Mobility Services Platform Management Software: Stage Edition.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Cloud Computing Security With More Than 50 Years Of Security And Enterprise Experience Cloud Raxak Automating Cloud Security. Cloud Raxak automates and.
© 2014 VMware Inc. All rights reserved. Dynatrace for vCloud Air High-level Overview Dynatrace 10/21/2014.
© 2017 SlidePlayer.com Inc. All rights reserved.