Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Next Generation Monitoring in Cisco Security Cloud Leon De Jager and Nitin.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
1 Real-time End-to-End Transaction Visibility into Distributed and Mainframe Applications Steve Saville Mainframe Technical Account Manager – Compuware.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Cloud Testing – Guidelines and Approach. Agenda Understanding “The Cloud”? Why move to Cloud? Testing Philosophy Challenges Guidelines to select a Cloud.
1 © 2009 Cisco | EMC | VMware. All rights reserved. Virtual Computing Environment Accelerating Deployment of the Private Cloud Cisco and EMC, together.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Microsoft Operations Management Suite
Citrix Partner Update The Citrix Delivery Centre.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Managing LOB Applications by Using System Center Operations Manager Published: March 2007.
WMU GNL Automation How to make my IT life easier CHRISTOPHER KEYAERT CONSULTANT AT INOVATIV CLOUD AND DATACENTER MANAGEMENT MVP.
Ravi Sankar Technology Evangelist | Microsoft Corporation
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco CloudVerse for Government: Helping Agencies Reduce Costs and Respond.
BMC Software confidential. BMC Performance Manager Will Brown.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Dell Connected Security Solutions Simplify & unify.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Paul King Director, Threat Intelligence CiscoSystems.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
SAM for SQL Workloads Presenter Name.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
© 2015 TriZetto Corporation Managed Services Overview Presenter Names 2.
Introduction to Avaya’s SDN Architecture February 2015.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
- Company Confidential - Corporate Overview March 2015.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
Designing Cisco Data Center Unified Fabric
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Hybrid Management and Security
Insights & Analytics Technical data deck.
TrueSight Operations Management 11.0 Architecture
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Real-time protection for web sites and web apps against ATTACKS
Configure and Manage Your Hybrid Cloud Environment at Scale
Microsoft Azure: The only consistent Hybrid Cloud
Insights & Analytics Technical data deck.
Bill Banks | Security Engineer
Virtualization & Security real solutions
Your Business Opportunity
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Ed oms team OMS: Log Analytics Ed oms team.
Microsoft Data Insights Summit
Productive + Hybrid + Intelligent + Trusted
Presentation transcript:

Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Next Generation Monitoring in Cisco Security Cloud Leon De Jager and Nitin Thakur

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 What is Cisco Security Cloud Operations? Challenges faced Scale of the Solution How AppDynamics was selected Speed & Ease of deployment Issues identified so far What next?

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Many organizations want the savings and efficiency benefits of cloud computing, but don’t want to sacrifice traditional levels of control and security. Security is traditionally applied at the network perimeter; this disappears in cloud-based computing, in which borderless networks connect many types of users with enterprise private data centers and cloud-based resources. Some transactions, such as a remote worker accessing Salesforce.com, don’t even pass through the corporate network or scanning systems The Cisco Borderless Network architecture addresses this challenge, securing cloud computing by placing intelligent control points and endpoints throughout the network. Cisco ScanSafe Web Security Cisco IronPort® Cloud Security, Hybrid Security and Managed Security Cisco Registered Envelope Service Cisco AnyConnect Secure Mobility Solution Cisco Security Intelligence Operations Cisco Cloud Web Security (CWS) provides industry-leading security and control for the distributed enterprise. Users are protected everywhere, all the time when using CWS through Cisco worldwide threat intelligence, advanced threat defense capabilities, and roaming user protection.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Mobile App Monitoring NO VENDOR Diagnostics End User Experience Monitoring DotCom + EC2 Database Monitoring Business Transaction Monitoring NO VENDOR Tier-1 + Run Book Automation Application Monitoring HOMEBREWSynthetic Monitoring Server Monitoring HOMEBREWAlerting Network Monitoring Cacti, Nagios, OpenNMS HOMEBREWLog Monitoring Big Data MonitoringKibanaHOMEBREWCloud Monitoring Cisco currently uses a limited number of multiple standalone technologies from homegrown tools and multiple vendors. These separate implementations have created an expensive, fragmented amalgamation of independent products that: Limits – visibility into apps & the business transaction functions performed Strains – capital and manpower budgets Dilutes – a clear-cut root-cause of an issue by the confusion of multiple tools Delays – time to remediation

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Current State Mobile App Monitoring NO VENDOR Real User Monitoring DotCom + EC2 ? Business Transaction Monitoring NO VENDOR Application Monitoring Server Monitoring Network Monitoring Cacti, Nagios, OpenNMS Big Data Monitoring Kibana AppDynamics will add missing capabilities and help consolidate and compliment our existing monitoring solution In a single tool, AppDynamics provides complete end-to-end transactional visibility for rapid troubleshooting of Production and Development application performance issues. The in-depth features of our product and the power of their integration will allow your teams to: Unify – various teams by providing the same relevant view into apps Saves – capital and manpower budgets Simplify – NO manual configuration when changes are introduced Enables – teams to focus on new, more relevant projects instead of firefighting Current State Application Diagnostics Database Diagnostics Tier-1 +Run Book Automation HOMEBRE W Alerting HOMEBRE W Synthetic Monitoring HOMEBRE W Log Monitoring HOMEBRE W Cloud Monitoring CUSTOM ROADMAP

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Requirement gathering from multiple teams and end users Some high level requirements which we looked at: Compute requirements to be minimal for running the APM solution Ease of auto detection of business transactions Future roadmap from AppDynamics more aligned with business requirements PoC run for an extended period, including performance tests to ensure no negative impact on applications Runbook automation functionality to help reduce false positives from existing monitoring infrastructure

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 23 Datacenters Globally Hub & Spoke Architecture Design

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 23 Datacenters Globally 6.3 Billion Web Requests scanned per day 200 Million Threats blocked per day Reporting Database contains 500 billion rows on average. Reporting Database is approximately 220TB in size Web Scanning Hosts distributed globally AppDynamics deployed onto JVMs globally

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Global deployment across 23 datacenters covering hosts in less than a week. Example puppet module available on GitHub. GitHub

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Some of the issues we’ve been able to identify with the use of AppDynamics:- Unique Slow Business Transactions affecting services: Identified Configuration errors in applications: Identified and remediated (Prevented 70M Slow transaction from occurring) Unique behavior of the service dependent on end user usage Identified, further analysis undertaking Inter application communication and failure in the network stack Identified and remediated

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Nagios used for existing application monitoring, approximately 25 service checks configured per host. AppDynamics Monitoring Extensions to be used to replace Nagios application checks Runbook Automation Further integration into more Security Cloud Operations Products Chaos Monkey vs Runbook Automation

Thank you.