Infoblox Network Automation Matt Gowarty, Sr. Product Marketing Manager Dynamically Controlling Your Network.

Slides:



Advertisements
Similar presentations
Steve Lewis J.D. Edwards & Company
Advertisements

Your Data Any Place, Any Time Manageability. SQL Server 2008 Manageability Challenges Challenges face database administrators today : Managing complex.
ServiceDesk Plus MSP Product Overview. Why ServiceDesk Plus - MSP? Capability of Managing Multiple Client’s in one Help Desk Stop Juggling with multiple.
Altman IM Ltd | | capture | index | organise | workflow Enterprise document & content management … for all types & size.
IP ADDRESS MANAGEMENT [IPAM]
A Federated Approach to Systems Management Todd Nugent Mike Huffstatler Sr. Product Specialist Systems Engineer.
All content in this presentation is protected – © 2008 American Power Conversion Corporation Rael Haiboullin System Engineer Change Manager.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Catalyst Smart Operations Automates the trivial and repetitive tasks.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
What’s New in BMC ProactiveNet 9.5?
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
C ONFIDENTIAL July COM and LineSider bring OverDrive to Managed Service Providers.
1 | © 2013 Infoblox Inc. All Rights Reserved. Authoritative IP Address Management (IPAM) and its Security Implications Rick Bylina, Sr. Product Marketing.
Microsoft Office Sharepoint Server 2007 (MOSS) Overview Momentum Microsoft November 15, 2007.
Executive Overview. PLEASE READ (hidden slide) To deliver this presentation effectively, you need to be familiar with Windows Server 2008 R2 management.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
A simpler way to manage identities across multiple services Aldo Zanoni, CEO ext. 232
Xerox ® ConnectKey™ for SharePoint ® Simple, Smart and Flexible Workflows BR4266 SO1PA-13UA.
April 6, 2009 Ted Lesher - NexPrise, Inc..  Introduction/NexPrise Background  What is Software as a Service and how can it benefit my school?  Data.
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
©2011 Quest Software, Inc. All rights reserved.. Manage, Migrate & Customize SharePoint Control Your SharePoint Chaos.
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Cliff Evans Management Lead Microsoft UK System Center Overview.
1 | © 2013 Infoblox Inc. All Rights Reserved. 1 | © 2014 Infoblox Inc. All Rights Reserved. Control Your Network! Infoblox Overview Paul de Haan – Systems.
Enabling Authentication & Network Admission Control Steve Pettit.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
Module 10 Configuring and Managing Storage Technologies.
Managing Projects using Oracle Project Management (PJT) & SPREADSHEETS Neeraj Garg Vice President, Client Services.
© 2007 Infoblox Inc. All Rights Reserved. Infoblox DNS and DHCP Advantages LEX Computer Systems.
Real Time Monitors, Inc. Switch Expert™. 2 Switch Expert™ Overview Switch Expert ™ (SE) currently deployed at 80% percent of the INSIGHT-100.
Microsoft NDA Confidential Configuration Manager 2012 How To Video Series Compliance and Settings Management Overview (fka DCM) Onur Koc Snr. Program Manager.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
UNIT 6 SEMINAR Unit 6 Chapter 7 and 8, plus Lab 12 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours:
SiteWiz – RiT ’ s CAM Solution. Daily IT Challenges Overload of infrastructure information Numerous daily changes Many departments involved No clear picture.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Microsoft Management Seminar Series SMS 2003 Change Management.
Enable self-service – users make requests on demand Standardize and deliver Templates, workflows, processes and a common CDMB enable automation The Service.
HP PPM Center release 8 Helping IT answer the tough questions
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Module 12: Configuring and Managing Storage Technologies
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
IQ Server Product Overview June The problem we solve in a customer’s words… “We have almost 400 applications and they are all intertwined and very.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Secure Access and Mobility Jason Kunst, Technical Marketing Engineer March 2016 Location Based Services with Mobility Services Engine ISE Location Services.
Managing multiple projects or services? Have a mix of Microsoft Project and more simple tasks? Need better visibility and control?
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
How Sage ERP X3 Systems Can Benefit Businesses.  Sage X3 is an affordable and flexible ERP solution designed to help mid-sized companies manage business.
© 2009 Infoblox Inc. All Rights Reserved. Infoblox Platform for Core Network Services Solution Details - IPAM.
OPEN SOURCE NETWORK MANAGEMENT TOOLS
Hybrid Management and Security
Redcell™ Management Essentials, Juniper Networks Enterprise Edition
OptiView™ XG Network Analysis Tablet
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Configuration Management with Azure Automation DSC
Description of Revision
Microsoft Ignite NZ October 2016 SKYCITY, Auckland.
Management Solution for Cisco NG Advanced Security Services
Is your deployment in pants-down mode?
Simplified Development Toolkit
GRC - A Strategic Approach
Scrumium NetBrain Thursday, May 09, 2019.
Features Overview.
7.3 Example Use Cases Spirent Automation Platform Technologies.
Cloud Management as a Service
{Project Name} Organizational Chart, Roles and Responsibilities
Presentation transcript:

Infoblox Network Automation Matt Gowarty, Sr. Product Marketing Manager Dynamically Controlling Your Network

Complexity Outpacing Resources © 2013 Infoblox Inc. All Rights Reserved.2 TasksTasks  Discovery and network analysis  Reduce risk & ensure compliance  Increase productivity & network availability  Shorten time to deploy services Time Quantity/Size Network Management Resources Network Infrastructure Demands Network Scale & Complexity  More complex work  Increased expectations  Menial tasks  Distracted focus

The Power of Infoblox Network Automation © 2013 Infoblox Inc. All Rights Reserved.3 3 IP & Device Management Cross Functional Enablement Policy Enforcement & Audits Task Delegation Task Delegation Dynamic Provisioning Dynamic Provisioning Change & Config Automation Dynamic IPAM Sync Network Auto- Discovery Infoblox Network Automation Infoblox Network Automation

Solving Business Problems Eliminate network bottlenecks to deploy services & apps Shorten time to delivery Empower IT staffing Support growing IT needs with existing IT staff Reduce risk of policy violations and non-standard networks Ensure ongoing compliance

Infoblox Network Automation © 2013 Infoblox Inc. All Rights Reserved.5 5 Discover Automated Network DiscoveryChange & Configuration Management Automate Compliance & Policy Standardization Maintain Firewall ACL & Rule Automation Control

Infoblox Network Automation Overview Network discovery Built-in analysis Check against best practices Detect issues Monitor and manage change Automate change Maintain compliance Provision ACL & rules Collected Via: SNMP CLI/configuration Syslog Fingerprinting Real-time & Historical Analysis © 2013 Infoblox Inc. All Rights Reserved.6

What’s On and Connected to My Network? Manual, spreadsheets and/or scanning tools Often out of date Tight budgets and stretched teams Multi-vendor network devices Proliferation of IP devices Ever-changing questions What’s on my network? Which ports are active? Do I need more capacity? What device is using which port? When & where did they connect? 7 © 2013 Infoblox Inc. All Rights Reserved.7

Network Auto-Discovery 8 Automatic device discovery Extensive multi- vendor support Layer 2 physical & 3 logical data Integrated topology views New device detection Detailed VLAN information © 2013 Infoblox Inc. All Rights Reserved.8

Switch Port Management 9 Track free vs. available port Identify unused ports Capacity planning & management Track connected end-hosts/devices History of what connected when and where Track devices/MACs by specific VLANs © 2013 Infoblox Inc. All Rights Reserved.9

Automated IPAM Sync 10 Integrated with Infoblox IPAM Auto-created networks Synced device details within IPAM IP map correlation Updated smart folders All automated – no manual steps © 2013 Infoblox Inc. All Rights Reserved.10

Keeping Up with Daily Changes Extensive manual processes CLI Scripting Limited functionality Configuration scrapes Basic change automation Vendor-specific tools Minimal control & documentation Limited work-flow Admin or nothing access rights Massive files require extensive manual digging and compiling 11 © 2013 Infoblox Inc. All Rights Reserved.11

Change Management Automatic change detection Accurate job flow and control Every change at fingertips Saved historical configurations Simple side by side comparisons Powerful configuration search © 2013 Infoblox Inc. All Rights Reserved.12

Change Automation Embedded jobs and scripts Templates for easy customization Easily import existing Perl scripts Powerful variable- based jobs User-based, role access controls Scheduled and triggered jobs © 2013 Infoblox Inc. All Rights Reserved.13

Intuitive Change Control Simplified switch port changes Strong user access rights Network tasks within NIOS GUI Enable single touch for common changes User initiated and triggered tasks Automatic detailed updates and sync © 2013 Infoblox Inc. All Rights Reserved.14

Is My Network Still Compliant? Different drivers External mandates Internal security policies Networking best practices Typically reactive When something breaks When audit is required Manually intensive Massive log files CLI access Manually collect, aggregate, tabulate and present findings 15 © 2013 Infoblox Inc. All Rights Reserved.15

Policy and Compliance Management 16 Embedded compliance rules Customizable best practice templates Manage multiple policies Proactive violation detected Multiple remediation options Current and historical views © 2013 Infoblox Inc. All Rights Reserved.16

Configuration Analysis 17 Unique pre-packaged expertise Identifies common misconfigurations Customizable alerting Recommended remediation options Understand concept of the network Network Scorecard views © 2013 Infoblox Inc. All Rights Reserved.17

Powerful Reporting 18 Single-click compliance reports Pre-packaged and customizable Powerful filtering Executive and detailed reports On-demand or scheduled User-based view rights © 2013 Infoblox Inc. All Rights Reserved.18

So Many Firewall Changes – So Little Time © 2013 Infoblox Inc. All Rights Reserved.19  Spike in number of security policy changes  IT headcount not keeping pace  Multiple point products add confusion  Network SLAs impacted negatively  Expensive and diminishes security effectiveness Manual Firewall Change Needed Hours/DaysNetwork Provisioning Time Search For Devices 1 Figure Out Impacted Devices 2 Determine Correct Config 3 Compare Change to Standards/ Compliance 4 Request Change/ Implement Manually 5 Reconfirm Correctness and Compliance 6 LEGACY APPROACH TO FIREWALL POLICY CHANGE IMPLEMENTATION

Rule and ACL Analysis Built-in multi-vendor expertise Automatic alerts of common issues ContinuousmonitoringContinuousmonitoring Finds hidden, over- lapping & duplicates Automated discovery Topology path views views © 2013 Infoblox Inc. All Rights Reserved.20

Search and Alerting CustomizablesearchesCustomizablesearches Flexible multiple device options Flexible multiple device options Blacklisting reduces risk Blacklisting Whitelisting ensures access Whitelisting Automatic alerts “Simple English” commands commands © 2013 Infoblox Inc. All Rights Reserved.21

Integrated Provisioning Integrated provisioning Creates vendor- specific syntax Push changes to one or multiple devices User-based access controls User-based Testing and rollback options Testing and rollback options Change monitoring and tracking © 2013 Infoblox Inc. All Rights Reserved.22

Taking Automation to the Next Level © 2013 Infoblox Inc. All Rights Reserved.23 Improve capabilities with dynamic value look ups Dynamic Better configurations based on understanding neighbors Topology Maintain control with role-based access and rights Control Reduce time with multi-device coordinated change Flexibility Eliminate scripts by leveraging intuitive GUI across multiple vendors and devices Ease of use

Infoblox Network Automation Dynamically Controlling Your Network