Net Optics Virtualization Solutions Deployment Case Study Intelligent Access and Monitoring Architecture Solutions.

Slides:



Advertisements
Similar presentations
Technology alliance partner
Advertisements

Customer Presentation ThinkServer EMC VSPEX Private Cloud Solutions.
The future of Desktops Transform Your Desktop with Virtualization.
1 © 2009 Cisco | EMC | VMware. All rights reserved. Virtual Computing Environment Accelerating Deployment of the Private Cloud Cisco and EMC, together.
Tunis, Tunisia, 28 April 2014 Business Values of Virtualization Mounir Ferjani, Senior Product Manager, Huawei Technologies 2.
Virtualizing Enterprises: Challenges Harrick M. Vin Vice President and Chief Scientist Tata Research Development and Design Centre, Tata Consultancy Services.
What is a Virtual Tap? Intelligent Access and Monitoring Architecture Solutions.
Virtual techdays INDIA │ 9-11 February 2011 Cross Hypervisor Management Using SCVMM 2008 R2 Vikas Madan │ Partner Consultant II, Microsoft Corporation.
Citrix Partner Update The Citrix Delivery Centre.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
VIRTUALIZATION AND YOUR BUSINESS November 18, 2010 | Worksighted.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted. For HP.
Virtualization for Cloud Computing
Solutions for Network Monitoring Access Performance Challenges Load Balancing Monitoring Access.
Virtualization Performance H. Reza Taheri Senior Staff Eng. VMware.
Net Optics Confidential and Proprietary Net Optics Launches Spyke Intelligent Access and Monitoring Architecture Solutions.
Virtual Desktop Infrastructure Solution Stack Cam Merrett – Demonstrator User device Connection Bandwidth Virtualisation Hardware Centralised desktops.
VMware vSphere 4 Introduction. Agenda VMware vSphere Virtualization Technology vMotion Storage vMotion Snapshot High Availability DRS Resource Pools Monitoring.
Net Optics Confidential and Proprietary Phantom Virtual Tap May 2011 Intelligent Access and Monitoring Architecture Solutions.
E Virtual Machines Lecture 4 Device Virtualization
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Andrey Zakharov Technical Sales Consultant, St. Petersburg office LinxCloud global team.
The Next Phase of Virtual Infrastructure Kevin Bailey Director - Product Marketing EMEA Symantec Corporation.
CONNECTED VIRTUALISATION WESTCON 5-DAAGSE / SALES 13 FEBRUARY 2012 Dennis de Leest Security Systems Engineer.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2010 Seminar #1 VIRTUALIZATION EVERYWHERE.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2009 Seminar #1 VIRTUALIZATION EVERYWHERE.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Lets agree that an Optimized Data Center is not yet a Cloud +=
Appendix B Planning a Virtualization Strategy for Exchange Server 2010.
Virtual Infrastructure 3 Best Practices for a secure installation. Jeff Mayrand.
= WEEKS, MONTHS, YEARS OF DELAYED APPLICATION VALUE MISSED REVENUE OPPORTUNITIES, INCREASED COST AND RISK DEV QA PACKAGE COMMERCIAL SOFTWARE CUSTOM APPLICATION.
© 2014 VMware Inc. All rights reserved. vSphere Optimization Assessment Presenter Name.
UnitedLayer Managed Private Cloud Saad Saleem Director of Customer Engineering.
VMware View built on FlexPod Flexible IT Infrastructure for Desktop Virtualization.
Net Optics Confidential and Proprietary iLink Agg xStream Intelligent Access and Monitoring Architecture Solutions.
High Performance Computing on Virtualized Environments Ganesh Thiagarajan Fall 2014 Instructor: Yuzhe(Richard) Tang Syracuse University.
Joe Yong Chief Architect Scalability Experts SESSION CODE: DAT 205.
VIRTUALIZATION SOFTWARE
© 2010 VMware Inc. All rights reserved vSphere 4.1: Install, Configure, Manage.
E-TechServices's IT Strategy Open. Virtualize. Rationalize. A Strategy for Optimal IT Deployment.
©2015 EarthLink. All rights reserved. Private Cloud Hosting Create Your Own Private IT Environment.
LegendCorp What is System Center Virtual Machine Manager (SCVMM)? SCVMM at a glance Features and Benefits Components / Topology /
Private Cloud Hosting. IT Business Challenges I need to extend my on-premises virtualized environment to utilize the Cloud and manage the entire environment.
© 2006 Cisco Systems, Inc. All rights reserved.Presentation_ID 1 Transforming Server Virtualization with Cisco VN-Link Belmont Chia Consulting System Engineer.
Project Name Program Name Project Scope Title Project Code and Name Insert Project Branding Image Here.
3-1 VMware vSphere 4: Install, Configure, Manage – Rev B Copyright © 2009 VMware, Inc. All rights reserved. Virtual Machines Physical Switches 1000 Mbps.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
1 Veloxum Corporation © Veloxum ACO solution improves the efficiency and capacity of your environment for both physical and.
Compete (and Complementing) VMWare Leon Booth, Solution Specialist, Microsoft Scott Gosling, Practice Lead, Data#3 Terry Burgess, vWorkspace Specialist,
Cisco Confidential 1 Copyright © 2008 Cisco Systems, Inc. All rights reserved. Jim Robshaw IT Director – Cisco Systems October 2009 Cisco’s Virtualization.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Module Objectives At the end of the module, you will be able to:
© 2011 VMware Inc. All rights reserved VMware – Cloud Security Solutions.
C © 2010 NetApp, Cisco, and VMware. All Rights Reserved. Presented Jointly by Cisco, NetApp, and VMware FlexPod for VMware.
A Measured Approach to Virtualization Don Mendonsa Lawrence Livermore National Laboratory NLIT 2008 by LLNL-PRES
VIRTUAL MACHINE – VMWARE. VIRTUAL MACHINE (VM) What is a VM? – A virtual machine (VM) is a software implementation of a computing environment in which.
REMOTE MANAGEMENT OF SYSTEM
COMP532 IT INFRASTRUCTURE
TrueSight Operations Management 11.0 Architecture
Performance Testing Methodology for Cloud Based Applications
Proprietary & Confidential
Designing Cisco Data Center Unified Fabric practice-questions.html.
Virtualization & Security real solutions
Get Cisco Actual Exam Dumps - Cisco Practice Questions - Realexamdumps.com
Migration Strategies – Business Desktop Deployment (BDD) Overview
Presentation transcript:

Net Optics Virtualization Solutions Deployment Case Study Intelligent Access and Monitoring Architecture Solutions

2 Presenter David Pham Senior Solutions Engineer Net Optics, Inc. David holds certifications for: VMware Certified Professional, Microsoft Certified Technology Specialist and Microsoft Certified Information Technology Professional, Xiotech Certified Storage Engineer Patrick Merchant Sales Executive/Account Executive Net Optics, Inc.

3 Agenda Current Environment 1 Virtualization Benefits: Reduced TCO and Increased ROI 2 Monitoring and Security Pitfalls 3 Overcoming Blind Spots with a Virtual Tap 4 Transporting Virtual Traffic to Existing Monitoring Tools 5

4 Data Center Infrastructure $480k/annually for support/warranty costs for 1600 physical servers Server resources are not balanced and many are underutilized/over- utilized Physical Servers Spanning 5 Different Call Centers Call Center

5 Problem With Virtualization: Visibility App OS VM3 App OS VM4 Production LAN Virtual Ethernet Adapters ESX vSphere 4.1 vSwitches Physical Ethernet Adapters Production LAN Management LAN App OS VM1 App OS VM2 Service Console Analyzer ?

6 Hypervisor Monitoring Challenge VM1VM2VM3 Physical ESX Server ESX Virtual Stack Virtual Switch Analyzer IDS Physical Network Security & Monitoring Virtualization Creates Security, Monitoring and Compliance Risks No visibility into inter-VM traffic, vulnerabilities or threats Lacks auditing of data passing between virtual servers Inability to pinpoint resource utilization issues

77 Alternative Solutions Switch Level Monitoring: enabling monitor/SPAN ports Degrades overall production network Configure VM to run in Promiscuous Mode CPU performance degrades due to traffic volume Hypervisor Level Monitoring: enabling Port Mirroring Network capacity reduced by up to 50%

8 Phantom Virtual Tap Solution VM1VM2VM3 Analyzer IDS Physical Network Security & Monitoring Tools Physical ESX Server ESX Virtual Stack with Phantom Installed Phantom Manager (VM) Enables Security, Performance Monitoring and Compliance 100% visibility of inter-VM traffic Kernel implementation—no need for SPAN Ports / Promiscuous Mode on Cisco 1000V Bridges virtual traffic to physical monitoring tools Phantom Virtual Tap Virtual Switch

9 Net Optics Converged Network Solution

10 Outcome NEW Virtual Server Consolidation Strategy Physical Server Infrastructure Savings of over $400k in hardware warranty and support (not including power and cooling costs) Meet Compliance & Regulations for FCC, PCI, and SOX VS.

11 Virtual Tap – Key Takeaways Key FeatureAdvantageBenefit End-to-End Inter-VM Traffic Visibility Provides Auditing and Performance Data Achieve Compliance Standards for PCI-DSS, HIPAA, etc Kernel Level Implementation Low CPU and Memory Requirements Low Impact on Virtual Server Performance Does Not Run in Promiscuous/SPAN Mode Delivers Visibility of Inter- VM Traffic to Existing Physical Tools No Need to Purchase New Virtual Monitoring Tools Lower CAPEX, Higher ROI of Existing Tools Converged Physical and Virtual Monitoring Optimize Tool Utilization

12 Net Optics, Inc Q&A Question & Answer Download the Case Study here: To sign up for our newsletter: Thank you