gigamon u - network rules, distributed network analysis architecture

10
Network Instruments

Upload: grant-swanson

Post on 23-Jan-2015

1.797 views

Category:

Business


1 download

DESCRIPTION

Enterprise IT administrators at transaction and data-driven corporations deal with intricate network issues while continuing to worry about computer hacking, intellectual property theft, and complying with industry regulations. To solve these problems, administrators need the ability to capture hours, days, or even weeks worth of network traffic directly to disk for comprehensive analysis. The GigaStor provides massive data collection and a unique time-based analysis that eliminates the need to recreate problems, rapidly increasing time to resolution.

TRANSCRIPT

Page 1: Gigamon U - Network Rules, Distributed Network Analysis Architecture

Network Instruments

Page 2: Gigamon U - Network Rules, Distributed Network Analysis Architecture

Distributed Network Analysis Architecture

Page 3: Gigamon U - Network Rules, Distributed Network Analysis Architecture

End-to-End Network AnalysisSoftwareSoftware

ProbeProbe

GigaStorGigaStor

10/100/100010/100/1000Probe ApplianceProbe Appliance

WAN and Gigabit WAN and Gigabit Probe AppliancesProbe Appliances

Top TalkersTop TalkersMultiHopMultiHopAnalysisAnalysis

ConnectionConnectionDynamicsDynamics

Application AnalysisApplication Analysis SNMP ManagementSNMP ManagementVoIP AnalysisVoIP Analysis

Gigabit and WANGigabit and WANObserver Suite SystemObserver Suite System

Page 4: Gigamon U - Network Rules, Distributed Network Analysis Architecture

Example – Forensic Analysis Situation: A major retail company has been tasked with researching

the violations of their acceptable use policies by a former employee.

Solution: The GigaStor appliance, featuring a time-based navigationinterface, allows for complete write-to-disk at Gigabit line speed, toensure all necessary data is captured and stored

Page 5: Gigamon U - Network Rules, Distributed Network Analysis Architecture

Step 1: Identify the timeframe of interest using the GigaStor TimeAnalysis Interface

Example – Forensic Analysis

Page 6: Gigamon U - Network Rules, Distributed Network Analysis Architecture

Step 2: Determine the stations, conversations, or ports of interestfrom the specified timeframe

Example – Forensic Analysis

Page 7: Gigamon U - Network Rules, Distributed Network Analysis Architecture

Step 3: Complex filters can be created automatically, and will be runagainst the specified timeframe

Example – Forensic Analysis

Page 8: Gigamon U - Network Rules, Distributed Network Analysis Architecture

Step 4: Complete reconstruction capabilities allow an administrator toreassemble original documents such as emails, IM conversations, webpages, and even VoIP calls

Example – Forensic Analysis

Page 9: Gigamon U - Network Rules, Distributed Network Analysis Architecture

Example – Forensic Analysis

Situation: A major retail company has been tasked withresearching the violations of their acceptable use policies by aformer employee.

Solution: The GigaStor appliance, featuring a time-basednavigation interface, allows for complete write-to-disk at Gigabitline speed, to ensure all necessary data is captured and stored.

Result: Proactive monitoring allows the organization to haverelevant information available without the need to recreate anissue, or, in this case, not have the ability to verify a potentialconflict with their acceptable use policy.

Page 10: Gigamon U - Network Rules, Distributed Network Analysis Architecture

Thank You

www.networkinstruments.com

Toll Free: (800) 526-7919