Visibility in the Cloud

  • Published on

  • View

  • Download


1. Visibility In The Cloud20th-October, IPExpo LondonPaul ReeveChannel Sales and Business Development 2. Wait, Ive seen this before somewhere 3. Time Shared Computing 4. Time Sharing Computing 5. The Underlying Economics of Cloud ComputingHas less to do withComputing PowerMemoryBut more to do withUbiquitous broadband access to the InternetLow cost of wide area networks 6. Cloud Computing is about moving seams and changing the nature of the seamsBefore Cloud Computing, a seam defined two distinct computing platforms but both werecontrolled by the organization.Our Big ComputersOur Little ComputersSeams require security and monitoring.Security and monitoring starts with visibility. 7. New SeamsOld seams were based oncomputing platforms within anenterpriseNew seams are based onapplications between different enterprisesButSeams still require visibility 8. The need is for application-based visibility 9. And so emerged the SLAQuestion:How do you know if the SLA is being delivered?Answer:Visibility at the seams 10. Cloud Service Provider- Must know that service is delivered securely as promised- Only way to know is to establish data capture infrastructure at the seamService Provider Data Capture InfrastructureSEAMSEAMEnterpriseData Capture InfrastructureEnterprise- Must know that service is delivered securely as promised- Only way to know is to establish data capture infrastructure at the seam 11. What is Data Capture Infrastructure?Why is it important? 12. Question:What Happens If Face Recognition Software Is Served By A Substandard Camera?12?Answer:Expensive, Sophisticated Software is Sub-Optimized Datacom Systems Inc. Confidential 13. Analysis Starts with Proper Data CaptureRich Schultz/Associated PressFlights Out of Newark Airport Halted for Possible Security Breach Passengers waited after a security breach shut down a terminal at the Newark Liberty International Airport on Sunday.By SARAH WHEATONPublished: January 3, 2010Newark Airport's Security Cameras Were BrokenAirport Owns the Cameras but Says the TSA is Supposed to Report Them BrokenBy AARON KATERSKYJan. 5, 20109 commentsPort Authority installs camera alarms at Newark airport after security breachByMike Frassinelli/The Star-LedgerFebruary 25, 2010, 4:00PMUnfortunately, the importance of data capture is realized after an event 14. The Same is True in NetworkingWe tend to be fascinated with and focus on the analysis software.but overlook the importance of the data capture infrastructure that feeds the analysis software 15. Optimal Network Analysis is .A division of labor between hardware and softwareThe best security is always a combination of hardware and software.Paul Otellini, CEO Intel20-Sept. Wall Street Journal, comment on combining Intel hardware with McAfee software 16. How Data is Captured for AnalysisThe actual data is not captured but rather copied by either:1.A general-purpose network element or a 2.A purpose-built network elementGeneral-PurposeSpan Port from a RouterSPAN stands for switch port analyzerPurpose-BuiltTAPTAP stands for test access port 17. Data Capture is first about getting a 100% reliable copy of the data.Data Capture Infrastructure will perform a combination of these three functions:AggregationData from multiple links aggregated for one tool to analyzeRegenerationData from a single link is regenerated for multiple toolsFilteringData is reduced to the essential packets for specialized analysis 18. Data Capture Infrastructure Works in Tandem with Analysis ToolsAnalysis ToolAnalysis ToolAnalysis ToolData Capture InfrastructureFoundation for Network SecurityAggregation and FilteringTAPTAPTAPTAPTAPTAPProduction Network TrafficData Capture Infrastructure not only copies the traffic but prepares the copied traffic for more efficient performance by the analysis tools 19. SPAN vs. TAPA TAP can be placed closer to the seam between the enterprise and the cloud service provider Easily mis-configured 20. Consumes a port and CPU 21. Dropped if the router is stressed 22. Not scalable 23. VLAN tags stripped out 24. Corrupt packets are dropped 25. True picture of the traffic including layer 1 and 2 26. Permanent port that doesnt affect traffic 27. Visibility into full duplex links 28. Every packet delivered in order 29. Scalable through regeneration and multiple ports 30. VLAN tags and corrupt packets capturedData Capture InfrastructureShould be placed at the seam between the enterprise and cloud service providerIs the most reliable way to confirm SLA complianceRequires planning as with any other network deploymentIncreases the efficiency of analysis tools 31. Thank YouPaul ReeveGCH Test & Computer Services LtdStand 832


View more >