application and network monitoring

31
OPNET Confidential – Not for release to third parties. © 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only. Application and Network Monitoring Lorna Robertshaw, Director of Applications Engineering OPNET Technologies

Upload: melissa-miller

Post on 03-Oct-2015

224 views

Category:

Documents


5 download

DESCRIPTION

Application and Network monitoring.Monitoring basics for Network

TRANSCRIPT

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Corporate OverviewFounded in 1986Publicly traded (NASDAQ: OPNT)HQ in Bethesda, MDApproximately 600 employeesWorldwide presence through direct offices and channel partnersBest-in-Class Solutions and ServicesApplication Performance ManagementNetwork Engineering, Operations, and PlanningNetwork R&DStrong Financial Track RecordLong history of profitabilityTrailing 12-month revenue of over $120MApproximately 25% of revenue re-invested in R&DBroad Customer BaseCorporate EnterprisesGovernment Agencies/DoDService ProvidersNetwork Equipment ManufacturersAbout OPNET Technologies, Inc.

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Analytics for Networked ApplicationsEnd-User Experience Monitoring & Real-Time Network AnalyticsReal-Time Application Monitoring and AnalyticsSystems Capacity Planning for EnterprisesOPNET Solutions PortfolioApplication Performance Management (APM)Network Engineering, Operations, and Planning

    Network R&DNetwork Planning and Engineering for EnterprisesNetwork Planning and Engineering for Service ProvidersTransport Network Planning and EngineeringNetwork Audit, Security, and Policy ComplianceAutomated Up-to-Date Network DiagrammingModeling and Simulation for Defense CommunicationsWireless Network Modeling and SimulationAccelerating Network R&D

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.AgendaMonitoring Application BehaviorCase Study: Impact of rogue application and usersCase Study: Impact of worms and virusesCase Study: Impact of bottlenecksMonitoring, Triage, and ForensicsMonitoring network and application behavior with OPNET ACE LiveDeep-dive packet analysis and forensics with ACE AnalystUsing application characterizations in OPNET Modeler

    Auditing Network ConfigurationCase Study: Impact of misconfigurations on WAN infrastructureCase Study: Default passwords on Internet-facing routersAuditing device configurations with SentinelProviding network diagramming through NetMapper

    Questions

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

    Monitoring Application Behavior

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Case Study: Impact of Rogue ApplicationsCompany that does scientific research for defense agenciesLarge monthly costs for WAN connection between two main sitesLink is often near saturation, so cost is justifiedInvestigation finds one user responsible for 1/3 of total inbound traffic throughout workday syncing home computer to work computerPossible security threatHuge monthly expense to company

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Case Study: Impact of Worms and VirusesThe perfect storm: Large software company. Battles between IT staff and developers over management of development servers.

    Blaster Worm (August 2003)Worm caused infected computers to become unstableInfected computers also caused major network outages that impacted non-infected computers!

    Network was unusable but no one knew whyApplication monitoring showed ~150 infected machines sending ARP requests for every IP they could think ofIt took 5 hours to find and unplug infected computersMajor business impact tech support was down, customer support site was down, lost productivity

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Case Study: Impact of Network BottlenecksMedical Service ProviderOne data center with large research facilities (high bandwidth), hospitals (lower bandwidth), and small strategic sites (T1, sufficient for 3-4 users)Citrix, Terminal services, WAN Optimizers deployed throughout to overcome network latency issuesTricky environment to troubleshoot and gain visibility!Users in low bandwidth locations experience high network congestion and retransmissionsMonitoring showed that congestion correlated with times users were printingSingle print server in the Data Center was a huge bottleneck and was impacting high priority traffic to the strategic sites

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.*OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Three Dimensions of Application Performance Management Monitoring: high-level viewBroad visibility (network, server) Real-time dashboards Alerts when user experience degradesSLA violationsTrending and historical dataForensics: root causeFollow user transaction across network and through serversIdentify specific cause (network event, line of code, etc.)Triage: initial troubleshootingLocalize problem (who, what, when, how bad)Due to network or server?Which team to call next?Snapshot and archive forensic data

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.*OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.*ACE LiveACE LiveData CenterReal-time agentless performance monitoring Broad coverage with a small footprint (all users and all applications)Localize performance problems and differentiate between network and server delaySnapshot detailed data for forensic analysis

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.End User Experience Monitoring 24x7 application monitoring applianceEnd-user response time for all transactions and usersAuto-discovers applications out-of-the-boxOracle, Peoplesoft, SAP, Microsoft, IM, P2P, others Intuitive, easy-to-use, low TCOOne-click guided work flows Web-based dashboards; customizable reportsInstalled and configured within 1 hourUnified views across the enterpriseAutomatic analysisComponents of delay, top-talkers Dynamic thresholds learns abnormal behaviorHistorical trending (up to one year) Real-time VoIP performance managementNetFlow collectionNetFlow and user response time in a unified view in a single applianceExclusive: Integrated monitoring and troubleshooting Integrates with ACE Analyst for root cause analysis Quick, easy network troubleshooting

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.ACE Live InsightsEasy guided workflows for troubleshooting and analysisPoint-and-click wizards automate best practicesAccomplish complex tasks at a mouse-clickCustomizable

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Bandwidth Hogs

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Alerts: Potential DoS Attacks

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Worm Hunt: Detect External Attacks

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.End-User Response Times: Server Delay

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.End-User Response Times: Network Delays

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Analytics for Networked ApplicationsAutomatic root-cause analysisVisualize application behavior across the networkDiagnose root causes of response-time delayValidate proposed solutionsCertify new applications prior to rollout

    Restores network-tier visibility in WAN-optimized environments Support for leading vendors (e.g. Riverbed, Cisco, Juniper)

    Response time prediction using a behavioral application model New application deployment Data center migrations Server consolidation and virtualizationWAN optimization deploymentApplication deployment to new locations

    Over 700 protocol and application decodesCitrix, Oracle, SQL Server, Web Services, others

    Predict response timesSummarize components of response-time delay

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.ACE Analyst for Deep Dive ForensicsVisually see the connectionsGantt chart of each conversationDrill into packet decodesShorten time/skillset needed to analyze packet captures

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Application Characterization for simulation in OPNET ModelerReal traffic patterns add accuracy to simulated modelsSimulate DoS attacks etc.

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Application Monitoring: SummaryQuality monitoring tools will help you:Weed out rogue applicationsDetect and study security threatsOnly pay for bandwidth you needAvoid congestion caused by inefficient architectureUnderstand import of issues on end-user experienceTRIAGE problems and allow deeper dive into FORENSICS tools

    Keys to deploying application monitoring solutions:Diverse user community with different access levels, cross-disciplinary communicationUser trainingHook into existing tools wherever possible, look for integrated tool suites rather than point solutions

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

    Network Configuration Monitoring

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Case Study: Impact of misconfigurations on WAN infrastructure

    Global ISPCore routers have HUGE routing tablesPeering points to customer networks use route filters to avoid bombarding CE routers with Internet routing tablesOperator fat fingers route filter nameCisco IOS responds by sharing no routes

    Months pass

    IOS upgrade occursIOS throws out the command altogetherALL routes sent to CE routerOutage in middle of business day

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Case Study: Default PasswordsLarge insurance company with stringent regulatory requirements (SOX, HIPAA)Some routers and switches in production network still have staging configurationsDefault username/pw combinations (cisco/test etc) found on Internet facing devicesProduction community strings found on devices

    Major changes required to entire network in case the devices had been compromisedCould have been worse!

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Network Audit, Security, and Policy-Compliance Reduce network outagesDetect configuration problems before they disrupt network operationsAutomatically audit production network configuration with ~750 rules

    Ensure network security200+ security rules

    Demonstrate regulatory complianceGenerate self-documenting, customizable reportsLeverage rule templates for rapid customization

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Sentinel Architecture Near Real-Time Comprehensive Network ModelScheduled Audit Engine Production Network Configuration & TopologyThird Party Data Sources

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Security Standards and Guidelines

    Standard/GuideDescriptionApplicable OrganizationsPCI Data Security StandardDescribes the Payment Card Industry (PCI) Data Security Standard (DSS) requirements.

    PCI DSS requirements are applicable if a Primary Account Number (PAN) is stored, processed, or transmitted.* Banks* Credit Card MerchantsNIST Special Publication 800-53(also basis for FISMA compliance)Provides technical guidance to enhance the confidentiality, integrity, and availability of Federal Information Systems.This document is provided by NIST as part of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, P.L. 107-347.* DoD* Defense Contractors * Federal AgenciesDISA Network Infrastructure STIGProvides security configuration guidance to enhance the confidentiality, integrity, and availability of sensitive DoD Automated Information Systems (AISs).

    This Security Technical Implementation Guide (STIG) is provided under the authority of DoD Directive 8500.1. * DoD* Federal Agencies * Defense ContractorsNSA Router Security Configuration GuideProvides technical recommendations intended to help network administrators improve the security of their routed networks.

    The initial goal for this guide is to improve the security of the routers used on US Government operational networks.* Federal Agencies* DoD* Enterprises* Service ProvidersNSA Cisco IOS Switch Security Configuration GuideProvides technical recommendations intended to help network administrators improve the security of their switched networks.

    The initial goal for this guide is to improve the security of the switches used on DoD operational networks.* DoD* Enterprises* Service ProvidersCisco SAFE Blueprint for Enterprise NetworksProvides Ciscos best practices to network administrators on designing and implementing secure networks.* EnterprisesISO-17799 Provides guidelines and general principles for initiating, implementing, maintaining, and improving information security in an organization.

    This is an International Standard developed by the International Organization for Standardization (ISO) and the International Electro technical Commission (IEC).* Enterprises

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Example Sentinel Reports

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Example Sentinel Reports

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Automated Network Diagramming Automatically generate up-to-date network diagramsPublished in Microsoft Visio formatComprehensive and detailed unified network viewsPhysical layoutsDetailed configuration informationLogical views including Layer 2/3, VPN, OSPF, BGP, and VLANsCustom annotationsBenefitsMeet regulatory compliance requirements: PCI, SOX, etc.Accelerate network troubleshootingPerform effective asset & change management

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

  • OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.Questions?

    OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All trademarks are the property of their respective owners and are used herein for identification purposes only.

    **Basic corporate introduction. Where we came from. How big we are. What we do (three areas of core competency for enterprises, focus on analytics and automation of problem-solving and problem prevention, which well explain more shortly). Recognized in the industry as the experts in these areas. Sound business track record. Diverse customer base, with thousands of customers overall; we have focused product offering four industry segments. Today we are focusing on OPNETs enterprise solutions.Company and products have won numerous awards for technical excellence, innovation, and financial success.Note: Revenues quoted are a running total of the previous 4 quarters. Q4 2006 refers to the calendar year 2006.

    *OPNET offers solutions for application performance management, network operations, capacity planning and design, and network R&D. Today well e focusing on (name target area). *****Insights are the core of the quickness and ease of which ACE Live will solve a problem. OPNET has worked with our customers to take their best practices at solving application performance problems and incorporated these into best practice work flows, called Insights. This has been encapsulated into a user interface that allows you to use layer 8, the super-computer behind the human eyes, to see problems with just a few mouse clicks.

    Some of the Insights will provide value right out of the box.

    *****