deployments, migrations, security, visibility

21
GMI – Delivering Technology Visibility End Users, Virtualization, Apps, Servers, DB, Storage

Upload: kent-cartwright

Post on 22-Jul-2015

118 views

Category:

Technology


1 download

TRANSCRIPT

GMI – Delivering Technology VisibilityEnd Users, Virtualization, Apps, Servers, DB, Storage

General MicrosystemsProducts and Services Overview

Cloud and Enterprise Deployments, Migrations, Security, Visibility

General MicrosystemsProducts and Services for the Cloud or Enterprise

GMI Consulting, Assessment, Integration

Network Performance Monitoring

Network Traffic Analysis

WAN Performance

IP Address Management

Network Configuration Management

Application Performance Monitoring

Complete Visibility End User, Network, Apps, Virtualization, DB, Storage

GMI’s Chosen Solution Set From SolarWinds

GMI Deployments, Migrations, Security, Visibility

IT Business Service Model The End Users, Infrastructure, Apps, and Data We Manage

DPI – Deep Packet Inspection Data Collection Netflow enhancing DPI Deviation from Normal Time Over Threshold

5 Concepts To Know First

Deep Packet Inspection - Performance Meets SecurityTraffic Between Virtual Servers, and Between Service Tiers

Visibility Reveals Traffic AnomaliesHow Netflow Adds To This Use Case

Performance Assurance From AnalyticsDeviation from Normal

Performance Assurance From AnalyticsTime Over Threshold

Critical need for PCI / HIPPA Compliance

End user is the revenue driver for the organization

All deployments, migrations, etc. should be performed from the perspective of the end user and the app

Real-time and synthetic visibility

Visibility in and around the end user

Business Service Performance End User Workstations – Physical, Virtual, VPN

SNMP community strings (read and read-write)

Traffic analysis for performance and security

Capacity planning

Downstream suppression, root cause

Business Service Performance Network Devices – switch / router

Web ServerInternal and externally facing

• IIS, Apache, etc.

• Performance and Security

Database Performance – Host, Queries, surrounding infrastructure

• Data stores• Virtual Machines• SQL queries• Performance• Security

StorageImpacting Application Performance?

• LUNs• VM

associations• Tiered visibility• Performance• Security

Active DirectoryPerformance and Security

• Privilege escalation

• Compromise admin account

• Compromise admin workstation

• Compromise domain controller

• Pass the hash attacks

• Domain controllers should be part of an automated patching scheme

Public/Private Cloud Applications

Apps are separated by a VPN tunnel – Private cloud

Apps are separated by a sea of devices – Public Cloud

Authentication may be local and/or cloud

Apps and Databases may be separated by tunnels

Dependency on provider’s

The IT Business Service Model is Now Virtualized“Cloud”

Solution Overview

Live Product Demonstration

LAUNCH

- Slide 21 -