Hi [[ session.user.profile.firstName ]]

High Performance, Cost Effective Visibility Plane for Enterprise Networks

As data centers grow and adopt virtualization technologies, service-assurance tool costs and security system costs can sky rocket. In pursuit of increased scale and savings, some web-scale enterprises have attempted to go the DIY route. While this approach might work for the 1%ers of data-center networks, these hand built systems aren't available to everyone else. With a staff of software engineers, some have attempted to build out large-scale management switches, but these systems prove costly and require network packer brokers for many services.

In this webinar, you will learn about:
- The dynamics driving the need for more cost-effective monitoring infrastructure
- The challenges of silo'ed network monitoring
- The cost and performance advantages of interconnected packet brokers
- The benefits of a unified visibility plane
Recorded Mar 18 2015 29 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sarah Banks, Director, Product Management
Presentation preview: High Performance, Cost Effective Visibility Plane for Enterprise Networks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Large Scale, High Performance Visibility Plane for Cloud and Web Service Recorded: May 21 2015 48 mins
    Gordon Beith, Director of Product Management
    This webinar will describe the challenges faced by cloud and web service providers when attempting to monitor, manage, and troubleshoot across large data centers and networks, whether fully owned or hosted. It will describe the benefits of using a unified visibility plane as the solution to address these challenges, in a cost-effective and streamlined manner, whether it is for security, performance, and/or troubleshooting purposes.
  • Layered Security Infrastructure: Enterprise Case Studies Recorded: Apr 29 2015 36 mins
    Icaro Vazquez, Senior Product Line Manager, Security
    As bad actors relentlessly continue to take advantage of the many innovations and trends in our current world, network security professionals are realizing that the passive mode of checking for threats is no longer adequate. As BYOD is now the norm rather than the exception in the corporate world and most organizations have a significant presence in the cloud, bad actors are more than happy to take advantage of the new conduits into the corporate network. Therefore, the need to catch, repair and eliminate security threats as early as possible has never been greater. With this in mind, VSS Monitoring has been helping various enterprise customers to deploy an inline layered security infrastructure that provides multiple lines of defense against the bad actors.

    This webinar will present some of the use cases we have been involved in, what were the motivations that led to the deployment of layered security and how a layered security architecture, anchored by VSS Monitoring, allowed enterprises to become more nimble in their never ending fight against bad actors. Join us for a safari tour of an exciting and evolving space!
  • High Performance, Cost Effective Visibility Plane for Enterprise Networks Recorded: Mar 18 2015 29 mins
    Sarah Banks, Director, Product Management
    As data centers grow and adopt virtualization technologies, service-assurance tool costs and security system costs can sky rocket. In pursuit of increased scale and savings, some web-scale enterprises have attempted to go the DIY route. While this approach might work for the 1%ers of data-center networks, these hand built systems aren't available to everyone else. With a staff of software engineers, some have attempted to build out large-scale management switches, but these systems prove costly and require network packer brokers for many services.

    In this webinar, you will learn about:
    - The dynamics driving the need for more cost-effective monitoring infrastructure
    - The challenges of silo'ed network monitoring
    - The cost and performance advantages of interconnected packet brokers
    - The benefits of a unified visibility plane
  • Scaling Your Network: What You Need to Know for Advanced Attacks & Big Data Recorded: Feb 12 2015 38 mins
    Tony Zirnoon, CISSP – Sr. Director Security Strategy VSS Monitoring
    Even as network data has exploded in volume, velocity and variety, network security and monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale, and accommodate continuous monitoring in consolidated physical, virtual and cloud based datacenters. The network’s increasing speed and rapidly growing complexity (e.g. virtualization, and tunneling with encryption), pose challenges for IT network and security professionals trying to manage and secure network infrastructure. How does one architect a scalable security & monitoring architecture to withstand the test of time while ensuring adaptability to evolving business needs? The IT organization as a whole needs to ensure end-to-end visibility and data access to meet and exceed business, network and application performance SLAs while keeping their infrastructure and data secure against continually evolving advanced and targeted attacks.

    Join Tony Zirnoon, CISSP – Sr. Director Security Strategy VSS Monitoring, as he discusses:
    1. Monitoring gaps and security vulnerabilities in today’s traditional network security and monitoring architecture
    2. How to address those gaps and vulnerabilities without defaulting to a rip and replace approach
    3. Proven best practices in architecting a future-proofed physical or virtual DC monitoring fabric for total network visibility
    4. Learn how you can architect a defense-in-depth network security model that scales across converged networks (with real production deployment examples)
    5. Future proofing your security infrastructure design and investments against the ongoing barrage of advanced security threats while maintaining high availability and agility to keep up with Big Data flows.
  • Optimize your trading infrastructure - See, understand and act fast Recorded: Nov 11 2014 55 mins
    James Wylie, Senior Manager, Product Marketing, Corvil; Gordon Bieth, Product Management, VSS Monitoring
    Trading on the world’s markets has become highly competitive and technology driven. Traders battle for advantage where orders are processed in millionths of a second. Inefficiencies lead to poor fill rates and failing strategies. Optimizing the performance of the entire trading loop is key to success. Monitoring these systems in true real-time is key to gaining and maintaining a competitive edge.

    Join Corvil and VSS Monitoring in discussing the challenges and methodology of monitoring high volume, multi-asset markets, hop-by-hop in real-time. High quality network data is key to understanding the nuances in the trading loop, from the delivery of market data to the timely submission of orders, many components affect performance.

    Topics covered will include:
    • Analyzing Market data: The importance of microburst, gap detection, relative latency and embedded time-stamps.
    • Order-flow: Including order-ack latency, message rate, order-tracking and anomaly detection.
    • Broker and DMA: Performance monitoring
    • Foreign Exchange: Pricing Latency, Quote to order timing and currency pair visibility
    • Latency data: port stamping/tagging and time stamping of packets
    • Traffic optimization: packet deduplication, deep packet filtering, and flow-aware balancing
    • Archival & troubleshooting: PCAP & Metadata creation and spooling off to storage
  • Eliminating instrumentation complexity in the high-density data center Recorded: Oct 8 2014 53 mins
    Gordon Beith – Director, Product Management, VSS Monitoring
    Enterprise, including particular Financial Services networks, poses unique challenges to monitor and manage. While performance remains a top priority to maintain competitiveness, regulatory compliance, security assurance and risk mitigation must also be addressed. Market data messages (such as FIX protocol) and, in some cases, proprietary protocols, can add to the complexity, as these may require intelligent traffic capture that performs filtering beyond Layer 4.

    At the same time, many organizations are consolidating, co-locating and homogenizing facilities, while upgrading to support increasing usage, energy regulations, and speeds of 100Gbps and 40Gbps. The result is higher density in the data center. Maintaining high performance and security on a large scale requires that the monitoring tools have comprehensive visibility across the data center and are able to keep pace with network changes.

    Join VSS Monitoring to discover how high-density visibility solutions paired with specialized traffic capture capabilities—including packet optimization and DPI—can reduce per-port costs, scale performance and security monitoring tools, and eliminate deployment complexity.

    Topics covered will include:
    •Large data center monitoring challenges for enterprises
    •Addressing tool port contention and specialized applications
    •Increasing tool coverage without increasing rack footprint
    •Leveraging 10G and 1G tools across 100G and 40G networks
  • Type of Security Breaches and Solutions, Part 2/2 Recorded: Sep 18 2014 47 mins
    Icaro Vazquez, Sr. Security Product Manager
    Security threats have been evolving at an accelerating speed and are now an everyday occurrence in both cloud and physical environments. Network Security professionals long for the days when the most common breach was just a DDoS attack. As more and more bad actors turn their attention to valuable data and succeed in not only penetrating the network, but also in stealing confidential information, media reports of companies losing customer data are becoming increasingly common.

    VSS Monitoring, through its experience in various security deployments with Enterprises and Service Providers, observes network threats every week. Join us for a webinar where we discuss the most common types of security breaches we have seen and the kind of solutions your peers, network engineers and security professionals are deploying to counteract these threats. We will talk about the following security threats:
    •SSL-encrypted attacks,
    •Spam-based threats,
    •Socially engineered attacks, and
    •Attacks against mobile devices.

    Miss Part 1/2 - A Day in the Life of a Network/Security Operations Engineer? It's now available for on-demand viewing in our Channel.
  • Managing the Health and Performance of IT Systems in Financial Services Recorded: Sep 10 2014 63 mins
    James Wylie, Sr. Mgr Prod Mktg and Gordon Beith, Director, Prod Mgmt
    For operators of complex financial IT environments, minimizing latency and ensuring “always on” performance are mandatory for maintaining relevance in a highly competitive industry. Identifying and reconciling issues across multiple systems and geographies can be a considerable challenge, especially since performance is measured in fractions of a second.

    Join VSS Monitoring and Corvil to discover how to source and make sense of the raw IT data streaming through the network. Maximizing the information available within streaming network data can enable a panoramic view of customers and business & IT infrastructure interacting together in real time—without disturbing the systems and applications under analysis.

    Topics covered will include:
    • Leveraging network packet brokers (NPBs) to provide a comprehensive, real time network visibility plane for all monitoring and security tools.
    • Applying nanosecond resolution time stamping, hardware-based filtering and line-rate packet manipulation to strategically optimize network and application performance analysis, as well as security and risk mitigation functions.
    • Using streaming IT data to discover, classify and analyze network and application behavior within complex financial environments.
    • Deriving real-time financial intelligence from streaming IT data
  • A Day in the Life of a Network/Security Operations Engineer, Part 1/2 Recorded: Aug 28 2014 55 mins
    Icaro Vazquez, Sr. Security Product Manager, VSS Monitoring
    Security Threats and Network Complexity have been evolving at an accelerating speed and are moving from lower layers to Layer 7 and finally to the cloud. As a Network Engineer and a Security Operations Engineer, do you ever feel like it is impossible to catch up to the bad actors? Do you live in a world of ever-tightening budgets where you are asked to do more with fewer tools? Do you feel like the tools we, Network Equipment Manufacturers and Security Providers, provide are complicated to setup and maintain? Do you find yourself spending inordinate amounts of time trying to setup Layered Security Defenses?

    VSS Monitoring has been involved in countless security deployments with Enterprises and Service Providers of all sizes. Join us for a webinar where we discuss major pain points we have seen in working with Network Professionals and Security Engineers (check if our list looks similar to yours) and how our solutions can help simplify your life so you can get back to what you do best: optimize and protect the network.

    Check out Part 2/2 - Types of Security Threats and Solutions, live on Sept 18th. Now available for registration in our Channel.
  • Taming the Network Data Monster: Performance and Security Monitoring (2/2) Recorded: Aug 11 2014 56 mins
    Gordon Beith, Director, Product Management and Chris Roeckl, VP, Global Marketing
    Network owners are migrating to higher bandwidth network infrastructure, supporting speeds of 40Gbps and 100Gbps. These network links must continue to be monitored and secured as before, which involves deploying multiple tool types for both performance management and security assurance.

    Unfortunately, the tools available today cannot ingest high-speed traffic, because they lack both the physical interfaces and processing power to do so. Even when certain tools begin to support 40G or 100G interfaces, replacing existing moving to new tools and systems immediately would be expensive and many products will be unable to keep up with line rate traffic at 40G or 100G.

    Watch the webinar to understand the challenges associated with current means to monitor these high-speed networks and learn how VSS Monitoring can help you optimize your current or planned 40G / 100G network monitoring.
  • Taming the Network Data Monster: Performance and Security Monitoring (1/2) Recorded: Aug 11 2014 52 mins
    Gordon Beith, Director, Product Management and Chris Roeckl, VP, Global Marketing
    Network owners are migrating to higher bandwidth network infrastructure, supporting speeds of 40Gbps and 100Gbps. These network links must continue to be monitored and secured as before, which involves deploying multiple tool types for both performance management and security assurance.

    Unfortunately, the tools available today cannot ingest high-speed traffic, because they lack both the physical interfaces and processing power to do so. Even when certain tools begin to support 40G or 100G interfaces, replacing existing moving to new tools and systems immediately would be expensive and many products will be unable to keep up with line rate traffic at 40G or 100G.

    Watch the webinar to understand the challenges associated with current means to monitor these high-speed networks and learn how VSS Monitoring can help you optimize your current or planned 40G / 100G network monitoring.
  • Achieving Intelligence-Aware Security, Monitoring Controls, and Agility Recorded: Jul 25 2014 64 mins
    Tony Zirnoon, CISSP - Sr. Director Security Strategy at VSS Monitoring
    As network data has exploded in volume, velocity and variety, network security and monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale and accommodate continuous monitoring in consolidated physical, virtual and cloud based data centers. The network’s increasing speed and rapidly growing megatrends (e.g. virtualization and tunneling protocols), pose challenges for IT network and security professionals trying to manage and secure Financial Services network infrastructure in a more agile and proactive manner.

    The IT organization as a whole needs to ensure end-to-end visibility and data access to meet and exceed business, network and application performance SLAs while keeping their infrastructure and data secure against continually evolving advanced and targeted attacks. How does one architect a scalable failsafe security & monitoring architecture to withstand the test of time while ensuring adaptability to evolving business needs?

    Attend this webinar to learn how to:
    - The value props a Network Packet Broker system could deliver for Financial Services networks
    - How to use the security intelligence offered by Next Generation IPS and advanced malware prevention tools in one segment
    - How to identify bad actor(s) / suspicious traffic patterns, and then leverage an extensible Network Packet Broker system to not only perform intelligent traffic capture, but also gain intelligence aware security and monitoring controls across the entire network infrastructure
  • Avoiding “War Room” Problem-Solving: Monitoring and Securing Your Infrastructure Recorded: Jul 16 2014 58 mins
    Zack Belcher, Product Manager - Fluke Networks; Tony Zirnoon, Sr. Director of Security Strategy & Alliances
    As your business grows and expands, so does the complexity of managing application and network performance to deliver quality end user experience. The added challenge is that the IT landscape within most organizations is made up of independent networks and applications, managed by teams within their own siloes of responsibility, often with their own tools optimized for specific discipline. When issues arise, it requires a collaborative analysis at the problem in order to reach an agreed upon identification of the issue, which often drives the cross-functional IT team into the "War Room" scenario.

    Join us in a discussion about how to monitor and troubleshoot performance problems in a complex ecosystem addressing:
    - Data gathering for monitoring, security, compliance
    - Architect an infrastructure to monitor performance across multiple switches, data centers and virtual environments
    - Maximizing visibility across the distributed enterprise
  • Video: Defense-in-depth Best Practices Recorded: Jul 9 2014 7 mins
    VSS Monitoring
    Quick overview of defense-in-depth security best practices.

    For an in-depth education, view for our 2-part series: "Architecting Defense-in-Depth Network Security" and "Security Service Assurance - a panel discussion" by clicking on the "attachments" button below.
  • Considerations for Ramping to a Big Data Network Monitoring Architecture, Part 2 Recorded: May 7 2014 56 mins
    Tony Zirnoon, Sr. Director of Security and Adwait Gupte, Product Manager
    This is a continuation of our 2-part series on Big Data Visibility with Network Packet Brokers (NPBs).

    Big data techniques and technologies can be powerful tools for scaling network monitoring and forensics. They can also facilitate new use cases for network data, potentially beyond the scope of Operations.

    Tony Zirnoon, Sr. Director of Security and Adwait Gupte, Product Manager, will discuss practical considerations for migrating to a Big Data Visibility Architecture, including:
    • Accommodating network volume, velocity and variety using sophisticated hardware preprocessing and APIs
    • Metadata versus flow statistics versus full packet capture – considerations and use cases for each
    • Open versus proprietary formats for storage
    • Pros and cons of integrated capture/storage/analysis solutions versus separate capture/ storage solutions coupled with virtualized analysis probes
    • Addressing retrieval in an “open” forensics model
    • Leveraging a distributed computing framework for processing large-scale data stores
  • Leveraging a Big Data Model in the IT domain, Part 1 Recorded: Apr 30 2014 44 mins
    Andrew R. Harding, VP of Product Line Management
    This is part 1 of our 2-part series on Big Data Visibility with Network Packet Brokers (NPBs).

    Even as network data has exploded in volume, velocity and variety, network monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale and accommodate a widening virtualization trend. Customers are demanding greater freedom in how applications are deployed and are moving to a consolidated, shared model of data using big data frameworks, such as Hadoop, which enable large-scale processing and retrieval for multiple stakeholders.

    Join Andrew R. Harding, VP of Product Line Management at VSS Monitoring, as he discusses:
    - Big data and its implications for network monitoring and forensics
    - Why network monitoring solutions are lagging from a virtualization standpoint and why this is a problem for network owners
    - How certain traditional network monitoring functions will eventually be offloaded to adjacent technologies
    - How Network Packet Brokers can accelerate the adoption of virtualized probes, “open” storage, and big data technologies within network management / monitoring
    • How a Big Data Visibility architecture can enable network data to become part of the “big data store,” allowing it to integrate with the rest of enterprise data
  • Future Proof Your Data Center's Network and Security Monitoring Recorded: Mar 19 2014 52 mins
    Gordon Beith, Director of Product Management
    How should one architect a DC security monitoring architecture to withstand the test of time while ensuring adaptability to evolving business needs?

    As network evolves, data center (DC) also transforms along with it. Such transformation demands continuous configuration of services and devices in the DC, whether for performance, security or analytics, making deployment and management even more cumbersome. Top 2014 DC trends, such as virtualization (i.e. vDC) and software-defined network (SDN), further increase network blind spots and – in light of NSA data-snooping revelation – heighten the need for DC monitoring.

    Join Gordon Beith, Director of Product Management at VSS Monitoring, in a discussion about:
    - Monitoring gaps and security vulnerabilities in today’s traditional DC network architecture
    - How to address those gaps and vulnerabilities without defaulting to a rip and replace approach
    - Proven best practices in architecting a future-proofed physical or virtual DC monitoring fabric for total network visibility
    - How to enable design flexibility, deployment simplicity, and scalability without enlarging the DC carbon footprint

    Attendees will receive FREE copy of our most popular downloads:
    1. Network Packet Brokers for Dummies, an eBook
    2. Best Practices for Mainstreaming Monitoring Fabrics - an Enterprise Management Associates white paper
  • Part 2 - Panel: Network Intelligence Optimization for Security Service Assurance Recorded: Feb 19 2014 62 mins
    Joe Onisick, Define the Cloud; Jim Frey, EMA; Curt Schwaderer, IP Fabric; Tony Zirnoon, VSS Monitoring
    Emerging technologies and proven designs with Jim Frey of EMA, Curt Schawderer of IP Fabrics, and Tony Zirnoon of VSS Monitoring.

    This is a continuation of our 2-part series focusing on Defense-in-Depth Network Security - a panel discussion - with panelists: Jim Frey, VP of Research Network Management from EMA; Curt Schwaderer, Chief Software Architect at IP Fabrics, and Tony Zirnoon, Sr. Director of Global Security Strategies from VSS Monitoring.

    Panelists will discuss emerging technologies and proven reference architecture designs that provide much needed agility, flexibility and scalability so IT organizations can build a scalable network, security and forensics infrastructure environments that equally benefit both Network Operations and Security Operations. (Net Ops can thrive, achieve and maintain 99.999% while Security Ops is empowered to design and deploy defense-in-depth, and add additional defense layers as needed with minimal network instrumentation in a proactive manner.) The panel will also share best practices to help IT organizations proactively mitigate against known and unknown threats while optimizing and scaling security analytics and response agility.

    Attendees will get FREE copy of our most popular downloads:
    1. Security Proof-of-Concept Best Practices – a white paper
    2. Best Practices for Mainstreaming Monitoring Fabrics - an EMA white paper

    What's Next?
    - Attending RSA 2014? Consult with our solution architects at Booth 301, South Hall.
    (Prequel: Part 1 of 2: Architecting Defense-in-Depth Network Security, a Webinar - available on Feb 5, 2014 at 10 am PT and also on-demand).
  • Part 1/2: Architecting Defense-in-depth Network Security, a Webinar Recorded: Feb 5 2014 47 mins
    Tony Zirnoon, Sr. Director of Global Strategy & Alliances
    Insights and best practices on architecting a defense-in-depth network security model.

    Today’s rapidly growing network speeds and increased complexity such as Virtualization, Tunneling with Encapsulation and Encryption pose challenges for IT Network and Security professionals trying to manage and secure them. The IT organization, as a whole, needs to ensure end-to-end visibility, and data access to meet and exceed agreed upon business, network and application performance SLAs while keeping their infrastructure and data secure.

    Join Tony Zirnoon, Sr. Director of Global Security Strategy & Alliances for insights into best practices for:
    1. Architecting a defense-in-depth network security model that scales across converged networks (with real production deployment examples); and
    2. How to future proof existing security infrastructure/solutions against the ongoing barrage of security threats while maintaining high availability and agility.

    Attendees will get FREE copy of our most popular downloads:
    1. Blind as a Bat? Supporting Packet Decryption for Security Scanning - a SANS whitepaper
    2. Optimize Network Monitoring for Real World Threats - a SANS whitepaper
    3. 9 Proven Ways to Optimize Network Security –a white paper
    4. Limitless Network Monitoring & Security – a Network Intelligence Optimization solution brief

    What's next?
    - Don't miss Part 2: Security Service Assurance panel discussion on Feb 19th - stay tuned for more details.
    - Attending RSA2014? Consult with our solution architects at Booth 301, South Hall.
Proven solutions and best practices from industry experts
Featuring network visibility, network security & performance monitoring solutions; technologies; best practices; and applications for big data, security assurance, application and network performance, network forensics, vDC/cloud monitoring, and more...

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: High Performance, Cost Effective Visibility Plane for Enterprise Networks
  • Live at: Mar 18 2015 6:00 pm
  • Presented by: Sarah Banks, Director, Product Management
  • From:
Your email has been sent.
or close