Gigamon Introduction
Gigamon Introduction
Gigamon Introduction
Customer data from FY2016. Based on 2016 Fortune list, Fortune is part of Time Inc. Samantha Sharf, "The World's Largest Tech Companies: Apple Beats Samsung, Microsoft And Alphabet," Forbes, May 26, 2016. Retrieved from:
“Top 50 Banks in the World," Banks around the World. June 30, 2016. Retrieved from: http://www.relbanks.com/worlds-top-banks/assets http://www.forbes.com/sites/samanthasharf/2016/05/26/the-worlds-largest-tech-companies-2016-apple-bests-samsung-microsoft-and-alphabet/#ed4f6fc89ee4
Laura Lorenzetti, "The 10 biggest health-care companies in the Fortune 500," Fortune, June 20, 2015. Retrieved from: "Stores Top Retailers 2016," Kantar Retail, National Retail Federation, 2016. Retrieved from: https://nrf.com/resources/annual-retailer-lists/top-100-retailers/stores-top-
https://gigamon.my.salesforce.com/00O14000008ef5s retailers-2016
Data Set: Top US Government Agencies by Contract Spending (FY 2016), GovWin from Deltek. Accessed Feb. 7, 2017. "The World's Biggest Public Companies," Forbes, June 2, 2016. Retrieved from: https://en.wikipedia.org/wiki/List_of_telephone_operating_companies
1900+ 78 50
of the of the Top 100
End Customers
Fortune 100 Global SPs
As of Q4 2015
Customer
Experience
Management
Network
Performance
Management
Application
Performance
Management
Network
Forensics/Big Data
Analytics
Twelve Security Capabilities of the Gartner Adaptive (at the core of change) Security Architecture
Predict Adjust
Posture
Implement
Posture
Prevent
Risk-prioritized Harden Systems
Exposure Assessment
Anticipate Threats / Isolate Systems
Attacks Continuous
Baseline Systems and Visibility and Prevent Attacks
Adjust Monitor
Security Posture
Verification Posture
Users
Systems
Remediate System activity
Payload
Detect Incidents
Design / Model Network
Policy Change Confirm and
Prioritize Risk
Investigate
Incidents / Retrospective Contain Incidents
Analysis
Respond Detect
*Source: Gartner Data Center Infrastructure Operations and Management Conference, December 2016
Intrusion
Cloud: AWS
IPS
• Significant blind spots
Detection
Intrusion (Inline)
System Intrusion IPS
Detection
Detection
System
System
Internet IPS
(Inline)
(Inline)
• Extraordinary costs
• Contention for access to traffic
Data Loss
Prevention
Routers Anti-Malware
(Inline)
Anti-Malware • Inconsistent view of traffic
Data Loss Anti-Malware (Inline)
Data Loss “Spine”
Prevention (Inline)
Prevention Switches
• Blind to encrypted traffic
“Leaf”
• Too many false positives
Email Threat Switches Forensics
Detection
Email Threat Forensics
Detection Forensics
Email Threat Virtualized
Detection Server Farm
Routers Anti-Malware
Data Loss
(Inline)
Anti-Malware
Prevention
Data Loss Anti-Malware (Inline)
Data Loss “Spine”
Prevention (Inline)
Prevention Switches
On-prem
DC
Public
Cloud
ü All tools still connected ü Enhanced tool efficiency
ü Fewer network touch points ü Decreased OPEX costs
SSL
Slicing Tunneling
Decryption
Visibility
Nodes Intelligent Visibility Public Cloud Virtual Traffic Aggregators Network TAPs
Any Network
Data Center and Private Cloud | Public Cloud | Service Provider Networks | Remote Sites
* ”Avoid These "Dirty Dozen" Network Security Worst Practices’, Andrew Lerner and Jeremy D'Hoinne, Gartner, January 2015
Intrusion
Detection
System (IDS)
Intrusion Detection
System (IDS) Application
Performance
Application Performance
Management Management
Customer is unable to use all tools! Customer has complete visibility for all tools!
Switch 2 Switch 2
Switch 3 Switch 3
VoIP Analyzer
Customer migrates to a 10Gb network and Customer able to extend the life
1Gb monitoring tools become useless of their 1Gb network and security tools
Remote 4 Remote 4
Switch 4 Switch 4
Central
Central
Switch Switch
1 site per Tool – Tools not optimized Centralize the Tools for maximum efficiency
VIRTUALIZE
SERVER
SERVER
Hypervisor Hypervisor
SERVER SERVER
Switch
Switch
GigaVUE-VM
IDS
ANTI-MALWARE
HYPERVISOR HYPERVISOR
SERVER SERVER
APM
Core Core
Application
GigaVUE-VM Performance
• Flow Mapping™
• Filter on VM, application ports
• Packet slicing at any offset Spine Spine
Network
• Tunneling for multi-tenant
Tunnel Port
DB Server Network
Performance
Leaf Leaf Leaf Leaf
DB
OS
Tunneling Security
GigaVUE-FM
• All tools are still Traditional Architecture New ACI Architecture Centralized Tools
connected
VM Traffic
• Fewer network Application
Performance
Inline
touch points Bypass VXLAN= Management
6000
• Increased tool SSL
Decryption Customer
performance Core Spine NetFlow
VXLAN= Experience
Management
5000
(Nexus 7K) (Nexus 9500) Generation
• Cost savings Aggregation Application
(Nexus 5K, Session
Catalyst 6K) G-TAP BiDi Filtering De-cap Security
Network
Leaf (40Gb) VXLAN
Access Transform- Header
(Nexus 2K) ation (Nexus 9300) Stripping
Network
GigaVUE-VM NetFlow / Performance
IPFIX Management
Server Farm Virtualized Server Farm (UCS)
VM VM
HYPERVISOR
VXLAN=6000
IDS
SSL
Decryption DLP
De-dupe Header
Stripping
Lock
Pwr
Rdy M/S IBM Tealeaf
PRT-HC0-Q06
PRT-HC0-Q06
PPS Fan Rear
PTP
IEEE Rdy Q1 LNK Q1 LNK Q1 LNK Q1 LNK Q1 LNK Q1 LNK Rdy Q1 LNK Q1 LNK Q1 LNK Q1 LNK Q1 LNK Q1 LNK
GigaVUE-HC2
1588
Stack Pwr ENA ENA ENA ENA ENA ENA Pwr ENA ENA ENA ENA ENA ENA
Mgmt
Port
1 3
SMT-HC0-X16
Mgmt
SilverTail
Rdy
Con-
sole H/S
QSF-502 module
between TA40 to HC2
Leaf Leaf 40gb
1 2
Leaf
3
Uses x-over MPO-LC
connector
PinDrop
Riverbed
ARX
QSB-501 BiDi module
between TA40 and
TAP-506 DynaTrace
BiDi
Live A Live A Live A Live A
1
4
3
Live B Live B Live B Live B
G-TAP BiDi
G-TAP BiDi
G-TAP BiDi
G-TAP BiDi
TAP-506
Out A Out A Out A Out A
6
5
8
7
Out B Out B Out B Out B
TAP-506
TAP-506
TAP-506
TAP-506
“…our joint customers will benefit from “Even the best security appliance “…Gigamon’s high performance “…a robust and systematic framework to
some of the most advanced security will fail to deliver if it does not security delivery platform is deliver pervasive network visibility to
technology available.” get the right traffic,…” the right match…” security appliances…”
“…critical manageability and “…To be effective, a security appliance “…a security delivery platform “…Together, Lancope and Gigamon
control to traffic and needs to be able to access the right addresses the real need for pervasive, enable customers to solve today’s
flow visibility.” network traffic…” high fidelity visibility…” tough security challenges."
“…much needed operational “…allows joint customers to leverage “…efficient access to traffic flows and “…significantly increasing the efficiency
efficiency to the task of ensuring Gigamon's Security Delivery Platform to high fidelity meta-data from anywhere and effectiveness of [business]
pervasive visibility for security tools.” effectively extend and access the in the network…” security teams…”
critical data flows …”
No service
Service continue
Maximize tool
efficiency
Increase scale of
security monitoring
HC2
Edge Routers
Visibility into SSL traffic leaving an organization (Internet servers, cloud services)
1 Source: Gartner “Predicts 2017: Network and Gateway Security”, December 13 2016.
2 Source: SSL Performance Problems, NSS Labs
3 Source: 2016 Trustwave Global Security Report
Inline
Tool(s)
Decryptor
2 • Corporate servers
Active, Inline Passive, Out-of-Band
• Diffie-Hellman (DH) key exchange Appliance(s) Appliance(s)
Network
• Emerging TLS 1.3 standard NGFW
Forensics
• Need to be inline to decrypt SSL
IPS Anti-malware
SSL Session
Leg 2 Inline Tool Group
(encrypted) (decrypted traffic)
3
Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change.
Security Tool
Relevant
Traffic
Switch Relevant
Switch Traffic
Relevant and Irrelevant traffic is passed to the Tool Only relevant traffic is passed to the Tool!
=> efficiency of Tool reduced!
4 3 2 1 Video
NETFLIX NETFLIX NETFLIX NETFLIX Monitor
4 4 3 3 2 2 1 1 4 3 2 1 Email
NETFLIX Exchange NETFLIX Exchange NETFLIX Exchange NETFLIX Exchange Exchange Exchange Exchange Exchange Monitor
Application
Session Filtering
2 2 1 1
NETFLIX Exchange NETFLIX Exchange Collector
• Filter all traffic corresponding to an application session even though signature may only be in one packet
“
The ability to filter out irrelevant traffic based on regular expression
at line speed makes security more effective.
// Mike Gyler, Director, InfoSec, George Washington University
BACKGROUND • Streaming Services (Netflix & Hulu) consumed 50% of network bandwidth
& CHALLENGE • Security sensors were being overloaded
• Customer is using all web traffic (SSL and non SSL) on port 8080. Separate using ASF
• Identify data found in SSL certificate such as subject field
• SSL with a specific cypher suite (insecure versions)
• Filter traffic from specific internal/external domains
• Filter traffic from custom applications developed in an enterprise
• iSCSI Control plane traffic (initiation, termination)
• Kerberos: Search for Kerberos traffic (possibly specific exchanges such as TGT and Service
Tickets) and send to a tool doing user authentication and user control
• DNS records: Filter transactions based on regular Expression from DNS response
Customer
Experience
Management
(CEM)
Application
Performance
Service Provider
Metadata
Flow Mapping®
Generation
Security
Optimize • Offload NetFlow Generation to the Visibility Fabric™ increases infrastructure efficiencies
Production • Out-of-Band solution completely eliminates the risk of dropping production traffic on busy
Network routers or switches as a result of generating NetFlow
End-to-End
• Unsampled NetFlow record generation to facilitate true response and root cause capability
Traffic and
• Integrated traffic visibility solution with NetFlow Generation simultaneously provides both flow
Flow
and packet statistics to a variety of monitoring, analysis, and security tools
Visibility
Low
Performance
1010101000
1110010101
DNS, SSL,
0100011100
1010101000
High
HTTP, RDP,
1010101000
PowerShell
1110010101 Costs
0100011101
Low Visibility
SIEM Poor Security
Network
High
Performance
1010101000
1110010101
DNS, SSL,
0100011100
1010101000 DNS, SSL, Low
HTTP, RDP,
1010101000
PowerShell
1110010101 HTTP, RDP Costs
0100011101
Network
DNS LOGGING
Local
DNS
Server SIEM
Low High
Performance Costs
Local
DNS
Server SIEM
Extension Purpose
Data Length Detect exfiltration of data using large size DNS packets
Canonical Name Track other domain names used by C&C servers
Multiple collects Handle multiple responses for DNS requests
Additional fields Numerous header, query, response, authority fields in DNS
Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and subject to change.