Gigamon U - Network Rules, Distributed Network Analysis Architecture

33 %
67 %
Information about Gigamon U - Network Rules, Distributed Network Analysis Architecture

Published on June 6, 2008

Author: gigamonster

Source: slideshare.net

Description

Enterprise IT administrators at transaction and data-driven corporations deal with intricate network issues while continuing to worry about computer hacking, intellectual property theft, and complying with industry regulations. To solve these problems, administrators need the ability to capture hours, days, or even weeks worth of network traffic directly to disk for comprehensive analysis. The GigaStor provides massive data collection and a unique time-based analysis that eliminates the need to recreate problems, rapidly increasing time to resolution.

Network Instruments

Distributed Network Analysis Architecture

End-to-End Network Analysis Software Probe Connection MultiHop Dynamics Top Talkers Analysis GigaStor 10/100/1000 Probe Appliance Application Analysis SNMP Management VoIP Analysis WAN and Gigabit Probe Appliances Gigabit and WAN Observer Suite System

Example – Forensic Analysis Situation: A major retail company has been tasked with researching  the violations of their acceptable use policies by a former employee. Solution: The GigaStor appliance, featuring a time-based navigation  interface, allows for complete write-to-disk at Gigabit line speed, to ensure all necessary data is captured and stored

Example – Forensic Analysis Step 1: Identify the timeframe of interest using the GigaStor Time Analysis Interface

Example – Forensic Analysis Step 2: Determine the stations, conversations, or ports of interest from the specified timeframe

Example – Forensic Analysis Step 3: Complex filters can be created automatically, and will be run against the specified timeframe

Example – Forensic Analysis Step 4: Complete reconstruction capabilities allow an administrator to reassemble original documents such as emails, IM conversations, web pages, and even VoIP calls

Example – Forensic Analysis Situation: A major retail company has been tasked with  researching the violations of their acceptable use policies by a former employee. Solution: The GigaStor appliance, featuring a time-based  navigation interface, allows for complete write-to-disk at Gigabit line speed, to ensure all necessary data is captured and stored. Result: Proactive monitoring allows the organization to have  relevant information available without the need to recreate an issue, or, in this case, not have the ability to verify a potential conflict with their acceptable use policy.

Thank You www.networkinstruments.com Toll Free: (800) 526-7919

Add a comment

Related presentations

Related pages

Salable and eliable Advaned Threat etetion and Mitigation ...

for Cyphort to process comprehensive analysis ... distributed architecture ... to enable the management of increasingly complex networks. Gigamon ...
Read more

Application Note Stateful GTP Correlation

traffic streams can instead be distributed across a group ... above rules will go to tool T3 Access Network ... complex networks. Gigamon
Read more

Omnipliance Network Adapter Cards | 1G | 10G | 40G

Omnipliance Network Adapter Cards from Savvius connect Omnipliances to network ... PCI Express network analysis card that supports up to 2 full ...
Read more

Gigamon and Corvil Collaborate to Enhance Operational ...

... a leader in traffic visibility solutions with the innovative Visibility Fabric™ architecture, ... analysis. Gigamon's ... network analysis, ...
Read more

VMware vNetwork Distributed Switch

VMware vNetwork Distributed Switch ... vNetwork Distributed Switch retains network statistics for ... This product is protected by U.S. and international ...
Read more

Network analysis (electrical circuits) - Wikipedia, the ...

A useful procedure in network analysis is to simplify the network by reducing the number of components. ... if a network contains distributed components, ...
Read more

Networking Advice, Discussion, Community - Network Computing

EXPERT ANALYSIS OPNFV: Focus On ... A new set of network essentials is necessary to meet the challenges of today's network ... What Enterprise Architects ...
Read more

Citrus | GigaVUE Web GUI Packet Slicing | Masking | Port ...

are easily rendered by dragging lines between network ... • Near zero latency architecture allows for ... Gigamon Inte li gentDANTM U P W H E N I S T A L ...
Read more