0% found this document useful (0 votes)
21 views18 pages

Knysyiwjvuveuvjx Gigvbc22

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views18 pages

Knysyiwjvuveuvjx Gigvbc22

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

GigaVUE 6 and Beyond

Michael Dickman
Chief Product Officer

© 2017-2022 Gigamon Inc. All rights reserved.


Product Vision
• Market Trends

• Role of Network Telemetry

• Deep Observability Pipeline

• Introducing GigaVUE 6
Market Trends
How We’ve Brought Our Mission to Life

Complexity → Blind Spots, Cost, Inflexibility Visibility → Security, Efficiency, Agility

4
Constantly Evolving Infrastructure

Hybrid & 5G IoT / OT


multi-cloud

Zero-Trust Next-Gen
Security Datacenter

5
Trends in Cloud Security: Teams, Tools and Telemetry

• Teams
Dev CloudOps DevSecOps SecOps NetOps
• Typically non-collaborative
• Security is a common goal

Observability & In-House Tools Datacenter Tools


• Security functions New Relic, Dynatrace, Sumo Logic, Datadog SolarWinds, GTI, Imperva, PRTG, Wireshark

• Detection: SecOps Tools SIEM


• Response: DevOps & NetOps Splunk, QRadar, LogRhythm

• Vulnerability mitigation & Zero Trust:


SecOps & DevOps & NetOps
M.E.L.T. Network Packets
• Tools are siloed
• Reason: Siloed telemetry Telemetry
App Metadata

• Deep observability Deep Observability Pipeline


• Network intelligence as MELT Network-Derived Intelligence
• Brings security use cases to
observability tools
• Brings NetOps into cloud platforms 6
Why Combine MELT with Network Telemetry?
TELEM ETRY SOURCE : M.E.L.T NETWO RK

• Telemetry based on “MELT” from Intra-Host Metrics Y N


systems and agents
• Metrics: Current CPU level
Low Volume Y N*

• Events: High-CPU alert Y Y


Managed Host Visibility What is reported What actually happened
• Logs: “User ran a query”

• Traces: Step-by-step app Unmanaged Host Visibility N Y


performance
Actual Activity (vs. Arbitrary) N Y
• Deep observability pipeline
Immutable (vs. Log Injection) N Y
• Adds the network visibility with
packets, flows and metadata
Passive (I.e., no impact on hosts) N Y
• Completes hybrid-cloud visibility

* Packets are high volume, metadata is low


Deep Observability Pipeline
Why “Deep Observability Pipeline?”

Deep Observability Pipeline


Knowing vs Guessing: Non-intrusive Operational Telemetry: Efficient Information Flow:
“know the true immutable facts “the ability to measure the “a set of automated processes & tools
from the application layer down internal states of a system by that allows developers and operations
to the packets and frames” examining its outputs” professionals to collaborate”

9
200+
Gigamon Hawk Deep Observability Pipeline Components Tools Partners

Network
Traffic

Any
Flow
Workload Records

Access Broker Transform Investigate

Network &
App Metadata

Cisco, Juniper & Arista

Any Environment
200+
Gigamon Hawk Deep Observability Pipeline Components Tools Partners

Network
Traffic

Any GigaVUE-FM Fabric Manager


Flow
Workload Traffic Intelligence
GigaSMART
Application Intelligence Security Intelligence Subscriber Intelligence
Records

GigaVUE Operating System

Network &
Physical TAPs & Appliances Virtual TAPs & Visibility Nodes App Metadata

Cisco, Juniper & Arista

Any Environment
11
Introducing GigaVUE 6
Rapidly Evolving 92% operate in hybrid and multi-cloud
Hybrid Cloud Security infrastructures (Flexera ‘22)
Requirements 75% of IT leaders believe combining
observability with network intelligence
is critical for hybrid cloud security (IDC
‘22)
Siloed security and monitoring is
causing security and troubleshooting
challenges
Deepens and extends observability for
full-stack hybrid cloud use cases by Actionable network-
Accessing and aggregating traffic natively –
virtual, container, or physical
derived intelligence to
Optimizing and enriching
amplify security and
Serving as a hybrid cloud broker of network observability tools
traffic, and intelligence derived from the traffic

Brings actionable network intelligence


to any tooling, anywhere.
This release
Helps organizations improve security by
“democratizing” the security delivery across all IT
operations teams.

Reduces cross-platform costs and complexity,


as required in today’s modern IT operations.
GigaVUE Today – Selected Capabilities
Subscriber-Aware Sampling
Deterministic Sampling

Management
& Orchestration AWS Auto Scaling NSX-T Support

Red Hat OpenShift


Next-Gen App Metadata SSL Decryption
VMware Tanzu Calico Flannel Docker Engine Integration
Container Layer 2 iSSL
Framework
Visibility
CEF, IPFIX

High-Performance
Kernel API Deep Observability
Processing
GigaVUE-HC1

Cloud
AWS Azure GigaVUE-HC3
Platforms

Public Cloud Private Cloud Physical

Previously Available Version 6 New Capability


GigaVUE 6.0 / 6.1 Capabilities
Subscriber-Aware Sampling
Deterministic Sampling
Rotational Sampling

Topology Visualization Multi-Homing NIC Support


Management
& Orchestration AWS Auto Scaling NSX-T Support
Azure Scale Sets NSX-T Cluster Updates

Red Hat OpenShift


Next-Gen App Metadata SSL Decryption
VMware Tanzu Calico Flannel Docker Engine Integration
Container Layer 2 iSSL
AWS EKS, Azure Multus Containerd CRI-O Framework
Visibility Layer 3 iSSL
AKS, TCA Antrea Mirantis
Native Kubernetes CEF, IPFIX, JSON
Azure CNI
Flex AMI Export
AMI Kafka Support High-Performance
Kernel API Deep Observability
ThreatINSIGHT
MetaStream Processing
with Signals GigaVUE-HC1
GigaVUE-HC1 Plus
Cloud
AWS Azure GCP GigaVUE-HC3
Platforms
400/100G G-TAP BiDi Optics

Public Cloud Private Cloud Physical

LEGEND Previous Capability G6 New Capability


Strengthening Observability and SIEM
Dashboards with Network Perspective
MANAGED HOSTS

Devices
VMs Agent
Metrics, Events,
Containers Logs, Traces

&
Network-Derived
Virtual TAP or Native Packet Mirror Network Intelligence
Metadata Events

Agent
On-Prem Public Cloud
Network Network

Internet

&
A flexible new layer of IT security stack:
• See all traffic; north-south & east-west
• Monitor unmanaged hosts
Devices IoT • ”Discover” new hosts, assets & applications
VMs Containers • Detect vulnerabilities; old SSL ciphers
Instances • Detect Rogue IT activities; torrent, crypto-mining, etc.
• Detect suspicious activities; “port spoofing”
UNMANAGED HOSTS
Michael Dickman

Thank You
[email protected]

VISIT THE NETWORKING GROUP


Continue the Discussion
• Post all questions & answers
• Ask more questions

community.gigamon.com

You might also like