This Session was presented by Bob Shaw at Cisco Live 2012, where he talks about what needs to change and how quickly we need to modify the network
Even with all the latest and cutting edge technology we have in the network today, in the 15 minutes it will take you to watch this video, 10,000 customer records will be stolen, of which 9,500 will not be detected as being stolen, so this means that data is being stolen from the network and it is being discovered by a third party
So if we are purchasing the right solutions keeping it updated why we are still having network security and performance issues.
Network Visibility – The Missing Ingredient
We need to design the network to be pro-active not reactive, and to do this you need to get visibility across the entire breadth and depth of the network?
This is a growing area as this is the point at which the user intersects with network-based applications and is where new revenue streams are being created. So how do know the experience is the best it can be for your customers, while making sure that the network is safe, secure and is operating at the speed that it should?You need to ensure you have the tools and the visibility across each of the these spots in the network
Low Latency Exchange Networks
1ms can cost millions of dollars, if there is a need for an audit, you need to show what has happened with that trade, so you need complete visibility into the network to complete the audit
How do you access and maintain visibility as more data moves to the cloud?
In 2011 the industry shipped more virtual servers than they did physical servers. As you move data into the virtual world, and you have an audit, are you clear were all your blind spots are within the virtual network. As traffic moves to virtual servers you lose network visibility within the inter VM machines, are you sure you can pull all the data from the virtual machines and see that traffic.
A product called Phantom loads on the ESX server sitting at the kernel level, and gives you the ability to take that virtual traffic and pull it back to the physical tools that you already invested in. So now you can use physical security and performance tools to look at what is happening in the virtual network
How do you see what is happening in the thousands of remote branches sites?
The problem at a remote site is if you are experiencing a problem and we cannot solve it over the phone, then we need to dispatch resources to the site. This causes delay in getting the problems solved, so customers experience is impacted while we dispatch to the site.
Network Visibility Must Have Relevancy
A lot of information is coming at your monitoring tools today. Network speeds will always outpace the ability of the tools to monitor them. Network speeds are increasing from Gig to 10Gig-40Gig-80Gig and then to 100Gig. Trying to purchase a monitoring tool to capture at these speeds is very expensive
A solution to this is a tool that can sit inline with 10-40-80 or 100 Gig inputs and in an intelligent manner be able to send the traffic to multiple tools without having the monitoring tool becoming over subscribed
So to meet these demands we total visibility within the network and the tools need be intelligent in understanding the traffic so that you have No Blind Spots and total Visibility into the Network