Service - NetScout
Service - NetScout Service - NetScout
40 Traditional Security Approach is No Longer Enough Network Security Challenges • Internal and external attacks and threats • Denial-of-service attacks • Network breaches • Impersonation (Spoofing) • Data leaks Traditional Perimeter NAC / Desktop Service Delivery Environment Firewall | IPS | Appliances Increased scope of damage with a shorter time to respond NetScout Product Update – Customer Roadshow | NetScout | July, 2011 | NetScout Confidential | © 2011 NetScout Systems, Inc. All rights reserved.
41 Extending Your Security Architecture Improving Situational Awareness Layer of visibility over existing security solutions • Leverage service management systems already deployed • Gain visibility into both applications and network layers • Identify anomalies, behavior changes and policy violations • Early warning to the Cyber Defense Alert Center (CDAC) • Integrated anomaly detection into ArcSight ETRM platforms • Complemented with extensive post-event forensic capabilities • Which servers affected • Which ports affected • Which users affected • How fast is threat spreading • Which paths affected • Which open ports allowed attack NetScout Product Update – Customer Roadshow | NetScout | July, 2011 | NetScout Confidential | © 2011 NetScout Systems, Inc. All rights reserved.
- Page 1 and 2: 1 Assuring the User Experience: Net
- Page 3 and 4: 3 NetScout Strategy Update NetScout
- Page 5 and 6: 5 The Value of Best Practices Enter
- Page 7 and 8: 7 Which Vendors Ranked as Most Used
- Page 9 and 10: 9 Managing User Experience Monitor
- Page 11 and 12: 11 Recent Announcements nGenius Vir
- Page 13 and 14: 13 Enabling Pervasive Visibility Ne
- Page 15 and 16: 15 The Evolution of Probe Technolog
- Page 17 and 18: 17 Where to Extract Intelligence Un
- Page 19 and 20: 19 nGenius Virtual Agent • Extend
- Page 21 and 22: 21 Extending Forensic Analysis Virt
- Page 23 and 24: 23 Cisco ISR Integration No Router
- Page 25 and 26: 25 Supported Service Modules Suppor
- Page 27 and 28: 27 The Packet Flow Challenge… Sca
- Page 29 and 30: 29 ASI Technology Enabling Scale fo
- Page 31 and 32: 31 The Value of ASI Technology Up t
- Page 33 and 34: 33 Unmatched Investment Protection
- Page 35 and 36: 35 The Business Service Dashboard:
- Page 37 and 38: 37 Intelligent Early Warning Automa
- Page 39: 39 Intelligent Early Warning Automa
- Page 43 and 44: 43 Case Study: Major Retail Bank nG
- Page 45 and 46: 45 Case Study: Higher Education Ins
- Page 47 and 48: 47 Unified Path to Identify Root Ca
- Page 49 and 50: 49 Unified Visibility into Enterpri
- Page 51 and 52: 51 nGenius Voice | Video Manager Ne
- Page 53 and 54: Enterprise Voice 53 Current UC Serv
- Page 55 and 56: 55 Introducing nGenius Voice | Vide
- Page 57 and 58: 57 Supports the Full Spectrum of UC
- Page 59 and 60: 59 Getting to the Real User Experie
- Page 61 and 62: 61 Instrumentation Reference Archit
- Page 63 and 64: 63 Endpoint and CDR Data Collection
- Page 65 and 66: 65 Evolution of the nGenius Service
- Page 67 and 68: 67 Licensing and Configurations •
- Page 69 and 70: 69 The Cumulative Value of NetScout
- Page 71 and 72: 71 Customer Study Participants Staf
- Page 73 and 74: 73 Cross-Functional Use Increases V
- Page 75: 75 www.netscout.com NetScout Produc
40<br />
Traditional Security Approach<br />
is No Longer Enough<br />
Network<br />
Security<br />
Challenges<br />
• Internal and external attacks and threats<br />
• Denial-of-service attacks<br />
• Network breaches<br />
• Impersonation (Spoofing)<br />
• Data leaks<br />
Traditional Perimeter<br />
NAC / Desktop<br />
<strong>Service</strong> Delivery Environment<br />
Firewall | IPS | Appliances<br />
Increased scope<br />
of damage with<br />
a shorter time<br />
to respond<br />
<strong>NetScout</strong> Product Update – Customer Roadshow | <strong>NetScout</strong> | July, 2011 | <strong>NetScout</strong> Confidential | © 2011 <strong>NetScout</strong> Systems, Inc. All rights reserved.