1 / 21

NETSCOUT Overview, Vision and Strategy

NETSCOUT Overview, Vision and Strategy. Evolution of Wire Data Network Solutions. Digital Transformation. 2015 – Business Assurance. Carrier IP Convergence. 2005 – Service Assurance. Networking. 1995 – Network Assurance. Protocols. 1985 – Protocol Assurance. NETSCOUT EVOLUTION.

aingle
Download Presentation

NETSCOUT Overview, Vision and Strategy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NETSCOUT Overview, Vision and Strategy

  2. Evolution of Wire Data Network Solutions Digital Transformation 2015 – Business Assurance Carrier IP Convergence • 2005 – Service Assurance Networking • 1995 – Network Assurance Protocols • 1985 – Protocol Assurance

  3. NETSCOUT EVOLUTION The First 30 Years 1984 – 2014

  4. NETSCOUT Changed the Game in 2015: Acquired Danaher’s Communications Business • Solutions for Cyber (Arbor) • Customer Experience – BI (TekComms) • Radio Access Network Optimization (TekComms) • Extension into mid-tier of Enterprise (Fluke) + Increased Total Addressable Market • Larger, more global and more diverse customer base • Cross-sell opportunities • Increased international presence incl. stronger VAR channel Expanded Go-to-Market Activities • Strategically positioned for increased innovation within Service Providers and Enterprise • Next-gen platform and software Platform and Scale Creation Ready to Accelerate the Digital Transformation

  5. NETSCOUT Today Corporate Facts: Solution Facts: Employees: ~3,000 in over 50 regional offices Market Leader: Enterprise NPM, Service Provider Service Assurance, DDoS Protection Customers: >5,000 in over 120 countries • Revenue: $1Billion in FY’18 • 60% Americas, 40% Rest of World • 50% Enterprise, 50% Service Provider Smart Data Technology: Visibility to over 1/3rd of the global Internet, large enterprise & mobile traffic Profit: 18% operating profit margin in FY’18 Software Flexibility: Offering physical, virtual, cloud, and hybrid systems or managed services Ticker: NTCT on NASDAQ

  6. The Problem: Multiple IT teams are struggling to get the data they need • NetOps require a view to assure the business application performance and troubleshoot issues Enterprise Infrastructure • CloudOps and DevOps require service assurance as well as a knowledge of dependencies on legacy systems • SecOps need to see network traffic to determine risk on both legacy and cloud systems. Cloud Security

  7. NETSCOUT Smart Data The Most Reliable Signal in The Connected World Advanced Cyber Threats DDOS Business Analytics NPM APM User Experience InternetThreat Visibility ATLASIntelligenceFeed AdaptiveServiceIntelligence AIF ASI Internal Activity

  8. NETSCOUT Solutions to Assure and Protect PROTECTION ASSURANCE Mobile, Data, Voice and Video Services Internet, Core, and Premise Services SERVICE PROVIDERS NETSCOUT Smart Data SMARTDATA Network, Application, and Infrastructure Performance ENTERPRISE Internal and External Threats

  9. Our Service Assurance Solutions ENTERPRISE SERVICE ASSURANCE • SERVICE PROVIDER • SERVICE ASSURANCE ANALYZE AND MITIGATE Visibility & analytics for service and customer experience Visibility & analytics for service assurance • nGeniusONE • nGenius Business Analytics • nGenius Session Analyzer • TrueCall RAN Analytics • nGeniusONE • nGeniusPULSE SMARTDATA InfiniStreamNG / vSTREAM Packet Flow Switch COLLECT AND ORGANIZE Public Cloud, Virtual, Physical Internal Traffic

  10. Our Security Solutions ENTERPRISE SECURITY • ARBOR INTERNET • SECURITY ANALYZE AND MITIGATE Internet visibility and protection against Cyber attacks. Visibility, analytics and protection against advanced threats. • Arbor Sightline • Arbor Threat Mitigation System • Arbor Cloud • ATLAS Intelligence Feed • Security Analytics • CyberOptimizer • Arbor Edge Defense SMARTDATA CyberStream, InfiniStreamNG Arbor Edge Defense Packet Flow Switch COLLECT AND ORGANIZE Public Cloud, Virtual, Physical Internal Traffic

  11. DDoS Attack Trends on Sweden ATLAS Statistics

  12. January 2019

  13. February 2019

  14. March 2019

  15. So far in April (1st until 24th)

  16. So far in April (1st until 24th) Largest Events

  17. Volumetric, Brute Force DDoS Attacks Volumetric DDoS attacks are designed to saturate and overwhelm network resources, circuits etc by brute force ISP 2 ISP 1 ISP n SATURATION ISP Firewall IPS LoadBalancer TargetApplications & Services Attack Traffic DATA CENTER Good Traffic

  18. Stopping Volumetric Attacks Cloud-based DDoS Protection SCRUBBING CENTER Peakflow SP/TMS ISP 2 ISP 1 ISP n DATA CENTER ISP IPS Firewall LoadBalancer • Cloud-based: Volumetric DDoS mitigation must be done up stream, before traffic gets to Data Center • Activated “on demand”: only active when an attack is detected or reported

  19. Layer 4-7, Smart DDoS Attacks Use much less bandwidth; harder to detect; target applications where they slowly exhaust resources. ISP 2 ISP 1 ISP n EXHAUSTION EXHAUSTION DATA CENTER ISP Firewall IPS LoadBalancer TargetApplications & Services Attack Traffic Good Traffic

  20. Stopping Layer 4-7, Smart Attacks On-premise DDoS Protection ISP 2 ISP 1 ISP n DATA CENTER ISP IPS Firewall LoadBalancer TargetApplications & Services • On-premise: L4-7 DDoS mitigation must be done at the Data Center • Always ON: immediate mitigation • Fine-tuned to the services behind it to minimize false positives and false negatives

More Related