370 likes | 564 Views
NETSCOUT Overview, Vision and Strategy. Evolution of Wire Data Network Solutions. Digital Transformation. 2015 – Business Assurance. Carrier IP Convergence. 2005 – Service Assurance. Networking. 1995 – Network Assurance. Protocols. 1985 – Protocol Assurance. NETSCOUT EVOLUTION.
E N D
NETSCOUT Overview, Vision and Strategy
Evolution of Wire Data Network Solutions Digital Transformation 2015 – Business Assurance Carrier IP Convergence • 2005 – Service Assurance Networking • 1995 – Network Assurance Protocols • 1985 – Protocol Assurance
NETSCOUT EVOLUTION The First 30 Years 1984 – 2014
NETSCOUT Changed the Game in 2015: Acquired Danaher’s Communications Business • Solutions for Cyber (Arbor) • Customer Experience – BI (TekComms) • Radio Access Network Optimization (TekComms) • Extension into mid-tier of Enterprise (Fluke) + Increased Total Addressable Market • Larger, more global and more diverse customer base • Cross-sell opportunities • Increased international presence incl. stronger VAR channel Expanded Go-to-Market Activities • Strategically positioned for increased innovation within Service Providers and Enterprise • Next-gen platform and software Platform and Scale Creation Ready to Accelerate the Digital Transformation
NETSCOUT Today Corporate Facts: Solution Facts: Employees: ~3,000 in over 50 regional offices Market Leader: Enterprise NPM, Service Provider Service Assurance, DDoS Protection Customers: >5,000 in over 120 countries • Revenue: $1Billion in FY’18 • 60% Americas, 40% Rest of World • 50% Enterprise, 50% Service Provider Smart Data Technology: Visibility to over 1/3rd of the global Internet, large enterprise & mobile traffic Profit: 18% operating profit margin in FY’18 Software Flexibility: Offering physical, virtual, cloud, and hybrid systems or managed services Ticker: NTCT on NASDAQ
The Problem: Multiple IT teams are struggling to get the data they need • NetOps require a view to assure the business application performance and troubleshoot issues Enterprise Infrastructure • CloudOps and DevOps require service assurance as well as a knowledge of dependencies on legacy systems • SecOps need to see network traffic to determine risk on both legacy and cloud systems. Cloud Security
NETSCOUT Smart Data The Most Reliable Signal in The Connected World Advanced Cyber Threats DDOS Business Analytics NPM APM User Experience InternetThreat Visibility ATLASIntelligenceFeed AdaptiveServiceIntelligence AIF ASI Internal Activity
NETSCOUT Solutions to Assure and Protect PROTECTION ASSURANCE Mobile, Data, Voice and Video Services Internet, Core, and Premise Services SERVICE PROVIDERS NETSCOUT Smart Data SMARTDATA Network, Application, and Infrastructure Performance ENTERPRISE Internal and External Threats
Our Service Assurance Solutions ENTERPRISE SERVICE ASSURANCE • SERVICE PROVIDER • SERVICE ASSURANCE ANALYZE AND MITIGATE Visibility & analytics for service and customer experience Visibility & analytics for service assurance • nGeniusONE • nGenius Business Analytics • nGenius Session Analyzer • TrueCall RAN Analytics • nGeniusONE • nGeniusPULSE SMARTDATA InfiniStreamNG / vSTREAM Packet Flow Switch COLLECT AND ORGANIZE Public Cloud, Virtual, Physical Internal Traffic
Our Security Solutions ENTERPRISE SECURITY • ARBOR INTERNET • SECURITY ANALYZE AND MITIGATE Internet visibility and protection against Cyber attacks. Visibility, analytics and protection against advanced threats. • Arbor Sightline • Arbor Threat Mitigation System • Arbor Cloud • ATLAS Intelligence Feed • Security Analytics • CyberOptimizer • Arbor Edge Defense SMARTDATA CyberStream, InfiniStreamNG Arbor Edge Defense Packet Flow Switch COLLECT AND ORGANIZE Public Cloud, Virtual, Physical Internal Traffic
DDoS Attack Trends on Sweden ATLAS Statistics
So far in April (1st until 24th) Largest Events
Volumetric, Brute Force DDoS Attacks Volumetric DDoS attacks are designed to saturate and overwhelm network resources, circuits etc by brute force ISP 2 ISP 1 ISP n SATURATION ISP Firewall IPS LoadBalancer TargetApplications & Services Attack Traffic DATA CENTER Good Traffic
Stopping Volumetric Attacks Cloud-based DDoS Protection SCRUBBING CENTER Peakflow SP/TMS ISP 2 ISP 1 ISP n DATA CENTER ISP IPS Firewall LoadBalancer • Cloud-based: Volumetric DDoS mitigation must be done up stream, before traffic gets to Data Center • Activated “on demand”: only active when an attack is detected or reported
Layer 4-7, Smart DDoS Attacks Use much less bandwidth; harder to detect; target applications where they slowly exhaust resources. ISP 2 ISP 1 ISP n EXHAUSTION EXHAUSTION DATA CENTER ISP Firewall IPS LoadBalancer TargetApplications & Services Attack Traffic Good Traffic
Stopping Layer 4-7, Smart Attacks On-premise DDoS Protection ISP 2 ISP 1 ISP n DATA CENTER ISP IPS Firewall LoadBalancer TargetApplications & Services • On-premise: L4-7 DDoS mitigation must be done at the Data Center • Always ON: immediate mitigation • Fine-tuned to the services behind it to minimize false positives and false negatives