200 likes | 339 Views
Secure and Optimized Multi-Protocol Application Delivery. Leigh Costin Product Marketing Manager, APAC Blue Coat Systems, Inc. June 1 st 2007 Banking Vietnam 2007. Branch. Web. HQ. ASP. Trends Driving A New IT Requirement. 9% Growth/yr Source: Nemertes. 73% Congestion
E N D
Secure and OptimizedMulti-Protocol Application Delivery Leigh Costin Product Marketing Manager, APAC Blue Coat Systems, Inc. June 1st 2007 Banking Vietnam 2007
Branch Web HQ ASP Trends Driving A New IT Requirement 9% Growth/yr Source: Nemertes 73% Congestion Source: Research Concepts 50% Direct to the ‘Net Source: Gartner 40% Outsourced Source: AMR 97% Increase Source: IDC
Applications Are Everywhere Users Are Everywhere Branch Office Branch Office Branch Office Security Threats Poor App Performance An Enterprise Without Boundaries ASP SFA App ASP CRM App ASP HR App Supplier Procurement App Corp Data Center File Servers Corp Intranet Corp E-Mail
WAN/Internet What’s Needed Is a System Architecture for Optimizing User-Application Communications It’s All About Users and Applications Applications Users Access P2P Viruses IM/Skype SSL Cost Content Compliance Bus. Apps Spyware Internal orExternal Internal orExternal
Applications Users WAN/ Internet Internal orExternal Internal orExternal Point of Control for Secure & Optimized Application Delivery Need User-Application Point of Control
Evolution of User-App Communication HTTP/HTTPSoverTCP/IP Multi-Protocol L5-L7overTCP/IP Networked Users Multi-protocolL2-L4 SNAL2-7 Mainframe Web 2.0 PC Internet/Browser 2020 1970 1980 1990 2000 2010 1960
Applications Users WAN/ Internet Internal orExternal Internal orExternal Multi-Protocol Point of Control for Secure & Optimized Application Delivery Need Multi-Protocol Point of Control
Best Practice for Application Delivery • Support all key enterprise applications • Client-Server and web • Internal and external • Encrypted and unencrypted • Bandwidth intensive and response sensitive • Apply correct techniques to each application • Protocol optimization • Object caching • Byte caching • Bandwidth management • Compression • Enterprise scalability, management, reporting
The Application Delivery Challenge • Different apps • Different users • Different priorities • Different problems • Different solutions Chatty Apps Web Apps Unwanted Apps SSL Apps Video Apps Individual applications must be individually optimized.
Optimizing Chatty Applications • Communicate in small bits (designed for LANs) • Result in hundreds or thousands of roundtrips • File services, e-mail (MAPI), some web apps Chatty Apps Web Apps Unwanted Apps SSL Apps Video Apps No amount of bandwidth can reduce their latency.
Optimizing Web Applications • Lots of bulky repetitive objects • Serial communication slows response • Internal and external Chatty Apps Web Apps Unwanted Apps SSL Apps Video Apps Web browsers are becoming the primary app interface
SSL use is growing If it’s important, it’s encrypted! Internal apps are hard to accelerate External apps are even harder Handle with care Optimizing SSL Applications Chatty Apps Web Apps Unwanted Apps SSL Apps Video Apps SSL often accounts for 30% + of all WAN traffic
Optimizing Video Applications • Are you video ready? • Earnings announcement • E-learning • YouTube.com • Is it at least controlled? • Split streams for live broadcast • Distribute and accelerate video-on-demand Chatty Apps Web Apps Unwanted Apps SSL Apps Video Apps Video on the Web could be the next “killer app.”
Controlling Unwanted Applications Chatty Apps Web Apps • Why accelerate? • Frivolous surfing • Bulk downloads • Peer-to-Peer • Spyware and viruses • Get rid of it! • Or it will grow • Crowd out good apps Unwanted Apps SSL Apps Video Apps Uncontrolled Internet traffic wastes WAN bandwidth
Question: How Do You Do This? • Determine good/bad? • Accelerate good, stop bad • Differentiate important/relevant/tolerated? • Prioritize accordingly • Bring all of the appropriate acceleration techniques to bear? • Know/accelerate SSL? Video?
Answer: Only With a Proxy • Proxies terminate • Protocols can only be “fixed” with proxies • Application-layer proxies understand users, applications • Application protocols can only be “fixed” with application-layer proxies • Caching and compression – only with proxies • SSL can only be accelerated and controlled with a proxy
Applications Users WAN/ Internet Internal orExternal Internal orExternal Full User-Application Session Termination Visibility and Context Control User-Application Security and Performance Power of the Proxy
Director Reporter Branch Branch WAN Soon Extended to: Customer & Remote User Sessions Performance, Security, Control Eventual Goal: “No User Left Behind” Performance, Security, Control For Everyone, Everywhere Traditional Focus on: User to Internet Sessions Performance, Security, Control Secondary Focus on: Web App Sessions Performance, Security, Control Now Extended to: Branch User to App Sessions Performance, Security, Control Blue Coat Proxies as Points of Control Corp HQ Data Center Public Web/ App Servers Gateway Proxy Internet Reverse Proxy Customers Branch Office Proxy WAN Opt Proxy Remote Users BranchOffice Proxy
Secure & Optimized Application Delivery • Understand the dynamics of application delivery • Applications are hosted everywhere • Users want access from anywhere • We still live in a multi-protocol world • TCP/IP is ubiquitous, but L5-7 is still multi-protocol • Know the applications in your enterprise • Apply the appropriate optimization techniques for each • Application delivery is a combination of performance optimization, security and control • It is not enough to accelerate the good • You need to stop the bad • And prioritize the rest