View
121
Download
1
Category
Tags:
Preview:
Citation preview
General MicrosystemsProducts and Services Overview
Cloud and Enterprise Deployments, Migrations, Security, Visibility
GMI Consulting, Assessment, Integration
Network Performance Monitoring
Network Traffic Analysis
WAN Performance
IP Address Management
Network Configuration Management
Application Performance Monitoring
Complete Visibility End User, Network, Apps, Virtualization, DB, Storage
GMI’s Chosen Solution Set From SolarWinds
GMI Deployments, Migrations, Security, Visibility
IT Business Service Model The End Users, Infrastructure, Apps, and Data We Manage
DPI – Deep Packet Inspection Data Collection Netflow enhancing DPI Deviation from Normal Time Over Threshold
5 Concepts To Know First
Deep Packet Inspection - Performance Meets SecurityTraffic Between Virtual Servers, and Between Service Tiers
End user is the revenue driver for the organization
All deployments, migrations, etc. should be performed from the perspective of the end user and the app
Real-time and synthetic visibility
Visibility in and around the end user
Business Service Performance End User Workstations – Physical, Virtual, VPN
SNMP community strings (read and read-write)
Traffic analysis for performance and security
Capacity planning
Downstream suppression, root cause
Business Service Performance Network Devices – switch / router
Web ServerInternal and externally facing
• IIS, Apache, etc.
• Performance and Security
Application Server
• Exchange• SQL• AD• Any
others
Database Performance – Host, Queries, surrounding infrastructure
• Data stores• Virtual Machines• SQL queries• Performance• Security
StorageImpacting Application Performance?
• LUNs• VM
associations• Tiered visibility• Performance• Security
Active DirectoryPerformance and Security
• Privilege escalation
• Compromise admin account
• Compromise admin workstation
• Compromise domain controller
• Pass the hash attacks
• Domain controllers should be part of an automated patching scheme
Apps are separated by a VPN tunnel – Private cloud
Apps are separated by a sea of devices – Public Cloud
Authentication may be local and/or cloud
Apps and Databases may be separated by tunnels
Dependency on provider’s
The IT Business Service Model is Now Virtualized“Cloud”
The Future of Cloud Performance AssuranceVisibility Between Virtual Servers
Solution Overview
Live Product Demonstration
LAUNCH
- Slide 21 -
Recommended