Professional Documents
Culture Documents
Agenda
1. Introduction Gigamon
2. Fungsi Gigamon
3. Flow Mapping
4. Gigamon Product Portfolio
5. Partner & Posision Gigamon
6. Summary (KeyPoint Why Gigamon)
7. Q&A
Agenda
1. Introduction Gigamon
2. Fungsi Gigamon
3. Flow Mapping
4. Gigamon Product Portfolio
5. Partner & Posision Gigamon
6. Customer Gigamon di BHp
7. Summary (KeyPoint Why Gigamon)
8. Q&A
TH E ES S E N TI A L E LE ME N T OF YOU R
INFRASTRUCTURE
8 83
of the top ten of the
Healthcare Providers Fortune 100
10 8
of the top ten of the top ten
U.S. Federal Agencies Mobile Phone
Network Operators
Customer data from April 2018. List sources available upon request.
ENTERPRISE
Gigamon Customers Today
FEDERAL SERVICE PROVIDER
GENERAL ENTERPRISE / RETAIL / HEALTHCARE /INSURANCE
TECHNOLOGY MISC SERVICES FINANCE
4,000+ 83
of the
End Customers
Fortune 100
Kondisi Infrastruktur tanpa Gigamon
LATAR BELAKANG
• Penambahan Monitoring Tool
• Tidak Consolidation Monitoring
Tools.
• Port SPAN/mirror yang terbatas
• Keterbatasan port monitoring tools
• Penempatan tapping – Link Putus
Agenda
1. Introduction Gigamon
2. Fungsi Gigamon
3. Flow Mapping
4. Gigamon Product Portfolio
5. Partner & Posision Gigamon
6. Customer Gigamon di BHp
7. Summary (KeyPoint Why Gigamon)
8. Q&A
2. Fungsi Gigamon
1. VISIBILITY &
ANALYTICS FABRIC
THE GIGAMON VISIBILITY & ANALYTICS FABRIC
2. Fungsi Gigamon
1. VISIBILITY &
ANALYTICS FABRIC
Intrusion
Detection
System (IDS)
Intrusion Detection
System (IDS) Application
Performance
Application Performance
Management
Management
Switch with two SPAN
session limitation VoIP Analyzer
VoIP Analyzer Switch with
two SPAN
ports Packet
Packet Capture
Capture
Customer is unable to use all tools Customer has complete visibility for all tools
2. Fungsi Gigamon
1. VISIBILITY &
ANALYTICS FABRIC
VoIP Analyzer
Customer migrates to a 10Gb network and Customer able to extend the life
1Gb monitoring tools become useless of their 1Gb network and security tools
2. Fungsi Gigamon
1. VISIBILITY &
ANALYTICS FABRIC
4. Limited Access to
Environment
Use Case: Limited Access to Environment (Multi segments)
LIMITED TOOL PORTS, MANY SWITCHES
Switch 2 Switch 2
Switch 3 Switch 3
4. Limited Access to
Environment
Use Case: Optimize Tool Efficiency (Centralization)
MAXIMIZE THE TOOL INVESTMENT BY CENTRALIZING
Remote 4 Remote 4
Switch 4 Switch 4
Central
Central
Switch Switch
1 site per Tool – Tools not optimized Centralize the Tools for maximum efficiency
2. Fungsi Gigamon
1. VISIBILITY &
5. Optimize Tool Efficiency
ANALYTICS FABRIC
4. Limited Access to
Environment
Use Case: Visibility into Virtual
USE EXISTING TOOL FOR VIRTUAL
VM VM VM
??? VM VM VM
1 2 3 1 2 3
Switch Switch
Existing Tool have no visibility into virtual Visibility into Virtual World with existing Tools
environment
2. Fungsi Gigamon
1. VISIBILITY &
5. Optimize Tool Efficiency
ANALYTICS FABRIC
No service
Service continue
Inline Bypass to Scale Security Delivery
SOLVING PAIN POINTS OF BOTH SECURITY & NETWORK TEAMS Inline
Bypass
Maximize tool
efficiency
Increase scale of
security monitoring
Filtering Data :
1. Ingress Filtering
2. Egress Filtering
Ingress Filtering
Tool 1 (VoIP)
Tool 2 (IDS)
Tool 3 (CEM)
Tool 4 (Web)
Tool 5 (SQL)
Tool 6 (Recorder)
Bit Bucket
Egress Filtering
Ingress Ports Egress Ports
Tool 1 (VoIP)
Tool 2 (IDS)
Tool 3 (CEM)
Tool 4 (Web)
Tool 5 (SQL)
Tool 6 (Recorder)
Bit Bucket
Cara kerja flow mapping pada Gigamon
Fabric Ingress Fabric Egress
Flow Mapping®
Map Rule Tool 1 (VoIP)
Tool 5 (SQL)
Managed by: CLI, GUI, *FM Managed by: CLI, GUI, *FM
* FM – Fabric Manager provides centralized management for all Gigamon visibility nodes . FM supported on vSphere , KVM or Hyper-V. FM physical appliance available.
Gigamon Product Portfolio
GigVUE-TA25 GigVUE-TA200
* A – Means “Always ON”. Rechargeable lithium ion battery runs for one hour in case of power failure. It is charged by AC, DC or PoE power.
Optical Taps Comparison
Network
Management
Application
Performance
Flow Mapping® GigaSMART®
Virtual
GigaVUE-VM
Security
GigaVUE-VM
GigaSMART® Feature
Application Description Benefits
Packet Slicing • Optimize processing and monitoring throughput
Compliance and confidentiality requirements
•
• Reduce storage requirement.
Customer
Experience
Management
Network
Performance
Management
Application
Performance
Management
Network
Forensics/Big Data
Analytics
Gigamon Ecosystem Partners
Security and Vulnerability Management ` Service Performance
Provider Management
Infra-
structure
Agenda
1. Introduction Gigamon
2. Fungsi Gigamon
3. Flow Mapping
4. Gigamon Product Portfolio
5. Partner & Posision Gigamon
6. Summary (KeyPoint Why Gigamon)
7. Q&A
6. Summary (KeyPoint Why Gigamon)
• Mengapa menggunakan Gigamon ?
– Mengatasi keterbatasan port.
– Meningkatkan kinerja dan performa Network Infrastructure.
– Meningkatkan kinerja dan performa dari monitoring Tool.
– Mengurangi downtime.
– Mengurangi jumlah monitoring tool dan menghemat biaya (reduce cost).
– Memperpanjang umur dari monitoring tool (dapat menggunakan tool existing).
– Management traffic ke monitoring tool.
– Dapat memberikan visibilitas pada trafik data yang terenkripsi.
Kondisi Infrastruktur tanpa Gigamon
• Penambahan Monitoring Tool
• Tidak ada consolidation Network
Monitoring
• Port spam/mirror yang terbatas
• Keterbatasan port monitoring tools
• Penempatan tapping – Link Putus
Infrastruktur Jaringan dengan Gigamon
• Termonitornya data Network yang
penting
• Terkoordinasinya penempatan
monitoring tools.
• Trafik dapat di monitor secara
menyeluruh
• Production Network tidak
terganggu jika ada perubahan
• Filtering Trafik
Q&A
Thanks to all