Chief IT – For IT Leaders & Decision Makers
Chief IT – For IT Leaders & Decision Makers
Latest News
Obstinately clinging to iconic obsolescence
As those around me in the Protega office will...
Championing for open source collaboration
Having been fortunate to be in California’s Silicon Valley...
Fighting financial cybercrime with data
Cybercrime is a serious threat to anyone and everyone...
India’s cyber trauma
Recently, India’s Defence and other ministries were placed on...
What’s causing the cybersecurity skills gap?
How the Industry is Strangling Cybersecurity Career Development It...
Scalable optics: New lanes laid for the ‘Internet of Things’ super-highway
Since I can remember, the digital world has always...
National Security reforms needed before the Internet of things
The half way approach putting all Australian’s at risk:...
Without security the Internet of Things is doomed and could kill millions!
Are we setting up the Internet of Things to...
Artificial Intelligence & Cybersecurity: Scaling up for the Internet of Things
The world may only get one chance at making...
Worrying statistics Inaugural cyber security survey for Australia
While it’s natural to assume large companies with large...
Digital technology vs national security threats
It’s no secret digital technologies have changed everything. These...
What really happened? Why it’s so hard to get the truth when investigating an incident
Something that all incident responders need to be reminded...
Completely at sea
Shipping companies are under attack! In the new era...
The great submarine leak
The wide-ranging data leak on India’s French-origin Scorpene submarines...
Combating financial fraud: How to save billions with a text
Fighting fraud is an ever escalating arms race, with...
Singapore Cyber Updates
Highlights from the Singapore International Cyber Week 2016 (10th...
IT executives take pause as technology vendors queue up outside your door
The global political stage is certainly an interesting spectacle...
Canalys Channels Forum – Interview with Peter Ryan
STEVE BRAZIER INTERVIEWS PETER RYAN, CHIEF SALES OFFICER, ENTERPRISE...
Executive Editor AISA National Conference 2016 Interview Series: Bruce Schneier
  Cybersecurity Guru Bruce Schneier, author of ‘Data &...
Fighting technology with technology: protecting children from cyber bullies
Technology has altered the way we live. This goes...
The non-IT expert’s guide to surviving a cyberattack
Cyber-crime is one of the fastest growing industries in...
The safe city and it’s need for interoperability
Most people today who live in cities, particularly large...
Prevention is still better than cure
There is still a defeatist attitude resonating through the...
Security industry must embrace modern technologies
The global security industry is growing at a rapid...
ISACA’s CSX Hosts Free Virtual Conference: “Cybersecurity Evolves”
The digital world is on a constant continuum of...
Instagram accounts hacked, altered to promote adult dating spam
Norton by Symantec has found that scammers are hacking...
Increased Cyber Threat Activity in Brazil
Global Cybersecurity Threat Report Provides Research on Advanced Threat...
The greatest threat to your business today
For as long as digital technology has existed, there...
Creating a culture of security to defend against social engineering attacks
The Fifth Annual Benchmark study on Privacy and Security...
Fake lockscreen app on Google Play: Pokemon GO Ultimate
ESET researchers have discovered fake apps on Google Play...
How will Australia keep up
The UK’s National Crime Agency (NCA) has recently published...
Cyber Threats to the Mining Industry
In today’s competitive global market for commodities and manufactured...
Five ways the cloud is helping retailers meet customer demands
Retailers can be more innovative, and satisfy the growing...
How to prevent security breaches when patching is not an option
Businesses should beware of relying too much on software...
Three factors to help organisations be less vulnerable to cyber attack
As long as the cost of perpetrating a cyber...
Analysis of the Cyber Security Strategy: Strategic pillars of change
Strategic pillars of change: Analysis of the Cyber Security...
CenturyLink expands its cloud platform to Australia
Launches CenturyLink Cloud node in Sydney to continue international...
Five reasons the cloud makes sense for big data projects
Big data can be powerful, giving organisations extremely detailed...
Five ways managed security helps businesses keep pace with cyber threats
Cyber crime is commercial enterprise, with new tools and...
Six business and technology trends to watch in 2016
2016 will be a pivotal year for organisations pursuing...
Android.Bankosy: All ears on voice call-based 2FA
Android.Bankosy gets updated to steal passwords sent through voice...
Security in the holiday season
For many employees, the approaching holiday season means Christmas...
Securing operational technology: big data’s big role
Convergence between operational technology (OT), the hardware and software...
BAE Systems supporting Australia’s next generation of cyber security professionals
With cyber security becoming a core concern for businesses...
McAfee Labs Report Reveals Prices of Stolen Data on Dark Web
Intel Security has released The Hidden Data Economy Report which...
Palo Alto Networks revolutionises security in Asia Pacific with the introduction of Advanced Endpoint Protection offering
Offers preventative approach to stop cyberthreats at the endpoint...
Intel Security names Nicole Kidman, Jessica Mauboy and Dr Chris Brown as Most Dangerous Celebrities 2015
Intel Security has announced the results of its ninth...
BAE Systems Applied Intelligence launches Cloud-based Cyber Security in ANZ
BAE Systems Applied Intelligence has announced it is bringing its...
How to spot insider trading through behavioural analytics in the age of big data
Following this week’s  U.S. identification of an international crime...
Cisco releases first Smart Region Report focused on digital opportunities for South East Queensland
Identifies the potential of $10 billion to the region’s...
Seven ways security can cost your business
Most organisations have a pretty good sense of the...
Cisco’s Recommendations to the Australian Prime Minister & Cabinet’s 2015 Cyber Security Review
Australia’s transition towards a more digitally-enabled economy will drive...
Cisco Midyear Security Report Reveals Sophisticated Cyberattacks Are Defining the Innovation Race between Adversaries and Defenders
Findings underscore the need for retrospective analysis to reduce...
BAE Systems Applied Intelligence: Know your cyber enemy – why cyber threat intelligence is emerging as a vital security approach
Managing cyber security on an internet that was never...
Next-generation security products steal the show at 30th annual Security Exhibition & Conference
Leading security product and service suppliers including Avigilon, Ness...
FNT Software Announces Major Enhancements to Data Centre Management Software
New FNT Command 10 Includes Expanded Visualization Capabilities, Dashboards...
Why digital security must become a boardroom issue
Mikko Hietanen, Board  Director, BAE Systems Applied Intelligence gives...
A future-focused regulator for the communications market
The Government is conducting a review of the Australian...
Wireless Network the Weakest Security Link in Enterprise IT Infrastructure, According to Fortinet Global Survey of IT Leaders
9 in 10 CIOs Report Concerns Over Insufficient Wireless...
Night Vision Australia – What’s the perfect tool for Security & Law Enforcement in Australia?
FLIR Thermal Imaging Camera’s Thermal imaging cameras produce a...
BAE Systems Applied Intelligence: Why intelligence-led penetration testing needs to be the proactive defence in every business
As the cyber threat landscape evolves, so too does...
BAE Systems Applied Intelligence: Public Wi-Fi networks a threat to your businesses’ data
Recent announcements around free and open public Wi-Fi being...
Everyone has a role to play in securing Asia’s digital future
Asia is in the middle of a digital revolution,...
Honeywell: Connected Buildings delivering real outcomes
By Michael Brookes, Honeywell Building Solutions The Internet of...
Fortinet: How the world’s financial system found it itself under attack… from the inside
By Gary Gardiner A/NZ Director of Engineering, Fortinet Recently,...
DDLS introduces more live hacking challenge Labs
DDLS, Australia’s leading IT Training provider, has introduced even...
2015 CIO Leaders Summit Australia
Media Corp International was proud to conclude the 2015...
Gallagher introduces new technology to the security market
The latest product developments from leading security technology manufacturer,...
DDoS-for-Hire Preys Upon SaaS Apps such as Joomla
Akamai Technologies, the leading provider of cloud services for...
The world’s first 3D printed jet engine made in Melbourne
Monash University researchers along with collaborators from CSIRO and...
Minister for Defence opens new Lockheed Martin Facilities in Newcastle
Minister for Defence Kevin Andrews MP has formally opened Lockheed...
Micron, Seagate Announce Strategic Alliance
Micron Technology, and Seagate Technology have announced a strategic agreement that...
RiskMap 2015: The New World Disorder
Control Risks, the global business risk consultancy, has published...
Valentine’s Day: Avoid the heartbreak of Cyber Crime
After analysing a wave of scams spreading worldwide before...
An Australian Counter Unmanned Aircraft System – ‘Drone’ – Security Initiative
The association of Australian Certified UAV Operators Inc. (ACUO)...
New Cyber Security Campaign Focuses on Everyday Australians
The Australian Cyber Security Centre (ACSC) has released a video...
Submission for Senate Inquiry into Aviation and Airport Security
  2015 Senate Rural and Regional Affairs and Transport...
Trend Micro Researchers Discover New Adobe Zero Day Attacks
Security software vendor Trend Micro has identified yet another...
Akamai PLXsert’s Q4 2014 State of the Internet – Security Report Released
Akamai Technologies, the leading provider of cloud services for...
Indago Small Unmanned Quad Copter Aids Australian Firefighters
Western Australia’s Emergency Services Commissioner called upon Lockheed Martin’s...
Trend Micro: New “Zero-day” in Adobe Flash: What You Need to Know
By Christopher Budd Recently, we learned of a new...
New lockers allow round the clock access for Hills’ customers
Hills Limited will trial new secure lockers to allow...
2015 Big Data & Analytics Global Caxton Interactive Technology Workshop – Register Now!
Event: 2015 Big Data & Analytics Date: 16-18 February...
Keeping a trusted eye on today’s government networks
Australian government agencies must continue to evolve their IT...
Horror in Martin Place – Australasian Council of Security Professionals Comments
The Australian community has witnessed a hostage situation take...
WatchGuard Predicts Five Security Trends You Should NOT Worry About in 2015 and Five You Should
From passwords and the IoT to nation state cyber...
McAfee Labs Threat Predictions outlines Top Security Issues for 2015
Intel Security has released its McAfee Labs 2015 Threat...
Seagate Launches Data Recovery Services in Australia
Seagate Technology, a world leader in storage solutions, has announced...
Australian Businesses Lose Over US$55 Billion from Data Loss and Downtime Per Year, According to Global IT Study
EMC Corporation has announced the Australian findings of a new...
Internet of Things Drives Measurable Business Outcomes
The majority of organisations that have adopted Internet of...
Cyber Threats to Increase in Scope and Complexity in the New Year as Black Hat Hackers Become More Sophisticated, According to Fortinet 2015 Threat Predictions
As the 2015 New Year looms, Fortinet, a global...
New Seagate NAS HDD Delivers Enterprise-Class Solutions for Small and Medium Businesses
Seagate Technology has announced its new Enterprise NAS HDD...
SNP Wins NSW Business Chamber Award
SNP has been recognised, winning the state award for...
Kaspersky Lab’s 2015 short-range predictions
With cybercriminals growing in confidence, Kaspersky Lab anticipates that...
Gallagher Team Takes Top Engineering Award
Gallagher has added another esteemed award to its growing...
Omlis Computer Security Day 2014: Mobile payment security and tokenization
In light of Computer Security Day on 30 November,...
Seagate Appoints New Managing Director of Sales & Marketing for Asia
Seagate has announced that it has appointed Rex Dong as...
New Generation of WatchGuard Firewalls Enable Mid-Size Enterprises to Keep Pace with Explosive Growth in Encrypted Traffic
WatchGuard® Technologies, a leader in multi-function firewalls, has announced next-generation...
Telstra Cyber Security Report 2014 – Join the conversation now!
Join Telstra specialists as they discuss findings from the recently...
Louis Tetu to Keynote GovInnovate Summit
Coveo announced that Chairman & CEO Louis Tetu will...
Akamai Warns of Yummba Webinject Tools and Banking Fraud
Akamai Technologies, Inc, the leading provider of cloud services...
Tenable Network Security’s Nessus v6 Enhances Advanced System Hardening, Malware Detection and Mobility Support to Reduce the Attack Surface
Tenable Network Security®, Inc., the leader in continuous network...
Gartner Says the Digital Economy Will Push Technology Spending in Australia up 4.1 percent to $78.7 Billion in 2015
Spending on technology products and services is projected to...
Imperva Introduces Bot Protection Services for the SecureSphere Web Application Firewall
Imperva Inc, pioneering the third pillar of enterprise security...
Former GCHQ Deputy Director Cyber Defence joins Wynyard Group
Wynyard Group a market leader in crime fighting software...
First Australian made vertical tails by Marand installed on F-35 Lightning II
The first vertical tails manufactured by Australian company, Marand, have...
HP Offers Partners the On-ramp to New Style of IT
HP has announced the new HP ServiceOne program for 2015...
Cubic Announces Partnership with Unreal Government Network to Create Next Generation Live, Virtual, Constructive, Gaming Training Solutions
Cubic Advanced Learning Solutions (CALS), a subsidiary of Cubic...
Palo Alto Networks Latest PAN-OS Release Expands Cloud Security Support for AWS and KVM
Palo Alto Networks, the leader in enterprise security, has...
Ovum and F5 Networks Complimentary webinar invitation – Register now!
Webinar: Telcos as an intelligent provider: Monetizing “consumer intelligence”...
Honeywell: 7 in 10 Australians fearful that cyber attacks could damage Australia’s economy
More than seven in ten surveyed adults (72 percent)...
Imperva Introduces Cloud Reference Architecture for Protecting Web Applications in Infrastructure-as-a-Service Environments
Imperva Inc, pioneering the third pillar of enterprise security...
Stuxnet Patient Zero: First Victims of the Infamous Worm Revealed
More than four years have passed since the discovery...
Inmarsat completes construction of the Global Xpress ground network
Inmarsat, the leading provider of global mobile satellite communications...
Shavlik Eliminates Known Vulnerabilities in Third-party Software with Shavlik Patch 2.1
Shavlik has announced the release of a new version of...
F5 Showcases F5 Synthesis™ Interoperability with VMware Solutions at vForum 2014
F5 Networks showcased at vForum2014 at Grand Hyatt Hotel,...
New Gartner report on Application Delivery Controllers
The application delivery controller (ADC) is a key component...
Kaspersky Lab sheds light on “Darkhotel” espionage campaign
Kaspersky Lab experts have researched the ‘Darkhotel’ espionage campaign,...
Goodbye Graffiti Resources
The WA Police Graffiti Team is taking orders for...
Aconex Launches Dynamic Manuals for Mobile Handover
Aconex, provider of a leading cloud collaboration platform for...
ONVIF Connects with International Audiences at Security Industry’s Largest Trade Shows
ONVIF, the leading global standardization initiative for IP-based physical security...
Cubic Awarded $46 Million Contract to Provide Training Systems Support for the U.S. Marine Corps
Cubic Applications, Inc., an operating company of the Mission...
UL receives confirmation from Visa for simulating the latest version of ADVT
UL is pleased to announce that its Collis Brand...
Seagate research reveals nearly half of Australian small businesses have lost work due to not backing up effectively
Of these 45% of businesses that have lost work...
FireEye Exposes Cyber Espionage Group Potentially Linked to Russian Government
FireEye research, analysis exposes long-standing operations by APT28 targeting...
Insider Threat Kill Chain: Detecting indicators of human compromise
More than one-third of all data breaches were perpetrated...
CIOs need to act on their cloudy good intentions, states Ovum
A recent survey of 65 CIOs at a Strategy...
Do you know a thought leader in ICT in...
Push for Australians’ web browsing histories to be stored
Intelligence agency ASIO is using the Snowden leaks to...
Trend Micro enhances Smart Protection Platform to better prevent, detect, analyse and respond to broad range of threats
Trend Micro Incorporated has announced the latest enhancements to the Trend...
The Evolution of the Data Centre – Exclusive Interview with Intel’s Balaji Srinivasan
Genetec Unveils Stratocast
Genetec has launched Stratocast™, a powerful yet easy-to-use Video...
Space to the subsea – emergence of agnostic integrated systems
By Chris Cubbage During September 2013, Executive Editor, Chris...
HGH Infrared Systems Debuts Spynel-S
HGH Infrared Systems, a global provider of 360 degree...
Crowd control using Video Analytics vs. Personal GPS. Which is better for safety and security?
BBC’s Click program highlighted how the Police used personal...
Simlat to supply Summit Avanced Systems
Simlat Ltd. has been chosen to provide its advanced...
Axis upgrades top-of-the-line pan/tilt/zoom series with launch of nine new cameras
The top-of-the-line AXIS Q60 PTZ Dome Network Camera Series...
New camera line from MOBOTIX is more light Sensitive and shows more detail than ever before
The new D25, M25 and Q25 5-megapixel IP camera...
Sony introduces new W series Rapid Dome IP Cameras to harness IPELA ENGINE™ PRO technology
Sony Electronics continues its commitment to advance the security...
All new Fisheye Dome cameras
ACTi delivers a new level of resolution and functionality...
ACTi’s latest PTZ
ACTi is proud to launch the very first product...
Canon presents world’s smallest Full HD PTZ surveillance camera
Canon unveils the world’s smallest full high definition (HD)...
World’s first Raytec lighting integration with Milestone VMS
Raytec is delighted to announce its integration with Milestone’s...
MOBOTIX launches lowlight exposure optimization – MxLEO
MOBOTIX AG has launched the new Lowlight Exposure Optimisation...
Integrated Milestone IP video surveillance monitors all district campuses
Milestone XProtect® open platform video management software (VMS) is...
Raytec protects critical infrastructure in Oman
The Oman Water and Electrical Board have chosen Infra-Red...
Arecont Vision’s New MegaView® 2 and MegaBall® 2 combine high performance, great aesthetics and ease of installation
Arecont Vision, the industry leader in IP-based megapixel camera...
UXC Connect secures $4.1 million contract to deliver IP surveillance and security solution for LNG project in Western Australia
UXC Connect has announced that it has secured a...
Arecont Vision unveils new SurroundVideo® 12 Megapixel 360° panoramic camera with true wide dynamic range (WDR)
Arecont Vision, the industry leader in IP megapixel camera...
FLIR and VideoIQ join forces for new site protection solution
  FLIR Systems is proud to announce the launch...
Imaging chips and pixels
Everything started with the discovery of the Charge Coupled...
The Past Present and Future of Video Analytics
Author:  Dr Rustom Kanga –  iOmniscient This article was...
HID Global Introduces Best-in-Class Features to the Industry’s Leading Retransfer ID Card Printer
HID Global has launched its enhanced FARGO® HDP5000 High...
Gallagher launch Command Centre v7.10
Gallagher Security has announced one of its most important...
City Surveillance Market Set to Double
El Segundo, Calif. (June 24, 2013)—The global market for...
PUBLIC CCTV SURVEILLANCE : NETWORKS & AWARENESS
As at 2011, living in modern Australia, and indeed...

Introduces cloud-native application traffic visibility by dynamically monitoring VM, container and public cloud environments 

big swich networks_logoBig Switch Networks has announced significant updates to its SDN-based Big Monitoring Fabric (Big Mon) product line. The company is introducing BigSecure Architecture, a dynamic, high-performance cyber-defence platform that enables Terabit attack mitigation. The company is also extending Pervasive Visibility use cases for cloud-native application traffic, which includes dynamic monitoring of VM, Containers and Public Cloud environments.

Big Switch will host a special launch webinar on Wednesday, December 14 at 10am PT. The webinar will highlight BigSecure Architecture, cloud-native application monitoring use cases and new features in Big Monitoring Fabric 6.0. To register: http://bit.ly/2gCgM8V.

“Our mission is to provide next-generation data centre networking solutions so that our customers can experience the true benefits of a software-defined data centre,” said Douglas Murray, CEO, Big Switch Networks. “With our introduction of BigSecure Architecture and cloud-native application monitoring, we are arming customers with next-generation data centre security and visibility solutions they need to defend their networks and monitor their cloud-based applications.”

Momentum
In January of 2016, Big Switch announced USD$48.5M in Series C funding, which included participation from existing and new investors and brings the company’s total funding to USD$94M. In the latest quarter, the company saw annual software subscriptions grow by more than 267% year-over-year and had multiple customer deals in excess of USD$1MM. Customers are located across North America, APAC and EMEA regions in more than 25 countries and are in verticals that include technology, financial services, government, media, telecom and higher education. Customers include: Verizon, the U.S. Federal Government, Intuit, Nomura Research Institute, American Fidelity, National Instruments, CleanSafeCloud, Digita Oy, 10 of the 15 largest telcos in the world, multiple global financial services firms, media companies, a Fortune 25 software company and a Fortune 5 oil and gas company.

BigSecure – A dynamic cyber-defence architecture for Terabit attack mitigation
The volume, cadence and sophistication of cyber-attacks is rapidly increasing on large organisations including cloud providers, service providers and software-as-a-service (SaaS) providers. Attackers have started to compromise tens of thousands of Internet of Things (IoT) devices to create armies of “botnets,” which collectively send large-scale malicious traffic to disrupt critical internet-based services. Recently, the self-spreading Mirai malware compromised over one hundred thousand internet-connected video cameras to generate over 1 Terabit of distributed denial of service (DDOS) attack to Domain Name Service (DNS) service provider, blocking multiple high-profile Internet domains for hours. It has become necessary for organisations to deploy cyber-defence mechanisms to protect against massively distributed attacks without breaking their security budget.

With Big Switch’s BigSecure Architecture organisations are able to deploy a dynamic, high-performance cyber-defence solution, at affordable price points. The solution enables existing security tools to leverage an externalised elastic attack mitigation infrastructure consisting of the underlying network and a pool of x86-based compute resources. Specifically, the BigSecure Architecture includes:

  • Big Monitoring Fabric — an SDN-based inline fabric deployed at the data centre edge or in the DMZ for connecting security tools and creating service chains; the Big Monitoring Fabric SDN controller supports programmatic operations through RESTful APIs for dynamic multi-system interactions, dynamic load balancing of tools and dynamic reconfiguration of security service chain.
  • Big Monitoring Fabric Service Node — a high performance (40G to 160G) Intel x86 DPDK-based service node, centrally controlled and managed by the Big Mon SDN Controller, for deep-packet and flow inspection and filtering based on whitelist/blacklist of signatures for the purpose of attack mitigation. With the aid of the Big Mon Controller, it can be dynamically inserted into security service chains to guarantee front-line attack mitigation. Multiple service nodes can be deployed in a scale-out manner for Terabit filtering and mitigation.
  • NFV Tool Farm — a pool of x86 compute resources available for hosting security tools in the form of virtual network functions (VNFs) in order to elastically scale them for Terabit attack mitigation. Big Monitoring Fabric programmatically augments service chains as well as load balances across a large set of tool VNFs.
  • Security Tools — 3rd party security tools (such as A10 Networks’ Threat Protection System) that detect and mitigate sophisticated attacks, leverage L2-L7 attack mitigation capabilities of the high-speed SDN fabric, service nodes and NFV tool farm, and interact programmatically with the Big Mon controller for dynamic attack mitigation.
  • Open Hardware — industry-standard 10G/40G/100G Ethernet switches from Dell EMC and Edgecore Networks operating at multi-terabit bandwidth, centrally controlled and managed by the Big Monitoring Fabric controller; industry-standard x86 servers for SDN controllers, service nodes and NFV tool farm.

Once BigSecure Architecture is instantiated, a security tool detects a high-bandwidth attack and interacts with the Big Monitoring Fabric Controller via programmatic APIs to redirect incoming traffic for elastic mitigation. Depending on the type of attack, the Big Mon Controller activates SDN fabric and compute resources for attack mitigation, reconfigures the service chain to redirect traffic to mitigation infrastructure, and load-balances traffic across a cluster of Big Mon service nodes and NFV tool farm for scale-out performance. The combination of SDN fabric, Big Mon service nodes and NFV tool farm performs Layer-7 scans of network traffic and blocks those packets/flows that contain attack signatures. With BigSecure, security teams are able to deploy dynamic cyber-defence architecture that provides elastic, Terabit-scale attack mitigation capability at an affordable price while continuing to leverage best-of-breed security tools.

In addition to Terabit-scale mitigation, BigSecure Architecture also exports flow telemetry (NetFlow, sFlow) of network traffic to anomaly-detection/traffic visibility systems, which provide the ability to detect, classify, and traceback a variety of attacks.

Cloud-native application monitoring
The rise of cloud-native applications, in the form of virtual machines (VMs) and containers, has driven up east-west traffic within the data centre, leading to tremendous visibility and security challenges. When applications are deployed in public clouds, consistent architecture for application traffic visibility becomes necessary.

Big Switch pioneered the “monitor every rack” use case for comprehensive east-west traffic monitoring of bare-metal and VM traffic at affordable price points. With this release, Big Switch introduces new capabilities in Big Monitoring Fabric, leveraging programmatic interactions, to enable pervasive visibility and security of any workload, anywhere. Specifically:

  • Dynamic VM Monitoring — VM-to-VM traffic visibility in VMware environments by leveraging programmatic interactions between Big Monitoring Fabric controller and VMware vSphere VMs; this alleviates the need for a special monitoring VM in every vSphere host which introduces operational complexities across virtualisation and security teams, adds cost and reduces server performance.
  • Container Monitoring — Container-to-container traffic visibility when deployed on bare-metal hosts or within VMware vSphere VMs.
  • Public Cloud Monitoring — Traffic visibility for workloads deployed in public cloud, such as Amazon Web Services (AWS).

Big Monitoring Fabric Release 6.0
Big Monitoring Fabric is a next-generation network packet broker (NPB) that leverages SDN principles, Open Networking switches and a high-performance x86-based DPDK service node to provide feature-rich, scale-out data centre monitoring at up to 50% lower cost than traditional NPBs. Big Monitoring Fabric supports 1G, 10G, 40G and 100G for the most demanding and high volume network monitoring and security environments. Customer use cases for Big Monitoring Fabric include: monitor every rack, monitor every location, monitor mobile/LTE networks and DMZ/Extranet Inline security. Big Monitoring Fabric Release 6.0 includes:

  • 160G Service Node
  • NetFlow generation service
  • Packet masking service
  • Header decapsulation service
  • Analytics 2.0 with top users, top apps, triggers and custom reports
  • Support for Dell EMC open networking switches: Z9100-ON (32x100G), S6100-ON (64x40G), S6010-ON (32x40G), S4048-ON (42x10G + 6x40G) and S4048T-ON (48x10GbT + 6x40G)
  • Support for Edgecore Networks open networking switches: AS7712-32X (32x100G), AS6812-32X (32x40G), AS5812-54X (48x10G + 6x40G), AS5812-54T (48x10GT + 6x40G)

Integration with leading Technical Solution Partners

  • A10 Networks and Big Switch Networks have partnered to create an efficient, cost-optimised solution for DDoS attack detection across the entire data centre. The solution is composed of A10 Networks’ Thunder Threat Protection System (TPS) and Big Switch’s Big Monitoring Fabric, which leverages open networking switches. The solution enables security administrators to monitor data-centre wide traffic for sophisticated DDoS attacks and security breaches.
  • ExtraHop and Big Switch Networks have partnered to deliver a scalable, cost-effective solution for all IT teams to gain deep visibility into network and application traffic. The joint solution combines ExtraHop’s streaming analytics and proactive remediation capabilities with SDN controls from Big Monitoring Fabric, to offer unparalleled visibility into all network activity, and help customers gain optimal application experience and business efficiency.
  • The collaboration between FireEye and Big Switch has enabled customers to achieve comprehensive, organisation-wide threat protection. Big Switch’s Big Monitoring Fabric with FireEye Threat Prevention Platform enables monitoring of any flow at any time while providing the benefits of zero-touch management and scale-out deployment. With Big Mon Inline solution and FireEye IPS deployed in the DMZ, customers can benefit from simplified, scalable and dynamically orchestrated service chains, all from a single pane of glass.
  • Riverbed SteelCentral NetExpress network performance management platform and Big Monitoring Fabric together deliver an all-in-one pervasive network monitoring solution that combines flow as well as packet collection and analysis for the entire data centre.
  • Certified joint solution of Symantec SSL Visibility Appliance with Big Monitoring Fabric Inline through Symantec’s ETM Ready Program (Encrypted Traffic Management) helps customers combat sophisticated attacks by addressing malware hiding in SSL traffic.

Availability
Big Monitoring Fabric Release 6.0 is currently in beta and will be generally available in Q1, 2017.

Webinar
Big Switch will host a special launch webinar on Wednesday, December 14 at 10am PT. The webinar will highlight BigSecure Architecture, cloud-native application monitoring use cases and new features in Big Monitoring Fabric 6.0. To register: http://bit.ly/2gCgM8V (if you are unable to join the webinar at 10am PT, please register for the webinar and we will send you a link to the recording, following the webinar).

Supporting quotes
“As the threat landscape intensifies, data centres are demanding next-generation solutions to monitor pervasively and withstand massive cyber-attacks while operating within flat budgets,” said Prashant Gandhi, VP and Chief Product Officer, Big Switch Networks. “With the introduction of BigSecure Architecture, our customers are now armed with best-of-breed and dynamic cyber-defence at Terabit scale to combat massively distributed cyber-attacks. And with Big Mon’s innovations to programmatically monitor cloud-native applications such as containers and public cloud, we are enabling unprecedented any-workload-any-where visibility at affordable price points.”

“We wanted to build a dedicated Ethernet monitoring network for critical video delivery services and to easily tap various measurement points around the network. First we looked at traditional Network Packet Brokers (NPBs) but soon realised that we needed a more flexible and scalable solution. Big Switch solutions allow us to start small and grow as needed and it is easy to use and deploy, and offers all the features we need,” said Leimio Antti, System Designer, IP Networks, Digita Oy. “We can easily tap any fibre connection in the network and quickly see if we have problems in video quality. Big Monitoring Fabric can aggregate monitoring traffic and forward it to centralised measurement devices. This simplifies and speeds up our operations and troubleshooting. We can also add inline security monitoring on the same system and troubleshoot network issues effectively with Big Monitoring Fabric.”

“Organisations are compelled to defend their data centre assets from massively distributed DDoS attacks,” said Raj Jalan, Chief Technology Officer at A10 Networks. “The A10 Thunder Threat Protection System (TPS) with Big Switch’s Big Monitoring Fabric leverages SDN controls to deliver a scale-out and operationally simple threat protection solution for enterprise customers. A10 Thunder TPS detects and mitigates complex DDoS attacks while utilising the BigSecure SDN fabric to mitigate terabit scale amplification attacks at the edge.”

“Edgecore Networks’ partnership with Big Switch continues to flourish as more customers around the world are choosing disaggregated hardware and software solutions to modernise their data centre networks to better serve their business needs,” said Jeff Catlin, VP of Technology, Edgecore Networks. “Edgecore open network switches coupled with Big Cloud Fabric and Big Monitoring Fabric products provide customers with flexible and intelligent SDN solutions that enable rapid provisioning of new applications while meeting requirements to better monitor and secure their networks. The introduction of BigSecure and its new use cases show Big Switch’s commitment to innovation, which complements Edgecore’s leadership in open network hardware, providing our customers with SDN solutions that address real world problems.”

“With the exponential growth in VM and container-based deployments of cloud-native applications, the volume of East-West traffic is exploding – making it harder than ever to monitor and manage,” said John Leon, Vice President of Business Development, ExtraHop. “In partnership with Big Switch’s SDN capabilities, ExtraHop provides the ability to stream wire data off of the network. This gives customers a data-driven, highly scalable, and comprehensive view of their entire IT environment, allowing IT to maximise network and application performance, availability, and security.”

“Riverbed SteelCentral and Big Switch together provide intelligent and scale-out solutions for rapid resolution of network and application performance,” said Nik Koutsoukos, VP Product Marketing, at Riverbed, “We see tremendous opportunity to accelerate customer demand for our end-to-end performance monitoring by leveraging a software-defined architecture for operational simplicity and deep visibility.”

About Big Switch Networks
Big Switch Networks is the Next-Generation Data Centre Networking Company. We disrupt the status quo of networking by designing intelligent, automated and flexible networks for our customers around the world. We do so by leveraging the principles of software-defined networking (SDN), coupled with a choice of industry-standard hardware. Big Switch Networks has two solutions: Big Monitoring Fabric, a Next-Generation Network Packet Broker, which enables pervasive security and monitoring of data centre and cloud traffic for inline or out-of-band deployments and Big Cloud Fabric, the industry’s first Next-Generation switching fabric that allows for choice of switching hardware for OpenStack, VMware, Container and Big Data use cases. Big Switch Networks is headquartered in Santa Clara, CA, with offices located in Tokyo, Sydney, London and Istanbul. For additional information, email info@bigswitch.com, follow @bigswitch, or visit www.bigswitch.com.

Big Switch Networks, Big Cloud Fabric, Big Monitoring Fabric, BigSecure, Big Chain, Switch Light OS, and Switch Light VX are trademarks or registered trademarks of Big Switch Networks, Inc. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners.

Comments are closed.

Subscribe to our newsletter