0% found this document useful (0 votes)
28 views27 pages

Cloud Insights Customer Presentation August 2023

Uploaded by

sunil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views27 pages

Cloud Insights Customer Presentation August 2023

Uploaded by

sunil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

Cloud Insights

Fortune Integrated Assets


Pvt Ltd.

Sunil
Salunke
Presales
22/08/2023
DATASOFT
© 2023 NetApp, Inc. All rights
NETWORK
reserved.
Infrastructure Observability

© 2023 NetApp, Inc. All rights


reserved.
Enables operations teams to address
the complexities of modern
infrastructure, at any scale, across
containers, compute, and storage

Cloud Insights
• +15 years of Infrastructure
Observability
• 80% of Fortune 500
• +3.5m Virtual Machines under
management
• ~8000 PB of Heterogeneous Storage
discovered

© 2023 NetApp, Inc. All rights


reserved.
Complexities of Modern IT

• Complex infrastructure increases


unexpected
downtime and mean time to resolution I don’t have
• Operational processes are disjointed, The time to finish
gaps in visibility impact operational complexit my tasks!
y is out of
efficiency and collaboration between control!
teams
There are
Why are
• Inconsistency across platforms and tools there so
so many
risks!
results in a rise in ops software licensing many
issues?!?
expenses
• Waste and misuse of infrastructure
increases
storage/VM/container costs

© 2023 NetApp, Inc. All rights


reserved.
Cloud Insights simplifies the complexity
of Modern IT Environments

Cloud Insights provides Realized Value


• Proactive Issue Identification • Reduction in mean-time to resolution by
• Configuration Analysis
~90%

• Performance Monitoring
• Improvement in operational efficiency
~80%
• Management and Alerting
Integration • Reduction in ops software licensing cost
~80%
• Cloud-Native
• Reduction in wasted IT cost ~30%

• Reduction in unplanned downtime ~80%

© 2023 NetApp, Inc. All rights


reserved.
Streamline IT management
Reduce the time and effort required to identify and
resolve issues
Consolidate troubleshooting workflows from
multiple,
disjointed tools, to one

• Resolve issues faster by identifying the


underlying
cause of impacted workloads

• Prevent outages and focus on proactive


activities; identify trends that indicate risk,
allowing teams prevent issues and !

collaborate better

• Maintain consistency and predictable service


levels with an understanding of the inner
workings of infrastructure

• Reduce alerting noise with a common set of


© 2023 NetApp, Inc. All rights alerts
reserved.
Deliver a Cloud-Like Experience
Simplify hybrid cloud infrastructure as a
service

Deliver cloud-like services to consumers, with


a clear catalog of consistent service levels
cross-vendor with predictable performance

• Clear resource utilization by LoB or


application
without relying on naming conventions

• Self-service reports and dashboards for


infrastructure consumers

• Reduction in hardware and software costs


through
control of storage and compute waste

• Consistent API across all vendors and


platforms
© 2023 NetApp, Inc. All rights
reserved.
Cloud Insights: Architecture

GKE EKS DATA DATA PLATFOR UNIFIED Engineerin


COLLECTIO INGESTION M INTERFACE g
AKS
N SERVICE
KUBERNETES
Architectu
Infrastructure
Common Correlations re
Metric Monitoring
Data &
s
Model Analysis
Operation
Metadata / Cloud Migration s
Logs / Insight
DEVICES
Events Extraction
Categorizati Admin
on s
Monitors Chargeback
Annotatio Scal
&
CMDB ns e
Alerting Manager
s
Visualization Capacity
Objects / Topolog Planning
&
Assets y
Reporting
MONITORING

Optimization &
Application
Reclamation
Data
CLOUD CMDB
s

© 2023 NetApp, Inc. All rights


reserved.
Large IT customer

Challenged by growth and fragmentation in Voice of The Customer


their
infrastructure >$2M Reduction in unplanned downtime
Multi-platform infrastructure with disjointed >$3M Reduction/reclaimed assets
visibility
and risks to service levels >$300K Improvement in operational
• Identified wasted capacity and further efficiency
data to move to object storage to
reduce an imminent investment in new <12 months Payback period
infrastructure by $1m
• Real-time capacity planning views to
prevent
waste vs. previous days-long manual
reporting
• During PoC phase, Cloud Insights prevented
© 2023 NetApp, Inc. All rights
a mission-critical
reserved. outage by identifying the
Kubernetes Observability

© 2023 NetApp, Inc. All rights


reserved.
Kubernetes: The Platform for Digital Emerging as the “operating system”
Transformation of the cloud

• Digitization is a necessity, as companies


rely on
70% 90% 31%
software and data to stay competitive.
Enterpris Cloud- Of all back-
• Companies prioritize app development, e native end
analytics, and business differentiation. adoptio workload developers
n s
• Rapid app development and
modernization are
The platform for running almost anything
crucial for staying ahead. 2021
59% 41%
• Hybrid and multi-clouds are now part
of the evolved cloud that IT teams 202
operate. 2
37% 63%

• Kubernetes is a must-have APPLICATION WORKLOADS +30% AUXILIARY WORKLOADS +211%


YoY YoY
platform for modernization that
IT teams rely on. Source:
CNCF, The State of Cloud Native Development
report, 2021 CNCF Annual Survey 2022
© 2023 NetApp, Inc. All rights
reserved.
Kubernetes is complicated and
involves many fragmented tools

• Kubernetes requires hard-to-find skills


and expertise
• Having too many tools results in
fragmentation,
inefficiency, and complexity

• Unexpected changes and


misconfigurations
affect the business

• Resolving issues requires


understanding Kubernetes
components and their underlying
compute and storage infrastructure

© 2023 NetApp, Inc. All rights


reserved.
“Too many
many are
incidents;
trivial. “Spending too much
time reacting to
I have other tasks service disruptions
to complete.” and downtime.
DevOps
I need to drive the
This complexity results adoption of the
platform.”
in operational Platform engineer
inefficiencies,
“Too long and too
troubleshooting delays, many tools to
and increased expense debug a “Reduce
deployment complexity
problem. and cost.
I need to deploy
I need the right
NOW.”
skills to manage
Developer the platform.”
Manager

© 2023 NetApp, Inc. All rights


reserved.
NetApp Cloud Insights simplifies operating and troubleshooting Kubernetes

15 © ©202032N3 eNAt eptApp, pn


I , cIn. cA.lArlilgrhigtshtrsesresrveervde. d. —
NETAPP CONFIDENTIAL —
Preview Feature
Change management

• Gain valuable insights into


how changes affect
Kubernetes health,
availability, and performance.
• Track every deployment and
configuration change to
Kubernetes and its underlying
compute and storage
infrastructure.
• Correlate these changes
with incidents and alerts
to resolve problems faster
and streamline
Kubernetes
troubleshooting.

© 2023 NetApp, Inc. All rights


reserved.
Workload map

• Simplify troubleshooting by
mapping dependencies
between Kubernetes
workloads.
• Resolve issues faster by
quickly identifying and
isolating the affected
workload within the
environment.
• Identify the source of traffic
and latency problems and
how data flows through
the system.
• Understand the
dependencies and
limitations that might
© 2023 NetApp, Inc. All rights
affect workload
reserved.
Kubernetes monitoring

• Maintain the availability, reliability, and


scalability of Kubernetes.
• Gain visibility into the environment, its
resources, and analyze performance
metrics and logs.
• Proactively detect and resolve issues
before they affect performance or
availability.
• Get seamless troubleshooting and root
cause analysis to pinpoint common
issues and apply best practices quickly.
• Get support for capacity planning and
resource allocation, with insights into
resource utilization and performance
trends.
© 2023 NetApp, Inc. All rights
reserved.
Storage Workload Security

© 2023 NetApp, Inc. All rights


reserved.
NetApp delivers data-centric ransomware protection
A multilayered solution to a multilayered problem – complementary protection
on and off-box
Protect Detect & Response Recover
Workload Security
• Identify and fix security • Monitor user file activity & file • Restore petabytes in
vulnerabilities. entropy. minutes from clean
• Ensure frequent recovery • Use AI/ML to detect potential Snapshot copies.
points attacks such as Ransomware. • NetApp FlexClone®
using NetApp snapshots. • Stop attacks by blocking user technology
• Prevent backup deletion access. for granular file restore.
with NetApp SnapLock® • Take automatic snapshots to • Leverage snaplock to enable
write once, read many protect your data. WORM as part of data
(WORM) retention. • Data breach forensics. protection policy using snap
• Approve and exclude file vault.
extensions using NetApp
Fpolicy.
• Onbox ONTAP Ransomware
Detection based on file-
entropy for on-prem.

© 20©2320N2e3tANpeptA, pInpc,. IAncll.rAiglhl trsigrhetserrevseedr.ve—d. NETAPP


CONFIDENTIAL —
• Environment-wide monitoring for all
observability needs: Capacity
management, performance
troubleshooting and security management
• Ingest security data points from your entire
environment: ONTAP alerts, snapshot status,
Why Cloud Insights? user and file activity

• Automated actions to generate an alert to the


admin team, take a snapshot of potentially
impacted data, and restrict malicious users.

• Wide integration with third party tooling:


automation, ticketing, alerting.

• Detailed file and user activity auditing to aid


recovery and reporting activities.

• SaaS for a quick time to value and minimal


meta- management

© 2023 NetApp, Inc. All rights


reserved.
1. Monitor User Activity & File
Entropy
To accurately identify breaches, every user activity
across on-premises and hybrid cloud
How Cloud Insights Storage environments, is captured and analyzed.

Workload Security Works 2. Detect Anomalies & Identify Potential


Attacks
Workload Security uses advanced machine
learning algorithms to uncover unusual data
Cloud Insights Storage Workload Security does activity and detect a potential attack.
not assume a trusted internal network, it
takes a trust no one approach. It inspects and 3. Automated Response Policies
analyzes all data access activity in real time Workload Security alerts you and automatically
to detect takes actions when detecting a risky behavior,
taking an immediate snapshot to protect your data
malicious behaviors. and blocking users to stop the attack

4. Forensics and User Audit Reporting


Provides a graphical interface to cut and slice
activity data to perform data breach
investigations and generate User Data Access
Audit reporting.

© 2023 NetApp, Inc. All rights


reserved.
How Storage Workload Security
Detects Anomalies in User Behavior

• Builds a behavioral model for each


user
• Detects abnormal change in user
activity
• Analyzes abnormal behavior
patterns to determine type of
threat
• Detects Ransomware
• Provides insights on potential attacks

• Identifies and reduces false positive alert


noise by continually learning and
correlating NetApp ONTAP ransomware
alerts

© 2023 NetApp, Inc. All rights


reserved.
Detecting Modern Malware & Zero-day
Attacks Requires AI/ML

• Modern Ransomware malwares are


more sophisticated and use random
extensions and file names
• Signature-based (blocked list)
solution do
not work anymore
• Workload Security uses AI/ML to
monitor
anomalies and patterns.
• Provides dynamic and accurate
detection
• Reduces false detection noise

© 2023 NetApp, Inc. All rights


reserved.
Intelligent Threat and Impact Analysis
Alerts give you the information you need to
assess the threat

• Identify
• What (risk): Potential Attack
• Who: User and Source IP
• When: Real time detection
• Impact: Affected volumes and files

• Rich graphical interface for


analysis
• View user profile and activity
information
• Compare user activity during alert
and
with historical information
© 2023 NetApp, Inc. All rights
reserved.
How Storage Workload Security Uses
Automated Response Policies

Define automated response policies


based on
detected activity
• Administrators receive an alert to
investigate
suspicious activity
• Take snapshot to protect your data
when a
potential attack is detected
• When a ransomware attack is
detected the user’s access can be
restricted to stop the attack.
• When abnormal file deletion is
detected, the user’s access can be
restricted to stop the attack
© 2023 NetApp, Inc. All rights
reserved.
Forensic for Data Breach and Audits
Unified visibility for all user's activity

• Cut and slice file activity data by


user,
time, activity type and file
attributes.
• Generate User Data Access Audit
reporting
• Conduct data breach and
security incident
investigations
• Historical data for 13 months

© 2023 NetApp, Inc. All rights


reserved.
Thank You

© 2023 NetApp, Inc. All rights


reserved.

You might also like