公司规模
Large Corporate
地区
- America
国家
- United States
产品
- nGeniusONE® Service Assurance platform
- nGenius® for Flows
- InfiniStreamNG™ hardware appliances
- vSTREAM™ Embedded
- nGenius Collector Virtual Appliance
技术栈
- Amazon Web Services (AWS)
- Cisco Application Centric Infrastructure (ACI)
- VMware
实施规模
- Enterprise-wide Deployment
影响指标
- Cost Savings
- Productivity Improvements
- Digital Expertise
技术
- 基础设施即服务 (IaaS) - 云计算
- 基础设施即服务 (IaaS) - 混合云
- 基础设施即服务 (IaaS) - 私有云
适用行业
- 国家安全与国防
适用功能
- 离散制造
- 物流运输
用例
- 车队管理
- 预测性维护
- 边缘计算与边缘智能
服务
- 云规划/设计/实施服务
- 数据科学服务
- 系统集成
关于客户
客户是一家政府机构,其使命中“保护和服务”部分占了很大比重。该机构非常专注于该使命,即使在政府机构中也处于独特的地位。为了成功执行其使命,该机构依靠数千名员工和承包商的技能和才能,以及高度安全、最先进的信息技术,在数百个集中和远程设施中全天候提供最新且完全准确的信息。该机构是 NETSCOUT® 多年的客户,其信息技术 (IT) 团队依靠下一代 nGeniusONE 服务保证平台来持续查看和监控其网络和应用程序环境。
挑战
该机构的任务成功在很大程度上取决于快速成功地分析大量数据,以保护国家利益、政府资产和全球公民。为了确保任务成功,该机构开发并部署了一套应用程序套件,能够从不断增长的数据量中快速提取有意义的分析。为了更灵活地启动计算和存储资源以支持这些关键任务应用程序和新开发的应用程序,该机构做出了一项战略决策,通过整合现有数据中心运营并过渡到商业云服务提供商 (CSP) 服务来拥抱最近的数字化转型创新。作为这一过程的一部分,该机构采用了政府标准采购流程,从而能够精心选择业内最佳技术来安装在新的 CSP 中。因此,他们早早决定投资思科以应用为中心的基础设施 (ACI) 软件定义网络 (SDN) 架构,该架构提供了应用敏捷性和数据中心自动化的优势。转向年度 CSP 服务还涉及使用该机构新推出的 Amazon Web Services (AWS) 和虚拟 VMware 虚拟机管理程序技术。
解决方案
该机构对可用的网络和应用程序性能管理和服务保障技术进行了严格审查,最终选择了 NETSCOUT nGeniusONE 服务保障解决方案。实时 nGeniusONE 信息平台利用 NETSCOUT 智能数据作为通用数据源,提供更智能的分析,以实现整个机构虚拟化和混合云环境中端到端的可视性。InfiniStreamNG (ISNG) 硬件设备部署在数据中心环境中,采用 NETSCOUT 专利的 Adaptive Service Intelligence™ (ASI) 技术,将该机构的有线流量转换为智能数据,使 IT 团队能够确保安全性、管理风险并提高关键任务应用程序的服务性能。该机构通过部署 vSTREAM Embedded (vSTREAM-EMB) 虚拟设备满足了 VMware 平台监控需求,该设备通过监控 CSP 数据中心虚拟化环境中的东西向流量,补充了 ISNG 平台对南北向流量的可视性。为了实现远程办公室可视性,该机构已过渡到基于软件的 NetFlow 方法,其中 nGenius Collector Virtual Appliance 和 nGenius for Flows 解决方案使用 ASI 技术将 NetFlow 数据与 nGeniusONE 智能数据无缝集成。
运营影响
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
相关案例.

Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.
Case Study
Enhancing Security and Compliance in Remitly's Global Money Transfer Service with Fastly
Remitly, an online remittance service, was faced with the challenge of securing its proprietary global transfer network. The company needed a security solution that could meet PCI requirements and protect customers' sensitive transactions through its mobile application. The solution had to be capable of defending against new and emerging attack types without impacting performance. Remitly also had to deal with irregular traffic patterns, such as a sudden spike in account transfers from a small network segment on the Pacific coastline of South America. The company needed to determine in real time whether such traffic indicated an attack or valid requests. A traditional web application firewall (WAF) would not be able to distinguish this traffic, potentially leading to customer frustration if the IP was blacklisted.

Case Study
Major Aerospace Company Automates Asset Management
The O&M division of an aerospace and global security company was using spreadsheets to manually track more than 3,000 assets assigned to students and staff. Maintaining audit trails for this high volume of equipment became increasingly time-consuming and challenging. The chore involved knowing precisely what equipment was on hand, what had been issued, its location and the name of the custodial owner of each item. Every aspect of this task was carried owner of each item. Every aspect of this task was carried out by individuals with spreadsheets. Manually documenting the full lifecycle of each asset added to the burden. This included tracking maintenance requirements and records, incidents and damages, repairs, calibrations, depreciation, and end-of-life data.

Case Study
Securing a Large Data Center in the EMEA Region: An IoT Case Study
A leading data-center operator in the EMEA region, with multiple facilities spanning over 25,000 square meters, faced significant security challenges. The operator experienced interruptions in their internal IT network due to unsupervised work of third-party technicians. Despite having a high-end building control system that provided 24x7 monitoring and control to all the building’s infrastructure, the data center was vulnerable from a cyber perspective as it was connected to the IT network infrastructure. The operator launched an urgent OT cyber security project that included both IT-OT network segmentation and OT network asset mapping and anomaly detection. The main objectives were to harden the security of the server systems, secure the facility’s power supply and server cooling system, strengthen the segmentation between building and operational systems, create a visual OT network map, and set up a system for presenting supply-chain attacks that may threaten the data center through equipment vendors’ maintenance activities.

Case Study
Leveraging Graph Technology for Enhanced Cybersecurity: A Case Study on MITRE's CyGraph
MITRE, a federally-funded, not-for-profit company that manages seven national research and development laboratories in the United States, was grappling with the challenge of managing an influx of cybersecurity data. The constant changes in network environments were impacting the security posture of U.S. government agencies. Intrusion alerts, anti-virus warnings, and seemingly benign events like logins, service connections, and file share access were all potentially associated with adversary activity. The cybersecurity researchers at MITRE needed to go beyond rudimentary assessments of security posture and attack response. This required merging isolated data into higher-level knowledge of network-wide attack vulnerabilities and mission readiness. The challenge was not the lack of information, but the ability to assemble disparate pieces of information into an overall analytic picture for situational awareness, optimal courses of action, and maintaining mission readiness. The team also struggled with fully comprehending a given security environment and mapping all known vulnerabilities.

Case Study
Enhancing Security Precision with IoT: A Case Study of Guardsman Group
Guardsman Group, a leading security company in the Caribbean, faced a significant challenge in maintaining the security of its digital infrastructure. The company provides security equipment, personnel, and systems for various businesses across the region. However, one of its offices experienced a security incident that affected all communications at that location. The existing security tools were not sufficient to provide the necessary protection, and it took hours to identify the source of the issue. This incident highlighted the need for a dynamic solution that could proactively identify threats. The company's primary concern was any disruption to its business, as it manages a significant portion of Jamaica's money and cannot afford for its operations to go down.