“why does visibility matter?”
TRANSCRIPT
![Page 1: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/1.jpg)
© 2013 FishNet Security Inc. All rights reserved.
“Why Does Visibility Matter?”
Presented by: Shawn ButlerEnterprise Architect
![Page 2: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/2.jpg)
© 2013 FishNet Security Inc. All rights reserved.
The Open Group Architecture Framework (TOGAF)
Modeled at four levels Business Application Data Technology
Architectural framework providing a comprehensive approach for ‐ Planning Design Implementation Governance
![Page 3: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/3.jpg)
© 2013 FishNet Security Inc. All rights reserved.
Identify Gaps
TOGAF Framework
![Page 4: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/4.jpg)
© 2013 FishNet Security Inc. All rights reserved.
Interoperability
![Page 5: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/5.jpg)
© 2013 FishNet Security Inc. All rights reserved.
© 2013 ServiceNow All Rights Reserved 5
Service Management
Tool Sets – Auditing and DiscoveryIT CostIT GRCProject
ManagementApplications
AssetConfig/CMDB Discovery Orchestration
InfrastructureApplications
Service Catalog & Request SDLC Release
Incident Problem Change
OperationalApplications
Vendor/Contract
Management
Custom App
HR Management
Custom App
FacilitiesManagement
Custom App
Shipping/Logistics
Management
Custom App
![Page 6: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/6.jpg)
© 2013 FishNet Security Inc. All rights reserved.
Define the Foundation
![Page 7: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/7.jpg)
© 2013 FishNet Security Inc. All rights reserved.
Process and Framework
![Page 8: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/8.jpg)
© 2013 FishNet Security Inc. All rights reserved.
Traffic Flows and User Communities
![Page 9: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/9.jpg)
© 2013 FishNet Security Inc. All rights reserved.
Where Do I Go, Which way does it go?
![Page 10: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/10.jpg)
© 2013 FishNet Security Inc. All rights reserved.
Flow Mapping and Traffic Direction
![Page 11: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/11.jpg)
© 2013 FishNet Security Inc. All rights reserved.
Dependency Mapping, Base lining
![Page 12: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/12.jpg)
© 2013 FishNet Security Inc. All rights reserved.
Correlations and Deep Packet Inspection
![Page 13: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/13.jpg)
© 2013 FishNet Security Inc. All rights reserved.
Testing and Load Simulation
![Page 14: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/14.jpg)
© 2013 FishNet Security Inc. All rights reserved.
Service Delivery: A Continual Process
![Page 15: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/15.jpg)
© 2013 FishNet Security Inc. All rights reserved.
Network Optimization Current Tool Sets Applications – Simultaneous Sessions Configurations and Policies Inbound and Outbound Flows – User Communities Resource and Bandwidth Availability Storage/Content Traffic Direction and Mapping Deep Packet Inspection Integration, Correlations, and Analytics Fault Isolation Visibility and Predictability Accountability – SLA’s Synchronization and Interoperability Enhancing Operational Efficiencies Improving Service Delivery
Recap and Considerations
![Page 16: “Why Does Visibility Matter?”](https://reader034.vdocument.in/reader034/viewer/2022042519/6261c048058d4e1d0d7a906a/html5/thumbnails/16.jpg)
© 2013 FishNet Security Inc. All rights reserved.
Thank YouShawn ButlerEnterprise ArchitectFishNet [email protected]