Cisco Cisco Tetration Analytics G1 Scheda Tecnica
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 1 of 10
Data Sheet
Cisco Tetration Analytics
The Cisco Tetration Analytics
™
platform simplifies implementation of a secure
zero-trust model in an application-centric world using pervasive visibility and
behavior-based application insight.
behavior-based application insight.
Product Overview
Applications are driving data center infrastructure today. Applications are dynamic, with virtualization,
containerized, and workload mobility technologies, and with constantly changing communication patterns between
application components. Because of these technology advancements, 76 percent of data center traffic is east-west
traffic
. In addition, today’s data centers demand a hyper-available network with no scheduled downtime. This
dynamic environment contributes to three main challenges:
●
The need for pervasive visibility of traffic across the entire data center infrastructure, including servers and
extending all the way to processes
●
The need to understand communications and dependencies for all applications in the data center
●
The need to implement a secure zero-trust using whitelist policy model in a heterogeneous network
environment
The new Cisco Tetration Analytics platform is designed to address these challenges through comprehensive traffic
telemetry collection and advanced analytics using an algorithmic approach. The platform is designed to collect
telemetry information at line rate at data center scale. The algorithmic approach includes unsupervised machine-
learning techniques and behavioral analysis, providing a turn-key solution. This solution is designed to:
●
Process millions of flow events per second, apply intelligent algorithms, and provide actionable insights in
minutes
●
Capture and store hundreds of billions of telemetry records without aggregation to enable long-term
forensics analysis
●
Provide complete visibility into application components, communications, and dependencies to enable
implementation of a zero-trust model in the network
Cisco Tetration
™
telemetry information is collected using sensors. Two types of sensors are used: hardware
sensors and software (host) sensors. With these two types of sensors, this platform is designed to support both
existing (brownfield) and new (greenfield) data center infrastructure.