1 / 20

Secure and Optimized Multi-Protocol Application Delivery

Secure and Optimized Multi-Protocol Application Delivery. Leigh Costin Product Marketing Manager, APAC Blue Coat Systems, Inc. June 1 st 2007 Banking Vietnam 2007. Branch. Web. HQ. ASP. Trends Driving A New IT Requirement. 9% Growth/yr Source: Nemertes. 73% Congestion

mircea
Download Presentation

Secure and Optimized Multi-Protocol Application Delivery

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure and OptimizedMulti-Protocol Application Delivery Leigh Costin Product Marketing Manager, APAC Blue Coat Systems, Inc. June 1st 2007 Banking Vietnam 2007

  2. Branch Web HQ ASP Trends Driving A New IT Requirement 9% Growth/yr Source: Nemertes 73% Congestion Source: Research Concepts 50% Direct to the ‘Net Source: Gartner 40% Outsourced Source: AMR 97% Increase Source: IDC

  3. Applications Are Everywhere Users Are Everywhere Branch Office Branch Office Branch Office Security Threats Poor App Performance An Enterprise Without Boundaries ASP SFA App ASP CRM App ASP HR App Supplier Procurement App Corp Data Center File Servers Corp Intranet Corp E-Mail

  4. WAN/Internet What’s Needed Is a System Architecture for Optimizing User-Application Communications It’s All About Users and Applications Applications Users Access P2P Viruses IM/Skype SSL Cost Content Compliance Bus. Apps Spyware Internal orExternal Internal orExternal

  5. Applications Users WAN/ Internet Internal orExternal Internal orExternal Point of Control for Secure & Optimized Application Delivery Need User-Application Point of Control

  6. Evolution of User-App Communication HTTP/HTTPSoverTCP/IP Multi-Protocol L5-L7overTCP/IP Networked Users Multi-protocolL2-L4 SNAL2-7 Mainframe Web 2.0 PC Internet/Browser 2020 1970 1980 1990 2000 2010 1960

  7. Applications Users WAN/ Internet Internal orExternal Internal orExternal Multi-Protocol Point of Control for Secure & Optimized Application Delivery Need Multi-Protocol Point of Control

  8. Best Practice for Application Delivery • Support all key enterprise applications • Client-Server and web • Internal and external • Encrypted and unencrypted • Bandwidth intensive and response sensitive • Apply correct techniques to each application • Protocol optimization • Object caching • Byte caching • Bandwidth management • Compression • Enterprise scalability, management, reporting

  9. The Application Delivery Challenge • Different apps • Different users • Different priorities • Different problems • Different solutions Chatty Apps Web Apps Unwanted Apps SSL Apps Video Apps Individual applications must be individually optimized.

  10. Optimizing Chatty Applications • Communicate in small bits (designed for LANs) • Result in hundreds or thousands of roundtrips • File services, e-mail (MAPI), some web apps Chatty Apps Web Apps Unwanted Apps SSL Apps Video Apps No amount of bandwidth can reduce their latency.

  11. Optimizing Web Applications • Lots of bulky repetitive objects • Serial communication slows response • Internal and external Chatty Apps Web Apps Unwanted Apps SSL Apps Video Apps Web browsers are becoming the primary app interface

  12. SSL use is growing If it’s important, it’s encrypted! Internal apps are hard to accelerate External apps are even harder Handle with care Optimizing SSL Applications Chatty Apps Web Apps Unwanted Apps SSL Apps Video Apps SSL often accounts for 30% + of all WAN traffic

  13. Optimizing Video Applications • Are you video ready? • Earnings announcement • E-learning • YouTube.com • Is it at least controlled? • Split streams for live broadcast • Distribute and accelerate video-on-demand Chatty Apps Web Apps Unwanted Apps SSL Apps Video Apps Video on the Web could be the next “killer app.”

  14. Controlling Unwanted Applications Chatty Apps Web Apps • Why accelerate? • Frivolous surfing • Bulk downloads • Peer-to-Peer • Spyware and viruses • Get rid of it! • Or it will grow • Crowd out good apps Unwanted Apps SSL Apps Video Apps Uncontrolled Internet traffic wastes WAN bandwidth

  15. Question: How Do You Do This? • Determine good/bad? • Accelerate good, stop bad • Differentiate important/relevant/tolerated? • Prioritize accordingly • Bring all of the appropriate acceleration techniques to bear? • Know/accelerate SSL? Video?

  16. Answer: Only With a Proxy • Proxies terminate • Protocols can only be “fixed” with proxies • Application-layer proxies understand users, applications • Application protocols can only be “fixed” with application-layer proxies • Caching and compression – only with proxies • SSL can only be accelerated and controlled with a proxy

  17. Applications Users WAN/ Internet Internal orExternal Internal orExternal Full User-Application Session Termination Visibility and Context Control User-Application Security and Performance Power of the Proxy

  18. Director Reporter Branch Branch WAN Soon Extended to: Customer & Remote User Sessions Performance, Security, Control Eventual Goal: “No User Left Behind” Performance, Security, Control For Everyone, Everywhere Traditional Focus on: User to Internet Sessions Performance, Security, Control Secondary Focus on: Web App Sessions Performance, Security, Control Now Extended to: Branch User to App Sessions Performance, Security, Control Blue Coat Proxies as Points of Control Corp HQ Data Center Public Web/ App Servers Gateway Proxy Internet Reverse Proxy Customers Branch Office Proxy WAN Opt Proxy Remote Users BranchOffice Proxy

  19. Secure & Optimized Application Delivery • Understand the dynamics of application delivery • Applications are hosted everywhere • Users want access from anywhere • We still live in a multi-protocol world • TCP/IP is ubiquitous, but L5-7 is still multi-protocol • Know the applications in your enterprise • Apply the appropriate optimization techniques for each • Application delivery is a combination of performance optimization, security and control • It is not enough to accelerate the good • You need to stop the bad • And prioritize the rest

More Related