Slide 1

Slide 1 text

Our Customers

Slide 2

Slide 2 text

Why They Love What We're Doing ● Agility – ability to act quickly ● Visibility - finds things everyone missed – Information always up to date ● Effectiveness - knowledge is power ● Continuous Security Monitoring ● Diagnose problems / minimal noise ● No special network/security permissions ● Works with real, virtual and cloud systems ● Extremely scalable / Near-zero configuration Everyone sleeps better

Slide 3

Slide 3 text

Competition ● Integrate CMDB & comprehensive monitoring ● Self-maintaining ● Continuous Discovery ● Visualization ● Doesn't trigger security alarms ● Minimal network load ● Extreme scale ● Open Source We're Better Because

Slide 4

Slide 4 text

Create Graph Model CMDB Monitor Services, Systems & Security ● Servers & Services ● Switches ● All IP & MAC addresses ● Dependencies ● Configuration ● Installed Software ● Much more - anything

Slide 5

Slide 5 text

Here's How It Works ● Reliable “No News Is Good News” using agents ● Central system delegates nearly all work to Agents ● Agents monitor selves and two neighbors ● Listen for Configuration Packets ● Look at Network-Facing applications on systems ● Send Only Changes to Central System ● Actions triggered by changes

Slide 6

Slide 6 text

Are you that guy or gal? ● IT Security professional ● System Administrator/Engineer/Planner ● Network Administrator/Engineer/Planner ● IT Management Or maybe you know one... If so, we want to talk http://assimilationsystems.com/

Slide 7

Slide 7 text

Portion of my Home Network (vision test)