Observer Apex

Observer Apex offers end-user experience scoring with seamless integration to GigaFlow enriched records and GigaStor transaction details to help IT teams achieve optimal service delivery.

Observer Apex provides unified visibility of network and IT infrastructure for NetOps and SecOps teams through a combination of end-user experience scoring performance monitoring, active defense, and in-depth post-event awareness into every network conversation and transaction.

As the centralized jumping-off point for troubleshooting, managing network resources, and aiding investigations of incidents of concern (IoC) or confirmed security breaches, Apex uniquely combines high-fidelity wire data, device, host, infrastructure, and user information into a single coherent view to quickly isolate aberrant activity or solve service issues. Knowing unconditionally who is talking on the network and what they are saying has never been so easy.

Apex delivers an out-of-box experience like no other network performance monitoring and diagnostics (NPMD) solution or security solution on the market.

Features and Benefits Summary

  • User-defined dashboards enable integrated, enterprise-wide situational awareness into service delivery health and security posture
  • Threat map offers real-time insight into current security attack vectors active against IT resources with integrated workflows
  • End-user experience scoring analytics with domain level root cause detail accelerates service troubleshooting at the individual transaction or site level
  • On-demand application dependency mapping delivers comprehensive multi-tier application understanding
  • Intelligent analysis and long-term retention of high-fidelity data facilitates forensic investigations  
  • Industry first synthesis of user, device, host, and infrastructure information into a single record linked to wire data enables advanced profiling and empowers IT team threat hunting

Additional resources:

End-User Experience Scoring

Machine learning powered end-user experience scoring for every network transaction with intelligently rolled-up values at the dashboard site level. Scores are color-coded and range from 0 (worst experience) to 10 (best experience) with corresponding problem domain highlighted. Integrated with out-of-the-box workflows and site-based views, the scoring empowers engineers to quickly identify, prioritize, and solve service issues.


Threat Map with Security Workflows

Integrated threat map offers IT teams global, real-time visibility into the current security risk vectors that are potentially impacting IT resources and users. IT teams can quickly gain situational awareness and initiate rapid response actions with targeted workflows or hunting efforts based on severity assessments.


Site Dashboards and Workflows

Geolocation-based dashboards provide global intelligence of IT service health at the regional, country, city, or data center levels, with even more granularity to individual service groups such as accounting. When combined with end user experience scoring, IT teams can gain instant world-wide situational awareness of all resources and then, when required quickly drill down to an individual user for rapid problem resolution.


On-Demand Multi-Tier Application Intelligence

On-demand application dependency mapping offers fast discovery of app interdependencies. Maps are built automatically to display complex relationships with simple clarity. This allows users to determine worst connections, app tiers, and network delay threshold deviations, while sorting all connections by status; critical, marginal, and acceptable.


Host/Device Traffic Profiling

Define groups of critical or at-risk assets like point-of-sale or ATMs; then gain instant visibility via alerts when exception activities or sessions not defined in white list rules are detected on these existing or new devices


Threat Hunting

Breaches are a given in today’s IT, passive defense strategies like firewalls, IDS/IPS, and SIEMs are necessary but no longer enough to protect critical resources—especially the organization’s crown jewels. IT teams need active defense capabilities like threat hunting to easily perform investigations of potential adversaries that have already gained access anywhere in the environment—real-time or post-event. Comprehensive detection of suspicious north/south or east/west traffic ensures rapid containment and then elimination of the threat.


Threat Map with Security Workflows

Integrated threat map offers IT teams global, real-time visibility into the current security risk vectors that are potentially impacting IT resources and users. IT teams can quickly gain situational awareness and initiate rapid response actions with targeted workflows or hunting efforts based on severity assessments.


Host/Device Traffic Profiling

Define groups of critical or at-risk assets like point-of-sale or ATMs; then gain instant visibility via alerts when exception activities or sessions not defined in white list rules are detected on these existing or new devices.


Threat Hunting

Breaches are a given in today’s IT, passive defense strategies like firewalls, IDS/IPS, and SIEMs are necessary but no longer enough to protect critical resources—especially the organization’s crown jewels. IT teams need active defense capabilities like threat hunting to easily perform investigations of potential adversaries that have already gained access anywhere in the environment—real-time or post-event. Comprehensive detection of suspicious north/south or east/west traffic ensures rapid containment and then elimination of the threat.


Apex collects and aggregates data from GigaStor and GigaFlow to achieve enterprise-wide performance and security visibility for NetOps and SecOps teams. By intelligently combining GigaStor network conversation information and enriched flow records from GigaFlow, Apex delivers centralized management of end-user experience, performance, and security intelligence.

Integration into Observer

As the centralizing reporting point for Observer, Apex provides flexible, customizable real-time dashboards and long-term historical reporting from aggregated wire data collected in GigaStor and GigaFlow. Beginning at a dashboard, users can review IT health and as required troubleshoot problems.

Deployment Considerations:

  • Deploy Apex in locations that maximize the opportunity to simplify connectivity with support components
  • Monitoring instrumentation points depend on network size, configuration, and visibility requirements
  • Utilize redundant Apex capabilities with two duplicate systems; a primary and a secondary for automated replication, facilitating redundancy

Select an Observer Apex deployment that aligns with your IT team’s requirements

For more information beyond the deployment options below, contact a VIAVI Solutions sales expert.​


 

Hardware Deployment

Apex allows for standalone hardware deployment. This is our most popular option. Please refer to the following link for technical details.


Software Installation

Apex can be installed on your virtual machine. If you are installing Apex on your own hardware or a virtual machine, please see the minimum, recommended, and optimal system requirements.


ObserverONE

ObserverONE is VIAVI’s enterprise NPMD tool to empower IT teams to gain the powerful security and performance insights of the entire Observer platform all in one box. This upgradable appliance combines Apex’s superior end-user experience with GigaStor’s industry leading packet capture and GigaFlow’s enriched flow analysis, offering optimal performance at a modest price point with minimal footprint.​

Learn More


With the Observer Platform, the ability to get an expert analysis relatively quickly is the best benefit., The capture is constantly running, so we can analyze any time we like without setting up extra equipment.

Landrin Long
,
State of Nevada Department of Information Technology

The options that are available and the power of the product are amazing. We’ve solved more problems quicker with Observer than any other analyzing software we’ve had.

Landrin Long
,
State of Nevada Department of Information Technology

I have found the Observer Platform to be an invaluable tool in diagnosing both application and network issues.

Peter Young, Network Administrator
,
Home Office UK Ministerial Department

How to Get Started

Interested in a product demonstration? Contact us for more info, receive a price quote, or find out how to buy.