Network visibility is an often overlooked but critically important activity for IT. Visibility is what enables you to quickly isolate security threats and resolve performance issues; ultimately ensuring the best possible end-user experience. A proper visibility architecture addresses the strategic end-to-end monitoring goals of the network, whether they are physical, virtual, out-of-band, or inline security visibility.
Join us for the first of several discussions to learn what a visibility architecture is and how it can help you optimize network data capture and analysis.
Key Points to Comment on:
- A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility
- The basis of a visibility architecture starts with creating a plan. Instead of just adding components as you need them at sporadic intervals (i.e. crisis points), step back and take a larger view of where you are and what you want to achieve.
- A visibility architecture typically yields immediate benefits such as the following: eliminating blind spots, reducing costs while maximizing ROI, and simplifying data control
- There are four keys areas of a visibility architecture:
- Proper access to the data you need using taps, virtual taps, and bypass switches
- Filtering capability to maximize the flow of relevant information to your monitoring tools. NPBs are enable: data aggregation, filtering, deduplication, and load balancing of Layer 2 through 4 (of the OSI model) packet data.
- Application intelligence functionality allows additional filtering and analysis at the application layer, i.e. Layer 7 of the OSI stack. These capabilities give you quick access to information about your network and help to maximize the efficiency of your tools.
- The final layer is made up of your security and monitoring tools. These devices are typically special purpose tools (e.g. IPS, firewall, sniffer, APM, etc.) that are designed to analyze specific data. The output from these tools is typically used by network engineers to make their decisions
Calls To Action:
- Download the ebook ABCs of Network Visibility from the Resources page of IXIA Corp
- Download the white paper Best Practices for Network Monitoring from the Resources page of IXIA Corp
- Download the white paper on Deduplication Best Practices from the Resources page of IXIA Corp
- Visit Out-of-Band Visibility Solutions page at or contact Ixia for a demonstration of well it works and how easy it is to use
Please join us.