What Do TCP/IP Selective Acknowledgments (SACKs) Look Like? (by Phillip Storey)
Troubleshooting with Wireshark - Find Delays in TCP Conversations (by Chris Greer)

LMTV LIVE | What Can I Really Do With A Visibility Architecture? (with Keith Bromley of IXIA and Mike Canney of Viavi)



Yx_X0tC2Network visibility is an often overlooked but critically important activity for IT. The real question people often ask is, what can I really do with a “Visibility Architecture?” The short answer is that it enables you to quickly isolate security threats and resolve performance issues. The long answer is that there are over 50 different monitoring and visibility use cases that are either enabled and/or improved by implementing a Visibility Architecture. This is our second of several discussions to learn what a visibility architecture is and how it can help you optimize network data capture and analysis.

Key Points to Comment on:


  • A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility
  • There are 7 basic areas where a Visibility Architecture can help IT to:
  • Improve network reliability (maximize network uptime)
  • Strengthen network security (prevent breaches, capture security alerts, increase alert resolutions, etc.)
  • Deliver on cost containment and control
  • Speed up troubleshooting efforts (meet/exceed MTTR SLA goal)
  • Optimize network performance (maximize QoS & QoE, reduce network “slowness” complaints)
  • Strengthen regulatory compliance initiatives (SOX, HIPAA, CALEA, GLBA, FEDRAMP)
  • Reduce/fix unexpected issues (i.e. remove network blind spots)
  • Here are just a couple examples of the over 50 use cases:
  • Packet filtering and de-duplication reduce the load on monitoring tools
  • Reduce/eliminate the need for Change Board approvals and crash carts
  • Load balancing can extend the life and value of existing security & monitoring tools
  • Inline and Out-of-Band data filtering improves security tool efficiency
  • Use NPM and APM solutions to improve QoS/QoE and optimize SLA performance
  • High Availability makes inline security tool deployments more reliable
  • Application intelligence can provide indicators of compromise
  • Application intelligence can identify slow or underperforming applications
  • Proactive monitoring provides better and faster network rollouts
  • Conduct proactive troubleshooting with application intelligence
  • Floating filters dramatically cut data collection times
  • Use application intelligence to enhance regulatory compliance
  • Packet trimming (payload stripping) eliminates propagation of sensitive data
  • Visibility architectures expose missing/hidden data
  • Virtual taps expose hidden east-west traffic in virtual data centers


Calls To Action:

  • Watch this webinar (6 Ways Network Visibility Can Optimize Your Network) for an overview of 15 different use cases for network monitoring solutions from the Resources page on www.ixiacom.com
  • Visit the Viavi Solutions website for more information on network performance and security forensics solutions
  • Download the whitepaper Best Practices for Network Monitoring from the Resources page on www.ixiacom.com
  • Download the whitepaper on de-duplication best practices from the Resources page on www.ixiacom.com
  • Visit Out-of-Band Visibility solutions page at https://www.ixiacom.com/solutions/out-band-monitoring or contact Ixia for a demonstration of well it works and how easy it is to use



Click to read other LMTV posts by contributors of LoveMyTool »

Comments