156 posts categorized "Oldcommguy" Feed

How To Improve Network Security and Performance (by Keith Bromley)

How To Improve Network Security and Performance 

As you may have seen, I like to talk a lot about network visibility – what it is and what the benefits are. Therefore, I often get the question, “So, how can I specifically use network visibility to solve my problems?” – sort of a Jerry Maguire “show me the money” type of question. The short answer is that there are lots of use cases available, it simply depends upon what your individual needs are. Let me show you.

Hopefully you have heard of the term “network visibility” by now. It has become commonplace over the last year or so. If not, network visibility is simply the ability to see what your network is doing and how it is performing. You can get a longer narrative of the definition here and free resources on network visibility are available here. While some might think that network visibility is a non-issue these days. It’s actually not. Many networks have had, and continue to have, network problems such as:  downtime, slow running applications, missing data, expensive troubleshooting activities, and security breaches.

The first half of the solution to this problem is straight forward. You should consider implementing a visibility architecture. This approach allows you to integrate your network architecture with your security architecture so that you can capture all of the data that you need. The right data is crucial to minimizing (and even preventing) downtime, repairing the network as fast as possible, meeting and exceeding your internal and external customer SLAs, and maximizing your network security.

The second half of the solution is to implement the right technology and processes to solve your problems. Basically, what can you, and what should you, implement? Let’s look at this subject in further detail.

First, you need to figure out what your specific trouble areas and blind spots are. You may already know about several of your problem areas. At the same time, you probably do not know what you do not know. So, there may be some hidden problems as well. These areas, called blind spots, are where you can’t tell (or don’t know about) that there is an issue. There are numerous sources for blind spots including:  the use of cloud networks, silo IT, rogue IT, mergers and acquisition with different networks and applications, etc. You can get more details on blind spots in this article .

Once you figure out what your problems areas are, take a look at this free resource. This resource examines 6 different categories of solutions that resolve different types of known problem areas and/or blind spots. These areas include:

  • Network security improvements
  • Cost containment capabilities
  • Enhanced troubleshooting efforts and network reliability
  • Removal of network blind spots
  • Optimization of Network Performance
  • Strengthening of regulatory compliance initiatives

In fact, the book contains 68 different examples of what you can do (i.e. use cases), broken down by those six categories. Some examples are:

  • How to expose indicators of compromise
  • How to make inline security tool deployments more reliable by using High Availability
  • How to reduce/eliminate the need for Change Board Approvals and crash carts
  • How to use application intelligence to conduct proactive troubleshooting
  • How to simplify inline SSL decryption by using an NPB with integrated decryption
  • And many others

Once you read the book, you will have a very good of what you should do and how to go about improving network operations. It shows you how to combine taps, bypass switches, network packet brokers, application intelligence, and security and monitoring tools to achieve your security and monitoring goals.

If you want more information on this topic, click here to see a list of resources that also might help you, especially if you want more details of the various use cases described in the book.


KeithAuthor: Keith Bromley is a product marketing manager for Ixia, Inc., with more than 20 years of industry experience in marketing and engineering. Keith is responsible for marketing activities for Ixia’s network monitoring switch solutions. As a spokesperson for the industry, Keith is a subject matter expert on network monitoring, management systems, unified communications, IP telephony, SIP, wireless and wireline infrastructure. Keith joined Ixia in 2013 and has written many industry whitepapers covering topics on network monitoring, network visibility, IP telephony drivers, SIP, unified communications, as well as discussions around ROI and TCO for IP solutions. Prior to Ixia, Keith worked for several national and international Hi-Tech companies including NEC, ShoreTel, DSC, Metro-Optix, Cisco Systems and Ericsson, for whom he was industry liaison to several technical standards bodies. He holds a Bachelor of Science in Electrical Engineering.

Oldcommguy dubs Keith "One Of The Good Guys" in today's technology!

Please note - Keith has many other popular articles on WWW.Lovemytool.com - and on Ixia.com

A-life-cycle-view-of-network-security

What-the-heck-are-network-blind-spots?

Network-monitoring-basics-what-why-how?

Network-security-resilience-report!

Network-monitoring-basics-what-why-how!

What-applications-are-flowing-over-your-network?

Find-breaches-faster-using-indicators-of-compromise-by-keith-bromley.html

Understanding-network-visibility-use-cases-by-keith-bromley.html


Merry Christmas and A Wonderful 2018! by : The Oldcommguy

Merry Christmas and A Wonderful New Year!

From the LoveMyTool.com Family

We had our tenth year and it was a super year with Tony, Paul O, Paul S, Chris and Denny plus the new guy -  Mike. We are lucky to have a greatly skilled and diverse Team of technical writers and true technology consultants to bring you relevant technology information and applicable skills.

Technology grows and changes daily as does the security threats but so do the people that fight every day to protect and grow the network experience. 

Thanks for being part of our Family and the Family of Network, Security and Management Geeks.

Special thanks to our awesome sponsors -

NetScout Systems, ExtraHop, Datacom Systems, Garland Technology,  Apposite Technologies, Ixia, Netfort, ProfiTap, Peformance Vision, Resource Communications and Viavi

Plus special supporters like Gerald Combs of Wireshark and the Wireshark/Sharkfest Family.

So to all our Friends, Sponsors and Readers -

Christmas 2017


LMTV LIVE | Wireshark Week (with Brad Reinboldt and Tony Fortunato)



Wireshark_email_header_17_200_3This week Tim, Tony and Denny spoke with an old friend, Brad Reinboldt, Senior Solutions Manager from Viavi Solutions, about their upcoming free education webinar series Wireshark Week.

We looked at the challenges of getting started with Wireshark, uncover quick tips from Tony that make troubleshooting in Wireshark easier, and talk about other tools that work alongside Wireshark to simplify root-cause analysis. Additionally, Brad went into detail on the Wireshark web sessions offered from November 6-11.

For more information, click here to sign up for Wireshark Week

Click to read other LMTV posts by contributors of LoveMyTool »


LMTV LIVE | General Data Protection Regulations

Join Tim, Tony October 4th when we’ll speak with Steve Brown, Director of Solutions Marketing, at Viavi Solutions about upcoming EU privacy and security regulations that will any organization that does business  in Europe. We’ll outline the impact of EU General Data Protection Regulations (GDPR) regulations on  network and security teams, clarify the global nature of GDPR regulations, and outline solutions and strategies for ensuring compliance.

When GDPR goes into effect on May 28, 2018, any organization that operates in, or does business in the EU will have just 72 hours to report detected breaches concerning personal information to relevant authorities and impacted parties. In addition to the LMTV discussion, resources can be found at: www.viavisolutions.com/gdpr

 

 

 


LMTV LIVE | Advanced Performance and Security Real-time Analysis (Extrahop)

 


YouTube LIVE start time: 9:30 AM PST, Wednesday, September 20, 2017


Extrahop_logo With 7.0, ExtraHop introduces live activity maps for complete 3D interaction with the hybrid IT environment; enhanced threat anomalies and machine learning-initiated workflows for performance and security; and perfect forward secrecy (PFS) decryption at scale to support next-generation security architectures.


Challenger Branding - Set A Goal to Set Goals (by John Gumas)

Set A Goal to Set Goals!

Set A Goal to Set Goals

If you hang around Challenger Brand marketers long enough, you will begin to hear the steady repetition of commonly used phrases, adages and mantras that are designed to remind Challenger Brands to look at their business differently.

Readers of this blog are no strangers to tenets like, “If you try to be too many things to too many people, you end up being nothing to anybody,” or “There are no such things as B2Bs, only H2H (humans-to-human),” and “Speak in terms of benefits, not features.”
Set a goal to set goals

One of our favorite Challenger Brand statements is, “If you can’t measure it, you can’t manage it.”

Continue reading "Challenger Branding - Set A Goal to Set Goals (by John Gumas)" »