3 posts categorized "Packet Brokers" Feed

LMTV LIVE | Visibility Architectures - Understanding Security Solutions (with Keith Bromley of IXIA and John Jacobs of Fortinet)



Yx_X0tC2Security is top of mind for most IT departments. Once the subject comes up, everyone has their own ideas about what security tools (IPS, IDS, DLP, WAF, etc.) and what defense strategies (black list, white list, defense in depth, etc.) should be put in place. But what about the functionality that enables the security solutions? How do you create the visibility into the network that you need to create a truly adequate security solution? Join us for the final podcast in this Best Practice series to learn about what a visibility architecture is and how you can use it to create your inline and out-of-band network security solutions.

Continue reading "LMTV LIVE | Visibility Architectures - Understanding Security Solutions (with Keith Bromley of IXIA and John Jacobs of Fortinet) " »


LMTV LIVE | Visibility Architectures - Understanding NPM and APM (with Keith Bromley of IXIA and Jason Suss of Dynatrace)



YouTube Live Event starts at 9:00 AM PST, Wednesday, March 3, 2017


Yx_X0tC2Most everyone in IT has heard about network performance monitoring (NPM) and application performance monitoring (APM). But what are the real benefits? For instance, what kind of information do I really get and is it worth the investment? Also, what about the complexity involved with these types of solutions? Join us for the third of several discussions to learn what a visibility architecture is, the real benefits of NPM and APM, and how you can optimize your network to take advantage of these solutions.

Continue reading "LMTV LIVE | Visibility Architectures - Understanding NPM and APM (with Keith Bromley of IXIA and Jason Suss of Dynatrace)" »


LMTV LIVE | What Can I Really Do With A Visibility Architecture? (with Keith Bromley of IXIA and Mike Canney of IXIA)



Yx_X0tC2Network visibility is an often overlooked but critically important activity for IT. The real question people often ask is, what can I really do with a “Visibility Architecture?” The short answer is that it enables you to quickly isolate security threats and resolve performance issues. The long answer is that there are over 50 different monitoring and visibility use cases that are either enabled and/or improved by implementing a Visibility Architecture. This is our second of several discussions to learn what a visibility architecture is and how it can help you optimize network data capture and analysis.

Key Points to Comment on:

Continue reading "LMTV LIVE | What Can I Really Do With A Visibility Architecture? (with Keith Bromley of IXIA and Mike Canney of IXIA)" »