5 posts categorized "Packet Brokers" Feed

Use Network Packet Brokers to make data center security infrastructure more efficient and cost effective (by Yoram Ehrlich)

Use Network Packet Brokers to make data center security infrastructure more efficient and cost effective

Today’s enterprise networks and service providers are in a conundrum: as network technologies advance, managing network security has become harder and costlier. Sure, they could continuously introduce new monitoring tools - but this adds configuration hours and management complexities to an already intricate scenario. They could also replace slow-running tools with higher-speed devices - but they’ll incur additional costs. Or, for better results, they can adopt a holistic network monitoring infrastructure that enables migration to a higher network speed while increasing the effectiveness of existing security and monitoring tools.

Today’s security landscape demands strong, holistic-visibility architecture

Security breaches are moving up to ever higher (and frightening) levels and remain a thorn in organizations’ sides. Verizon’s 2018 Data Breach Investigations Report (DBIR) indicated that in 2017, more than 53,000 security incidents were reported and 2,216 breaches confirmed. The number of actual attacks remains unknown but undoubtedly is considerably higher.

Unfortunately, the issue of network security cannot be solved with a one-time purchase, and no security product is “perfect.” Today’s organizations’ best bet is a Network Visibility architecture-based security solution that reveals hidden network dangers and inefficiencies, identifies network hiccups and outages, increases network security, and addresses potential compliance issues — all before they impact the business.

Look for these four critical components when choosing a holistic approach: high efficiency and flexible access to the network, monitoring middleware functionalities (filtering, packet grooming, etc.), advanced monitoring functions (application intelligence, NetFlow support), and monitoring tools connectivity.

...and a more efficient and cost-effective security infrastructure

Continue reading "Use Network Packet Brokers to make data center security infrastructure more efficient and cost effective (by Yoram Ehrlich)" »


Scalability in Network Architecture (by Christian Ferenz)

Scalability in Network Architecture

There has been a huge surge in network traffic and no industry is immune from being overwhelmed by data. Network visibility is a requirement for all industries ranging from financial corporations, telecom companies, data centres to retailers, government and healthcare. All are vulnerable to becoming constrained due to scalability issues.

With non-scalable tools, companies are limited by the number of switches and the architecture does not allow them to address all their network visibility concerns. As a result, they end up investing huge sums in changing their entire network architecture.

If a company’s existing network monitoring setup consists of a limited number of network TAPs feeding a monitoring switch, the system provides limited visibility and is not scalable. Such a system is also not capable of addressing regular microbursts in network traffic. Furthermore, the architecture generates substantial duplicate packets that the switch is not equipped to eliminate, creating challenges for monitoring. In such cases, when a company needs to install new TAPs and new port SPANs to accommodate network expansion, the old switch is not able to handle the load.

A scalable solution which offers multi-stage filtering, de-duplication and other features helps a network operate more efficiently.

Customers can ease these problems by building scalable network monitoring visibility solutions.

  • Tools that can intelligently aggregate data and precisely channel it to the appropriate monitoring tools without missing or dropping data, and which provide 100-percent visibility. Instead of using several TAPs, SPANs and tools, a scalable tool can provide 100 percent visibility of all data passing through it.

 

Continue reading "Scalability in Network Architecture (by Christian Ferenz)" »


LMTV LIVE | Visibility Architectures - Understanding Security Solutions (with Keith Bromley of IXIA and John Jacobs of Fortinet)



Yx_X0tC2Security is top of mind for most IT departments. Once the subject comes up, everyone has their own ideas about what security tools (IPS, IDS, DLP, WAF, etc.) and what defense strategies (black list, white list, defense in depth, etc.) should be put in place. But what about the functionality that enables the security solutions? How do you create the visibility into the network that you need to create a truly adequate security solution? Join us for the final podcast in this Best Practice series to learn about what a visibility architecture is and how you can use it to create your inline and out-of-band network security solutions.

Continue reading "LMTV LIVE | Visibility Architectures - Understanding Security Solutions (with Keith Bromley of IXIA and John Jacobs of Fortinet) " »


LMTV LIVE | Visibility Architectures - Understanding NPM and APM (with Keith Bromley of IXIA and Jason Suss of Dynatrace)



YouTube Live Event starts at 9:00 AM PST, Wednesday, March 3, 2017


Yx_X0tC2Most everyone in IT has heard about network performance monitoring (NPM) and application performance monitoring (APM). But what are the real benefits? For instance, what kind of information do I really get and is it worth the investment? Also, what about the complexity involved with these types of solutions? Join us for the third of several discussions to learn what a visibility architecture is, the real benefits of NPM and APM, and how you can optimize your network to take advantage of these solutions.

Continue reading "LMTV LIVE | Visibility Architectures - Understanding NPM and APM (with Keith Bromley of IXIA and Jason Suss of Dynatrace)" »


LMTV LIVE | What Can I Really Do With A Visibility Architecture? (with Keith Bromley of IXIA and Mike Canney of IXIA)



Yx_X0tC2Network visibility is an often overlooked but critically important activity for IT. The real question people often ask is, what can I really do with a “Visibility Architecture?” The short answer is that it enables you to quickly isolate security threats and resolve performance issues. The long answer is that there are over 50 different monitoring and visibility use cases that are either enabled and/or improved by implementing a Visibility Architecture. This is our second of several discussions to learn what a visibility architecture is and how it can help you optimize network data capture and analysis.

Key Points to Comment on:

Continue reading "LMTV LIVE | What Can I Really Do With A Visibility Architecture? (with Keith Bromley of IXIA and Mike Canney of IXIA)" »