13 posts categorized "Visibility" Feed

LMTV LIVE | Improve Network Security with Visibility (with Keith Bromley and Martin Holste)

 

LIVE Event Start Time: 9:30 AM PST, March 7, 2018

NetworkVis_Ad_TroubleshootIT_170x200Keith Bromley from Keysight Technologies (formerly Ixia) and Martin Holste from FireEye will be talking about how to use network visibility to improve network security.

Network security is one of, if not THE, most important topics for anyone in IT. This is true from the security engineer all the way to the CISO, CIO, and even the CEO. Everyone wants to improve security. The question though is, “What can you really do to improve it?” One solid answer is to strengthen your deployment of inline security tools. This is critical to an architecture where you are trying to maximize your defenses. Network visibility is what enables you to quickly isolate security threats.

Some key thoughts we will discuss during the event:

  • A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility
  • There are several possible ways to optimize your security architecture:
    • Insert external bypass switches between the network and security tools to improve network availability and reliability
    • Deploy the right kind security tools, like an IPS, to inspect incoming data and improve threat detection and isolation
    • Perform serial tool chaining for suspect data to improve the data inspection process Insert network packet brokers to improve security device availability by using either n+1 or High Availability technology
  • Security tools, like those from FireEye, can provide inline capabilities to help you improve your network operations. This lets you see and capture threats before they enter your network.
  • A visibility architecture typically yields immediate benefits such as the following: eliminating blind spots, improving data flow to security tools, and maximizing network and tool availability

Join us for the third of several discussions to learn how to unleash the power of network visibility.

Continue reading "LMTV LIVE | Improve Network Security with Visibility (with Keith Bromley and Martin Holste)" »


LMTV LIVE | How to Improve Network Troubleshooting (with Keith Bromley and Bill Coon)

With Paul Offord of Advance7 hosting, Keith Bromley from Keysight Technologies (formerly Ixia) and Bill Coon from Riverbed will be talking about how to use network visibility to improve troubleshooting.

According to an Enterprise Management Associates report (Network Management Megatrends 2016), IT teams already spend around 36% of their daily efforts on reactive troubleshooting efforts. In addition, pressure can increase exponentially on IT personnel as problem resolution time increases, since it directly correlates to network and application slowness and downtime. There is a new LMTV event happening on February 21, 2018. Keith Bromley from Keysight Technologies (formerly Ixia) and Bill Coon from Riverbed will be talking about how to use network visibility to improve troubleshooting. According to an Enterprise Management Associates report (Network Management Megatrends 2016), IT teams already spend around 36% of their daily efforts on reactive troubleshooting efforts. In addition, pressure can increase exponentially on IT personnel as problem resolution time increases, since it directly correlates to network and application slowness and downtime. 

Continue reading "LMTV LIVE | How to Improve Network Troubleshooting (with Keith Bromley and Bill Coon)" »


LMTV LIVE | How to Improve Network Performance (with Keith Bromley and Jim Sullivan)

Keith Bromley from Keysight Technologies (formerly Ixia) and Jim Sullivan from ExtraHop will be talking about how to use network visibility to improve network performance. In short, network visibility is what enables you to quickly isolate and resolve performance issues; ultimately ensuring the best possible end-user experience.

Since tactical data loses 70% of its value after 30 minutes, the speed and accuracy of data analysis is critical. A proper visibility architecture addresses the strategic end-to-end monitoring goals of the network, whether they are physical, virtual, out-of-band, or inline security visibility.

Continue reading "LMTV LIVE | How to Improve Network Performance (with Keith Bromley and Jim Sullivan)" »


How To Improve Network Security and Performance (by Keith Bromley)

How To Improve Network Security and Performance 

As you may have seen, I like to talk a lot about network visibility – what it is and what the benefits are. Therefore, I often get the question, “So, how can I specifically use network visibility to solve my problems?” – sort of a Jerry Maguire “show me the money” type of question. The short answer is that there are lots of use cases available, it simply depends upon what your individual needs are. Let me show you.

Hopefully you have heard of the term “network visibility” by now. It has become commonplace over the last year or so. If not, network visibility is simply the ability to see what your network is doing and how it is performing. You can get a longer narrative of the definition here and free resources on network visibility are available here. While some might think that network visibility is a non-issue these days. It’s actually not. Many networks have had, and continue to have, network problems such as:  downtime, slow running applications, missing data, expensive troubleshooting activities, and security breaches.

Continue reading "How To Improve Network Security and Performance (by Keith Bromley)" »


LMTV LIVE | How to Create Scalable Visibility in your Data Center (with Chris Bihary of Garland Technology)



YouTube LIVE event start time: Wednesday, July 19, 2017, 9:30 AM PST


Garland170x200How do you scale your network infrastructure to support multiple monitoring tools - while ensuring 100% packet capture?

This is the problem we have been hearing in the last few years. Data centers (D1 & D2) and enterprise networks have many challenges and two of the big ones are providing the IT department anytime access to full-duplex traffic, while guaranteeing full packet capture. Now layer on top of that a stack of 1G legacy monitoring tools in addition to the migration to 10G/40G and 100G speeds.

Join us for to learn about the latest visibility solution from Garland Technology’s as they introduce and demonstrate their Passive Fiber Modular Chassis System, a flexible, scalable and affordable high density solution for managing up to 24 links in a 1U box at network speeds of 1G/10G/40G/100G.


Click to read other LMTV posts by contributors of LoveMyTool »


LMTV LIVE | Visibility Architectures - Understanding Security Solutions (with Keith Bromley of IXIA and John Jacobs of Fortinet)



Yx_X0tC2Security is top of mind for most IT departments. Once the subject comes up, everyone has their own ideas about what security tools (IPS, IDS, DLP, WAF, etc.) and what defense strategies (black list, white list, defense in depth, etc.) should be put in place. But what about the functionality that enables the security solutions? How do you create the visibility into the network that you need to create a truly adequate security solution? Join us for the final podcast in this Best Practice series to learn about what a visibility architecture is and how you can use it to create your inline and out-of-band network security solutions.

Continue reading "LMTV LIVE | Visibility Architectures - Understanding Security Solutions (with Keith Bromley of IXIA and John Jacobs of Fortinet) " »