Keith Bromley from Keysight Technologies (formerly Ixia) and Jim Sullivan from ExtraHop will be talking about how to use network visibility to improve network performance. In short, network visibility is what enables you to quickly isolate and resolve performance issues; ultimately ensuring the best possible end-user experience.
Since tactical data loses 70% of its value after 30 minutes, the speed and accuracy of data analysis is critical. A proper visibility architecture addresses the strategic end-to-end monitoring goals of the network, whether they are physical, virtual, out-of-band, or inline security visibility.
- A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility
- There are four keys areas of a visibility architecture:
- Proper access to the data you need using taps, virtual taps, and bypass switches.
- Filtering capability to maximize the flow of relevant information to your monitoring tools. NPBs are enable: data aggregation, filtering, deduplication, and load balancing of Layer 2 through 4 (of the OSI model) packet data.
- Application intelligence functionality allows additional filtering and analysis at the application layer, i.e. Layer 7 of the OSI stack. These capabilities give you quick access to information about your network and help to maximize the efficiency of your tools.
- The final layer is made up of your security and monitoring tools. These devices are typically special purpose tools (e.g., sniffer, NPM, APM, etc.) that are designed to analyze specific data. The output from these tools is typically used by network engineers to make their decisions
- APM tools can provide real-time data analytics to help you manage your network. This lets you see problems before your users do.
- Anomaly driven data flows allow you to quickly isolate potential problems
- A visibility architecture typically yields immediate benefits such as the following: eliminating blind spots, reducing costs while maximizing ROI, and simplifying data control
Join us for the first of several discussions to learn how to unleash the power of network visibility.
If you can’t make it to the event, watch the podcast on-demand or check out some of these free resources.
- Download the ebook the The Definitive Guide to Visibility Use Cases from the Resources page on www.ixiacom.com
- Download the whitepaper Best Practices for Network Monitoring from the Resources page on www.ixiacom.com
- Visit the Ixia visibility solutions page at https://www.ixiacom.com/solutions/unleash-network-visibility or contact Ixia for a demonstration of well it works and how easy it is to use
- Visit the ExtraHop solution page at https://www.extrahop.com/solutions/technology/
Paul is currently leading the TribeLab project to explore new ways to help IT support people troubleshoot performance and stability problems.