NDP-TV - Network Visibility Basics Overview with Keith Bromley
NDP-TV Presents - Network Visibility Basics Overview
Overview - The Oldcommguy is inviting you to a scheduled Zoom meeting.
The Topic is: Network Visibility Basics - a "MUST HAVE" !
The Video session - Network Visibility!
Network visibility is an often overlooked but critically important activity for IT. Visibility is what enables you to quickly isolate security threats and resolve performance issues; ultimately ensuring the best possible end-user experience. A proper visibility architecture addresses the strategic end-to-end monitoring goals of the network, whether they are physical, virtual, out-of-band, or inline security visibility.
Join this podcast to learn what a visibility architecture and packet broker are and how they can help you optimize network data capture and analysis.
Key Points to Comment on:
A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility!
The basis of a visibility architecture starts with creating a plan. Instead of just adding components as you need them at sporadic intervals (i.e. crisis points), step back and take a larger view of where you are and what you want to achieve.
A visibility architecture typically yields immediate benefits such as the following: eliminating blind spots, reducing costs while maximizing ROI, and simplifying data control.
There are four keys areas of a visibility architecture:
Proper access to the data you need using taps, virtual taps, and bypass switches!
Filtering capability to maximize the flow of relevant information to your monitoring tools. NPBs are enable: data aggregation, filtering, deduplication, and load balancing of Layer 2 through 4 (of the OSI model) packet data!
Application intelligence functionality allows additional filtering and analysis at the application layer, i.e. Layer 7 of the OSI stack. These capabilities give you quick access to information about your network and help to maximize the efficiency of your tools!
The final layer is made up of your security and monitoring tools. These devices are typically special purpose tools (e.g. IPS, firewall, sniffer, APM, etc.) that are designed to analyze specific data. The output from these tools is typically used by network engineers to make their decisions!
Download the whitepaper Best Practices for Network Monitoring from the Resources page on www.ixiacom.com
Download the ebook the ABCs of Network Visibility from the Resources page on www.ixiacom.com
Download the ebook the ABCs of Network Visibility – Vol. 2 from the Resources page on www.ixiacom.com
Download the ebook The Definitive Guide to Visibility Use Cases from the Resources page on www.ixiacom.com
Download the whitepaper on deduplication best practices from the Resources page on www.ixiacom.com
Visit Out-of-Band Visibility solutions page at https://www.ixiacom.com/solutions/out-band-monitoring or contact Ixia for a demonstration of well it works and how easy it is to use!