top of page
Writer's pictureThe Oldcommguy

Free - Network Visibility Basics Video!


Join this NDP-TV podcast to learn what a visibility architecture and packet broker are and how they can help you optimize network data capture and analysis.

Summary:

Network visibility is an often overlooked but critically important activity for IT.

Visibility is what enables you to quickly isolate security threats and resolve performance issues; ultimately ensuring the best possible end-user experience.

A proper visibility architecture addresses the strategic end-to-end monitoring goals of the network, whether they are physical, virtual, out-of-band, or inline security visibility.

Join this podcast to learn what a visibility architecture and packet broker are and how they can help you optimize network data capture and analysis.

Here is the online video - Click Here !

Key Points:

  • A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility

  • The basis of a visibility architecture starts with creating a plan. Instead of just adding components as you need them at sporadic intervals (i.e. crisis points), step back and take a larger view of where you are and what you want to achieve.

  • A visibility architecture typically yields immediate benefits such as the following: eliminating blind spots, reducing costs while maximizing ROI, and simplifying data control

There are four keys areas of a visibility architecture:

  1. Proper access to the data you need using taps, virtual taps, and bypass switches

  2. Filtering capability to maximize the flow of relevant information to your monitoring tools. NPBs are enable: data aggregation, filtering, deduplication, and load balancing of Layer 2 through 4 (of the OSI model) packet data.

  3. Application intelligence functionality allows additional filtering and analysis at the application layer, i.e. Layer 7 of the OSI stack. These capabilities give you quick access to information about your network and help to maximize the efficiency of your tools.

  4. The final layer is made up of your security and monitoring tools. These devices are typically special purpose tools (e.g. IPS, firewall, sniffer, APM, etc.) that are designed to analyze specific data. The output from these tools is typically used by network engineers to make their decisions

Follow-up Information:

  • Download the whitepaper Best Practices for Network Monitoring from the Resources page on www.ixiacom.com

  • Download the ebook the ABCs of Network Visibility from the Resources page on www.ixiacom.com

  • Download the ebook the ABCs of Network Visibility – Vol. 2 from the Resources page on www.ixiacom.com

  • Download the ebook The Definitive Guide to Visibility Use Cases from the Resources page on www.ixiacom.com

  • Download the whitepaper on deduplication best practices from the Resources page on www.ixiacom.com

Visit Out-of-Band Visibility solutions page at https://www.ixiacom.com/solutions/out-band-monitoring or contact Ixia for a demonstration of well it works and how easy it is to use.

Author - Keith Bromley - is a senior product management and marketing professional at Ixia, a Keysight business, with over 25 years of high tech software and hardware experience. In his role, he is responsible for thought leadership, product management and marketing activities for network monitoring, network security, VoIP and unified communications (UC) for enterprise and carrier solutions. Keith is a E.E. and a dedicated technologist. Keith has many articles on www.NetworkDataPedia.com

51 views

Recent Posts

See All
bottom of page