• the oldcommguy

Is Your Government Agency Network Missing Up to 60% of Security Threats?

You Can’t Afford to Miss ANY Data

Especially if you are in the Government or Military!


Data is the fuel source for any security architecture.

Unfortunately, some network packet broker (NPB) solutions drop packets!


The wrong data, or missing data, often results in the wrong conclusion which creates the following:


deletion of the wrong data


missed malware


wasted time and effort


or the application of the wrong or incorrect security fix


These outcomes create the unnecessary risk that a cyber attacker will be successful.

There are two fundamental sources of missing data —


- lack of an inline visibility architecture and


- use of poorly designed equipment.


Lack of an adequate inline visibility architecture is one of the most common issues.

Inline security solutions are one of the ways that government agencies can deploy high impact security solutions to address security threats.

However, the "solution" is more than just adding an inline security appliance, like an intrusion prevention system (IPS) or a web application firewall (WAF). It requires complete (100%) data visibility, which allows examination of ALL data for suspect network traffic.


An inline visibility architecture consists of an external bypass switch and an NPB. While an inline security architecture will not create a foolproof defense against all these threats, it provides the crucial data access that security operations (SecOps) teams need to combat real-world threats. Without the bypass switch and NPB, you are you wasting time on worthless defensive cyber security operations. While this statement is true for many common hacker attacks nowadays, it is absolutely true for attacks from organized nation states that invest serious money and time into attacking corporate and government agencies.


Poorly designed (The Best NPBs are actually about the same cost) network packet brokers are your next security threat.

While there are several vendors for NPB solutions, ALL NPBs are not created equal. Some prominent vendors create NPBs that drop packets and have feature blocking architectures. In fact, because of those designs, you could be missing 60% or more of the security threats entering your network. What’s worse is that you won’t even know it — as those solutions don’t indicate that anything is wrong the entire time they are dropping that critical security data. Dropped or Hidden Data is NOT Recoverable!


The Right Security Solution to Fortify Your Network

Keysight Technologies has the solution to this problem. Our taps, bypass switches and NPBs provide the visibility and confidence you need that you are seeing EVERYTHING in your network. Keysight’s advantage is due to the Keysight architecture which uses FPGA’s to process the data instead of a CPU running software. The CPU/software combination has inherent issues since every line of code steals bandwidth. FPGA’s are faster because they work at line rate — and faster is 100% better.


What happens if you connect up a security appliance like an IPS to a Keysight packet broker and other NPBs?

The answer is a visible difference!

Some of those other NPBs dropped critical security data that led to the IPS missing 5 out of 8 attacks. This means those security solutions missed 62% of the security threats.

The Keysight NPB passed all of the correct data on resulting in the IPS catching all 8 out 8 attacks.

So, would you rather have a 38% success rate or a 100% success rate in detecting security threats?


Keysight NPBs, bypass switches, and other security solutions offer government agencies the following benefits:


Zero packet loss for data transfers to your inline security tools.


Increased network reliability with better fail-over techniques.


Improved security appliance survivability with a self-healing architecture.


Integrated secure sockets layer (SSL) decryption to expose hidden security threats.


Reduced security architecture complexity.


Ability to deploy measures to capture indicators of compromise (IOC).


A threat intelligence gateway that can stop incoming and outgoing security threats.


Faster. Better. More reliable. More secure.


These are the key goals for all Government and Military networks.

See for yourself in this video how Keysight’s Government solutions can significantly enhance your agency’s security architecture!

You can also reach out to me (keith.bromley@keysight.com) directly and we’ll show you how to fortify your network against multiple threat vectors.



Author Keith Bromley - is a senior product management and marketing professional at Ixia, a Keysight business, with over 25 years of high tech software and hardware experience. In his role, he is responsible for thought leadership, product management and marketing activities for Government and Military network monitoring, network security, VoIP and unified communications (UC). Keith is a E.E. and a dedicated technologist.

#Ixia #KeithBromley #TheOldcommguy

6 views
Imagotype-NetworkDataPedia (1)_edited.pn

NetworkDataPedia © 2018-2020  |  Editorial Team   |   Privacy Policies  |  Contact Us          Website built by DYCMarketing