Imagotype-NetworkDataPedia (1)_edited.pn

NetworkDataPedia © 2018-2020  |  Editorial Team   |   Privacy Policies  |  Contact Us          Website built by DYCMarketing 

NDP-TV - Network Visibility Basics Overview with Keith Bromley

October 1, 2019

NDP-TV Presents -  Network Visibility Basics Overview

 

 

Overview - The Oldcommguy is inviting you to a scheduled Zoom meeting.

 

The Topic is: Network Visibility Basics - a "MUST HAVE" !

 

 

The Video session -  Network Visibility!

 

 

Network visibility is an often overlooked but critically important activity for IT. Visibility is what enables you to quickly isolate security threats and resolve performance issues; ultimately ensuring the best possible end-user experience. A proper visibility architecture addresses the strategic end-to-end monitoring goals of the network, whether they are physical, virtual, out-of-band, or inline security visibility.

Join this podcast to learn what a visibility architecture and packet broker are and how they can help you optimize network data capture and analysis.

 

 

Key Points to Comment on:

  • A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility!

  • The basis of a visibility architecture starts with creating a plan. Instead of just adding components as you need them at sporadic intervals (i.e. crisis points), step back and take a larger view of where you are and what you want to achieve.

  • A visibility architecture typically yields immediate benefits such as the following:  eliminating blind spots, reducing costs while maximizing ROI, and simplifying data control.

The Video is here or below.

  • There are four keys areas of a visibility architecture:

  1. Proper access to the data you need using taps, virtual taps, and bypass switches!

  2. Filtering capability to maximize the flow of relevant information to your monitoring tools. NPBs are enable:  data aggregation, filtering, deduplication, and load balancing of Layer 2 through 4 (of the OSI model) packet data!

  3. Application intelligence functionality allows additional filtering and analysis at the application layer, i.e. Layer 7 of the OSI stack. These capabilities give you quick access to information about your network and help to maximize the efficiency of your tools!

  4. The final layer is made up of your security and monitoring tools. These devices are typically special purpose tools (e.g. IPS, firewall, sniffer, APM, etc.) that are designed to analyze specific data. The output from these tools is typically used by network engineers to make their decisions!

 

 

 

Follow-up Information:

Share on Facebook
Share on Twitter
Please reload

Sponsored By:

Viavi

Display_LoveMyTool_170x400.png
Recent Posts

November 12, 2019

Please reload