Blog

Select Categories

How TLS/SSL Protects Against Exploitation | Niagara Networks

By: Jose Anes September 09, 2019

Over the last few years, encryption has become one of the highest priorities for cybersecurity improvements. As important as it is to have strong password policies, advanced firewalls, and secure storage arrays, encryption gives you protection from attackers who would otherwise intercept your data in transit.  From a business user perspective, encryption means web browsing and application usage is completely secure. But just because up to

SIEM Security and Network Visibility | Niagara Networks

By: Phyllis Lum August 29, 2019

“If a company gets hacked, no CIO wants to have the board ask what happened and say, ‘Damn if I know.’ They want to say, ‘We’re going through log data to find out what happened.”—Eric Ogren, Senior Analyst at 451 Research. Designing a secure network infrastructure has become increasingly difficult. It’s not enough to deploy a stack of security tools li...

Duplication and Deduplication Boosts Visibility | Niagara Networks

By: André Vink August 19, 2019

The vast majority of the time, packet duplication is seen as a serious problem for network visibility.  When duplication occurs on the network traffic, it may indicate a network issue, however, often packet duplication is associated with the deployment of the network visibility layer itself, whereby network tools and appliances receive for processing the same packet from dif...

Visibility Layer Solution to Optimize Network Security | Niagara Networks

By: Yigal Amram July 30, 2019

It would be understandable if network security pros felt like they were constantly fighting a losing battle. Between 2018 and 2019, global cybersecurity spending increased nearly 10% to $103 billion. And yet, as you increase cybersecurity spending, attackers continue to successfully break through network security infrastructure.

Eliminating Blind Spots With Network Visibility | Niagara Networks

By: André Vink July 22, 2019

Designing a secure network infrastructure has to go hand-in-hand with network visibility. Attacks are becoming increasingly sophisticated, networking demands are increasing at a rapid rate, and it’s

Centralized Network Management | Niagara Networks

By: Yigal Amram June 27, 2019

There was a time when simply deploying network taps in place of SPAN ports put you ahead of the game when in terms of network visibility. In recent years, we’re seeing more and more IT managers shift from single-device network visibility solutions to multi-device, multi-site deployments. However, increasing applica...

The Fundamentals of Network Taps | Niagara Networks

By: Jose Anes June 17, 2019

Network taps are external appliances that sit between network devices to copy and monitor traffic. Because network connectivity and data security form the backbone of any business, it’s crucial to have pervasive visibility of all traffic. Taps are one of the core network visibility tools that ensure you gain...

Using Network Packet Brokers in Campus Deployments | Niagara Networks

By: André Vink June 12, 2019

A leading education and research institution faced security, management, flexibility and robustness challenges pertaining to network visibility. Niagara Networks N2 Network Packet Broker provided a highly configurable and robust, performance-enhancing aggregation point coupled with an enhanced "inline tap" for selective fo...

Network Security Predictions for 2019 and Beyond | Niagara Networks

By: Yigal Amram June 03, 2019

The network security landscape changes on a daily basis and it is a challenge to know how threats and cyber defenses will evolve every month and year.  We have to continually make predictions about the network security changes that are on the horizon. If we don’t, we’ll inevitably fall behind as new threats exploit hidden vulnerabilities and important trends in designing a secur...

Network Packet Broker Rules and Configurations | Niagara Networks

By: Jose Anes May 29, 2019

The Port Mirroring or SPAN (Switched Port Analyzer) method of monitoring network traffic has been the perennial focus of network visibility. With port mirroring enabled, the switch sends a copy of all network packets seen on one port (or an entire VLAN) to another port, where the packet can be analyzed. As a SPAN port is unidirectional and network traffic is bidirectional, the aggreg...