Blog

Select Categories

Using Network Packet Brokers in Campus Deployments | Niagara Networks

By: André Vink June 12, 2019

A leading education and research institution faced security, management, flexibility and robustness challenges pertaining to network visibility. Niagara Networks N2 Network Packet Broker provided a highly configurable and robust, performance-enhancing aggregation point coupled with an enhanced "inline tap" for selective fo...

Network Security Predictions for 2019 and Beyond | Niagara Networks

By: Yigal Amram June 03, 2019

The network security landscape changes on a daily basis and it is a challenge to know how threats and cyber defenses will evolve every month and year.  We have to continually make predictions about the network security changes that are on the horizon. If we don’t, we’ll inevitably fall behind as new threats exploit hidden vulnerabilities and important trends in designing a secur...

Network Packet Broker Rules and Configurations | Niagara Networks

By: Jose Anes May 29, 2019

The Port Mirroring or SPAN (Switched Port Analyzer) method of monitoring network traffic has been the perennial focus of network visibility. With port mirroring enabled, the switch sends a copy of all network packets seen on one port (or an entire VLAN) to another port, where the packet can be analyzed. As a SPAN port is unidirectional and network traffic is bidirectional, the aggre...

IPFIX Use Cases in Network Monitoring and Analysis | Niagara Networks

By: André Vink May 21, 2019

A Technical Overview and Deployment Considerations The IPFIX (IP Flow Information Export) protocol was standardized by the Internet Engineering Task Force (IETF) in 2013 to be a multi-vendor universal metadata protocol for exporting IP flow information from network devices, such as switches, routers, firewalls to network monitoring and analysis applications or “collector” systems. The IETF IPFIX standard defines how flow information is export...

Technical Overview of IPFIX Architecture | Niagara Networks

By: Jose Anes May 13, 2019

A Technical Overview and Deployment Considerations The Internet Protocol Flow Information Export (IPFIX) is a network flow protocol standard defined by the Internet Engineering Task Force (IETF). The IETF IPFIX project was initiated to create a widespread benchmark of export metadata about the traffic flow information from rou...

Managing Metadata - The importance of Netflow & IPFIX | Niagara Networks

By: Yigal Amram May 06, 2019

The right approach to network monitoring and analysis can make all the difference in cutting costs and improving ROI across your business. That’s why the market for network analytics is worth over $3 billion.

The Complete Guide to Network Packet Brokers | Niagara Networks

By: André Vink May 01, 2019

How are you keeping your company from becoming just another data breach statistic? The obvious answer is to build up a secure network infrastructure that keeps even the most advanced attackers at bay.

6 Steps for Securing an Impenetrable Network | Niagara Networks

By: Jose Anes April 22, 2019

By 2021, cybercrime will cost $6 trillion globally. In a survey of over 500 senior-level IT managers, 77% said their companies experienced a security incident in 2018. And worse yet, 39% said their companies suffered five or more data-corruptin...

Increase Network Visibility with SSL Decryption | Niagara Networks

By: Yigal Amram April 04, 2019

Why SSL Decryption? The growing adoption of protocols to secure Internet traffic, including Secure Socket Layer (SSL) and Transport Layer Security (TLS), is, paradoxically, giving cybercriminals a way to evade network defenses.  For example, Gartner Group predicts that, through 2019, more than 80 percent of enterprises' web traffic will be encrypted an...

The Challenges of SSL Decryption for Network Visibility | Niagara Networks

By: André Vink March 28, 2019

More and more network traffic is encrypted as people and businesses try to keep their data private and secure as it travels through the Internet. By encrypting transmissions, sensitive information, such as a user's login ID for an online banking session, or perhaps a credit card number, is protected and kept out of the hands of potential hackers and criminal organizations.