Blog
Select Categories

What Do Network Packet Brokers Have to Do With My Security Infrastructure?

By: Yigal Amram August 20, 2018

Networks keep increasing in size and demand on their resources, and although technology is advancing and doing its best to keep up (or even to try to catch up), managing the actual network security has become more complex, and not necessarily less costly. Enterprise networks and service providers mandate their IT and network experts to keep ahead of the game, and the solution usually adopted is to endlessly introduce new inspection and monitori...

Empowering Network Monitoring Tools

By: Yigal Amram August 15, 2018

Ready to dive in? Today’s blog will present a detailed look at several sample scenarios of how to support and enhance your network monitoring tools. Of course, network monitoring is quite a broad field that includes network and application monitoring, network traffic monitoring, and network performance monitoring. So we won’t be able to cover all perti...

Knowledge is Power: NPMD’s, NPB’s, and the Network Visibility layer

By: Yigal Amram August 08, 2018

The great English philosopher, Sir Francis Bacon known for his influence in promoting scientific method, held that the aim of scientific investigation is practical application of the understanding of nature to improve man's condition. He rightly expressed, that “Knowledge is Power”. In a similar manner, visibility and control via NPMD – is a necessary ‘knowledge’ power in the world of networking.

Intent Based Networking – A smart leap forward

By: Yigal Amram July 23, 2018

If you are wondering what an Intent-Based Network (IBN) is all about, Cisco recently described it (in “capsule” form) in a recent introductory paper to the concept, as “A network that predicts, protects and adapts”. <...

Why Bypass Switches are Imperative to your Network Security

By: André Vink July 04, 2018

It’s time to implement bypass switches (or upgrade your existing ones) to ensure your inline network security devices are pulling their weight and offering your enterprise optimum stability and service.

Network Nerd’s @ CISCO Live Orlando 2018

By: Yoram Ehrlich June 20, 2018

The Niagara team has returned from an incredible Cisco Live in Orlando and is reflecting on the fantastic experience for all who attended. It was a lot of fun to meet other network professionals who deeply understand how networks operate and are happy to discuss their day-to-day challenges at levels far more technical than other events. It’s always a pleasure to meet with others who care deeply about technology and how it can address and assist them in detectin...

Exploring Network Bypass Security Scenarios

By: André Vink June 05, 2018

When it comes to the network bypass switch and inline security solutions, you probably have a lot of questions, such as: “What is a bypass switch?”; “How will the bypass switch help if my in-line security device fails?”; “How do I connect up the bypasses?”, just to name a few.<...

Port Mirroring for Network Monitoring Explained

By: Yoram Ehrlich May 22, 2018

Let’s say that we want to study or measure traffic on the network (for example, to detect system intrusion, forecast traffic, analyze performance and measure throughput).

Active Taps for Complete Network Visibility

By: Yigal Amram May 10, 2018

OK, so we know that to secure and control our network, we need full visibility into the traffic passing through it. What we would like to have, is a truly non-intrusive device that will offer that visibility, without affecting the network.

Optimizing Security Tool Performance Through Network Traffic Management

By: André Vink May 02, 2018

Today, with network security becoming more important than ever before, enterprises are deploying a variety of network security tools. This is because security threats are becoming more robust, and networks are needing to cope with exponentially increasing amounts of complex data flowing through the network.