Blog

Select Categories
André Vink
André Vink
André Vink

Recent Posts

Why Network Visibility is Critical for DDoS Mitigation and Remediation | Niagara Networks

By: André Vink January 14, 2019

Distributed Denial of Services (DDoS) Overview Denial of service is a form of cyber-attack in which attackers overload computing or network resources with so much traffic that legitimate users are prevented from accessing to online services such as online banking and e-commerce. Enterprise websites are a preferred target since they provide the most engagement with an organization’s customers, partn...

Role of Bypass Switches for Visibility and Security

By: André Vink December 31, 2018

There’s one glaring problem with modern security tools. Even if you’ve deployed next-gen firewalls (NGFW), intrusion prevention systems (IPS), data leakage prevention and more, they’re all useless without total visibility of network packets.

What is Software-Defined Networking (SDN)

By: André Vink December 04, 2018

The networking and communications market is at a crucial juncture as it looks to adopt Software Defined Networking (SDN). Legacy networks have become very complex and hard to manage due to interoperability and upgrade requirements, advancing protocols, and management practices typically hard-coded into underlying hardware platforms.

The Potential of the Network Tap

By: André Vink November 19, 2018

Everyone’s talking about Network Visibility and how essential it is for network stability and security. However, to really understand its importance, you have to examine each component of network visibility and how it contributes to the overall picture. It’s imperative to consider how each network visibility component interfaces with and complements other components and how critical an effective visibility layer is in supporting robust network security. ...

The Art of Network Traffic Distribution - Load Balancing

By: André Vink November 01, 2018

For some reason, whenever I hear the term Load Balancing, I think of a circus high-wire act. Similar to the person walking on a relatively thin cable wire – about 50 or more scary feet above the ground – holding a long vertical bar for equilibrium. The analogy more or less stops with that bar (which helps the acrobat keep his or her balance). That acrobat uses the balancing bar – on a wire – and carries out a precision act in ord...

Network Visibility Layer: 6 Benefits and a Bonus

By: André Vink October 22, 2018

Were you ever curious to see what lay behind the face of an old mechanical Grandfather clock or even a pocket watch? – How the mechanism worked and how all the complex set of gears, springs, and wheels meshed and worked in tandem? If the mechanism was designed and built right, then everything would work to precision: “Like a Swiss clock” people used to say.

Which Network Tap is Right for You?

By: André Vink September 25, 2018

If you haven’t seen our white paper discussing the main differences between network taps and SPAN ports, now is a good time. In any case, it’s worthwhile to point out a few key benefits of network taps. For example, once the taps are installed, they’ll offer you a relatively easy way to interchange (attach and detach) monitoring and analys...

Why Bypass Switches are Imperative to your Network Security

By: André Vink July 04, 2018

It’s time to implement bypass switches (or upgrade your existing ones) to ensure your inline network security devices are pulling their weight and offering your enterprise optimum stability and service.

Exploring Network Bypass Security Scenarios

By: André Vink June 05, 2018

When it comes to the network bypass switch and inline security solutions, you probably have a lot of questions, such as: “What is a bypass switch?”; “How will the bypass switch help if my in-line secur...

Optimizing Security Tool Performance Via Network Traffic Management

By: André Vink May 02, 2018

Today, with network security becoming more important than ever before, enterprises are deploying a variety of network security tools. This is because security threats are becoming more robust, and networks are needing to cope with exponentially increasing amounts of complex data flowing through the network.