Blog

Select Categories
André Vink
André Vink
André Vink

Recent Posts

Viruses, Worms, and Trojan Horses | Niagara Networks

By: André Vink October 23, 2019

Sophisticated cyber attackers are constantly finding new ways to exploit your network. Whether delivered through drive-by downloads, phishing emails, self-propagation, or any technique in between, all it takes is one malware infection to cost your company millions of dollars. And one thing is clear when it comes to cybersecurity—despite

Network Segmentation and Network Packet Brokers | Niagara Networks

By: André Vink September 24, 2019

Traditionally, the foundation of enterprise network security has been a perimeter firewall behind an organization’s Internet gateway or a pair of firewalls encompassing a demilitarized zone (DMZ) which offer an isolated environment between a completely trusted enterprise network and untrusted external network. However, merely characterizing the entire enterprise network as ‘trusted’ and considering it as ‘flat’ (i.e. as a single segment) creates an environment ...

Duplication and Deduplication Boosts Visibility | Niagara Networks

By: André Vink August 19, 2019

The vast majority of the time, packet duplication is seen as a serious problem for network visibility.  When duplication occurs on the network traffic, it may indicate a network issue, however, often packet duplication is associated with the deployment of the network visibility layer itself, whereby network tools and appliances receive for processing the same packet from dif...

Eliminating Blind Spots With Network Visibility | Niagara Networks

By: André Vink July 22, 2019

Designing a secure network infrastructure has to go hand-in-hand with network visibility. Attacks are becoming increasingly sophisticated, networking demands are increasing at a rapid rate, and it’s

Using Network Packet Brokers in Campus Deployments | Niagara Networks

By: André Vink June 12, 2019

A leading education and research institution faced security, management, flexibility and robustness challenges pertaining to network visibility. Niagara Networks N2 Network Packet Broker provided a highly configurable and robust, performance-enhancing aggregation point coupled with an enhanced "inline tap" for selective fo...

IPFIX Use Cases in Network Monitoring and Analysis | Niagara Networks

By: André Vink May 21, 2019

A Technical Overview and Deployment Considerations The IPFIX (IP Flow Information Export) protocol was standardized by the Internet Engineering Task Force (IETF) in 2013 to be a multi-vendor universal metadata protocol for exporting IP flow information from network devices, such as switches, routers, firewalls to network monitoring and analysis applications or “collector” systems. The IETF IPFIX standard defines how flow information is export...

The Complete Guide to Network Packet Brokers | Niagara Networks

By: André Vink May 01, 2019

How are you keeping your company from becoming just another data breach statistic? The obvious answer is to build up a secure network infrastructure that keeps even the most advanced attackers at bay.

The Challenges of SSL Decryption for Network Visibility | Niagara Networks

By: André Vink March 28, 2019

More and more network traffic is encrypted as people and businesses try to keep their data private and secure as it travels through the Internet. By encrypting transmissions, sensitive information, such as a user's login ID for an online banking session, or perhaps a credit card number, is protected and kept out of the hands of potential hackers and criminal organizations.

[PART 2] Network Visibility and Hybrid Networks | Niagara Networks

By: André Vink March 04, 2019

How to Achieve Hybrid Network Visibility with a Central Controller In the first part of this mini blog series, we talked about the new reality for IT leaders—hybrid networks. Despite the all-or-nothing excitement in the early days of cloud computing, it’s clear that on-premises infrastructure isn’t going anywhere anytime soon. Rather, the key to network success is finding your perfect ba...

The Power of Packet Deduplication | Niagara Networks

By: André Vink February 05, 2019

Introduction -- Causes and Impact of Packet Duplication Seamless monitoring of network traffic is critically important for enterprise network and security administrators: it lies at the very foundation of network threat detection and remediation. Regrettably, packet duplication has commonly been an undesirable side-effect of