Blog

Select Categories
André Vink
André Vink
Senior Security Expert & Technical Marketing
Find me on:

Recent Posts

Resolving the Packet Duplication Challenges

By: André Vink November 16, 2021

Seamless monitoring of network traffic is critically important for enterprise network and security administrators: it lies at the very foundation of network threat detection and remediation. Regrettably, packet duplication has commonly been an undesirable side-effect of network traffic monitoring. Packet duplication produces redundant information in the monitoring tra...

SecOps Blind sighted!?

By: André Vink November 24, 2020

Privacy, both in the physical and online world, is one of the things most people value dearly. With the inevitable shift from physical locations and facilities offered by financial institutions, retail stores and government to an online environment, secure communications and transactions are becoming indispensable.

Viruses, Worms, and Trojan Horses | Niagara Networks

By: André Vink October 23, 2019

Sophisticated cyber attackers are constantly finding new ways to exploit your network. Whether delivered through drive-by downloads, phishing emails, self-propagation, or any technique in between, all it takes is one malware infection to cost your company millions of dollars. And one thing is clear when it comes to cybersecurity—despite

Network Segmentation and Network Packet Brokers | Niagara Networks

By: André Vink September 24, 2019

Traditionally, the foundation of enterprise network security has been a perimeter firewall behind an organization’s Internet gateway or a pair of firewalls encompassing a demilitarized zone (DMZ) which offer an isolated environment between a completely trusted enterprise network and untrusted external network. However, merely characterizing the entire enterprise network as ‘trusted’ and considering it as ‘flat’ (i.e. as a single segment) creates an environment that requires an antagonist to o...

Duplication and Deduplication Boosts Visibility | Niagara Networks

By: André Vink August 19, 2019

The vast majority of the time, packet duplication is seen as a serious problem for network visibility. When duplication occurs on the network traffic, it may indicate a network issue, however, often packet duplication is associated with the deployment of the network visibility layer itself, whereby network tools and appliances receive for processing the same packet from different locations or often the very...

Eliminating Blind Spots With Network Visibility | Niagara Networks

By: André Vink July 22, 2019

Designing a secure network infrastructure has to go hand-in-hand with network visibility. Attacks are becoming increasingly sophisticated, networking demands are increasing at a rapid rate, and it’s almost impossible to pre...

Using Network Packet Brokers in Campus Deployments | Niagara Networks

By: André Vink June 12, 2019

A leading education and research institution faced security, management, flexibility and robustness challenges pertaining to network visibility. Niagara Networks N2 Network Packet Broker provided a highly configurable and robust, performance-enhancing aggregation point coupled with an enhanced "inline tap" for selective forwarding of traffic to security an...

IPFIX Use Cases in Network Monitoring and Analysis | Niagara Networks

By: André Vink May 21, 2019

A Technical Overview and Deployment Considerations The IPFIX (IP Flow Information Export) protocol was standardized by the Internet Engineering Task Force (IETF) in 2013 to be a multi-vendor universal metadata protocol for exporting IP flow information from network devices, such as switches, routers, firewalls to network monitoring and analysis applications or “collector” systems. The IETF IPFIX standard defines how flow information is exported, formatted and transferred from...

The Complete Guide to Network Packet Brokers | Niagara Networks

By: André Vink May 01, 2019

How are you keeping your company from becoming just another data breach statistic? The obvious answer is to build up a secure network infrastructure that keeps even the most advanced attackers at bay.

The Challenges of SSL Decryption for Network Visibility | Niagara Networks

By: André Vink March 28, 2019

More and more network traffic is encrypted as people and businesses try to keep their data private and secure as it travels through the Internet. By encrypting transmissions, sensitive information, such as a user's login ID for an online banking session, or perhaps a credit card number, is protected and kept out of the hands of potential hackers and criminal organizations. By 2019,...