Select Categories

The Complete Guide to Network Packet Brokers | Niagara Networks

By: André Vink May 01, 2019

How are you keeping your company from becoming just another data breach statistic? The obvious answer is to build up a secure network infrastructure that keeps even the most advanced attackers at bay.

6 Steps for Securing an Impenetrable Network | Niagara Networks

By: Jose Anes April 22, 2019

By 2021, cybercrime will cost $6 trillion globally. In a survey of over 500 senior-level IT managers, 77% said their companies experienced a security incident in 2018. And worse yet, 39% said their companies suffered five or more data-corruptin...

Increase Network Visibility with SSL Decryption | Niagara Networks

By: Yigal Amram April 04, 2019

Why SSL Decryption? The growing adoption of protocols to secure Internet traffic, including Secure Socket Layer (SSL) and Transport Layer Security (TLS), is, paradoxically, giving cybercriminals a way to evade network defenses.  For example, Gartner Group predicts that, through 2019, more than 80 percent of enterprises' web traffic will be encrypted an...

The Challenges of SSL Decryption for Network Visibility | Niagara Networks

By: André Vink March 28, 2019

More and more network traffic is encrypted as people and businesses try to keep their data private and secure as it travels through the Internet. By encrypting transmissions, sensitive information, such as a user's login ID for an online banking session, or perhaps a credit card number, is protected and kept out of the hands of potential hackers and criminal organizations.

Network Visibility Trends in 2019 | Niagara Networks

By: Jose Anes March 14, 2019

Network visibility goals never change—you want to deploy the right combination of network taps, network packet brokers, and

Port Fan-out for N2 Network Bypass and NPB Modules | Niagara Networks

By: Yigal Amram March 07, 2019

Critical Enabler for Robust Network Visibility Over the last few years, network equipment manufacturers have been in the process of broadly adopting fan-out technology for data center networking to increase port density. In this blog, we will examine how port fan-out technology overall enables higher scalability and flexibility for next-generation data centers and, when specifically applied to Niagara Networks N2 network bypass and

[PART 2] Network Visibility and Hybrid Networks | Niagara Networks

By: André Vink March 04, 2019

How to Achieve Hybrid Network Visibility with a Central Controller In the first part of this mini blog series, we talked about the new reality for IT leaders—hybrid networks. Despite the all-or-nothing excitement in the early days of cloud computing, it’s clear that on-premises infrastructure isn’t going anywhere anytime soon. Rather, the key to network success is finding your perfect b...

Packet Timestamping: Key to Boosting Visibility | Niagara Networks

By: Jose Anes February 19, 2019

The more we rely on network-connected systems and services for mission-critical processes, the more important it is to design for network visibility. Vendors have been preaching the importance of network visibility for decades. While it’s important to have the right combination of

The Power of Packet Deduplication | Niagara Networks

By: André Vink February 05, 2019

Introduction -- Causes and Impact of Packet Duplication Seamless monitoring of network traffic is critically important for enterprise network and security administrators: it lies at the very foundation of network threat detection and remediation. Regrettably, packet duplication has commonly been an undesirable side-effect of

Pervasive Network Visibility for SD-WAN Deployment | Niagara Networks

By: Yigal Amram January 28, 2019

In contrast to the other components of enterprise networks, the wide-area network (WAN) stands out as the most demanding to administer because it often includes a variety of services and devices with most of those devices at unsupported sites. Management and upgrading is difficult; often remote access to WAN devices is only possible via the WAN itself, so resolving any major errors made during an upgrade may demand physical access to the device itself.