Blog

Select Categories

Viruses, Worms, and Trojan Horses | Niagara Networks

By: André Vink October 23, 2019

Sophisticated cyber attackers are constantly finding new ways to exploit your network. Whether delivered through drive-by downloads, phishing emails, self-propagation, or any technique in between, all it takes is one malware infection to cost your company millions of dollars. And one thing is clear when it comes to cybersecurity—despite

Fibre Optics Taps for Seamless Network Monitoring | Niagara Networks

By: Yigal Amram October 01, 2019

For many networking teams, the great network visibility debate revolves around taps vs. SPAN ports. However, as network monitoring demands continue to increase, the drawbacks of SPAN ports, also known as mirror ports, are becoming clearer. Compared to

Network Segmentation and Network Packet Brokers | Niagara Networks

By: André Vink September 24, 2019

Traditionally, the foundation of enterprise network security has been a perimeter firewall behind an organization’s Internet gateway or a pair of firewalls encompassing a demilitarized zone (DMZ) which offer an isolated environment between a completely trusted enterprise network and untrusted external network. However, merely characterizing the entire enterprise network as ‘trusted’ and considering it as ‘flat’ (i.e. as a single segment) creates an environment that requires an antagonist to o...

How TLS/SSL Protects Against Exploitation | Niagara Networks

By: Yigal Amram September 09, 2019

Over the last few years, encryption has become one of the highest priorities for cybersecurity improvements. As important as it is to have strong password policies, advanced firewalls, and secure storage arrays, encryption gives you protection from attackers who would otherwise intercept your data in transit. From a business user perspective, encryption means web browsing and application usage is completely secure. But just because up to

SIEM Security and Network Visibility | Niagara Networks

By: Phyllis Lum August 29, 2019

“If a company gets hacked, no CIO wants to have the board ask what happened and say, ‘Damn if I know.’ They want to say, ‘We’re going through log data to find out what happened.”—Eric Ogren, Senior Analyst at 451 Research. Designing a secure network infrastructure has become increasingly difficult. It’s not enough to deploy a stack of security tools like firewalls,

Duplication and Deduplication Boosts Visibility | Niagara Networks

By: André Vink August 19, 2019

The vast majority of the time, packet duplication is seen as a serious problem for network visibility. When duplication occurs on the network traffic, it may indicate a network issue, however, often packet duplication is associated with the deployment of the network visibility layer itself, whereby network tools and appliances receive for processing the same packet from different locations or often the very...

Visibility Layer Solution to Optimize Network Security | Niagara Networks

By: Yigal Amram July 30, 2019

It would be understandable if network security pros felt like they were constantly fighting a losing battle. Between 2018 and 2019, global cybersecurity spending increased nearly 10% to $103 billion. And yet, as you increase cybersecurity spending, attackers continue to successfully break through network security infrastructure.

Eliminating Blind Spots With Network Visibility | Niagara Networks

By: André Vink July 22, 2019

Designing a secure network infrastructure has to go hand-in-hand with network visibility. Attacks are becoming increasingly sophisticated, networking demands are increasing at a rapid rate, and it’s almost impossible to pre...

Centralized Network Management | Niagara Networks

By: Yigal Amram June 27, 2019

There was a time when simply deploying network taps in place of SPAN ports put you ahead of the game when in terms of network visibility. In recent years, we’re seeing more and more IT managers shift from single-device network visibility solutions to multi-device, multi-site deployments. However, increasing application demands and the sprawl of net...

The Fundamentals of Network Taps | Niagara Networks

By: Jose Anes June 17, 2019

Network taps are external appliances that sit between network devices to copy and monitor traffic. Because network connectivity and data security form the backbone of any business, it’s crucial to have pervasive visibility of all traffic. Taps are one of the core network visibility tools that ensure you gain insight from every packet that ...