Blog

Select Categories

Network Packet Broker Rules and Configurations | Niagara Networks

By: Jose Anes May 29, 2019

The Port Mirroring or SPAN (Switched Port Analyzer) method of monitoring network traffic has been the perennial focus of network visibility. With port mirroring enabled, the switch sends a copy of all network packets seen on one port (or an entire VLAN) to another port, where the packet can be analyzed. As a SPAN port is unidirectional and network traffic is bidirectional, the aggregate traffic could be twice as mu...

IPFIX Use Cases in Network Monitoring and Analysis | Niagara Networks

By: André Vink May 21, 2019

A Technical Overview and Deployment Considerations The IPFIX (IP Flow Information Export) protocol was standardized by the Internet Engineering Task Force (IETF) in 2013 to be a multi-vendor universal metadata protocol for exporting IP flow information from network devices, such as switches, routers, firewalls to network monitoring and analysis applications or “collector” systems. The IETF IPFIX standard defines how flow information is exported, formatted and transferred from...

Technical Overview of IPFIX Architecture | Niagara Networks

By: Jose Anes May 13, 2019

A Technical Overview and Deployment Considerations The Internet Protocol Flow Information Export (IPFIX) is a network flow protocol standard defined by the Internet Engineering Task Force (IETF). The IETF IPFIX project was initiated to create a widespread benchmark of export metadata about the traffic flow information from routers, switches, firewalls, and oth...

Managing Metadata - The importance of Netflow & IPFIX | Niagara Networks

By: Yigal Amram May 06, 2019

The right approach to network monitoring and analysis can make all the difference in cutting costs and improving ROI across your business. That’s why the market for network analytics is worth over $3 billion.

The Complete Guide to Network Packet Brokers | Niagara Networks

By: André Vink May 01, 2019

How are you keeping your company from becoming just another data breach statistic? The obvious answer is to build up a secure network infrastructure that keeps even the most advanced attackers at bay.

6 Steps for Securing an Impenetrable Network | Niagara Networks

By: Jose Anes April 22, 2019

By 2021, cybercrime will cost $6 trillion globally. In a survey of over 500 senior-level IT managers, 77% said their companies experienced a security incident in 2018. And worse yet, 39% said their companies suffered five or more data-corrupting events.

Increase Network Visibility with SSL Decryption | Niagara Networks

By: Yigal Amram April 04, 2019

Why SSL Decryption? The growing adoption of protocols to secure Internet traffic, including Secure Socket Layer (SSL) and Transport Layer Security (TLS), is, paradoxically, giving cybercriminals a way to evade network defenses. For example, Gartner Group predicts that, through 2019, more than 80 percent of enterprises' web traffic will be encrypted and that during 2019, more than 50%o...

The Challenges of SSL Decryption for Network Visibility | Niagara Networks

By: André Vink March 28, 2019

More and more network traffic is encrypted as people and businesses try to keep their data private and secure as it travels through the Internet. By encrypting transmissions, sensitive information, such as a user's login ID for an online banking session, or perhaps a credit card number, is protected and kept out of the hands of potential hackers and criminal organizations. By 2019,...

Network Visibility Trends in 2019 | Niagara Networks

By: Jose Anes March 14, 2019

Network visibility goals never change—you want to deploy the right combination of network taps, network packet brokers, and

Port Fan-out for N2 Network Bypass and NPB Modules | Niagara Networks

By: Yigal Amram March 07, 2019

Critical Enabler for Robust Network Visibility Over the last few years, network equipment manufacturers have been in the process of broadly adopting fan-out technology for data center networking to increase port density. In this blog, we will examine how port fan-out technology overall enables higher scalability and flexibility for next-generation data centers and, when specifically applied to Niagara Networks N2 network bypass and