Blog

Select Categories

Resolving the Packet Duplication Challenges

By: André Vink November 16, 2021

Seamless monitoring of network traffic is critically important for enterprise network and security administrators: it lies at the very foundation of network threat detection and remediation. Regrettably, packet duplication has commonly been an undesirable side-effect of network traffic monitoring. Packet duplication produces redundant information in the monitoring tra...

Connecting the Dots of Visibility in Cyberwarfare of Today

By: Zeev Draer March 25, 2020

Nowadays, defending against asymmetrical cyber warfare using the old paradigm of focusing on North-South traffic is no longer valid. Attackers have discipline, creativity and more aggressive plans as the attack surface continues to expand with more digital assets inflating the value. Most cyber attacks and defence will start from a North-South direction, but once inside the network, an attacker will spread horizontally using East-West tactics. This is the precise moment when a combina...

Keys to Cybersecurity Success for CISOs in 2020 | Niagara Networks

By: Zeev Draer February 17, 2020

Chief Information Security Officers (CISOs) are leading a battle against a moving target battle. Many attackers keenly innovate and can change tactics almost immediately. With the global cost of cybercrime reaching some $6 trillion annually by 2021, cybercriminals are motivated to hone and evolve their practices for big pay-offs. But cyber attacks don’t have to be an i...

Duplication and Deduplication Boosts Visibility | Niagara Networks

By: André Vink August 19, 2019

The vast majority of the time, packet duplication is seen as a serious problem for network visibility. When duplication occurs on the network traffic, it may indicate a network issue, however, often packet duplication is associated with the deployment of the network visibility layer itself, whereby network tools and appliances receive for processing the same packet from different locations or often the very...

Increase Network Visibility with SSL Decryption | Niagara Networks

By: Yigal Amram April 04, 2019

Why SSL Decryption? The growing adoption of protocols to secure Internet traffic, including Secure Socket Layer (SSL) and Transport Layer Security (TLS), is, paradoxically, giving cybercriminals a way to evade network defenses. For example, Gartner Group predicts that, through 2019, more than 80 percent of enterprises' web traffic will be encrypted and that during 2019, more than 50%o...

The Challenges of SSL Decryption for Network Visibility | Niagara Networks

By: André Vink March 28, 2019

More and more network traffic is encrypted as people and businesses try to keep their data private and secure as it travels through the Internet. By encrypting transmissions, sensitive information, such as a user's login ID for an online banking session, or perhaps a credit card number, is protected and kept out of the hands of potential hackers and criminal organizations. By 2019,...

Network Visibility Trends in 2019 | Niagara Networks

By: Jose Anes March 14, 2019

Network visibility goals never change—you want to deploy the right combination of network taps, network packet brokers, and

Port Fan-out for N2 Network Bypass and NPB Modules | Niagara Networks

By: Yigal Amram March 07, 2019

Critical Enabler for Robust Network Visibility Over the last few years, network equipment manufacturers have been in the process of broadly adopting fan-out technology for data center networking to increase port density. In this blog, we will examine how port fan-out technology overall enables higher scalability and flexibility for next-generation data centers and, when specifically applied to Niagara Networks N2 network bypass and

[PART 2] Network Visibility and Hybrid Networks | Niagara Networks

By: André Vink March 04, 2019

How to Achieve Hybrid Network Visibility with a Central Controller In the first part of this mini blog series, we talked about the new reality for IT leaders—hybrid networks. Despite the all-or-nothing excitement in the early days of cloud computing, it’s clear that on-premises infrastructure isn’t going anywhere anytime soon. Rather, the key to network success is finding your perfect balance of on-premises, public cloud...

Packet Timestamping: Key to Boosting Visibility | Niagara Networks

By: Jose Anes February 19, 2019

The more we rely on network-connected systems and services for mission-critical processes, the more important it is to design for network visibility. Vendors have been preaching the importance of network visibility for decades. While it’s important to have the right combination of network...