Visibility Architectures Enable Real-Time Network Vigilance

Ixia's Network Visibility Architecture

A couple of weeks ago, I wrote a blog on how to use a network lifecycle approach to improve your network security. I wanted to come back and revisit this as I’ve had a few people ask me why the visibility architecture is so important. They had (incorrectly, IMO) been told by others to just focus on the security architecture and everything else would work out fine.

The reason you need a visibility architecture in place is because if you are attacked, or breached, how will you know? During a DDoS attack you will most likely know because of website performance problems, but most for most of the other attacks how will you know?

This is actually a common problem. The 2014 Trustwave Global Security Report stated that 71% of compromised victims did not detect the breach themselves—they had no idea and attack had happened. The report also went on to say that the median number of days from initial intrusion to detection was 87! So most companies never detected the breach on their own (they had to be told by law enforcement, a supplier, customer, or someone else), and it took almost 3 months after the breach for that notification to happen. This doesn’t sound like the optimum way to handle network security to me.

The second benefit of a visibility architecture is faster remediation once you discover that you have been breached. In fact, some Ixia customers have seen an up to 80% reduction in their mean time to repair performance due to implementing a proper visibility architecture. If you can’t see the threat, how are you going to respond to it?

A visibility architecture is the way to solve these problems. Once you combine the security architecture with the visibility architecture, you equip yourself with the necessary tools to properly visualize and diagnose the problems on your network. But what is a visibility architecture? It’s a set of components and practices that allow you to “see” and understand what is happening in your network.

The basis of a visibility architecture starts with creating a plan. Instead of just adding components as you need them at sporadic intervals (i.e., crisis points), step back and take a larger view of where you are and what you want to achieve. This one simple act will save you time, money and energy in the long run.

Ixia's Network Visibility Architecture

The actual architecture starts with network access points. These can be either taps or SPAN ports. Taps are traditionally better because they don’t have the time delays, summarized data, duplicated data, and the hackability that are inherent within SPAN ports. However, there is a problem if you try to connect monitoring tools directly to a tap. Those tools become flooded with too much data which overloads them, causing packet loss and CPU overload. It’s basically like drinking from a fire hose for the monitoring tools.

This is where the next level of visibility solutions, network packet brokers, enter the scene. A network packet broker (also called an NPB, packet broker, or monitoring switch) can be extremely useful. These devices filter traffic to send only the right data to the right tool. Packets are filtered at the layer 2 through layer 4 level. Duplicate packets can also be removed and sensitive content stripped before the data is sent to the monitoring tools if that is required as well. This then provides a better solution to improve the efficiency and utility of your monitoring tools.

Access and NPB products form the infrastructure part of the visibility architecture, and focus on layer 2 through 4 of the OSI model. After this are the components that make up the application intelligence layer of a visibility architecture, providing application-aware and session-aware visibility. This capability allows filtering and analysis further up the stack at the application layer, (layer 7). This is only available in certain NPBs. Depending upon your needs, it can be quite useful as you can collect the following information:

  • Types of applications running on your network
  • Bandwidth each application is consuming
  • Geolocation of application usage
  • Device types and browsers in use on your network
  • Filter data to monitoring tools based upon the application type

These capabilities can give you quick access to information about your network and help to maximize the efficiency of your tools.

These layer 7 application oriented components provide high-value contextual information about what is happening with your network. For example, this type of information can be used to generate the following benefits:

  • Maximize the efficiency of current monitoring tools to reduce costs
  • Gather rich data about users and applications to offer a better Quality of Experience for users
  • Provide fast, easy to use capabilities to spot check for security & performance problems

Ixia's Network Visibility Architecture

And then, of course, there are the management components that provide control of the entire visibility architecture: everything from global element management, to policy and configuration management, to data center automation and orchestration management. Engineering flexible management for network components will be a determining factor in how well your network scales.

Visibility is critical to this third stage (the production network) of your network’s security lifecycle that I referred to in my last blog. (You can view a webinar on this topic if you want.) This phase enables the real-time vigilance you will need to keep your network protected.

As part of your visibility architecture plan, you should investigate and be able to answer these three questions.

  1. Do you want to be proactive and aggressively stop attacks in real-time?
  2. Do you actually have the personnel and budget to be proactive?
  3. Do you have a “honey pot” in place to study attacks?

Depending upon those answers, you will have the design of your visibility architecture. As you can see from the list below, there are several different options that can be included in your visibility architecture.

  • In-line components
  • Out-of-band components
  • Physical and virtual data center components
  • Layer 7 application filtering
  • Packet broker automation
  • Monitoring tools

In-line and/or out-of-band security and monitoring components will be your first big decision. Hopefully everybody is familiar with in-line monitoring solutions. In case you aren’t, an in-line (also called bypass) tap is placed in-line in the network to allow access for security and monitoring tools. It should be placed after the firewall but before any equipment. The advantage of this location is that should a threat make it past the firewall, that threat can be immediately diverted or stopped before it has a chance to compromise the network. The tap also needs to have heartbeat capability and the ability to fail closed so that should any problems occur with the device, no data is lost downstream. After the tap, a packet broker can be installed to help traffic to the tools. Some taps have this capability integrated into them. Depending upon your need, you may also want to investigate taps that support High Availability options if the devices are placed into mission critical locations. After that, a device (like an IPS) is inserted into the network.

In-line solutions are great, but they aren’t for everyone. Some IT departments just don’t have enough personnel and capabilities to properly use them. But if you do, these solutions allow you to observe and react to anomalies and problems in real-time. This means you can stop an attack right away or divert it to a honeypot for further study.

The next monitoring solution is an out-of-band configuration. These solutions are located further downstream within the network than the in-line solutions. The main purpose of this type of solution is to capture data post event. Depending whether interfaces are automated or not, it is possible to achieve near real-time capabilities—but they won’t be completely real-time like the in-line solutions are.

Nevertheless, out-of-band solutions have some distinct and useful capabilities. The solutions are typically less risky, less complicated, and less expensive than in-line solutions. Another benefit of this solution is that it gives your monitoring tools more analysis time. Data recorders can capture information and then send that information to forensic, malware and/or log management tools for further analysis.

Do you need to consider monitoring for your virtual environments as well as your physical ones? Virtual taps are an easy way to gain access to vital visibility information in the virtual data center. Once you have the data, you can forward it on to a network packet broker and then on to the proper monitoring tools. The key here is apply “consistent” policies for your virtual and physical environments. This allows for consistent monitoring policies, better troubleshooting of problems, and better trending and performance information.

Other considerations are whether you want to take advantage of automation capabilities, and do you need layer 7 application information? Most monitoring solutions only deliver layer 2 through 4 packet data, so layer 7 data could be very useful (depending upon your needs).

Application intelligence can be a very powerful tool. This tool allows you to actually see application usage on a per-country, per-state, and per-neighborhood basis. This gives you the ability to observe suspicious activities. For instance, maybe an FTP server is sending lots of files from the corporate office to North Korea or Eastern Europe—and you don’t have any operations in those geographies. The application intelligence functionality lets you see this in real time. It won’t solve the problem for you, but it will let you know that the potential issue exists so that you can make the decision as to what you want to do.

Another example is that you can conduct an audit for security policy infractions. For instance, maybe your stated process is for employees to use Outlook for email. You’ve then installed anti-malware software on a server to inspect all incoming attachments before they are passed onto users. With an application intelligence product, you can actually see if users are connecting to other services (maybe Gmail or Dropbox) and downloading files through that application. This practice would bypass your standard process and potentially introduce a security risk to your network. Application intelligence can also help identify compromised devices and malicious botnet activities through Command and Control communications.

Automation capability allows network packet brokers to be automated to initiate functions (e.g., apply filters, add connections to more tools, etc.) in response to external commands. This automation allows a switch/controller to make real-time adjustments to suspicious activities or problems within the data network. The source of the command could be a network management system (NMS), provisioning system, security information and event management (SIEM) tool or some other management tool on your network that interacts with the NPB.

Automation for network monitoring will become critical over the next several years, especially as more of the data center is automated. The reasons for this are plain: how do you monitor your whole network at one time? How do you make it scale? You use automation capabilities to perform this scaling for you and provide near real-time response capabilities for your network security architecture.

Finally, you need to pick the right monitoring tools to support your security and performance needs. This obviously depends the data you need and want to analyze.

The life-cycle view discussed previously provides a cohesive architecture that can maximize the benefits of visibility like the following:

  • Decrease MTTR up to 80% with faster analysis of problems
  • Monitor your network for performance trends and issues
  • Improve network and monitoring tool efficiencies
  • Application filtering can save bandwidth and tool processing cycles
  • Automation capabilities, which can provide a faster response to anomalies without user administration
  • Scale network tools faster

Once you integrate your security and visibility architectures, you will be able to optimize your network in the following ways:

  • Better data to analyze security threats
  • Better operational response capabilities against attacks
  • The application of consistent monitoring and security policies

Remember, the key is that by integrating the two architectures you’ll be able to improve your root cause analysis. This is not just for security problems but all network anomalies and issues that you encounter.

Additional Resources

  • Network Life-cycle eBook – How to Secure Your Network Through Its Life Cycle
  • Network Life-cycle webinar – Transforming Network Security with a Life-Cycle Approach
  • Visibility Architecture Security whitepaper – The Real Secret to Securing Your Network
  • Security Architecture whitepaper – How to Maximize IT Investments with Data-Driven Proof of Concept (POC)
  • Security solution overview – A Solution to Network Security That Actually Works
  • Cyber Range whitepaper – Accelerating the Deployment of the Evolved Cyber Range

Thanks to Ixia for the article. 

Optimizing Networks with Ixia

Ixia's Visibility Architecture

We work with more than 40 of the top 50 carriers worldwide, as well as many of their largest customers and the companies who provide infrastructure technology for their networks. We’re the “application performance and security resilience” company – we help you make sure technology works the way you expect it to out of the gate, and keeps on doing it throughout the deployment lifecycle.

Today’s mobile subscribers are what we call “tough customers”: they expect instant availability and high performance, all the time, everywhere they go, and they tend to remember the “hiccups” more than all the times everything works just fine. No one has patience for dropped calls or choppy video or slow downloads anymore.

And that’s where Ixia comes in. We helps carriers and other providers worldwide exceed the expectations of their toughest customers. Physical or virtualized, wired or wireless, we can help you build and validate, secure, and optimize networks that deliver.

We do this with powerful and versatile hardware and software solutions, expert global support, and professional services, all designed to ensure user satisfaction and a great bottom line.

So what does this mean to you?

The Growing Performance Challenge

Right now we’re going to talk about optimizing your network and security over time—after you’ve validated and deployed new technologies and services.

  • How do you maintain quality with more mobile devices connecting to more data from more sources?
  • How do you manage and help customers manage the impact of the “BYOD” trend?
  • How you monitor the performance of VNFs in a newly virtualized environment?

These and other challenges are complicated by customers’ high expectations for always-on access and immediate application response. Not to mention new “blind spots” created by virtualization and the growing complexity of networks.

Today’s monitoring systems can quickly become stressed, making it harder to keep up with traffic and filter data to the appropriate tools. Optimizing the network requires 100% visibility into traffic along with real-time intelligence.

During the operations phase of the technology lifecycle, companies are looking to obtain actionable insight into performance, and maintain seamless application delivery. More intelligence –and sometimes more advanced tools –are needed to maximize visibility, and maximize the value of existing investments.

To meet both business and technology goals requires a highly scalable visibility architecture like Ixia’s to eliminate blind spots, and add control without adding complexity.

Example

One leading European bank with more than 13 million customers, 5,000 branches, and 9,000 ATMs needed to upgrade its infrastructure to meet new internal compliance standards. The company was also upgrading data centers to 40GbE, and looking to integrate the new links with the current traffic monitoring systems.

Ixia’s Net Tool Optimizer solutions made for an easy transition. The NTO family of network packet brokers or “NPBs” –are we sure we have enough acronyms? – helped connect the new 40GbE links to their monitoring system with no downtime, and helped them meet the new compliance requirements while providing for future growth.

Benefits included reducing the load on existing monitoring tools by more than 40%. Pretty powerful stuff.

Ixia Difference

So what is the Ixia Visibility Architecture? Basically it’s the sum total of the industry’s most comprehensive product portfolio.

This includes the NPBs we just talked about that aggregate and filter traffic to monitoring tools, as well as “taps” that provide visibility into any network link, and virtualized taps or vTaps that eliminate new blind spots created during virtualization.

The Ixia portfolio delivers 100% visibility and into the network at speeds up to 100Gbps. No matter what type of traffic you’re running – games, online banking, video streaming, online shopping, automotive Ethernet, and the like – application traffic IS the network, and Ixia visibility solutions help optimize the customer experience in real time, and over time.

Additional Resources:

Ixia visibility solutions

Ixia NTO solutions

Ixia Net Optics taps

Thanks to Ixia for the article.

Application Performance Monitoring

Ixia NTO-7300

Your network infrastructure exists for one reason: to deliver the services and applications that matter to your customers who demand access now, without interruption. Anything that affects your ability to reach customers has a serious impact on your bottom line.

High-quality application performance requires real-time awareness of what’s happening on the network. Network operators need to monitor, analyze, and report on transactions throughout the IT environment—whether physical, virtual, or in the cloud—to identify issues quickly and resolve problems before they disrupt critical services. This means understanding dependencies between applications and the network, being alerted to issues before business is affected, and accelerating troubleshooting.

For most businesses, network performance must now be evaluated and managed from an application perspective. To accomplish this, you need innovative transaction performance management capabilities that help prioritize problem resolution according to business impact.

Ixia Application Performance Monitoring (APM)

Ixia offers a spectrum of intelligent APM capabilities that work with monitoring devices to capture and analyze network traffic in a scalable solution. Ixia APM solutions accurately, efficiently, and non-disruptively direct out-of-band network traffic from multiple access points, whether SPAN ports or TAPs, to the monitoring device for analysis. The result is application awareness that dramatically raises network performance, availability, and security.

Ixia APM enables

Full network visibility. Ixia’s APM solutions deliver all required traffic from anywhere in the network to the monitoring tools, allowing fully 100 percent of traffic to be monitored and analyzed.

  • Simplified deployment. Flexible enough to work in any network environment, Ixia’s APM shares access with deployed monitoring and security tools.
  • Streamlined scalability. Ixia’s APM allows you to add 1GE, 10GE, 40GE, or 100GE ports, with filters dynamically adjusted to meet bandwidth requirements.
  • Effective security. Ixia’s APM automatically directs traffic as needed to a centralized “farm” of cost effective, high-capacity security tools to monitor distributed buildings and network segments. Traffic of interest is returned to the security tool farm for inspection.
  • Advanced Automation. Ixia’s APM solutions automatically respond in real time to network events that have an impact on applications, including event recording, security analysis, and traffic redirection. This capability improves application performance and availability.

Highlights of Ixia APM

Ixia’s APM’s advanced filtering capabilities work easily with your own monitoring systems across a range of applications. Additionally, our APM performs:

  • Load-balancing of traffic across multiple monitoring input ports
  • Dynamic tightening of filters as needed to ensure that key transactions are always analyzed when total traffic spikes over 10Gbps
  • Traffic redirecting among multiple monitoring appliances on a network to provide high availability
  • Packet capture on demand, based upon NMS/SIEM alerts

Related Products

 

Ixia NTO-7300 Net Optics Network Taps Net Optics Phantom Virtualization Tap

Net Tool Optimizers
Out-of-band traffic aggregation, filtering, dedup, load balancing

Net Optics Network Taps
Passive network access for security and monitoring tools

Phantom Virtualization Tap
Passive network access to traffic passing between VMs

Thanks to Ixia for the article. 

 

Enterprises- Ensure Application Performance and Security Resilience

Ensure Application Performance and Security Resilience

For most every enterprise, the network is your business. Your network and applications are what connects you to your customers. Maintaining network vitality for an optimal user experience is key to business growth and profitability. But today’s networks are under tremendous pressures. User expectations for high performance and innovative applications are ever-increasing. So too are the frequency, magnitude, and sophistication of security attacks that your adversaries are launching to attempt to infiltrate your network, steal data, or disrupt operations.

To achieve a secure network that is resilient to attack requires the selection and deployment of security devices such as firewalls and intrusion prevention. To meet the expectation for application performance, devices such as load balancers, application controllers and performance monitoring tools are also deployed in the network. Ixia is focused on helping to ensure security resilience and application performance in your network.

Security Resilience

The demands on the network are constant and your security must have resilience to maintain its effectiveness as it comes under attack, is challenged to maintain visibility to traffic and events across the network, or just needs an operational change to deploy the latest threat updates. Ixia’s portfolio of security solutions allow enterprises to:

  • Optimize security device investments such as IPS, Firewall, NGFW or DDoS Mitigation by helping you select the best technology with the right performance and deploying it in the network most effectively with network visibility and optimal load balancing.
  • Minimize downtime and improve operational change control for security upgrades by validating security updates and changes and providing the inline deployment tools to ensure that these changes are not disruptive to network operations.
  • Train and prepare for realistic cyber security exercises with systems that can create the real-world application loads and attack traffic required for a cyber range and also provide the visibility required to stream high volumes of events to SOC tools to monitor the exercises.

Application Performance

It has become critical to assess applications and their performance not only before going live to ensure they are customer-ready, but that performance is maintained over time by monitoring the network — ensuring visibility into key application flows, anywhere on the network. Ixia’s portfolio of application performance solutions allow enterprises to:

  • Validate and assess application performance across your network with real-world application load testing and simulate applications for thousands of wireless or wired endpoints
  • Gain confidence for virtualization migrations by testing new deployments and removing any of the network visibility blind spots created by adoption of virtualization
  • Maintain application performance and ease of operation by getting the right information to the right application performance and network monitoring tools
  • Extend the life of IT tool investments and maximize the usefulness of the current tool capacity with the deployment of physical taps, virtual taps, bypass switches, and network packet brokers

Thanks to Ixia for the article. 

Network Performance Monitoring

Ixia's Net Tool Optimizer

Visibility Into the Business

With virtualization, “Big Data,” and the sheer complexity of enterprise networks on the rise, dynamic network monitoring of performance and security provides a critical business advantage. Ixia’s network visibility solutions deliver ongoing insight into production networks to help maximize your company’s productivity and profitability, as well as its return on new and existing IT investments.

Leveraging state-of-the-art technology and techniques, Ixia’s powerful, high-performance network monitoring switches equip network engineers to meet the growing challenge of testing, assessing and monitoring complex, high-performance networks with limited access points. These solutions add intelligence between network access points and sophisticated monitoring tools to streamline the flow of data, ensuring that each tool receives the exact information it needs. Data from multiple TAP and SPAN ports is aggregated and multicast to performance and security monitoring tools, providing network operators with maximum visibility into both physical and virtual networks.

Ixia network visibility solutions:

  • Optimize traffic for monitoring with advanced filtering, aggregation, and replication
  • Extend investments in 1G monitoring tools to 10G and 40G deployments
  • Automate troubleshooting to reduce MTTR
  • Introduce “drag and drop” simplicity to streamline configuration and management
  • Expand network monitoring capacity enabling simultaneous monitoring of multiple connection points from a single port

Poor application performance leads to poor business performance: lost sales, missed opportunities, inefficient operations, and disgruntled customers, weakening the corporate brand. Mitigating this risk, Ixia’s network visibility solutions equip network engineers to leverage actionable insight—maximizing network and application performance while helping to optimize security, compliance, management, scalability, and ROI.

 

Ixia's Net Tool Optimizer Net Optics Network Taps

Net Tool Optimizers
Out-of-band traffic
aggregation, filtering,
dedup, load balancing

Net Optics Network Taps
Passive network access for
security and monitoring tools

 

Thanks to Ixia for the article. 

Security & Compliance Monitoring

Ixia's Net Tool Optimizer

High-stakes Monitoring

Global finance moves fast. When data and transactions don’t take place as smoothly or securely as expected, the company’s revenues and reputation may instantly suffer, causing valued customers to seek more reliable providers. Regulatory requirements are also growing, creating a greater need for security and compliance monitoring.

To mitigate risk and ensure performance, Ixia’s network visibility solutions deliver the ongoing data needed to dynamically detect, avoid, and address issues that affect production networks, private clouds, and applications. With security and compliance monitoring requirements increasing and physical networks becoming more complex, the Ixia suite of network monitoring switches optimizes use of network monitoring access points and overcomes hardware limitations for increased visibility at reduced cost.

Leveraging industry-leading network visibility technology, Ixia’s solutions enable engineers running the world’s most demanding networks to:

  • Minimize latency and speed transaction times
  • Prevent fraud and secure data across multiple networks and private cloud infrastructures
  • Maintain compliance with rigorous regulatory standards associated with PCI-DSS and other governance
  • Maximize existing investments while evolving to 40Gbps and beyond
  • Demonstrate fairness to customers and compliance with requirements tied to Service Level Agreements

Ixia’s suite of solutions also supports testing, assessing and optimizing of network and application performance, security, compliance, and management under diverse conditions. These breakthrough solutions deliver:

  • Increased network visibility by efficiently providing network, application, and security monitoring tools the exact data they need
  • Expanded network monitoring capacity with aggregation, filtering, and replication of data enabling simultaneous monitoring of multiple connection points from a single port
  • Maximum tool utilization extending 1Gbps monitoring tools to 10Gbps and 40Gbps networks to defer costly upgrades
  • Automated troubleshooting that reduces mean time to repair (MTTR)
  • Industry-first “drag and drop” interface that speeds and simplifies configuration and management

Related Products

Ixia's Net Tool Optimizer Net Optics Network Taps Net Optics Phantom Virtualization Tap Net Optics Network Packet Brokers Ixia's Application and Threat Intelligence Processor

Net Tool Optimizers
Out-of-band traffic
aggregation, filtering, dedup, load balancing

Net Optics Network Taps
Passive network access for security and monitoring tools

Phantom Virtualization Tap
Passive network access to traffic passing between VMs

Net Optics Network Packet Brokers
Inline traffic aggregation,
filtering, deduplication and
load balancing for monitoring
tools

Ixia Application and Threat Intelligence Processor
Better data for better
decisions

Resources

The Real Secret to Securing your Network

Ixia's- The Real Secret to Securing your Network

Thanks to Ixia for the article. 

BYOD Monitoring

Ixia's Net Tool Optimizers

A Corporate Conundrum

With possession being 9/10th of the law, the bring your own device (BYOD) trend creates a conundrum for enterprises. BYOD is the policy of allowing employees to bring personally owned mobile devices to their place of work and use them to access company resources such as email, file servers, and databases. It is also fairly common to mix personal and professional data on single device or across multiple mobile options.

BYOD is becoming increasingly prevalent in enterprises, as employees enjoy using their familiar technology of choice over corporate-mandated equipment. But since employees actually own the devices they’re using to perform corporate work and send or receive business-related communications, how can IT control the security and performance of corporate applications and assets?

There are more questions than answers currently as IT struggles to deal with the impacts of BYOD. The move away from standard, corporate-controlled endpoints is fraught with peril.

BYOD Challenges

  • With employee-owned devices, the amount of control IT has over the endpoints is a gray area. Can they monitor it, or does monitoring violate employee privacy? Can they take actions to protect the device without employee permission?
  • Privacy rights of the employee are extremely sticky when dealing with BYOD, especially in certain parts of Europe where employers are subject to strict privacy laws.
  • When an employee-owned device is lost or stolen, does IT have the right to remotely wipe the device? What about personal data the employee has on the device?
  • With BYOD, instead of IT worrying about one device per employee, a single employee might use 2-3 or more devices to access corporate resources.
  • It should be assumed that BYOD endpoints are security risks, due to a lack of corporate control over the devices.
  • BYOD users expect the speed and performance they are accustomed to on their local desktops, so IT planning for sufficient capacity is key. SLAs must be defined for the BYOD infrastructure, as well as a centralized management capability.
  • A successful BYOD strategy must also take compliance under consideration and build in the auditing and reporting capabilities that are crucial to compliance.

The Ixia BYOD Solution

The Ixia BYOD solution is an essential element of a BYOD strategy. We help enterprises planning or already maintaining BYOD by remediating security and performance impacts on corporate networks due to uncontrolled endpoints.

With Ixia’s BYOD solution, you can monitor the corporate network actively, with no sacrifice of network access for your security and performance tools. Our BYOD line:

  • Protects corporate IT assets responsibly
  • Aggregates, filters and replicates traffic so all security tools get the right data
  • Increases monitoring tool performance and improves tool accuracy
  • Speeds incident remediation, delivering granular access control to network data and automated responses for adaptive monitoring when anomalous behavior is detected
  • Reduces exposure of sensitive data with filtering and stripping capabilities

Ixia enables the real-time monitoring to address critical business needs at gigabit speeds, while providing insights and analysis on a sub-minute level. We provide the application-specific intelligence that’s critical to timely root cause analysis for BYOD security—including identification of actual user names, individual VoIP calls, and deep visibility of email traffic. With a near real-time and historical view of key performance indicators (KPIs)—including traffic volume, top talkers, application and network latency, and application distribution—IT can monitor bandwidth usage and acquire needed information to quickly resolve application performance issues. IT can also perform capacity planning and trend analysis to see how the BYOD program affects the baseline of network resources.

Related products

Ixia's Net Tool Optimizers Net Optics Network Taps

Net Tool Optimizers
Out-of-band traffic aggregation,
filtering, dedup, load balancing

Net Optics Network Taps
Passive network access
for security and monitoring tools

 

Thanks to Ixia for the article

Ixia’s new Ebook- The Network Through a New Lens: How a Visibility Architecture Sharpens the View

“Enter the Visibility Architecture”

“Buying more tools to deal with spiraling demands is counter-productive – it’s like trying to simplify a problem by increasing complexity. Visibility merits its own architecture, capable of addressing packet access and packet stream management. A visibility architecture that collects, manages, and distributes packet streams for monitoring and analysis is ideal for cost-savings, reliability, and resilience. The economic advantages of such end to-end visibility are beyond debate.

An architectural approach to visibility allows IT to respond to the immediate and long-range demands of growth, management, access, control, and cost issues. This architecture can optimize the performance and value of tools already in place, without incurring major capital and operational costs. With the ability to see into applications, a team can drill down instantly from high-level metrics to granular details, pinpoint root causes and take action at the first—or even before the first – sign of trouble – lowering Mean Time to Repair (MTTR) dramatically.

A scalable visibility architecture provides resilience and control without adding complexity. Because lack of access is a major factor in creating blind spots, a visibility architecture provides ample access for monitoring and security tools: network taps offer reliable access points, while NPBs contribute the advanced filtering, aggregation, deduplication, and other functions that make sure these tools see only traffic of interest.

Application- and session-aware capabilities contribute higher intelligence and analytical capabilities to the architecture, while policy and element management capabilities help automate processes and integrate with existing management systems. Packet-based monitoring and analysis offers the best view into the activity, health, and performance of the infrastructure. Managing a visibility architecture requires an intuitive visual/ graphical interface that is easy to use and provides prompt feedback on operations – otherwise, architecture can become just another complexity to deal with.”

Ixia Visibility Architecture

The Ixia Network Visibility Architecture encompasses network and virtual taps, as well as inline bypass switches; inline and out-of-band NPBs; application-aware and session aware monitoring, and a management layer.

Download the ebook here

Ixia The Network Through a New Lens

Thanks to Network World for the article.