Column Control DTX

Best Practices for Visibility Architecture Tap Planning

백서

When it comes to data monitoring, ensuring proper access to network data is the most critical thing you can do. Everything else, data filtering and the conversion of data into actionable information, are all dependent on that initial data being correct and relevant. If this practice is ignored, you can, and will, end up realizing the well-known adage – “Garbage In equals Garbage Out”. This white paper is designed to be a generic guide to help assist you in optimizing the access layer of your Visibility Architecture so you can capture that correct information.

As you can see in Figure 1, there are three different frameworks that can be incorporated into a visibility architecture: the access framework, the out-of-band visibility framework, and the inline security framework. These three frameworks take the raw data from the network and manipulate it as necessary to get the appropriate data to the correct monitoring and analysis tool(s).

The access layer framework is naturally focused on creating access to network data. This is the base framework that then feeds data to packet brokers in either the out-of-band visibility or inline security frameworks where these data points can then be manipulated before being sent on to the appropriate monitoring tools. 

×

판매 문의 부탁드립니다.

*Indicates required field

선호하는 연락방법을 선택해 주십시오. *필수입력항목
Preferred method of communication? 이메일 변경하기
Preferred method of communication?

[키사이트 개인정보 수집 및 이용]
 1. 개인정보 수집 및 이용 동의
 2. 키사이트 파트너 업무 위탁 동의
 3. 키사이트 해외 본사 및 지사 제공 동의

"제출"을 클릭하시면 개인정보 수집 및 이용에 동의한 것으로 간주합니다. 보다 자세한 내용은 홈페이지 하단의 개인정보보호정책 을 참조하시기 바랍니다.

감사합니다!

A sales representative will contact you soon.

Column Control DTX