Column Control DTX

Best Practices for Network Monitoring

白皮書

Monitoring Challenges In Today’s Business Environment

The rapid evolution of business applications and systems is making information technology (IT) a strategic part of the world’s most successful companies. The recent shift toward virtualization and cloud computing comes at a time of increasing threats of attack on these strategic assets by malicious entities. At the same time, increasingly-stringent government and industry regulations require stricter data center controls to ensure compliance. IT organizations are working hard to address these challenges while also working to improve the responsiveness and reliability of network and computer systems to help increase their company’s competitive edge.

To get out in front of these data center challenges, IT teams use a number of technologies to proactively monitor their network and applications. Application performance monitors, network performance monitors, intrusion detection or prevention systems, VoIP monitors, data recorders, and traditional network analyzers are examples of monitoring tools that give an IT team better insight into the performance and problems in their network. These valuable tools all require access to network data to perform their analysis. Mirror ports (also known as SPAN ports) on network equipment and network taps create data access points that provide network data for tools to analyze. However, because the number of data access points on security and monitoring tools is limited, connecting a large number of monitoring tools to the network is impossible. A relatively new technology, the network packet broker (NPB), was created to solve this problem.

×

請銷售人員與我聯絡。

*Indicates required field

您希望以何種方式取得相關資訊? *必填欄位
Preferred method of communication? 變更email?
Preferred method of communication?

請點擊按鈕後,提供給是德科技您的個人資料。您可以從 Keysight隱私聲明 中,閱讀到我們如何使用這些資料的訊息,謝謝。

感謝您!

A sales representative will contact you soon.

Column Control DTX