Packet brokers intelligently move traffic to the various security points and monitoring tools which required network information. Without NPB, all data is sent to all devices, requiring a product like a firewall to pre-process the data before analyzing it. Given the cost of these devices, this might be the most expensive way to deploy security and management tools.
Many organizations lack granular network visibility into the network, which is vital for cybersecurity and application performance. Organizations previously had specialized security tools like a firewall, intrusion prevention system (IPS), monitoring tools, and web proxies, to name a few. Cybersecurity today is a mesh of many different tools on the network, all of which require different sets of data. With a massive amount of data generated across networks, having access to the right data for the right set of tools is critical.
I recently spoke with Taran Singh, Vice President of Products at Keysight, about the importance of packet brokers and how the company’s next-generation products eliminate blind spots in complex high-speed networks. . Highlights of the Interview with ZKastmade in collaboration with eWEEK eSPEAKSare below.
Also see: What is Edge Computing
- NPB’s data pre-processing capabilities reduce the complexity of mid- to large-scale network and security environments. This gives IT and SecOps teams complete visibility into what is happening within their network instead of having to throttle or throttle data based on tool performance. The more tools a company has, the more value an NPB brings.
- A packet broker aggregates all enterprise data and filters traffic based on the type of tools an organization has deployed. To use an analogy, it’s like a traffic cop for different types of traffic. For example, if a company has a full stack of email security tools, the packet broker filters email traffic and sends it to that stack.
- Vertical industries have needs that general package brokers cannot meet. Some Keysight package brokers are designed for financial markets and high frequency trading. Others specialize in the 4G/5G service provider correlation space, where subscriber correlation must occur for data coming from the edge to the mobile network. Then, in the enterprise, the packet brokers are customized according to the type of applications used by the enterprises.
Also see: leading companies
- Keysight recently rolled out two new 400-series full-package brokers for enterprises and service providers. Since many organizations are moving towards adopting high-speed networking stacks, packet brokers are flexible to support speeds ranging from 10 gigabytes to 400 gigabytes. They evolve as the needs of the business or service provider evolve.
- The first product, VisionEdge 400S, provides traffic aggregation with advanced tunneling, Internet Protocol (IP) header filtering, load balancing, and timestamping. The second product, Vision 400comes with innovative security monitoring features, such as packet processing for complex overlay networks.
- What is also unique about this product family is their ability to interpret various overlay protocols on multiple ports. They support non-return-to-zero (NRZ) and pulse amplitude modulation 4 (PAM4) standards for maximum port density. This is something that Keysight hasn’t offered before. 400 Series Packet Brokers provide a view of multiple links on a single unit and can be upgraded to higher network speeds.
- For organizations investing in cybersecurity tools, Keysight recommends ensuring that the tools see all data that traverses the network. This can be achieved by deploying packet brokers and automating cybersecurity stacks. The artificial intelligence (AI) and machine learning (ML) capabilities that power today’s cybersecurity tools can work with packet brokers to provide complete visibility, so nothing gets through the backdoor .