<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

Networking News: Security Spring Cleaning + Public Cloud

May 14, 2019

Riverbed2

The networking world is ever changing, with new monitoring and security tools entering the market, companies introducing exciting new technology, partnerships being formed to create disruptive solutions, and more. With so much note-worthy news, here are some of the most important news stories and updates in the industry this month and what that could mean for the industry as a whole. 

 


Spring Cleaning Your Network Security

Spring is the perfect time to dust off your network security policies, re-evaluate them, and gauge whether they are still effective. When using various tools to monitor, these is a rise of valuable data being collected and everyone becomes a potential victim of varied cybersecurity attacks. Even though it is impossible to build a network that is guaranteed 100% safe from intrusion, organizations must take necessary steps to address some of the most basic vulnerabilities such as preventive measures against breaches, keeping IoT devices secure, having firmware tools and hardening guides for technological partners and effectively managing product life cycles.  Read More

 

New Call-to-action

 

 

Riverbed announces new brand identity at annual Partner Summit and Awards

As a digital performance company, Riverbed, has announced its new brand identity centered around ‘Advancing Human Experiences in the Digital World’, at its inaugural Middle East Partner Connect in Dubai. Presentations held through the first half of the event focused on how partners could leverage the recently enhanced Riverbed Rise Partner Program, the Riverbed Digital Performance Platform and the company’s new corporate brand identity, to drive the digital transformation that their customers need, and grow their business as a result.“Using the Riverbed Digital Performance Platform, our partners can empower their customers to deliver superior digital customer experiences and achieve new levels of operational agility,” he added. Read More

ExtraHop joins AWS consulting partner private offer program to deliver enterprise security in the cloud

ExtraHop announced that it has joined the Amazon Web Services Consulting Partner Private Offer Program (AWS CPPO). Through this program, ExtraHop will work with leading security partners to deliver enterprise-class cloud security globally. The AWS CPPO Program was designed to bring together leading-edge cloud technologies with the experience and knowledge afforded by value-added resellers. AWS customers can now leverage the robust ExtraHop’s Reveal feature set supported by channel partners' deep domain expertise in cloud security architectures. The inside-out approach to cybersecurity coupled with leading technologies like ExtraHop Reveal proactively gives its clients the robust detection and investigation capabilities they require to simplify their processes and optimize their people. Additionally, the AWS CPPO Program allows extending those capabilities easily across consultative and managed digital transformation engagements. Customers are offered the best-of-breed solutions to help them protect their applications and data wherever they reside.  Read More



[Interested in learning more about the network monitoring industry? Download our whitepaper: The Ultimate Guide to Network Monitoring today.]

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES