To SPAN or Not to SPAN

Whether you’ve been in the IT, Network Monitoring, or Network Security industries for a short period or for a long period, you’ve probably been asked, “To SPAN or Not to SPAN?" Today’s your lucky day because you will learn how to best answer this question both for yourself and for the next time a colleague or prospect asks…

It's a Wrap: City of Angels' Data Connectors!

By now, hopefully you've been following us at a series of recent security conferences called Data Connectors. No worries if you haven't — the spiel is quick! Data Connectors is a series of regional events where local Network (and security) Nerds have a chance to learn about the latest trends in the cybersecurity and network…

On the 12th Day of Network Visibility, I Improved the Internet

I took a seminar taught by a retired U.S. Army Command Sergeant Major with a PhD in Organizational Psychology. Talk to anyone who knows about the U.S. military and they will tell you that it is the Sergeants that actually run the Army and before he retired, this guy had held the highest possible enlisted rank. His experience…

Join us at MWC17 in Barcelona!

Niagara Networks will be attending the Mobile World Congress event in Barcelona from 27th of February through 2nd of March. We welcome the opportunity to meet with you and get involved with the biggest players of the mobile market.  

On Day 11, I Created a New Vision: Network Visibility Everywhere

When the founders of Gigamon first described their, as they called it, Data Access Switch, a lot of observers (including myself) thought it was a clever idea. We also thought it would be strictly a niche use case, likely to be absorbed into the incumbent vendors’ existing switch/routing product lines.

A Frozen View from PDX's Data Connectors

Last week, we showcased our latest Network Visibility capabilities at the Portland Data Connectors conference. Determined people from far and wide braved the harsh elements and three feet of snow — some in search of fortifying their Network Security and Visibility, while others simply looking for the latest scoop on disruptive…

On the 10th Day of Network Visibility, I Reinvented the Internet

The Internet carries with it many problems, and over the decades, a large number of people have discussed reinventing the Internet. Some of these efforts have had a significant impact on the networking world. For example, IPv6 was created to solve the problem with the growth in Internet-connected computers and other devices,…

On the 9th Day of Network Visibility, I Learned That the Internet Was Designed to Be Secure

Every couple of years, the media is full of articles, conference discussions, and blog posts about reinventing the internet. There are some valid reasons for these conversations. However, the one that I hear often is the one that offers the vaguest explanation: “The internet wasn’t designed for today’s scale”, meaning that…

On Day 8 of Network Visibility, I Discovered My First Spam

In the 1970s, I worked for Honeywell Information Systems in technical marketing for the Multics operating system. Some of you may have heard about the system or studied it in college. It was a collaboration among AT&T Bell Laboratories, GE’s computer business (subsequently acquired by Honeywell) and MIT, with funding from…

On Day 7 of Network Visibility, I Learned about Bandwidth, Latency, WAN & LAN

One of the healthy things about the Software-Defined Networking (SDN) movement has been that WAN and LAN network engineers are finding common ground. When OpenFlow was introduced, some of its proponents advocated that it could be used to replace expensive, proprietary equipment pretty much everywhere in the network, including…

Day 6 of Network Visibility, I Discovered Cost, Profit, and the Speed of Light

When the legendary Admiral Grace Hopper would give a talk, she often would hand out pieces of a wire 11.8” in length, and educate her audience about the time it took electrons to traverse the length of the wire: 1/1,000,000,000 of a second, or, to round off a bit, electrons travel about one foot every nanosecond. In other…

Day 5: A Sixth Reason Why a Network TAP is Better Than a SPAN Port

Back on October 6, 2016, one of my colleagues at Niagara wrote a post about the five reasons a Network TAP is better than a SPAN port. There is at least one other good reason. To explain it, I’ll start with a quote from a former CTO turned venture capitalist who once told me, “You have to be sane enough to know you are…

On the 4th Day of Network Visibility, I Discovered SDN

If you were to ask longtime telecom industry experts where Software-Defined Networking (SDN) originated, they might be quick to answer that the concept of controlling networks from a management console has literally been going on for decades in large telecommunication network environments. But that’s not the only valid…

On Day 3, I Discovered All Things You Can Do with Network Visibility

Monitoring employees in the workplace is a sensitive topic because it touches on employee policies and an individual’s right to privacy, both of which often come with legal implications. But in certain situations, employee monitoring is a necessary tool to ensure that employees are engaging in appropriate and responsible…

On the 2nd Day of Network Visibility, I Adopted a Password Manager

There are still a couple of weeks to go, but in the realm of computing technology, I already know what this year’s biggest impact has been on my personal computing security, cyber security, and my peace of mind. I finally adopted password security by using a password manager. I must confess, I’m a testimony to the old saying,…

On the 1st Day of Network Visibility, I Got Hacked

On Wednesday, December 14, 2016, Yahoo announced that 1 billion user accounts were hacked in 2013 by what they said was a “state-sponsored” attacker. If, like me, you presumed that this was merely an update on the breach that Yahoo announced back in September of this year, then I suggest you keep reading this post.

Highlights from Recent Data Connectors

You may be wondering... what the heck is a Data Connectors? Let me help you picture it. Imagine you're in a hotel ballroom with over 200 people just like you (super smart and cool IT professionals), and get to learn about the newest topics in the industry, while meeting all the exciting vendors that can actually help you…

5 Tips to Maximize ROI in Next-Gen Network Visibility Platforms

As communication networks, the internet in particular, continue to evolve, enterprises must adopt new and efficient technologies, such as cloud computing and virtualization, to improve their networks’ monitoring, security, and overall network visibility. Network visibility has been the cause of many headaches over the years,…

This Thanksgiving, Be Thankful for Network Security

I was thinking about where I want to go shopping this year on Black Friday to get the best sales of the season, when I realized, there’s a lot more to this retail madness that I never even thought to consider. Black Friday & Cyber Monday Shopping. With Thanksgiving fast approaching, many of us are getting excited for some…

The Key in Network Security Asymmetry (INFOGRAPHIC)

We all know that securing a business network is not an easy task. However, this is becoming a more prominent challenge due to the growth of Wi-Fi hotspots, mobile device subscribers,  cloud applications, and software-defined networks. Did you know that there were 1.9 billion records compromised daily in 2015 alone? Now…

Highlights of the Year

As it's getting close to the end of the year, we wanted to keep you avid readers updated on some of the things we've been up to lately! Recent accomplishments include our 100Gb Modular Network Packet Broker, our Network Operating Software Edition (NOSE), and our new Support Center! You can visit our recent newsletter here,…

Which ghosts are lurking in the corners of your Network?

In the spirit of Halloween, people are watching horror movies, trick or treating, dressing up in scary costumes, and it may not be easy to tell who someone is or supposed to be. The same thing goes for Networks - sometimes you don’t know if you’re being attacked or what ghosts may be creeping up on you. Network Engineers…

That Which Doesn't Kill our Internet Makes us Stronger

I could go on and on talking about the DDoS (distributed denial of service) attack that happened last Thursday. But, if you work in IT, you probably are already weary from being pulled into meetings, or being tasked to write a carefully worded email or prepare some slides for executive row to address the obvious questions,…

5 Reasons to Use a Network Packet Broker

Over the last decade, Network Management has become an immensely important issue for enterprises to handle due to ever increasing speeds and the complexity of network architectures. Moreover, factors such as data center monitoring, virtualization and cloud computing have prompted companies to enhance network monitoring…

Five Reasons a Network TAP is Better than a SPAN Port

I’m sure you’re already aware of the battle between the Network TAP and the SPAN port for network monitoring purposes. Both of these serve the function of mirroring traffic on your network and sending it to out-of-band security tools such as intrusion detection systems, network recorders, or network analyzers.

We’re in Washington D.C. this Thursday!

Niagara Networks will be at one of the must-attend security events on Thursday, September 1st in Washington D.C. We welcome the opportunity to meet with you at the Washington D.C. Data Connectors conference and discuss our Next-Generation Network Visibility solutions from 1Gb all the way to 100Gb.

Niagara Networks from A to Z

We have actually been engineering and selling Network Visibility products to end customers for monitoring and network security deployments for about six years. Our portfolio offers users a broad choice of product including Network Packet Brokers (NPBs), Network TAPs, and Bypass Switches." -Ben Askarinam, CEO

The Past, Present, and Future of Network Packet Brokers

It was a critical time in the evolution of Ethernet networks. Gigabit Ethernet was just beginning to transition from a few high-cost uplink ports, to being used for the mid-2000s era of inexpensive rackmount servers. In the highest performance servers, even 10 Gigabit Ethernet was being deployed. Niagara’s Packet Brokers…

What is a Network Bypass Switch?

A network bypass switch is a hardware device, typically in a 1U form factor, which provides fail-over or fail-safe capabilities for an inline networking appliance. In this article, we will provide an overview of the functionality and use cases for the network bypass, while focusing mainly on the Intelligent Network Bypass…

Niagara Networks, The Next-Generation Network Visibility Company