Upcoming Events

A Network Computing Webcast:
SSDs and New Storage Options in the Data Center

March 13, 2013
11:00 AM PT / 2:00 PM ET

Solid state is showing up at every level of the storage stack -- as a memory cache, an auxiliary storage tier for hot data that's automatically shuttled between flash and mechanical disk, even as dedicated primary storage, so-called Tier 0. But if funds are limited, where should you use solid state to get the best bang for the buck? In this Network Computing webcast, we'll discuss various deployment options.

Register Now!


Interop Las Vegas 2013
May 6-10, 2013
Mandalay Bay Conference Center
Las Vegas

Attend Interop Las Vegas 2013 and get access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest tech.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Smart Taps Define Future of Network Intelligence

Knowing who is doing what, from where and when has become one of the core tenants of network security and performance monitoring. Simply put, it comes down to situational awareness--the ability for IT managers to see the big picture surrounding network traffic and usage.

IT professionals have turned to a variety of technologies over the years to accomplish the lofty goal of understanding and securing network traffic. However, many of the technologies to date have proved lacking in one area or another.

Although not new, the latest technology on the scene to make a dramatic impact on network monitoring abilities is the smart tap, a technology that plugs into the network to provide strategic, persistent monitoring. This capability is proving to be more important than ever when it comes to monitoring traffic across networks, clouds and mobile knowledge workers.

Network taps are commonly used for network intrusion detection systems, VoIP recording, network probes, RMON probes, packet sniffers, and other monitoring and collection devices and software that require access to a network segment. Taps are used in security applications because they are non-obtrusive, are not detectable on the network (having no physical or logical address), can deal with full-duplex and non-shared networks, and will usually pass through traffic even if the tap stops working or loses power.

"Smart taps are replacing traditional taps and span ports because they are much more capable and can address a variety of different situations more effectively" says Chris Mac-Stoker, distinguished engineer, Niksun. "Smart taps offer the ability to slice and filter traffic into manageable chunks, without losing any of the payload" he adds.

Mac-Stoker speaks from experience. His tenure with Niksun, a network forensics security vendor, has exposed him to a wide variety of data capturing technologies. "The debate between tap technology and span ports for data capture has been going on for some 15 years," he says. "Span ports have a critical weakness, if the host switch is experiencing high traffic, the span port may lose packets. On the other hand, traditional taps created other problems, such as being a single point of failure in a network or overloading connected analytics devices with excessive traffic."


Page:  1 | 23  | Next Page »


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
IaaS Providers
Cloud Computing Comparison
With 17 top vendors and features matrixes covering more than 60 decision points, this is your one-stop shop for an IaaS shortlist.
IaaS Providers

Next Gen Network Reports

Premium Content

Research and Reports

The Virtual Network
February 2013

Network Computing: February 2013

Upcoming Events



TechWeb Careers