Choose a country or area to see content specific to your location
白皮书
When it comes to data monitoring, ensuring proper access to network data is the most critical thing you can do. Everything else, data filtering and the conversion of data into actionable information, are all dependent on that initial data being correct and relevant. If this practice is ignored, you can, and will, end up realizing the well-known adage – “Garbage In equals Garbage Out”. This white paper is designed to be a generic guide to help assist you in optimizing the access layer of your Visibility Architecture so you can capture that correct information.
As you can see in Figure 1, there are three different frameworks that can be incorporated into a visibility architecture: the access framework, the out-of-band visibility framework, and the inline security framework. These three frameworks take the raw data from the network and manipulate it as necessary to get the appropriate data to the correct monitoring and analysis tool(s).
The access layer framework is naturally focused on creating access to network data. This is the base framework that then feeds data to packet brokers in either the out-of-band visibility or inline security frameworks where these data points can then be manipulated before being sent on to the appropriate monitoring tools.
解锁内容
免费注册
*Indicates required field
感谢您!
您的表格已成功提交
Note: Clearing your browser cache will reset your access. To regain access to the content, simply sign up again.
×
请销售人员联系我。
*Indicates required field
感谢您!
A sales representative will contact you soon.