Smart Data Filtering

An integral part of our Network Visibility solutions, Smart Data Filtering (SDT) extends the intelligence and value of our Network Visibility solutions by enhancing monitoring infrastructure and improving tool performance. A range of applications are available to optimize the traffic sent from your network to the tools you rely upon to monitor, manage, and secure that network. SDT’s advanced processing engine can be accessed anywhere within the Visibility Fabric without a port- or card-based restrictions and its engines can be combined to process higher traffic loads and optimized for specific applications. Operations can be combined or service chained so traffic benefits from multiple functions that can be achieved at once, such as generating NetFlow or SSL after duplicates have been removed, or by stripping VLAN headers before load balancing the traffic and sending it out to the tools.

Network monitoring tools perform more efficiently by eliminating unwanted content with the de-duplication and packet slicing features. SSL decryption provides visibility into encrypted sessions, sending decrypted packets to out-of-band monitoring tools. Masking allows network security teams to hide confidential information such as passwords, financial accounts, or medical data, allowing companies to meet SOX, HIPAA and PCI compliance regulations. Organizations can improve accuracy with the source port labeling and time stamping capabilities, which allow the addition of source or timing information at the point of collection. Enhanced packet distribution features available with Adaptive Packet Filtering or load balancing enable enhanced visibility into packet contents and, when combined with header stripping, allow tools to operate more effectively by removing unwanted protocol headers.

The advanced processing capabilities of its engine can also be leveraged to summarize and generate NetFlow statistics from incoming traffic streams. Offloading NetFlow Generation to the out-of-band Visibility Fabric eliminates the risk of expending expensive production network resources in generating those analytics. Enhanced flow-level visibility across remote locations and Big Data environments can be used to derive usage patterns, top talkers, top applications, and more, for effective capacity planning and enforcing security policies.

Powered by: