|Place of Origin:||China|
|Certification:||CCC, CE, RoHS|
|Minimum Order Quantity:||1 SET|
|Packaging Details:||Outer Carton plus Inner Foam|
|Delivery Time:||1-3 Working Days|
|Payment Terms:||L/C, D/A, D/P, T/T, Western Union, MoneyGram|
|Supply Ability:||100 sets per month|
|NPB Value:||Capturing, Aggregating, Filtering, And Delivering Data||Network Nodes:||Physical Virtual And Cloud|
|SSL Decryption:||Forwarding Private Encryption Information||NPB Benefit:||High Performance Architecture|
|Application:||Deliver The Right Packet To Right Tools||NetTAP® Technology:||Data Masking, Filtering, Deduplication, Slicing, Etc.|
NetTAP® Network Visibility Total Solution for Network Packet Broker
Network Packet Broker is a device that Capture, Replicate and Aggreate the inline or out of band Network Data Traffic without Packet Loss as "Packet Broker",
manage and deliver the Right Packet to Right Tools like IDS, AMP, NPM, Monitoring and Analysis System as "Packet Carrier".
- Redundant packet deduplication
- SSL decryption
- The header stripping
- Application and threat intelligence
- Application of monitoring
- The benefits of NPB
- Obtain more comprehensive and accurate data for better decision-making
- Tighter security
- Solve problems faster
- Improve initiative
- Better return on investment
Network of Before
- Gigabit as the backbone network, 100M to the desktop
- Business applications are mainly based on c-s architecture
- The operation & maintenance mainly depend on network management system
- Security construction is based on basic access control
- IT system low, operation, maintenance and security only can meet the needs
- Data security is only just reflected in the physical security, backup part
NetTAP® To Help You To Manage Your Network Now
- More application for 25G/50G/100G, bandwidth crazy growing
- Virtualized cloud computing drives both north-south and east-west traffic growth
- Main applications based on B/S architecture, with higher bandwidth requirements, more interaction open, and business changes faster
- Network operation and maintenance: single network management - network performance monitoring, network backtracking, anomaly monitoring - AIOPS
- More security management and control, such as IDS, DB Audit, Behavior Audit, Operation and Maintenance Audit, Data-oriented Management and Control, Virus Monitoring, WEB Protection, Compliance Analysis and Control
- Network Security – from Access control, Threat Detection and Protection to the core of Data Security
So, What can NPB do for you?
In theory, aggregating, filtering, and delivering data sounds simple.But in reality, smart NPB can perform very complex functions that generate exponentially increased efficiency and security benefits.
Load balancing is one of the functions.For example, if you upgrade your data center network from 1Gbps to 10Gbps, 40Gbps, or higher, NPB can slow down to distribute the high speed traffic to an existing set of 1G or 2G low speed analysis and monitoring tools.This not only extends the value of your current monitoring investment, but also avoids expensive upgrades when IT migrates.
Other powerful features that NPB performs include:
Redundant packet deduplication
Analysis and security tools support receiving a large number of duplicate packets forwarded from multiple distributors.NPB eliminates duplication to prevent the tool from wasting processing power when processing redundant data.
Secure sockets layer (SSL) encryption is a standard technique for securely sending private information.However, hackers can also hide malicious network threats in encrypted packets.
Checking this data must be decrypted, but shredding the code requires valuable processing power.Leading network packet agents can offload decryption from security tools to ensure overall visibility while reducing the burden on high-cost resources.
SSL decryption allows anyone with access to security and monitoring tools to see the data. NPB can block credit card or social security Numbers, protected health information (PHI), or other sensitive personally identifiable information (PII) before transmitting the information, so it is not disclosed to the tool or its administrators.
The header stripping
NPB can remove headers such as vlans, vxlans, and l3vpns, so tools that cannot handle these protocols can still receive and process packet data.Context-aware visibility helps identify malicious applications running on the network and the footprints left by attackers as they work in systems and networks.
Application and threat intelligence
Early detection of vulnerabilities can reduce loss of sensitive information and eventual vulnerability costs.The context-aware visibility provided by NPB can be used to expose intrusion metrics (IOC), identify the geographic location of attack vectors, and combat cryptographic threats.
Application intelligence extends beyond layer 2 to layer 4 (OSI model) of packet data to layer 7 (application layer).Rich data about users and application behavior and location can be created and exported to prevent application-level attacks in which malicious code masquerades as normal data and valid client requests.
Context-aware visibility helps to spot malicious applications running on your network and the footprints left by attackers as they work on systems and networks.
Application of monitoring
Application-aware visibility also has a profound impact on performance and management.You might want to know when an employee USES a cloud-based service like Dropbox or web-based email to bypass security policies and transfer company files, or when a former employee tried to access files using a cloud-based personal storage service.
The benefits of NPB
1- Easy to use and manage
2- Intelligence that removes team burdens
3- Loss-free - 100% reliable when running advanced features
4- High performance architecture
Contact Person: Jerry