Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

The dangers within: What’s hiding in your network?

By Barb Rigel
network security-freepik
August 9, 2021

How shocking would it be to learn that a dangerous intruder has been hiding inside your home for six months?

To make matters worse, you only find out after your neighbor tells you. What? That’s not only scary and more than just a little creepy; it’s hard even to imagine.

Yet, that is precisely what happens in many security breaches. The Ponemon Institute’s 2020 Cost of a Data Breach Report shows that it takes organizations on average 206 days to identify a breach and another 73 days to contain it. Unfortunately, many companies find out about a security breach from someone outside the organization, such as a customer, partner, or law enforcement. 

Malware, viruses, and trojans can sneak into your network and go undetected by your security tools. Cybercriminals know that many enterprises cannot effectively monitor and inspect all SSL traffic, especially at scale as traffic increases. They’re banking on it, and too often, they win that bet. When security tools identify potential threats in the network, it’s not uncommon for IT and SecOps teams to experience ‘alert fatigue’ - something experienced by more than 80% of IT staff. Sumo Logic research reports that 56% of companies with more than 10,000 employees receive more than 1,000 security alerts every day, and 93% say they cannot address all alerts the same day. Cybercriminals are also aware of alert fatigue and count on IT to ignore many security alerts. 

So, what can you do? 

Solving the problem with inline security

Effective security monitoring requires end-to-end visibility into traffic across all network links, including virtual and encrypted traffic - without dropping data packets. Today, you have more traffic to monitor than ever. Globalization, the IoT, cloud, virtualization and mobile devices are forcing companies to extend their network edge, often to places that are hard to monitor, which can cause vulnerable, blind spots. The larger and more complex your network, the better chance you’ll experience network blind spots. Like a dark alley, these blind spots provide a place for threats to go unnoticed until it’s too late.

The best way to address risks and eliminate dangerous blind spots is to create an inline security architecture to immediately inspect and stop bad traffic before it ever enters your production network.

A robust visibility solution is the foundation of your security architecture since you need to quickly inspect the massive amount of data crossing your network to identify and filter packets for further analysis.

A network packet broker (NPB) is a critical component of an inline security architecture. The NPB is a device that optimizes traffic flow between a network tap or SPAN port and your network monitoring and security tools. A NPB sits between bypass switches and inline security appliances and adds another valuable layer of data visibility to your security architecture.

All packet brokers are not the same, so choosing the right one for optimal performance and security is essential. NPBs utilizing field-programmable gate array (FPGA) hardware accelerate the packet processing capabilities of the NPB and deliver full line-rate performance with a single module. Many NPBs require additional modules to achieve this performance level, increasing the total cost of ownership (TCO). 

It is also essential to choose an NPB that provides intelligent visibility and contextual awareness. Advanced capabilities include aggregation, deduplication, load balancing, data masking, packet trimming, geolocation and tagging. With an increasing number of threats entering networks through encrypted data packets, also choose a NPB that can decrypt and quickly inspect all SSL/TLS traffic. Packet brokers can offload decryption from your security tools which reduces investment in high-value resources. An NPB should also be able to run all advanced capabilities simultaneously. Some NPBs force you to pick and choose features you can use on a single module which leads to investment in more hardware to fully utilize the capability of the NPB. 

Think of a NPB as a go-between that helps your security appliances connect seamlessly and safely to ensure that they do not cause network failures. NPBs reduce the load on your tools, remove blind spots and help improve mean time to repair (MTTR) with faster troubleshooting.

While an inline security architecture may not defend against all threats, it will provide a clear vision and secure data access. Data is the lifeblood of your network, and sending the wrong data to your tools or, worse, missing data entirely because of dropped packets can leave you feeling safe and protected when you are not.

KEYWORDS: cyber security incident response risk management security alerts

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Barb Rigel is Senior Manager of Network Visibility at Keysight Technologies.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cybersecurity-trends-fp1170.jpg

    Cybersecurity blind spots: The risks hiding in your own IT environment

    See More
  • Gaps in Cybersecurity Programs

    The risky door that telecommuting can open to your network

    See More
  • SEC0520-edu-Feat-slide1_900px

    The 5-Step Guide to Making AI Work within your Cybersecurity Strategy

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing