• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure

The Critical Role of Visibility in Next-Generation Networks – Part II

Diving into how network TAPs and Packet Brokers harvest the critical network traffic data IT teams rely on to feed a wide array of networking and security solutions.

February 11, 2019 Alastair Hartrup 2 Comments

In Part I of this series, we reviewed some of the major networking challenges organizations face as new technologies like SD-WAN and IoT begin to proliferate networks. In Part II, we’ll dive into how network TAPs and Packet Brokers harvest the critical network traffic data IT teams rely on to feed a wide array of networking and security solutions. This data enables them to gain the visibility necessary to maintain network performance, prevent security breaches and support overall business objectives.

What is a Packet Broker?

So, how does it all work? To answer that question, let’s look at a packet broker in more detail.

At a high level, TAPs and Packet Brokers connect to network links in-line, make a mirror copy of the traffic and pass it to another appliance that performs analytic or other specific tasks. As networks are constantly growing in complexity, size and speed, the need for a variety of high-performance security and diagnostic tools increases. The problem then becomes how to efficiently and economically connect and provide relevant visibility to all of these appliances at ever-increasing speeds and varying physical media without compromising network availability and reliability.

The ‘Broker’ in network packet broker refers to the solution’s ability to combine, integrate, separate, manipulate and process network data inputs from a wide variety of sources, delivering traffic to a wide variety of appliance and tool destinations. Delivering the right data to the right tool at the right time is one of the most important elements when working to optimize network security and performance.

The Visibility Architecture – TAPs

So far, we’ve focused on brokering a variety of network tools for maximum efficiency – the role of the packet broker. In-line connectivity, however, must be achieved through a network TAP.

A TAP is deployed in-line on network links and feeds the data to the packet broker. Network tools are then connected to the Packet Broker ports where live data passes through the TAP and back into the network with negligible delay. The TAP then makes a copy of the data and sends it to the packet, which processes and directs the traffic to the relevant network and/or security tools.

The TAP also provides fail-safe technology to protect live network data from power failure. If the TAP loses power, the live network traffic will still pass through it, keeping the network links active. This network fail-safe feature is the primary reason why TAPs must be used as the initial point of connection to a live network link.

It’s important to note that TAPs feed data to packet brokers directly, not to network and security tools. After receiving TAP data, a packet broker will provide the necessary traffic management features before delivering the appropriate data to the appropriate tools. When considering the overall visibility deployment architecture, the safest and most efficient plan is to utilize simple TAPs in front of feature-rich, advanced packet brokers.

Alastair Hartrup is the CEO and founder of Network Critical, a company that provides industry-leading network TAPs and Packet Brokers, which help organizations increase visibility across dynamic and complex networks. He founded Network Critical in 1997, and today more than 5,000 companies worldwide rely on its technology to help power the network and security monitoring tools needed to control changing infrastructure.

What Tools Are Packet Brokers Brokering?

Now that we’ve covered origin and path of critical data that ultimately provides granular visibility for network engineers and operators, let’s take a closer look at the networking and security tools that rely so heavily on it.

  • Network Performance Management and Analytics Products – More and more organizations are relying on Network Performance Management and Diagnostic (NPMD) solutions from vendors like LiveAction and Riverbed. These platforms allow network operations to gather comprehensive data sets and visualize performance across complex networks (which can be especially important as they roll out new SD-WANs). Probes and sniffers are also important tools to help network managers know what is going on in their network. Traffic can’t be managed if it can’t be seen and these products allow network managers to open packets, look for warning signs and diagnose problems (some NPMD solutions now include this functionality).
  • Performance Management Solutions – Problems do not exist solely on the network. Third-party applications provide services to network users and these applications provide great value to businesses, but can also provide great headaches to network managers. All applications do not act the same. Tools are needed to understand application response times and other metrics of application performance. Some of these tools are designed to accelerate application performance, increasing their value to the business and its’ customers.
  • Security Platforms – Companies like Darktrace, FireEye and WatchGuard Technologies provide appliances that help identify and block malware, detect and mitigate various network attacks and generally help managers keep up with the ever-growing menace of cybercrime. There are a wide variety of security appliances and each has unique advantages. Deploying a strong cybersecurity profile requires deployment of many of these specialized security tools. A Packet Broker helps to efficiently manage the type of traffic and the amount of traffic that flows to these critical components.
  • Cloud and Hybrid Network Tools – The are now plenty of solutions on the market designed to help businesses combine cloud networking, centralization of data, remote application management, storage caching and high-performance computing. As networks become more geographically diverse, more tools are required to maintain performance levels and manage remote information storage.

As you can see, in order to manage network performance and security effectively, IT teams at businesses around the world rely on granular network visibility into traffic processed and analyzed by a wide range of networking and security solutions. And network TAPS and packet brokers are the key to delivering the network packet data necessary to ensure that critical traffic streams can be effectively aggregated, filtered and load-balanced across multiple security and monitoring tools, delivering and enabling a more efficient, secure and resilient network – a next-generation network.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Internet, Internet of Things, Network Design

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Software License Spending, SaaS, cloud apps Your Guide to Choosing the Best Cloud Security…
  • IT Budget 2025 Budgeting Tips for IT Pros/CIOs in 2025
  • A close-up of a technician’s hands typing and navigating through troubleshooting steps on a computer in a well-lit office. , natural light, soft shadows, with copy space Five Ways to Reduce Desktop Support Troubleshooting Time

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Trackbacks

  1. Week in Review: Next-Gen Networks, Generation Z, Reverse Culture, etc. - My TechDecisions says:
    February 15, 2019 at 12:00 pm

    […] The Critical Role of Visibility in Next-Generation Networks – Part II […]

    Reply
  2. 7 Reasons Test Access Points Are Critical to Network Monitoring and Visibility - My TechDecisions says:
    May 15, 2019 at 12:18 pm

    […] traffic and properly distributing that data to the tools your business relies on is crucial for network visibility. That’s where the network Test Access Points (TAPs) come […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.