Company expands its lineup with chassis-based switches with increased capacity. One has up to 576 ports that can handle 10 Gigabit Ethernet
Two years ago Netscout Systems brought out one of the first packet flow-based network monitoring switches, a modest fixed 24-port device.
This week the lineup expanded substantially with the addition of three chassis-type models, one of which can offer up to 576 ports that can handle 10 Gigabit Ethernet traffic, or 48 ports that can take 40 GbE traffic.
“It’s a significant expansion of our position in network monitoring,” said Steve Shalita, Netscout’s vice-president of marketing.
“We’re significantly leapfrogging the vendors that are in the market today with much higher density, performance, feature capability and manageability.”
Those competitors include products from companies such as Gigamon, Ixia, Apcon and Net Optics
Unlike the earlier 1500 model that came out in 2011, the 3900 is a data-class module switch, Shalita said, with a unified management that supports large distributed environments in enterprises.
One of the problems large organizations face is scaling access to network traffic for a growing number performance management, application management and security tools. There’s only so many network connections, he argues.
Also the shift from 1 Gbps to 10 Gbps traffic raises the possibility of having to replace tools that are limited to 1 GB. A network monitoring switch can scale those connections, Shalita said, either by load balancing or conditioning traffic.
As a result, the network monitor becomes what he called a “middleware network layer.”
Zeus Kerravala, an industry analyst and principle at ZK Research agreed.
IDC Analyst Connection – Unified Threat Management: Benefits of an Integrated Approach to Network Security
This IDC Analyst Connection looks at the the benefits of using a UTM platform integrated with network connectivity and how it will save the enterprise money, reduce the number of vendors' products needed to be purchased, improve the communications between devices, offer the opportunity for organizations to deploy more sophisticated capabilities, and vastly improve security.