Premium Content

Access "Combining NetFlow and packet analysis boosts network visibility"

Shamus McGillicuddy, News Director Published: 10 Oct 2012

Now that Blue Cross Blue Shield of Minnesota relies on Software as a Service (SaaS) for core business processes like administering claims, network performance engineer Barry Pieper relies on deep packet analysis to tap inbound and outbound Internet traffic in order to ensure his providers are delivering on their service-level agreements (SLAs). But it wouldn’t be worth using costly deep packet inspection for all of his network monitoring needs, so Pieper still turns to good old fashioned NetFlow analysis for a broader view of what’s happening on the network. Combined, Pieper uses a Network Instruments Gigastor appliance for packet capture, Compuware’s Van­tage network monitoring product— recently rebranded as Gomez Net­work Performance Monitoring—for analysis of that packet information, and then Fluke Networks’ Optiview NetFlow Tracker for NetFlow. “I use NetFlow a lot on our wide area network mainly because it works so well there,” he said. “Our branch offices are T1 and T3 links, so we would do software distributions with Altiris or Tivoli and that would ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • How to manage and monitor the converged network
    modern_converged_network.png
    E-Handbook

    The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...

  • What does WebRTC video mean for the network?
    net_evo_0914.png
    E-Zine

    WebRTC, an emerging standard for embedding voice and video-conferencing applications into Web browsers, is aimed at making real-time communications ...

  • Context makes network security policy smarter, but not easier
    network_evo_0814.jpg
    E-Zine

    Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...