Deploying an Inline Security Architecture: Key Considerations

Successful inline security monitoring is to enable traffic inspection and detection without impacting network and application availability. If one of your security tools becomes congested or fails, you need to keep traffic moving, continue monitoring, and prevent a network or application outage.

 

  • Deploy inline security appliances behind the firewall in a serial configuration, if appliance becomes congested or fails, traffic stops.
  • Redundant network paths can help avoid this, but they require twice the number of tools, for both paths to handle the full volume of traffic is expensive and leaves tools on the inactive path under- utilized during normal operations.
  • To address any issues, you can deploy an underlying security architecture that can ensure failsafe operation of key security appliances and solutions.

Download Whitepaper

*Required fields

Yes , I authorize Keysight Technologies to receive my personal contact details data for the purpose of sending Keysight Technologies information on products, services, and/or events. For more information, please view the Keysight Technologies privacy policy here: https://www.keysight.com/us/en/contact/privacy.html