Remove Firewall Remove Metrics Remove WAN
article thumbnail

New Innovations in PAN-OS 9.1: SD-WAN and More

Palo Alto Networks

At Palo Alto Networks, we have always believed in bringing integrated innovations to market with our Next-Generation Firewall. PAN-OS 9.1 , the latest release of the software that powers our Next-Generation Firewalls, continues that tradition. . SD-WAN for comprehensive branch security. SD-WAN for Comprehensive Branch Security.

WAN 19
article thumbnail

A Critical Piece of Your SD-WAN Visibility

Kentik

SD-WAN, one of the most disruptive network technologies of the past few years, has a fast rate of adoption. Enterprises adopting SD-WAN are driven by key factors such as WAN cost savings, application performance improvement, management and operation simplification, and more. SD-WAN Visibility from Kentik.

WAN 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Network Also Needs to be Observable, Part 2: Network Telemetry Sources

Kentik

We see these DevOps teams unifying logs, metrics, and traces into systems that can answer critical questions to support great operations and improved revenue flow. Traditional WAN : WAN access switches, integrated services routers, cloud access routers. Wireless access points and controller.

Network 128
article thumbnail

Announcing Complete Azure Observability for Kentik Cloud

Kentik

Kentik customers move workloads to (and from) multiple clouds, integrate existing hybrid applications with new cloud services, migrate to Virtual WAN to secure private network traffic, and make on-premises data and applications redundant to multiple clouds – or cloud data and applications redundant to the data center.

Azure 105
article thumbnail

Going Beyond the (Net)Flow: Introducing Universal Data Records

Kentik

UDRs for the Firewall. Most recently, UDRs allowed us to add visibility into firewalls, including Cisco ASA and others. Firewalls can carry deep insights into network traffic based on their ability to perform deep packet inspection and authentication, and add attributes (such as user names and application types) to flow data.

.Net 85
article thumbnail

Practical Steps for Enhancing Reliability in Cloud Networks - Part I

Kentik

When evaluating solutions, whether to internal problems or those of our customers, I like to keep the core metrics fairly simple: will this reduce costs, increase performance, or improve the network’s reliability? It’s often taken for granted by network specialists that there is a trade-off among these three facets.

Network 104
article thumbnail

Strategies for Managing Network Traffic from a Remote Workforce

Kentik

This could mean the users are saturating the internet connectivity or that they’ve saturated the LAN (or maybe WAN). The richest data sources are from the VPN devices or firewalls. We also collect interface details and metrics using SNMP. Most often these devices can export NetFlow (or related flow types) or Syslog.

Network 69