Bring your own device (BYOD) makes healthcare network and information security more difficult to maintain. Implementing a dynamic, strong security system can assist with HIPAA compliance and compensate for the challenges brought about by BYOD.
Security scanning of critical devices should be standard practice on networks, but what about other devices such as TAPs, Network Packet Brokers (NPB) and Bypass switches?
This article is the second in a multi-part series on the management of Taps and Network Packet Brokers. This chapter focuses on Fault Management including Detection, Correlation/Aggregation, Diagnosis/Isolation, Restoration, and Resolution.
Network Taps, in addition to being available for copper or fiber media, can be purchased in a fixed configuration, typically called “duplex Taps” – or as “Aggregation Taps.” The latter category offers options for how the data copies are distributed among the monitor ports. This article will clarify the differences between the two Tap types, as well as exploring the rationale for different Tap configurations, and examples of their applications.
When looking at some of the simpler network device types such as taps and network packet brokers there are a few factors involved in trying to determine which management system interfaces should be supported and to what extent.