Optimize Your Network with Our Unique Disaggregation Approach
CGS Tower Networks optimizes cyber security, Big Data analytics, and monitoring applications deployed on both physical and virtual platforms, by eliminating network blind spots and reducing data overloads. CGS’s disaggregation approach revolutionizes the network visibility market with the most modern, scalable, and powerful network packet brokers, resulting in superior network visibility and compelling TCO.
CGS Tower Networks was founded in 2014 and is managed by industry leaders with a track record of success in introducing innovative and superior products and services to the market. Our committed team has vast experience in research and development of networking solutions, overcoming technical challenges and maintaining flexibility and creativity required to meet every customer need.
CGS Tower Networks products were originally designed in a modular and scalable way that leverages industry-leading hardware platforms, for delivering superior performance, reliability, scalability and TCO.
Product Type
· Traffic diversion, seperation and replication
· Virtual machine traffic replication
· Large traffic 100% no packet loss
· Filter, divert, and deduplicate packets before traffic output
· Seventh layer flow extraction Metadata
· Traffic 1:1 transfer to IPFIX/Netflow
· Tool Service Chain
· Packet slice, ERSPAN termination
· GRE channel transmission, termination
· Sensitive data masking
· Dynamic load balancing to prevent large flow filling analysis tools and packet loss happens
DLB vs Traditional LB People often ask themselves if they need to move forward to the latest technology, even when traffic load and ports type or rate difference is minor ?
This movie emphasis a major advantage brought by the Trident 3 family of devices, Dynamic Load Balancer (DLB)
The DLB allows to mitigate unbalanced hash distribution load of flows preventing overload and loss of traffic
The use of DLB in Network Packet Brokers protects the functionality of Cyber security and monitoring tools from loosing continuity of flow data, and when such cases are identified, new flows are "shifted" from overloaded output ports and their "shift"/Re-hash decision is maintained till the end of those flows
2 more advantages coming with the DLB are:
1. Graceful shutdown
2. Hitless grow of output ports to the LB group without re-hash of flows
Please contact us for more information about NPB Ie8, and NPB IIe (Trident 3 based)
Tera-Pro™ Manager is a centralized management system, a single pane of glass which provides users with a holistic view of the devices across the network topology and helps them configure, monitor, manage and operate the Network Visibility deployment.
The centralized Tera-Pro™ Manager software enhances the productivity of network operations and DevOps teams and helps them maximize the ROI from the network visibility equipment in their organization.
Tera-Pro™ Manager enables auto discovery and management of hundreds of virtual and physical Network Packet Brokers. It collects network statistics and traffic telemetry stored in elastic databases and displayed with real-time graphic visualization utilizing Kibana and Grafana dashboards. Alarms and events from managed devices trigger email notifications from the Tera-Pro™, and users can define different events and triggers per device according to cross devices events.
Network Microbursts are spikes in network traffic that are created when a significant amount of data is delivered within an extremely short time causing network congestions and packet loss. This happens more often on networks of Finance, Teleco and e-Commerce/ISP.
Large or frequent Microbursts cause network buffers to overflow, and packets to be discarded, resulting in essential data loss and blind spots. Such scenarios limit the performance of Cyber Security and monitoring Tools and jeopardize the ability of Tools to identify cyber-attacks.
CYBERSEC 2023 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy .