No advertisement (unfortunately, vendor doesn't pay me for it :) )
but for technology review only: one more IXIA solution analysis.
There is some device provided for enterprise network implementation. It's' topological place may be external side of the network between corporate and the Internet, and the internal one behind the enterprise information security infrastructure. ThreatArmor protection is based on IP-addresses traffic filtering by source from the Internet and by destination from internal hosts.
It is a picture of TreatArmor-protected corporate network architecture.
Enterprise is on the left side and Internet is on the right one.
There is some device provided for enterprise network implementation. It's' topological place may be external side of the network between corporate and the Internet, and the internal one behind the enterprise information security infrastructure. ThreatArmor protection is based on IP-addresses traffic filtering by source from the Internet and by destination from internal hosts.
It is a picture of TreatArmor-protected corporate network architecture.