Big Monitoring Fabric Inline Customer Fact
We were using inline tools directly inline (using bypass TAPs) for DMZ security before deploying Big Mon Inline.
This data was sourced directly from a verified user of Big Switch Networks by TechValidate.
TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.