{"id":9017,"date":"2018-08-09T15:43:00","date_gmt":"2018-08-09T15:43:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/"},"modified":"2018-08-09T15:43:00","modified_gmt":"2018-08-09T15:43:00","slug":"the-rise-of-next-generation-network-packet-brokers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/","title":{"rendered":"The rise of next-generation network packet brokers"},"content":{"rendered":"<p>Network packet brokers (NPB) have played a key role in helping organizations manage their management and security tools. The tool space has exploded, and there is literally a tool for almost everything. Cybersecurity, probes, network performance management, forensics, application performance, and other tools have become highly specialized, causing companies to experience something called \u201ctool sprawl\u201d where connecting a large number of tools into the infrastructure creates a big complex mesh of connections.<\/p>\n<p>Ideally, every tool would receive information from every network device, enabling it to have a complete view of what\u2019s happening, who is accessing what, where they are coming in from, and when events occurred.<\/p>\n<aside class=\"fakesidebar\"><strong>[ Read also: <a href=\"https:\/\/www.networkworld.com\/article\/3252167\/lan-wan\/getting-grounded-in-intent-based-networking.html\">Getting grounded in intent-based networking<\/a> ]<\/strong><\/aside>\n<p>The problem with this is that managing an environment where everything connects to everything isn\u2019t realistic (see top image below). Enter the world of the network packet broker. These devices sit between the infrastructure and tools layer, so each tool plugs into the NPB once, as does each infrastructure element (bottom image). This greatly simplifies deployment and management of tools.<\/p>\n<h3 class=\"body\">Without a network packet broker<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/08\/top-npb-100767386-large.jpg\" border=\"0\" alt=\"top npb\" width=\"700\" height=\"412\" data-imageid=\"100767386\"\/><small class=\"credit\">Zeus Kerravala<\/small><\/p>\n<h3 class=\"body\">With a network packet broker<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/08\/bottom-npb-100767387-large.jpg\" border=\"0\" alt=\"bottom npb\" width=\"700\" height=\"404\" data-imageid=\"100767387\"\/><small class=\"credit\">Zeus Kerravala<\/small><\/p>\n<p>Also, adding new tools simply requires plugging into the NPB. Another benefit is that upgrades can be done easily, as the tool can be taken off line, the interface upgraded and plugged back in. This minimizes any disruption from the operations of the business.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id=\"\"\/>\n<h2>NPBs have gone through many evolutionary phases<\/h2>\n<p>Over time, NPBs have evolved in both their capabilities and their strategic value. The following are the different evolutionary phases for NPBs:<\/p>\n<ul>\n<li><strong>Terminal access point (TAP) aggregation:<\/strong> This should be considered table stakes for NPBs. Initially, NPBs were designed to receive information from a network and other devices, organize the data, and pass it along to each tool plugged into the NPB. The value of the NPB was to ensure that each tool received all the data from all the tools to avoid potential blind spots.<\/li>\n<\/ul>\n<ul>\n<li><strong>Intelligent TAP aggregation:<\/strong> Over time, NPBs evolved and became smarter and would apply some filtering capabilities to the data before sending it to the tools. Features such as de-duplication, intelligent filtering, and packet splicing were brought to NPBs. Also, an NPB had the intelligence to understand what data was coming in and what tool it was sending the information to. For example, email security tools only need to receive email. Without an intelligent NPB, all data would be sent to it, and it would need to filter the data and drop what it does not need. The value of intelligent TAP aggregation is that each tool receives only what data it needs to perform its function, which greatly reduces the amount of processing the tools have to do.<\/li>\n<\/ul>\n<ul>\n<li><strong>Security packet broker:<\/strong> As cybersecurity threats have evolved, so has the number of security tools. As this happened, NPBs developed security-specific capabilities to optimize the effectiveness of the security tools. One example is the pre-filtering capabilities brought into intelligent TAP aggregation. Another capability of security packet brokers is the ability to operate out of band so that the security tools can perform their task at line rate but not impact the performance of applications.<\/li>\n<\/ul>\n<p>The current crop of NPBs plays a critical role in enabling businesses to perform several functions, such as moving to a virtual network, upgrading the network, and cost-effectively adding more advanced tools. However, infrastructure evolution continues to march on, and now it\u2019s time for next-generation NPBs.<\/p>\n<h2>Understanding next-generation NPBs<\/h2>\n<p>Next-generation NPBs are designed to meet the needs of digital businesses. A good analogy to consider is the evolution of application delivery controllers (ADCs). They started as simple load balancers and then added advanced load-balancing capabilities to become ADCs. After several years, security and cloud capabilities were introduced, and the product category shifted to advanced ADCs. The same trend is happening with NPBs as they evolve to next-generation NPBs.<\/p>\n<aside id=\"fsb-2599\" class=\"fakesidebar fakesidebar-auto fakesidebar-sponsored\"><strong>[ <a href=\"https:\/\/pluralsight.pxf.io\/c\/321564\/424552\/7490?u=https%3A%2F%2Fwww.pluralsight.com%2Fpaths%2Fcertified-information-systems-security-professional-cisspr\" rel=\"nofollow\">Prepare to become a Certified Information Security Systems Professional with this comprehensive online course from PluralSight. Now offering a 10-day free trial!<\/a> ]<\/strong><\/aside>\n<p>Several vendors play in the NPB market today, but not all of them are equal. Most are basic products that offer the core set of features that every NPB should have today. These include:<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id=\"\"\/>\n<ul>\n<li>Data aggregation<\/li>\n<li>De-duplication<\/li>\n<li>Intelligent filtering<\/li>\n<li>Packet slicing<\/li>\n<li>Decapsulation<\/li>\n<li>Masking<\/li>\n<li>Intelligent redistribution<\/li>\n<\/ul>\n<p>A few vendors have stepped ahead of the rest of the field and offer products with capabilities that make it easier to deploy and upgrade tools, manage the end-to-end environment, understand user behavior, and help businesses protect themselves. This has driven the need for a new set of features. The below features define next-generation NPBs:<\/p>\n<ul>\n<li>Metadata engine<\/li>\n<li>SSL decryption<\/li>\n<li>Application session filtering<\/li>\n<li>Inline bypass<\/li>\n<\/ul>\n<h2>New form factors are required for next-generation NPBs<\/h2>\n<p>The form factor of NPBs also needs to change. A traditional NPB is a hardware appliance; these are still required when guaranteed performance is a must. However, this form factor must now be augmented by others that bring the functionality to cloud and virtual environments. This augmentation will enable organizations to extend the NPB functions to public, private and hybrid cloud environments, giving businesses true end-to-end visibility.<\/p>\n<h2>Don\u2019t forget about centralized management<\/h2>\n<p>As the number of NPBs expands, the ability to manage them as discrete entities becomes increasingly difficult. Centralized management capabilities will give IT professionals the ability to make a single change and then propagate it across every next-generation NPB at once. Lastly, automation and orchestration capabilities would allow changes to be made to the next-generation NPB when a business policy dictates without having to involve IT operations. Over time, automation, orchestration, and a closed-loop data exchange will give rise to the vision of intent-based operations for next-generation NPBs, where business policies will dictate configuration changes.<\/p>\n<p>The advanced capabilities of next-generation NPBs are critical to the success of digital organizations. If an organization wants to move quickly, the limited feature set and manual nature of operations in traditional NPBs will hold the business back. Next-generation NPBs modernize the packet broker and align it with current trends.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id=\"\"\/>\n<div class=\"end-note\">\n<div id=\"\" class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\">LinkedIn<\/a> to comment on topics that are top of mind.<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3295881\/lan-wan\/the-rise-of-next-generation-network-packet-brokers.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nNetwork packet brokers (NPB) have played a key role in helping organizations manage their management and security tools. The tool space has exploded, and there is literally a tool for almost everything. Cybersecurity, probes, network performance management, forensics, application performance, and other tools have become highly specialized, causing companies to experience something called \u201ctool sprawl\u201d where connecting a large number of tools into the infrastructure creates a big complex mesh of connections.Ideally, every tool would receive information from every network device, enabling it to have a complete view of what\u2019s happening, who is accessing what, where they are coming in from, and when events occurred.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":9018,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[806,762,307],"class_list":["post-9017","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-network-management","tag-networking","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The rise of next-generation network packet brokers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The rise of next-generation network packet brokers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-09T15:43:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/the-rise-of-next-generation-network-packet-brokers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The rise of next-generation network packet brokers\",\"datePublished\":\"2018-08-09T15:43:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/\"},\"wordCount\":1032,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/the-rise-of-next-generation-network-packet-brokers.jpg\",\"keywords\":[\"Network Management\",\"Networking\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/\",\"name\":\"The rise of next-generation network packet brokers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/the-rise-of-next-generation-network-packet-brokers.jpg\",\"datePublished\":\"2018-08-09T15:43:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/the-rise-of-next-generation-network-packet-brokers.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/the-rise-of-next-generation-network-packet-brokers.jpg\",\"width\":620,\"height\":413},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Management\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/network-management\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The rise of next-generation network packet brokers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The rise of next-generation network packet brokers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/","og_locale":"en_US","og_type":"article","og_title":"The rise of next-generation network packet brokers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-09T15:43:00+00:00","og_image":[{"width":620,"height":413,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/the-rise-of-next-generation-network-packet-brokers.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The rise of next-generation network packet brokers","datePublished":"2018-08-09T15:43:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/"},"wordCount":1032,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/the-rise-of-next-generation-network-packet-brokers.jpg","keywords":["Network Management","Networking","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/","url":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/","name":"The rise of next-generation network packet brokers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/the-rise-of-next-generation-network-packet-brokers.jpg","datePublished":"2018-08-09T15:43:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/the-rise-of-next-generation-network-packet-brokers.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/the-rise-of-next-generation-network-packet-brokers.jpg","width":620,"height":413},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-rise-of-next-generation-network-packet-brokers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Network Management","item":"https:\/\/www.threatshub.org\/blog\/tag\/network-management\/"},{"@type":"ListItem","position":3,"name":"The rise of next-generation network packet brokers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/9017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=9017"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/9017\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/9018"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=9017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=9017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=9017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}