A network Load Balancer distributes network traffic across multiple network devices to avoid bottlenecks and inefficiency of the Cyber Security and Monitoring Tools.
CGS Tera-Pro™ Load Balancer has multiple advantages:
CGS Tera-Pro™ Load Balancer distributes incoming network traffic evenly across all available security and monitoring tools in the organization network. Enhancing the performance and availability of the tools.
Hash-Keys are used to distribute incoming traffic across the tools in a network. Each incoming request is assigned a hash key based on a specific criteria, the hash key is then used to determine which tool should handle the request. The use of hash keys ensures correctness and efficient implementation and enables a continuous flow of information regardless of the incoming data rates and the limitations of the tools to process the information.
Tools’ failure often causes network over- subscriptions and results in failure of the organization’s Cyber protection system. CGS Tera-Pro™ Load Balancer provides an extra level of redundancy and ensures high availability by defining redundant connection that will take into action in case of failure.
Dynamic load balancing algorithm continuously monitors the network and adjusts the distribution of traffic based on changing conditions ensuring that all network traffic is distributed evenly and efficiently across available resources.
Weighted Network Load Balancing (WNLB) allows to optimize network performance by assigning more priority to more powerful tools in the network and thus control the amount of traffic that is being handled by each tool.
CGS Tera-Pro™ uses hash-based traffic sorting, without additional physical interfaces in order to implement load balancing in the virtual space.