This document discusses how to select a security visibility solution and outlines key considerations. It begins by highlighting the evolving security threat landscape and need for optimized packet flow. A packet flow switch is presented as an appliance that can optimize packet flow to centralized security and monitoring tools. Key questions are outlined to evaluate a solution's performance, scalability, inline security support, health checks, tool chaining abilities. A case study demonstrates how a packet flow switching solution provided complete visibility across a private cloud. The document emphasizes selecting a solution that supports existing security investments while enabling simplification and performance assurance.