RSS feed Get our RSS feed

News by Topic

network analysis

Results 1 - 25 of 68Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Jul 30, 2015
Attaining value
Tags : cisco, network management, network management, business practices, research analysis, branding, data management/analytics
     Cisco
By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
     Cisco
By: Gigamon     Published Date: Oct 19, 2017
Download the Forrester Total Economic Impact™ of Gigamon: Cost Savings and Business Benefits Enabled by Gigamon to see how customers benefit from comprehensive and scalable visibility across their networks. This study delves into a cost-benefit analysis of the Gigamon security delivery platform, network visibility and traffic monitoring solutions that enable companies to see what matters in order to meet their security objectives, increase productivity and keep hardware, software and personnel costs in check without affecting performance.
Tags : 
     Gigamon
By: Gigamon     Published Date: Oct 19, 2017
Read SC Magazine’s original research article Double Vision to learn how visibility deep into network activity and analysis of network traffic can show breaches before serious damage is done. While monitoring network traffic is hardly a new or unique technology, it is an excellent example of how visibility works. Constant vigilance of network activity is simply the best way to determine if any semblance of an attack still resides on your network. Download now!
Tags : 
     Gigamon
By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : data, non-malicious, malicious, ponemon, solera network
     Blue Coat Systems
By: Riverbed     Published Date: Jul 17, 2013
"Cascade Pilot Personal Edition is a powerful network analysis, visualization, and reporting tool specifically designed to enhance Wireshark. Because Cascade Pilot Personal Edition is fully integrated with Wireshark, it allows you to easily leverage your team's existing expertise, increasing efficiency in diagnosing your networking issues. Learn more
Tags : cascade pilot, network analysis, network
     Riverbed
By: Riverbed     Published Date: Jul 17, 2013
Riverbed® Cascade® Pilot and Cascade Shark combine sophisticated, end-to-end monitoring with high-speed,high-fidelity packet capture and analysis to deliver comprehensive network performance monitoring and analysis. By continuously recording the packets traversing the network, rich troubleshooting details are always available, accelerating problem isolation and resolution times, and increasing productivity. Download this insightful solution brief to learn more.
Tags : network performance, riverbed cascade pilot, cascade shark, it infrastructure
     Riverbed
By: Riverbed     Published Date: Jul 17, 2013
As a network manager, application manager or security manager, you need systems in place that can collect data across your WAN, continuously analyze the data to discover problems, and allow you to troubleshoot issues as soon as they occur. A packet capture and analysis solution is an essential part of your toolset, since it provides the most granular level of information and can help troubleshoot the toughest problems. Riverbed Cascade has fundamentally changed the economics of network performance management. Learn more..
Tags : network, troubleshooting, wan, network manager, network performance management
     Riverbed
By: Juniper Networks     Published Date: Oct 20, 2015
The SRX Series features a carrier-grade next-generation firewall with layered security services such as application security, unified threat management (UTM), integrated IPS, and advanced integrated threat intelligence to guard against cyber threats and malware.
Tags : juniper, network, srx, gateway, reliability analysis, firewall, threat management, storage
     Juniper Networks
By: HPE Network Virtualization     Published Date: Jan 05, 2016
It’s simple and free! Enter your website URL to execute the test and you will receive an email with your custom 20+ page results within minutes. The report will show you exactly what is impacting your user’s experience so you can optimize to insure you are delivering amazing apps.
Tags : 
     HPE Network Virtualization
By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
     Viavi Solutions
By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
     IBM
By: Vectra Networks     Published Date: Aug 03, 2015
Learn how Vectra empowers IT and security analysts with insights to stop attacks, even while they’re happening.
Tags : network security management, it security, intrusion prevention, security analysis, cyberattacks, cybercriminals, adaptive protection, intrusion prevention systems
     Vectra Networks
By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : security, advance threat detection, nav
     Trend Micro
By: ArborNetworks     Published Date: Sep 16, 2015
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.
Tags : security
     ArborNetworks
By: Emulex Corporation     Published Date: Nov 07, 2013
The status quo in network monitoring is no longer adequate for large organizations. It’s simply taking too long for enterprises with mission-critical networks to resolve and find the root causes of network incidents. To speed things up, enterprises must add dedicated incident response and root cause analysis capabilities that are 100% accurate and reliable to their network management arsenals. It takes so long to diagnose, fix, and eradicate network incidents that network uptime and performance are suffering. Because of this, organizations need to embrace incident response and root cause analysis capabilities to accelerate resolution times and avoid the network downtime and service degradation that can cost them thousands, if not millions, of dollars per minute. Download this Whitepaper for more information.
Tags : network monitoring, network visibility, technology, endace, best practices
     Emulex Corporation
By: FireEye     Published Date: Mar 05, 2014
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat, cybersecurity incidents have evolved at a rapid pace and are taking down entire networks, successfully stealing sensitive data and costing organizations millions to remediate. In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on: The top security threats for global organizations in 2013; The largest gaps in organization's detection and response to threats; How these gaps will be filled in the coming year - new staff, tools or services; What organizations must do to stay ahead of these advanced threats.
Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
     FireEye
By: Dassault Systèmes     Published Date: May 09, 2018
More connected, informed and demanding customers have the financial services sector looking closely at their processes and products. Collaborative digital platforms can transform your value network and approach. • Improve data insights: Transform legacy systems, manual processes and data silos for consumer-centric collaboration. • Compete with agile FinTech startups: Use disruptive technologies to meet clients’ changing needs. • Empower me to make my own decisions: Give self-directed customers exceptional experiences, like rapid enrolment and self-assessment tools. • Turn regulatory compliance to competitive advantage: Use digitization to improve compliance, reduce risk and enhance governance. • Improve customer experience through digitization: Reduce regulatory issues, gain insights, increase efficiency and customer-centric innovation. I invite you to download your targeted industry analysis and uncover the expectations to take into account at every stage to be disruptive in the age o
Tags : 
     Dassault Systèmes
By: Riverbed     Published Date: May 18, 2012
Data center consolidation and migration projects are fraught with risk. By using Network Behavior Analysis (NBA) systems to get a handle on dependency information, usage information, change impact information, and post-change problem identification, IT organizations can significantly reduce risk by automating and improving the planning process and minimizing disruption during implementation. Download this informative Riverbed white paper to learn more.
Tags : data center consolidation, migration, it infrastructure, network behavior analysis, nba analysis, storage
     Riverbed
By: Incapsula     Published Date: Nov 06, 2017
Being aware of the risks and costs associated with DDoS attacks, most enterprises protect their websites and network infrastructure with some sort of mitigation solution. However, as the threat landscape continues to evolve, it’s getting harder to gauge your organization’s DDoS readiness and identify the soft spots in your defenses. The calculator measures your DDoS resiliency score based on a short questionnaire about your network infrastructure, security products and procedures. The results are provided in a detailed report that includes: Your DRS score, its meaning and implications Technical evaluation of a virtual penetration test Comparative analysis of your DRS within your business vertical Suggestions for improving your security posture
Tags : 
     Incapsula
By: TriGeo Network Security     Published Date: Oct 03, 2008
It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.
Tags : trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance
     TriGeo Network Security
By: Viavi Solutions     Published Date: Apr 14, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
     Viavi Solutions
By: Viavi Solutions     Published Date: Apr 14, 2017
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network. This white paper guides you through the essentials of VoIP troubleshooting, including common problems and the metrics you should employ to fix and prevent them. You’ll learn how these metrics relate to one another and to overall VoIP health. You’ll also learn the best practices for keeping your VoIP network flowing smoothly, your time-to-resolution low, and end users happy.
Tags : sensitive information, data protection, network security, asset protection, network performance, network analysis, troubleshooting solutions
     Viavi Solutions
By: Amazon Web Services     Published Date: Apr 11, 2018
Effectively monitoring and managing cloud infrastructure configuration changes and performing on-going vulnerability analyses through forensics, troubleshooting, audits, and automation are key activities to help secure your AWS environment.
Tags : 
     Amazon Web Services
By: Cisco     Published Date: Jul 11, 2016
Cisco estimates that the Internet of Everything (IoE) — the networked connection of people, process, data, and things — will generate $19 trillion in Value at Stake for the private and public sectors combined between 2013 and 2022. More than 42 percent of this value — $8 trillion — will come from one of IoE’s chief enablers, the Internet of Things (IoT). Defined by Cisco as “the intelligent connectivity of physical devices, driving massive gains in efficiency, business growth, and quality of life,” IoT often represents the quickest path to IoE value for private and public sector organizations. This paper combines original and secondary research, as well as economic analysis, to provide a roadmap for maximizing value from IoT investments. It also explains why, in the worlds of IoT and IoE, the combination of edge computing/analytics and data center/cloud is essential to driving actionable insights that produce improved business outcomes.
Tags : 
     Cisco
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics