Your SlideShare is downloading. ×
0
Network Instruments
Network Instruments
Network Instruments
Network Instruments
Network Instruments
Network Instruments
Network Instruments
Network Instruments
Network Instruments
Network Instruments
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Network Instruments

1,002

Published on

Enterprise IT administrators at transaction and data-driven corporations deal with intricate network issues while continuing to worry about computer hacking, intellectual property theft, and complying …

Enterprise IT administrators at transaction and data-driven corporations deal with intricate network issues while continuing to worry about computer hacking, intellectual property theft, and complying with industry regulations. To solve these problems, administrators need the ability to capture hours, days, or even weeks worth of network traffic directly to disk for comprehensive analysis. The GigaStor provides massive data collection and a unique time-based analysis that eliminates the need to recreate problems, rapidly increasing time to resolution. For more information go to www.networkinstruments.com.

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,002
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Network Instruments
  • 2. Distributed Network Analysis Architecture
  • 3. End-to-End Network Analysis Software Probe GigaStor 10/100/1000 Probe Appliance WAN and Gigabit Probe Appliances Top Talkers MultiHop Analysis Connection Dynamics Application Analysis SNMP Management VoIP Analysis Gigabit and WAN Observer Suite System
  • 4. Example – Forensic Analysis
    • Situation: A major retail company has been tasked with researching the violations of their acceptable use policies by a former employee.
    • Solution: The GigaStor appliance, featuring a time-based navigation interface, allows for complete write-to-disk at Gigabit line speed, to ensure all necessary data is captured and stored
  • 5. Example – Forensic Analysis Step 1: Identify the timeframe of interest using the GigaStor Time Analysis Interface
  • 6. Example – Forensic Analysis Step 2: Determine the stations, conversations, or ports of interest from the specified timeframe
  • 7. Example – Forensic Analysis Step 3: Complex filters can be created automatically, and will be run against the specified timeframe
  • 8. Example – Forensic Analysis Step 4: Complete reconstruction capabilities allow an administrator to reassemble original documents such as emails, IM conversations, web pages, and even VoIP calls
  • 9. Example – Forensic Analysis
    • Situation: A major retail company has been tasked with researching the violations of their acceptable use policies by a former employee.
    • Solution: The GigaStor appliance, featuring a time-based navigation interface, allows for complete write-to-disk at Gigabit line speed, to ensure all necessary data is captured and stored.
    • Result: Proactive monitoring allows the organization to have relevant information available without the need to recreate an issue, or, in this case, not have the ability to verify a potential conflict with their acceptable use policy.
  • 10. Thank You www.networkinstruments.com Toll Free: (800) 526-7919

×