Network Instruments
Distributed Network Analysis Architecture
End-to-End Network Analysis
                      Software
                       Probe
                                  ...
Example – Forensic Analysis
    Situation: A major retail company has been tasked with researching

    the violations of...
Example – Forensic Analysis




Step 1: Identify the timeframe of interest using the GigaStor Time
Analysis Interface
Example – Forensic Analysis




Step 2: Determine the stations, conversations, or ports of interest
from the specified tim...
Example – Forensic Analysis




Step 3: Complex filters can be created automatically, and will be run
against the specifie...
Example – Forensic Analysis




Step 4: Complete reconstruction capabilities allow an administrator to
reassemble original...
Example – Forensic Analysis
    Situation: A major retail company has been tasked with

    researching the violations of...
Thank You

www.networkinstruments.com

   Toll Free: (800) 526-7919
Upcoming SlideShare
Loading in …5
×

Gigamon U - Network Rules, Distributed Network Analysis Architecture

2,075 views

Published on

Enterprise IT administrators at transaction and data-driven corporations deal with intricate network issues while continuing to worry about computer hacking, intellectual property theft, and complying with industry regulations. To solve these problems, administrators need the ability to capture hours, days, or even weeks worth of network traffic directly to disk for comprehensive analysis. The GigaStor provides massive data collection and a unique time-based analysis that eliminates the need to recreate problems, rapidly increasing time to resolution.

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,075
On SlideShare
0
From Embeds
0
Number of Embeds
38
Actions
Shares
0
Downloads
26
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Gigamon U - Network Rules, Distributed Network Analysis Architecture

  1. 1. Network Instruments
  2. 2. Distributed Network Analysis Architecture
  3. 3. End-to-End Network Analysis Software Probe Connection MultiHop Dynamics Top Talkers Analysis GigaStor 10/100/1000 Probe Appliance Application Analysis SNMP Management VoIP Analysis WAN and Gigabit Probe Appliances Gigabit and WAN Observer Suite System
  4. 4. Example – Forensic Analysis Situation: A major retail company has been tasked with researching  the violations of their acceptable use policies by a former employee. Solution: The GigaStor appliance, featuring a time-based navigation  interface, allows for complete write-to-disk at Gigabit line speed, to ensure all necessary data is captured and stored
  5. 5. Example – Forensic Analysis Step 1: Identify the timeframe of interest using the GigaStor Time Analysis Interface
  6. 6. Example – Forensic Analysis Step 2: Determine the stations, conversations, or ports of interest from the specified timeframe
  7. 7. Example – Forensic Analysis Step 3: Complex filters can be created automatically, and will be run against the specified timeframe
  8. 8. Example – Forensic Analysis Step 4: Complete reconstruction capabilities allow an administrator to reassemble original documents such as emails, IM conversations, web pages, and even VoIP calls
  9. 9. Example – Forensic Analysis Situation: A major retail company has been tasked with  researching the violations of their acceptable use policies by a former employee. Solution: The GigaStor appliance, featuring a time-based  navigation interface, allows for complete write-to-disk at Gigabit line speed, to ensure all necessary data is captured and stored. Result: Proactive monitoring allows the organization to have  relevant information available without the need to recreate an issue, or, in this case, not have the ability to verify a potential conflict with their acceptable use policy.
  10. 10. Thank You www.networkinstruments.com Toll Free: (800) 526-7919

×