Network Instruments

1,248 views

Published on

Enterprise IT administrators at transaction and data-driven corporations deal with intricate network issues while continuing to worry about computer hacking, intellectual property theft, and complying with industry regulations. To solve these problems, administrators need the ability to capture hours, days, or even weeks worth of network traffic directly to disk for comprehensive analysis. The GigaStor provides massive data collection and a unique time-based analysis that eliminates the need to recreate problems, rapidly increasing time to resolution. For more information go to www.networkinstruments.com.

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,248
On SlideShare
0
From Embeds
0
Number of Embeds
35
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Network Instruments

  1. 1. Network Instruments
  2. 2. Distributed Network Analysis Architecture
  3. 3. End-to-End Network Analysis Software Probe GigaStor 10/100/1000 Probe Appliance WAN and Gigabit Probe Appliances Top Talkers MultiHop Analysis Connection Dynamics Application Analysis SNMP Management VoIP Analysis Gigabit and WAN Observer Suite System
  4. 4. Example – Forensic Analysis <ul><li>Situation: A major retail company has been tasked with researching the violations of their acceptable use policies by a former employee. </li></ul><ul><li>Solution: The GigaStor appliance, featuring a time-based navigation interface, allows for complete write-to-disk at Gigabit line speed, to ensure all necessary data is captured and stored </li></ul>
  5. 5. Example – Forensic Analysis Step 1: Identify the timeframe of interest using the GigaStor Time Analysis Interface
  6. 6. Example – Forensic Analysis Step 2: Determine the stations, conversations, or ports of interest from the specified timeframe
  7. 7. Example – Forensic Analysis Step 3: Complex filters can be created automatically, and will be run against the specified timeframe
  8. 8. Example – Forensic Analysis Step 4: Complete reconstruction capabilities allow an administrator to reassemble original documents such as emails, IM conversations, web pages, and even VoIP calls
  9. 9. Example – Forensic Analysis <ul><li>Situation: A major retail company has been tasked with researching the violations of their acceptable use policies by a former employee. </li></ul><ul><li>Solution: The GigaStor appliance, featuring a time-based navigation interface, allows for complete write-to-disk at Gigabit line speed, to ensure all necessary data is captured and stored. </li></ul><ul><li>Result: Proactive monitoring allows the organization to have relevant information available without the need to recreate an issue, or, in this case, not have the ability to verify a potential conflict with their acceptable use policy. </li></ul>
  10. 10. Thank You www.networkinstruments.com Toll Free: (800) 526-7919

×