Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Network Instruments

1,290 views

Published on

Enterprise IT administrators at transaction and data-driven corporations deal with intricate network issues while continuing to worry about computer hacking, intellectual property theft, and complying with industry regulations. To solve these problems, administrators need the ability to capture hours, days, or even weeks worth of network traffic directly to disk for comprehensive analysis. The GigaStor provides massive data collection and a unique time-based analysis that eliminates the need to recreate problems, rapidly increasing time to resolution. For more information go to www.networkinstruments.com.

Published in: Business, Technology
  • Be the first to comment

Network Instruments

  1. 1. Network Instruments
  2. 2. Distributed Network Analysis Architecture
  3. 3. End-to-End Network Analysis Software Probe GigaStor 10/100/1000 Probe Appliance WAN and Gigabit Probe Appliances Top Talkers MultiHop Analysis Connection Dynamics Application Analysis SNMP Management VoIP Analysis Gigabit and WAN Observer Suite System
  4. 4. Example – Forensic Analysis <ul><li>Situation: A major retail company has been tasked with researching the violations of their acceptable use policies by a former employee. </li></ul><ul><li>Solution: The GigaStor appliance, featuring a time-based navigation interface, allows for complete write-to-disk at Gigabit line speed, to ensure all necessary data is captured and stored </li></ul>
  5. 5. Example – Forensic Analysis Step 1: Identify the timeframe of interest using the GigaStor Time Analysis Interface
  6. 6. Example – Forensic Analysis Step 2: Determine the stations, conversations, or ports of interest from the specified timeframe
  7. 7. Example – Forensic Analysis Step 3: Complex filters can be created automatically, and will be run against the specified timeframe
  8. 8. Example – Forensic Analysis Step 4: Complete reconstruction capabilities allow an administrator to reassemble original documents such as emails, IM conversations, web pages, and even VoIP calls
  9. 9. Example – Forensic Analysis <ul><li>Situation: A major retail company has been tasked with researching the violations of their acceptable use policies by a former employee. </li></ul><ul><li>Solution: The GigaStor appliance, featuring a time-based navigation interface, allows for complete write-to-disk at Gigabit line speed, to ensure all necessary data is captured and stored. </li></ul><ul><li>Result: Proactive monitoring allows the organization to have relevant information available without the need to recreate an issue, or, in this case, not have the ability to verify a potential conflict with their acceptable use policy. </li></ul>
  10. 10. Thank You www.networkinstruments.com Toll Free: (800) 526-7919

×