network traffic

Results 26 - 50 of 181Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: Jul 17, 2013
Riverbed® Cascade Shark provides continuous, high-speed packet capture to ensure that packet-level information is available when needed for granular, real-time and post-event forensic analysis. Based on high-performance 1GbE and 10GbE capture cards, Cascade Shark is capable of sustained line-rate, multi-gigabit per second recording of network traffic.
Tags : 
cascade shark, datasheet, riverbed, cascade, riverbed cascade, high-performance, sustained line-rate, network traffic
    
Riverbed
Published By: Juniper Networks     Published Date: Oct 19, 2015
A new wave of application workloads and associated data traffic - related to virtualization, cloud, mobility, analytics, and social media — have placed unprecedented strain on the datacenter network and forced commensurate architectural and operational changes.
Tags : 
juniper, network, cloud, datacenter, virtualization, data, traffic, analytics
    
Juniper Networks
Published By: Butler Technologies     Published Date: Jul 02, 2018
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network.
Tags : 
    
Butler Technologies
Published By: IBM APAC     Published Date: Aug 22, 2017
Sometimes the best clues to a security breach aren’t found in the contents of the files that are traversing your network. Instead, they’re found in the details of the network metadata. An unusually large data transfer associated with simple web-browsing traffic can indicate the injection of malware. Also, an examination of any changes in an attached file’s entropy can reveal encryption or compression activities that can indicate the addition of embedded malware.
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM APAC
Published By: Juniper Networks     Published Date: Sep 10, 2014
As application workloads are redefined, data centers must change. This IDC Whitepaper looks at how network automation and orchestration can aid this transition, building simpler and more agile networks.
Tags : 
network automation, cloud datacenter, data traffic, network architecture, seamless integration, cloud orchestration
    
Juniper Networks
Published By: Limelight Networks     Published Date: Feb 22, 2018
In the increasingly competitive OTT market, competition for viewers is high. Providers must find ways to not just deliver compelling content, but to deliver compelling viewing experiences. In this whitepaper, you’ll learn about the critical challenges facing OTT providers today and how they can be overcome to provide the broadcast quality experiences viewers expect, regardless of the device in use or the viewers location in the world. Are you ready to keep your subscribers happy and away from your competition? Download this free white paper OTT 3.0: How to Build a Better Mousetrap and learn: Why personalized content discovery is so important to viewers – and to the success of your business How to avoid internet congestion by leveraging technologies like a CDN The importance of global network scale to meet spikes in consumer traffic The impact of advertising on viewer abandonment
Tags : 
    
Limelight Networks
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What you can’t see will hurt you The situation is critical, because the percentage of encrypted user traffic has more than doubled since 2014, exceeding 80 percent, according to F5 Labs' 2017 TLS Telemetry report. So, of course, now there are SSL visibility solutions that provide decryption services allowing those security controls to see what they’re doing. But visibility, by itself, isn’t enough. Security teams and network operations have found that setting up decryption zones is not easy. Security teams often have to resort to manual daisy-chaining or tedious configuration to manage decryption/encryption across the entire security stack. And then they find that exceptions abound. And lastly, you need to scan your inbound and outbound traffic for tomorrow’s threats, and SSL Orchestrator is the tool that lets your security controls keep your organization’s name out of the papers and away from those pesky GDPR fines. Download the eBook to find out how you can gain visibility into e
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: ipoque     Published Date: Oct 04, 2018
The SD-WAN market is growing fast, but so is competition. In such a competitive environment, SD-WAN vendors need to offer products with unique features and capabilities in order to stand out. Real-time application visibility powered by deep packet inspection (DPI) software can be the decisive element in achieving them. This whitepaper highlights the key value of DPI software, which is enabling advanced SD-WAN analytics and security features.
Tags : 
dpi, deep packet inspection, sd-wan, analytics, network analytics, traffic analytics
    
ipoque
Published By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Published By: Gigamon     Published Date: Feb 20, 2019
IDG survey confirms: CEOs consider cybersecurity a top priority. Get “Countering Escalating Cyberthreats” and improve your threat visibility across the entire network. As CEOs struggle with the risks of a digital business, it is time to adopt a more holistic approach to security. You can distribute traffic to the right tool at the right time, eliminate network weaknesses and keep your CEO happy. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Feb 20, 2019
Read “What Do You Mean TLS 1.3 Might Degrade My Security?” to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn how TLS 1.3 will impact your network, including the security implications. We’ll show you the potential implications for active and passive mode decryption as well as east-west traffic, what it means for threat hunting and compliance as well as how to prepare. Read now.
Tags : 
    
Gigamon
Published By: Intel     Published Date: Aug 26, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: HP - Enterprise     Published Date: Jun 05, 2013
As the networks become ever more essential to business processes, they are also increasing rapidly in size and complexity. Many factors can affect network availability and performance—increasing traffic, configuration problems, failed network elements, changes, and more. Since not all of these problems are hard failures, managing the network to detect and correct business-impacting problems requires new tools, strategies, and initiatives. To deliver the availability and performance business demands, network management teams need to optimize fault management and ensure availability, unify fault and performance management, automate change and configuration management to ensure compliance, and automate IT processes. This integrated approach is called Automated Network Management (ANM).
Tags : 
network management, network
    
HP - Enterprise
Published By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : 
ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
    
Viavi Solutions
Published By: Dyn     Published Date: Mar 30, 2016
IPM offers unparalleled visibility across the Internet allowing you the ability to optimize infrastructure costs, mitigate risk, and protect your revenue. Unlike APM and NPM which only provide visibility into your applications or internal network respectively, IPM provides a complete end-to-end view of the public Internet so you can: - Decide where to host content and applications for top performance - Determine the impact website partners, such as cloud providers and ISPs, have on web responsiveness - Identify optimal cloud hosts, NSPs, CDNs, and SaaS providers for Internet traffic, by region - Monitor and measure service provider performance and SLA compliance
Tags : 
dyn, internet performance management, online performance, ipm, apm, npm
    
Dyn
Published By: Dyn     Published Date: Apr 27, 2016
Download this whitepaper and learn: - The six macro trends driving the need for application, network and Internet performance management solutions - Key insights you've been missing when it comes to your portfolio of online assets, and how they interact with the public Internet - How you can receive a true "end-to-end" view into Internet performance and ensure availability and implement advanced traffic steering capabilities to your existing infrastructure
Tags : 
dyn, internet performance, internet performance management
    
Dyn
Published By: Intel     Published Date: May 19, 2017
An unprecedented level of network traffic is driving enterprises and communications service providers (CommSPs) to look for equipment that delivers greater operational agility and economics.
Tags : 
infrastructure, data, software, nfv, intel
    
Intel
Published By: Intel     Published Date: May 24, 2017
An unprecedented level of network traffic is driving enterprises and communications service providers (CommSPs) to look for equipment that delivers greater operational agility and economics.
Tags : 
    
Intel
Published By: Gigamon     Published Date: Dec 13, 2018
IDG survey confirms: CEOs consider cybersecurity a top priority. Get “Countering Escalating Cyberthreats” and improve your threat visibility across the entire network. As CEOs struggle with the risks of a digital business, it is time to adopt a more holistic approach to security. You can distribute traffic to the right tool at the right time, eliminate network weaknesses and keep your CEO happy. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Download the Gigamon white paper, "Addressing the Threat Within: Rethinking Network Security Deployment," to learn how evolving cybersecurity threat conditions are changing the trust model for security. See how a structured and architectural approach to network security gives security solutions better access to network traffic while enabling them to scale cost effectively. Learn how a security delivery platform can be the foundational building block for deploying adaptable security solutions. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Read “What Do You Mean TLS 1.3 Might Degrade My Security?” to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn how TLS 1.3 will impact your network, including the security implications. We’ll show you the potential implications for active and passive mode decryption as well as east-west traffic, what it means for threat hunting and compliance as well as how to prepare. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Security and network performance tools are unable to or weren’t built to handle and analyze traffic at higher bandwidths. Read Enterprise Management Associates new research report, “Next Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics” to learn how to reduce unnecessary tool upgrades due to bandwidth increases -- resulting in decreased costs, improved tool utilization and optimized investments in existing networking and security tools. Learn more by downloading this report!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Read “What Do You Mean TLS 1.3 Might Degrade My Security?” to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn how TLS 1.3 will impact your network, including the security implications. We’ll show you the potential implications for active and passive mode decryption as well as east-west traffic, what it means for threat hunting and compliance as well as how to prepare. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Security and network performance tools are unable to or weren’t built to handle and analyze traffic at higher bandwidths. Read Enterprise Management Associates new research report, “Next Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics” to learn how to reduce unnecessary tool upgrades due to bandwidth increases -- resulting in decreased costs, improved tool utilization and optimized investments in existing networking and security tools. Learn more by downloading this report!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
Organisations have invested heavily in cybersecurity tools and yet more than five million data records are lost or stolen every day. The problem is not that today’s cybersecurity tools are badly designed or missing features, the problem is that surging volumes of network traffic overwhelm security tools, causing administrators to use sampling or disable advanced features in order to preserve application performance. Also, security tools and IT staff don’t get all the data they need to detect and respond to outside attacks and insider incidents, because they are faced with “blind spots” in data collection. Read this business brief in local language to find out how
Tags : 
    
Gigamon
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.