User and device attribution comes to EndaceVision: Empowering network and security incident analysis

Original Entry by : Barry Shaw

We’ve all heard that the application is now the network. This paradigm shift moved us from the simple port-based definition of applications that was prevalent up until the end of the last decade, to the more awkward reality that applications are much more complex and no longer conformed to such a simple scheme. For network operators, understanding the applications on the networks was paramount and Endace responded to this by incorporating deep packet inspection (DPI) technology into its EndaceProbeTM Network Recorders in 2012.

Continue reading “User and device attribution comes to EndaceVision: Empowering network and security incident analysis”


Endace and Cisco ISE: rooting out fraudulent network activity

Original Entry by : Sonny Singh

There is something both cathartic and caustic whenever the term “ice” is added onto something of cultural and artistic value. Let’s see, you have hip hop artists like Ice-T and Ice Cube who rapped about social injustice and the hardships of poverty. Then you have this generation’s iconoclast,  Vanilla Ice (nee’ Robert Matthew Van Winkle) who let us know it was perfectly fine to “play that funky music” when you had a rough day or that humming “Ice Ice Baby” to your newly born child while rocking him to sleep didn’t constitute you as being strange.

Continue reading “Endace and Cisco ISE: rooting out fraudulent network activity”