Playing a hunch with confidence with the latest EndaceProbe software release 5.2

Original Entry by : Andy Summers

In the world of mission-critical networks, the very idea that you may be ‘playing a hunch’ when it comes to investigating a service-affecting issue likely would be met with utter derision. The pressure is to provide confident answers to critical questions; what happened, who was affected and how long will it take to resolve. This can be daunting especially when the air is thick with accusations and the ‘interested parties’ trending towards ‘C-level’ can be insurmountable.

Of course, the truth is that playing educated hunches lies at the very heart of network troubleshooting.  It is only after following and discarding a number of possibilities that you can exonerate yourself in what is known as the mean-time-to-innocence.

Continue reading “Playing a hunch with confidence with the latest EndaceProbe software release 5.2”


Endace and Cisco ISE: rooting out fraudulent network activity

Original Entry by : Sonny Singh

There is something both cathartic and caustic whenever the term “ice” is added onto something of cultural and artistic value. Let’s see, you have hip hop artists like Ice-T and Ice Cube who rapped about social injustice and the hardships of poverty. Then you have this generation’s iconoclast,  Vanilla Ice (nee’ Robert Matthew Van Winkle) who let us know it was perfectly fine to “play that funky music” when you had a rough day or that humming “Ice Ice Baby” to your newly born child while rocking him to sleep didn’t constitute you as being strange.

Continue reading “Endace and Cisco ISE: rooting out fraudulent network activity”


Securing the Evidence of Network Threat Propagation

Original Entry by : Matt Walmsley

“Spot the bad guys, stop the bad guys,” are rational and valid goals when it comes to securing your network. In fact, many organisations commit the majority of their security resources and investment to defense and detection, often by deploying automated technologies and solutions. But by their very nature, such solutions focus on protecting against known vulnerabilities and threats, have little context of your own network and can’t be a complete security solution.

Continue reading “Securing the Evidence of Network Threat Propagation”


How to Keep Sochi From Sucking Up Bandwidth

Original Entry by : Mike Heumann

The Sochi Winter Olympics are officially underway, and as you may have seen, NBC will once again be providing viewers access to live streaming in a multitude of mediums. On the NBC Olympics page, computer users can enter their cable or digital television provider personal user name and password and watch live video of the events. Mobile viewers can also download the free NBC Live Extra App. The iPhone, Droid and iPad app will have live and recorded events, and on demand HD video.  And for the first time, NBC Universal will stream video on Facebook as part of a partnership deal with the social media giant.

Continue reading “How to Keep Sochi From Sucking Up Bandwidth”


Let it (Net)Flow…

Original Entry by : Matt Walmsley

NetFlow as a network monitoring and statics technology is not new. To make it work, you need to sample the network and generate NetFlow records, which are sent to a NetFlow collector software application for analysis. NetFlow has been widely adopted and many organisations have invested time and money in learning how to use NetFlow tools to help their network operations teams understand how their network is performing and what is creating fluctuations in traffic.

Continue reading “Let it (Net)Flow…”


We didn’t think Splunk could do DPI. Our testing proved it can!

Original Entry by : Endace

By: Alistair Meakin, MarQuest

As a certified Splunk partner, and provider of network operations and security consultancy, MarQuest has extensive knowledge of the benefits Splunk brings to network operations (NetOps) and security operations (SecOps) teams. Curious about the Endace Fusion Connector for Splunk, we completed an independent evaluation of it to assess its usability and benefits. By installing, deploying and using the application, we looked for answers to the following questions:

  • Is the application likely to add value to IT operations?
  • How usable is the application?

Continue reading “We didn’t think Splunk could do DPI. Our testing proved it can!”


Starting 2014 with a bang (and a new EndaceProbe release)!

Original Entry by : Endace

The beginning of any new year is the perfect time to build upon the positive momentum of its predecessor and what better way to start than with the new EndaceProbe™ Network Recorder EP5.1.3 release which does exactly that!

Whilst there’s too much to cover in this blog alone, I’ve focused on some of the key additions to our network visibility tool EndaceVision ™ to give a flavour of the new capabilities that this release brings.

Continue reading “Starting 2014 with a bang (and a new EndaceProbe release)!”


Standing Up for Security

Original Entry by : Matt Walmsley

Earlier this month, I enjoyed some time working with LAN Assistans, our Nordic partner, as we co-exhibited at Nordic IT Security 2013 in Stockholm, Sweden. As part of our participation package, we had a short “open mic” session over lunch to talk about our security topic of choice.  Being stripped of my familiar presentation support aids like PowerPoint slides and asked to just stand up and talk really focused my mind (and increased my adrenaline levels!).

I often hear our team talk about our network recording and visualization solutions’ technical innovations, performance and features. In truth, Endace solutions have grown up from a DNA of engineering excellence, so it’s not so surprising that we love talking about our great technology! But for this open mic session, I thought I’d take a different approach and think about what our solutions enable our customers to do…here is a snippet of my “open mic” session:

Continue reading “Standing Up for Security”


Introducing the Fusion Connector for Splunk; Ideal for NetOps and SecOps Teams

Original Entry by : Barry Shaw

Network operations (NetOps) and security operations (SecOps) teams can now take advantage of our Endace Fusion Connector for Splunk, which will dramatically lower time-to-resolution (TTR) for network issues that typically take days to resolve in the absence of readily available packet data.  This Connector (available here on splunkbase) easily installs into any 5.x Splunk deployment and provides a seamless bridge between logs and packets.

Continue reading “Introducing the Fusion Connector for Splunk; Ideal for NetOps and SecOps Teams”


Application Delivery – Mean Time To Innocence

Original Entry by : Sri Sundaralingam

In the world of application delivery and performance management, it’s not easy on the applications or networking operations side to troubleshoot and resolve end-to-end issues. I‘m sure you have heard of Mean Time To Resolution (MTTR); frequently used for measuring how long it takes to resolve a particular problem from the time a trouble ticket is open to when the problem is resolved (i.e. when the ticket is closed). Have you heard of Mean Time To Innocence (MTTI), which is basically the metric for how long it takes to prove the issue wasn’t your responsibility?

Continue reading “Application Delivery – Mean Time To Innocence”