Starting 2014 with a bang (and a new EndaceProbe release)!

Original Entry by : Endace

The beginning of any new year is the perfect time to build upon the positive momentum of its predecessor and what better way to start than with the new EndaceProbe™ Network Recorder EP5.1.3 release which does exactly that!

Whilst there’s too much to cover in this blog alone, I’ve focused on some of the key additions to our network visibility tool EndaceVision ™ to give a flavour of the new capabilities that this release brings.

Continue reading “Starting 2014 with a bang (and a new EndaceProbe release)!”


Who needs Mixed Martial Arts (MMA) when you have Cyber Mondays?

Original Entry by : Sonny Singh

I don’t know about you, but the winter holiday season is a bittersweet pill for me to swallow due in part to two occurrences which are aptly named “Black Friday” and “Cyber Monday.” The connotations themselves conjure up images of sinister malevolence. Black Friday might as well be called “The Black Plague” and Cyber Monday could very well be the title for the next Terminator movie, “Cyber Monday – Rise of the Machines.” The two lexicons of retail mind-control methods are emblazoned in the pre-frontal cortex of every consumer out there…unless by chance, you have been one of the lucky few individuals who is stuck in the 1950’s and opts to buy their holiday presents from the Sears Roebuck Holiday catalog, I envy you.

Continue reading “Who needs Mixed Martial Arts (MMA) when you have Cyber Mondays?”


Standing Up for Security

Original Entry by : Matt Walmsley

Earlier this month, I enjoyed some time working with LAN Assistans, our Nordic partner, as we co-exhibited at Nordic IT Security 2013 in Stockholm, Sweden. As part of our participation package, we had a short “open mic” session over lunch to talk about our security topic of choice.  Being stripped of my familiar presentation support aids like PowerPoint slides and asked to just stand up and talk really focused my mind (and increased my adrenaline levels!).

I often hear our team talk about our network recording and visualization solutions’ technical innovations, performance and features. In truth, Endace solutions have grown up from a DNA of engineering excellence, so it’s not so surprising that we love talking about our great technology! But for this open mic session, I thought I’d take a different approach and think about what our solutions enable our customers to do…here is a snippet of my “open mic” session:

Continue reading “Standing Up for Security”


Propelling Applications Forward with Network Visibility and Agility: Ecosystem Member for Cisco ACI

Original Entry by : Rick Trujillo

We use technology in our everyday lives without a thought of how that content is delivered.  We conduct credit card transaction over a smartphone app for taxi fare, and stream live sporting events like the World Series not just to our television sets but to our smartphones, tablets and PCs. We connect to the corporate VPN while in mid-air over the Atlantic with an expectation that it should be seamless.

Innovation in technology continues to propel us forward from the physical to the virtual world. Server, storage and network virtualization, along with the cloud, has made it easier for the workforce and applications to be agile and mobile. Keeping applications and people connected is vital for any businesses to operate and generate revenue streams.

Continue reading “Propelling Applications Forward with Network Visibility and Agility: Ecosystem Member for Cisco ACI”


Introducing the Fusion Connector for Splunk; Ideal for NetOps and SecOps Teams

Original Entry by : Barry Shaw

Network operations (NetOps) and security operations (SecOps) teams can now take advantage of our Endace Fusion Connector for Splunk, which will dramatically lower time-to-resolution (TTR) for network issues that typically take days to resolve in the absence of readily available packet data.  This Connector (available here on splunkbase) easily installs into any 5.x Splunk deployment and provides a seamless bridge between logs and packets.

Continue reading “Introducing the Fusion Connector for Splunk; Ideal for NetOps and SecOps Teams”


Application Delivery – Mean Time To Innocence

Original Entry by : Sri Sundaralingam

In the world of application delivery and performance management, it’s not easy on the applications or networking operations side to troubleshoot and resolve end-to-end issues. I‘m sure you have heard of Mean Time To Resolution (MTTR); frequently used for measuring how long it takes to resolve a particular problem from the time a trouble ticket is open to when the problem is resolved (i.e. when the ticket is closed). Have you heard of Mean Time To Innocence (MTTI), which is basically the metric for how long it takes to prove the issue wasn’t your responsibility?

Continue reading “Application Delivery – Mean Time To Innocence”


Of NetFlows, Network Security and the Godfather…at Interop NY 2013

Original Entry by : Sonny Singh

There is something very “je ne sais quoi” about traveling to New York which brings out the “I wanna be Michael Corleone” in me. The first step in my ritualistic preparatory precursor is that I break out my extensive catalog of Frank Sinatra tunes and drink a stiff martini (dirty, with extra olives).  Every time I leave for New York, I take the time to re-learn every quotable line from my Godfather trilogy Blu-Ray box set (well, except for part three because it was a travesty) because having a tradeshow in New York and not honing in my “Godfather” lingo would be sacrilegious when speaking to partners and customers. It’s equally crucial to maintain that visage of confidence and cool collectiveness that only Marlon Brando could pull off while sitting at the table during one of his many sit-downs (or Robert DeNiro in “The Godfather Part II”). That said, the standard khaki slacks and one-size fits all black company logoed trade-show booth pullover are not exactly the cut of clothes that Michael Corleone favored, so I guess I’ll have to keep dreaming…

Continue reading “Of NetFlows, Network Security and the Godfather…at Interop NY 2013”


DDoS Attacks on Port 0 – Does it mean what you think it does?

Original Entry by : Tom Jones

Network monitoring best practice includes watching the latest trends not only in your own network, but also in other networks across the Internet. Fortunately, there are some great companies out there tracking what’s happening and issuing periodic reports to keep the rest of us up to speed.

I was very interested to read the recent report from Arbor Networks with the Q2 DDoS (distributed denial of service) attack data collated through their ATLAS Internet monitoring system. The report highlights a 43% increase in attacks from the same period in 2012.

Continue reading “DDoS Attacks on Port 0 – Does it mean what you think it does?”