Propelling Applications Forward with Network Visibility and Agility: Ecosystem Member for Cisco ACI

Original Entry by : Rick Trujillo

We use technology in our everyday lives without a thought of how that content is delivered.  We conduct credit card transaction over a smartphone app for taxi fare, and stream live sporting events like the World Series not just to our television sets but to our smartphones, tablets and PCs. We connect to the corporate VPN while in mid-air over the Atlantic with an expectation that it should be seamless.

Innovation in technology continues to propel us forward from the physical to the virtual world. Server, storage and network virtualization, along with the cloud, has made it easier for the workforce and applications to be agile and mobile. Keeping applications and people connected is vital for any businesses to operate and generate revenue streams.

Continue reading “Propelling Applications Forward with Network Visibility and Agility: Ecosystem Member for Cisco ACI”


Introducing the Fusion Connector for Splunk; Ideal for NetOps and SecOps Teams

Original Entry by : Barry Shaw

Network operations (NetOps) and security operations (SecOps) teams can now take advantage of our Endace Fusion Connector for Splunk, which will dramatically lower time-to-resolution (TTR) for network issues that typically take days to resolve in the absence of readily available packet data.  This Connector (available here on splunkbase) easily installs into any 5.x Splunk deployment and provides a seamless bridge between logs and packets.

Continue reading “Introducing the Fusion Connector for Splunk; Ideal for NetOps and SecOps Teams”


Application Delivery – Mean Time To Innocence

Original Entry by : Sri Sundaralingam

In the world of application delivery and performance management, it’s not easy on the applications or networking operations side to troubleshoot and resolve end-to-end issues. I‘m sure you have heard of Mean Time To Resolution (MTTR); frequently used for measuring how long it takes to resolve a particular problem from the time a trouble ticket is open to when the problem is resolved (i.e. when the ticket is closed). Have you heard of Mean Time To Innocence (MTTI), which is basically the metric for how long it takes to prove the issue wasn’t your responsibility?

Continue reading “Application Delivery – Mean Time To Innocence”


Of NetFlows, Network Security and the Godfather…at Interop NY 2013

Original Entry by : Sonny Singh

There is something very “je ne sais quoi” about traveling to New York which brings out the “I wanna be Michael Corleone” in me. The first step in my ritualistic preparatory precursor is that I break out my extensive catalog of Frank Sinatra tunes and drink a stiff martini (dirty, with extra olives).  Every time I leave for New York, I take the time to re-learn every quotable line from my Godfather trilogy Blu-Ray box set (well, except for part three because it was a travesty) because having a tradeshow in New York and not honing in my “Godfather” lingo would be sacrilegious when speaking to partners and customers. It’s equally crucial to maintain that visage of confidence and cool collectiveness that only Marlon Brando could pull off while sitting at the table during one of his many sit-downs (or Robert DeNiro in “The Godfather Part II”). That said, the standard khaki slacks and one-size fits all black company logoed trade-show booth pullover are not exactly the cut of clothes that Michael Corleone favored, so I guess I’ll have to keep dreaming…

Continue reading “Of NetFlows, Network Security and the Godfather…at Interop NY 2013”


DDoS Attacks on Port 0 – Does it mean what you think it does?

Original Entry by : Tom Jones

Network monitoring best practice includes watching the latest trends not only in your own network, but also in other networks across the Internet. Fortunately, there are some great companies out there tracking what’s happening and issuing periodic reports to keep the rest of us up to speed.

I was very interested to read the recent report from Arbor Networks with the Q2 DDoS (distributed denial of service) attack data collated through their ATLAS Internet monitoring system. The report highlights a 43% increase in attacks from the same period in 2012.

Continue reading “DDoS Attacks on Port 0 – Does it mean what you think it does?”


Go ahead… enjoy that cocktail party at VMworld in peace

Original Entry by : Sonny Singh

Because Endace has your virtualized data center covered!

VMworld has been the IT community’s premier source for gaining knowledge of virtualization and cloud computing technologies for more than ten years now. With hands-on labs, high-impact breakout sessions, and opportunities to network, VMworld brings together key innovators like Endace to help define, shape and execute customer’s business objectives.  This year’s key discussion topic centers on how the software-defined data center is extending virtualization across storage, networking and security.

Continue reading “Go ahead… enjoy that cocktail party at VMworld in peace”


Endace Packets – Laser Surgery for the Data Center!

Original Entry by : Mike Heumann

Medical procedures today are characterized by precision.  Thirty years ago, most cancer surgeries involved general anesthetic, “opening up” the patient, invasive and radical procedures, extended hospital stays for recovery, and in many cases. significant side effects.  Today, a surgeon can make a small incision, insert a laser probe, and “zap” the tumor, in many cases under no more than a local anesthetic.  The benefits are faster recoveries and little to no side effects.

Today marks the launch of Endace Packets, a protocol analyzer for EndaceProbes, which brings the same level of “laser precision” to the Network Operations (NetOps) and Security Operations (SecOps) process.  Many of you are familiar with Wireshark, the open source network analysis tool.  Wireshark has been the de facto standard for packet analysis in the Ethernet world for nearly a decade, and is used extensively by both NetOps and SecOps personnel.  However, the file sizes of traces produced from 10Gb Ethernet (10GbE) networks is a challenge for Wireshark, as anyone who has used Wireshark on such a trace can attest.  Like surgeries of old, you need to “open up” the patient to find the particular data of interest, which slows issue resolution

Continue reading “Endace Packets – Laser Surgery for the Data Center!”


Black Hat 2013 – It’s Hogwarts for Information Security Wizards (Or CIA Spooks)

Original Entry by : Sonny Singh

Imagine if Harry Potter’s life had been altered in an Aeon Flux, dystopian kind of way? Instead of inheriting wizard-like-skills and a matching lightning bolt scar on his forehead, he was conversely born with an astute affinity towards programming code, breaching internet firewalls and perhaps secretly working for the CIA?

If this were the case, Harry would clearly need to go to an academic institution worthy of his Information Security (InfoSec) inclined disposition, right? Believe it or not, such an institution actually exists – called “Black Hat,” and it is held yearly in Las Vegas.  Black Hat is a symposium that brings together the best minds in security to define tomorrow’s information security landscape with the ultimate goal of providing the essential knowledge and skills needed to defend the government and enterprises against today’s threats. Before we delve deeper, let’s first define what InfoSec is why it’s an extremely important topic to address in the technology sector.

Continue reading “Black Hat 2013 – It’s Hogwarts for Information Security Wizards (Or CIA Spooks)”