Attacks/Breaches
9/29/2006
08:16 AM
50%
50%

Splunk, WildPackets Integrate

WildPackets announced integration between the WildPackets OmniAnalysis Platform and the Splunk Server

WALNUT CREEK, Calif. -- WildPackets Inc., innovators in advanced network analysis, today announced integration between the WildPackets OmniAnalysis Platform and the Splunk Server. Splunk is the highest performance search engine for IT data allowing users to index, search, and manage logs and other IT data. WildPackets' OmniEngine extends the network analysis capabilities of the WildPackets OmniAnalysis Platform to remote locations, performing 24/7 data capture and network analysis across multiple network topologies, including wireless (802.11), Gigabit networks and WAN links. Through the product integration of OmniEngines and Splunk, IT professionals using Splunk can aggregate the results of WildPackets' expert network analysis-including Apdex application analysis, VoIP analysis, and wireless analysis-from remote locations.

Using the combined WildPackets and Splunk solution, network engineers can capture and analyze network traffic with OmniPeek analyzers and OmniEngines; generate notifications for all key network events, including security threats, VoIP errors, low Apdex scores and user-configurable alarms; accelerate troubleshooting by collecting and comparing notifications from multiple sources; monitor, manage and troubleshoot distributed networks of any size.

"This partnership lets us extend our real-time notifications, using Splunk's powerful IT event indexer and search engine, creating tremendous value for IT personnel everywhere," states Mahboud Zabetian, CEO of WildPackets. "Now IT organizations can augment real-time OmniAnalysis alerts in areas such as application performance satisfaction, bandwidth availability, network management, compliance and traffic analysis, with other highly relevant data managed by Splunk, in order to gain a broader and more complete view of the state of their digital assets."

"The Splunk Server lets you instantly figure out what's happening across all the technologies in your IT infrastructure, so it's a great complement to the WildPackets solution," states Michael Baum, CEO of Splunk. "Expert network event notifications from WildPackets' OmniEngines provide a rich source of distributed network data, coupled with Splunk's ability to show those event notifications in the context of events from multiple sources, will accelerate troubleshooting for network administrators."

WildPackets Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4497
Published: 2015-08-29
Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token...

CVE-2015-4498
Published: 2015-08-29
The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point i...

CVE-2014-9651
Published: 2015-08-28
Buffer overflow in CHICKEN 4.9.0.x before 4.9.0.2, 4.9.x before 4.9.1, and before 5.0 allows attackers to have unspecified impact via a positive START argument to the "substring-index[-ci] procedures."

CVE-2015-1171
Published: 2015-08-28
Stack-based buffer overflow in GSM SIM Utility (aka SIM Card Editor) 6.6 allows remote attackers to execute arbitrary code via a long entry in a .sms file.

CVE-2015-2987
Published: 2015-08-28
Type74 ED before 4.0 misuses 128-bit ECB encryption for small files, which makes it easier for attackers to obtain plaintext data via differential cryptanalysis of a file with an original length smaller than 128 bits.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.