Risk
2/27/2014
05:19 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Napatech Unveils Network Analysis Adapter To Enhance Appliance Throughput

Four-port 10 Gbps network analysis adapter provides full 40 Gbps analysis

BARCELONA, Spain and SAN FRANCISCO, Feb. 25, 2014 /PRNewswire/ -- (Mobile World Congress, Booth#6K20 and RSA Booth#1932) -- Napatech (OSE: NAPA), the world's leading supplier of network analysis adapters, today announced the availability of a new 4 port 10 Gbps adapter. This new product will help network equipment manufacturers stay ahead of the data growth curve by offering higher throughput with multi-port appliance solutions, while reducing time to market and risk.

(Logo: http://photos.prnewswire.com/prnh/20130917/LA81677LOGO)

PRODUCT FEATURES:

4 port 10 Gbps network analysis adapter provides full 40 Gbps analysis with guaranteed data delivery to applications.

Napatech Software Suite provides hardware abstraction that allows up to eight network adapters in an appliance to appear as one, enabling up to 320 Gbps of throughput per appliance.

Real-time data from multiple points in the network can be collected and merged into a single analysis stream, allowing for easier correlation of analysis data.

Precise merging is made possible by nanosecond precision time-stamping of every Ethernet frame, based on flexible support of multiple time synchronization schemes including IEEE1588-2008 Precision Time Protocol (PTP).

State-of-the-art monitoring of air temperature, voltage and power consumption.

Heat exhausts on the front of the adapter, double cooling and a unique housing ensure a consistent temperature in the most demanding environments.

Napatech will debut the new product at both Mobile World Congress in Barcelona, Spain from Feb. 24-27 and the RSA Conference in San Francisco, USA from Feb. 24-28.

SUPPORTING QUOTE:

Erik Norup, president and CMO, Napatech, said:

"Network equipment manufacturers are focused on improving efficiency, performance and cost. To stay ahead of the data growth curve, our customers will need higher capacity appliances with multiple analysis ports that help them reduce their time to market and risk. Our new 4 port 10G product and Napatech Software Suite addresses these needs. Napatech will continue to offer the broadest portfolio to enable unprecedented throughput with guaranteed delivery of data."

About Napatech

Napatech is the leading supplier of real-time analysis adapters with over 140,000 Ethernet ports deployed worldwide. Designed for use with Commercial Off-The-Shelf (COTS) servers, Napatech adapters enable rapid development of powerful appliances for high performance analysis. Napatech adapters guarantee real-time delivery of data at speeds up to 40 Gbps. Intelligent features allow network data analysis to be off-loaded, thereby accelerating application analysis for managing, securing and optimizing networks and services. When performance matters, the world's largest equipment vendors in telecom, enterprise, financial and government markets choose Napatech. Customers depend on Napatech for reliable delivery, complimentary maintenance and upgrades, and experienced global customer support. Napatech is headquartered in Copenhagen (Denmark) with offices in Mountain View, Andover, Washington D.C. (USA), Tokyo (Japan), Seoul (South Korea) and Sao Paulo (Brazil).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0547
Published: 2015-07-04
The D2CenterstageService.getComments service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-0548
Published: 2015-07-04
The D2DownloadService.getDownloadUrls service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-4196
Published: 2015-07-04
Platform Software before 4.4.5 in Cisco Unified Communications Domain Manager (CDM) 8.x has a hardcoded password for a privileged account, which allows remote attackers to obtain root access by leveraging knowledge of this password and entering it in an SSH session, aka Bug ID CSCuq45546.

CVE-2015-4525
Published: 2015-07-04
The log-gather implementation in the web administration interface in EMC Isilon OneFS 6.5.x.x through 7.1.1.x before 7.1.1.5 and 7.2.0.x before 7.2.0.2 allows remote authenticated users to execute arbitrary commands with root privileges via unspecified vectors.

CVE-2015-4231
Published: 2015-07-03
The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report