Risk
2/27/2014
05:19 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Napatech Unveils Network Analysis Adapter To Enhance Appliance Throughput

Four-port 10 Gbps network analysis adapter provides full 40 Gbps analysis

BARCELONA, Spain and SAN FRANCISCO, Feb. 25, 2014 /PRNewswire/ -- (Mobile World Congress, Booth#6K20 and RSA Booth#1932) -- Napatech (OSE: NAPA), the world's leading supplier of network analysis adapters, today announced the availability of a new 4 port 10 Gbps adapter. This new product will help network equipment manufacturers stay ahead of the data growth curve by offering higher throughput with multi-port appliance solutions, while reducing time to market and risk.

(Logo: http://photos.prnewswire.com/prnh/20130917/LA81677LOGO)

PRODUCT FEATURES:

4 port 10 Gbps network analysis adapter provides full 40 Gbps analysis with guaranteed data delivery to applications.

Napatech Software Suite provides hardware abstraction that allows up to eight network adapters in an appliance to appear as one, enabling up to 320 Gbps of throughput per appliance.

Real-time data from multiple points in the network can be collected and merged into a single analysis stream, allowing for easier correlation of analysis data.

Precise merging is made possible by nanosecond precision time-stamping of every Ethernet frame, based on flexible support of multiple time synchronization schemes including IEEE1588-2008 Precision Time Protocol (PTP).

State-of-the-art monitoring of air temperature, voltage and power consumption.

Heat exhausts on the front of the adapter, double cooling and a unique housing ensure a consistent temperature in the most demanding environments.

Napatech will debut the new product at both Mobile World Congress in Barcelona, Spain from Feb. 24-27 and the RSA Conference in San Francisco, USA from Feb. 24-28.

SUPPORTING QUOTE:

Erik Norup, president and CMO, Napatech, said:

"Network equipment manufacturers are focused on improving efficiency, performance and cost. To stay ahead of the data growth curve, our customers will need higher capacity appliances with multiple analysis ports that help them reduce their time to market and risk. Our new 4 port 10G product and Napatech Software Suite addresses these needs. Napatech will continue to offer the broadest portfolio to enable unprecedented throughput with guaranteed delivery of data."

About Napatech

Napatech is the leading supplier of real-time analysis adapters with over 140,000 Ethernet ports deployed worldwide. Designed for use with Commercial Off-The-Shelf (COTS) servers, Napatech adapters enable rapid development of powerful appliances for high performance analysis. Napatech adapters guarantee real-time delivery of data at speeds up to 40 Gbps. Intelligent features allow network data analysis to be off-loaded, thereby accelerating application analysis for managing, securing and optimizing networks and services. When performance matters, the world's largest equipment vendors in telecom, enterprise, financial and government markets choose Napatech. Customers depend on Napatech for reliable delivery, complimentary maintenance and upgrades, and experienced global customer support. Napatech is headquartered in Copenhagen (Denmark) with offices in Mountain View, Andover, Washington D.C. (USA), Tokyo (Japan), Seoul (South Korea) and Sao Paulo (Brazil).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7441
Published: 2015-05-29
The modern style negotiation in Network Block Device (nbd-server) 2.9.22 through 3.3 allows remote attackers to cause a denial of service (root process termination) by (1) closing the connection during negotiation or (2) specifying a name for a non-existent export.

CVE-2014-9727
Published: 2015-05-29
AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm.

CVE-2015-0200
Published: 2015-05-29
IBM WebSphere Commerce 6.x through 6.0.0.11 and 7.x before 7.0.0.8 IF2 allows local users to obtain sensitive database information via unspecified vectors.

CVE-2015-0751
Published: 2015-05-29
Cisco IP Phone 7861, when firmware from Cisco Unified Communications Manager 10.3(1) is used, allows remote attackers to cause a denial of service via crafted packets, aka Bug ID CSCus81800.

CVE-2015-0752
Published: 2015-05-29
Cross-site scripting (XSS) vulnerability in Cisco TelePresence Video Communication Server (VCS) X8.5.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCut27635.

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?