Risk
2/27/2014
05:19 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Napatech Unveils Network Analysis Adapter To Enhance Appliance Throughput

Four-port 10 Gbps network analysis adapter provides full 40 Gbps analysis

BARCELONA, Spain and SAN FRANCISCO, Feb. 25, 2014 /PRNewswire/ -- (Mobile World Congress, Booth#6K20 and RSA Booth#1932) -- Napatech (OSE: NAPA), the world's leading supplier of network analysis adapters, today announced the availability of a new 4 port 10 Gbps adapter. This new product will help network equipment manufacturers stay ahead of the data growth curve by offering higher throughput with multi-port appliance solutions, while reducing time to market and risk.

(Logo: http://photos.prnewswire.com/prnh/20130917/LA81677LOGO)

PRODUCT FEATURES:

4 port 10 Gbps network analysis adapter provides full 40 Gbps analysis with guaranteed data delivery to applications.

Napatech Software Suite provides hardware abstraction that allows up to eight network adapters in an appliance to appear as one, enabling up to 320 Gbps of throughput per appliance.

Real-time data from multiple points in the network can be collected and merged into a single analysis stream, allowing for easier correlation of analysis data.

Precise merging is made possible by nanosecond precision time-stamping of every Ethernet frame, based on flexible support of multiple time synchronization schemes including IEEE1588-2008 Precision Time Protocol (PTP).

State-of-the-art monitoring of air temperature, voltage and power consumption.

Heat exhausts on the front of the adapter, double cooling and a unique housing ensure a consistent temperature in the most demanding environments.

Napatech will debut the new product at both Mobile World Congress in Barcelona, Spain from Feb. 24-27 and the RSA Conference in San Francisco, USA from Feb. 24-28.

SUPPORTING QUOTE:

Erik Norup, president and CMO, Napatech, said:

"Network equipment manufacturers are focused on improving efficiency, performance and cost. To stay ahead of the data growth curve, our customers will need higher capacity appliances with multiple analysis ports that help them reduce their time to market and risk. Our new 4 port 10G product and Napatech Software Suite addresses these needs. Napatech will continue to offer the broadest portfolio to enable unprecedented throughput with guaranteed delivery of data."

About Napatech

Napatech is the leading supplier of real-time analysis adapters with over 140,000 Ethernet ports deployed worldwide. Designed for use with Commercial Off-The-Shelf (COTS) servers, Napatech adapters enable rapid development of powerful appliances for high performance analysis. Napatech adapters guarantee real-time delivery of data at speeds up to 40 Gbps. Intelligent features allow network data analysis to be off-loaded, thereby accelerating application analysis for managing, securing and optimizing networks and services. When performance matters, the world's largest equipment vendors in telecom, enterprise, financial and government markets choose Napatech. Customers depend on Napatech for reliable delivery, complimentary maintenance and upgrades, and experienced global customer support. Napatech is headquartered in Copenhagen (Denmark) with offices in Mountain View, Andover, Washington D.C. (USA), Tokyo (Japan), Seoul (South Korea) and Sao Paulo (Brazil).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-3518
Published: 2014-07-22
jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to exec...

CVE-2014-3530
Published: 2014-07-22
The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.