Risk
2/27/2014
05:19 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Napatech Unveils Network Analysis Adapter To Enhance Appliance Throughput

Four-port 10 Gbps network analysis adapter provides full 40 Gbps analysis

BARCELONA, Spain and SAN FRANCISCO, Feb. 25, 2014 /PRNewswire/ -- (Mobile World Congress, Booth#6K20 and RSA Booth#1932) -- Napatech (OSE: NAPA), the world's leading supplier of network analysis adapters, today announced the availability of a new 4 port 10 Gbps adapter. This new product will help network equipment manufacturers stay ahead of the data growth curve by offering higher throughput with multi-port appliance solutions, while reducing time to market and risk.

(Logo: http://photos.prnewswire.com/prnh/20130917/LA81677LOGO)

PRODUCT FEATURES:

4 port 10 Gbps network analysis adapter provides full 40 Gbps analysis with guaranteed data delivery to applications.

Napatech Software Suite provides hardware abstraction that allows up to eight network adapters in an appliance to appear as one, enabling up to 320 Gbps of throughput per appliance.

Real-time data from multiple points in the network can be collected and merged into a single analysis stream, allowing for easier correlation of analysis data.

Precise merging is made possible by nanosecond precision time-stamping of every Ethernet frame, based on flexible support of multiple time synchronization schemes including IEEE1588-2008 Precision Time Protocol (PTP).

State-of-the-art monitoring of air temperature, voltage and power consumption.

Heat exhausts on the front of the adapter, double cooling and a unique housing ensure a consistent temperature in the most demanding environments.

Napatech will debut the new product at both Mobile World Congress in Barcelona, Spain from Feb. 24-27 and the RSA Conference in San Francisco, USA from Feb. 24-28.

SUPPORTING QUOTE:

Erik Norup, president and CMO, Napatech, said:

"Network equipment manufacturers are focused on improving efficiency, performance and cost. To stay ahead of the data growth curve, our customers will need higher capacity appliances with multiple analysis ports that help them reduce their time to market and risk. Our new 4 port 10G product and Napatech Software Suite addresses these needs. Napatech will continue to offer the broadest portfolio to enable unprecedented throughput with guaranteed delivery of data."

About Napatech

Napatech is the leading supplier of real-time analysis adapters with over 140,000 Ethernet ports deployed worldwide. Designed for use with Commercial Off-The-Shelf (COTS) servers, Napatech adapters enable rapid development of powerful appliances for high performance analysis. Napatech adapters guarantee real-time delivery of data at speeds up to 40 Gbps. Intelligent features allow network data analysis to be off-loaded, thereby accelerating application analysis for managing, securing and optimizing networks and services. When performance matters, the world's largest equipment vendors in telecom, enterprise, financial and government markets choose Napatech. Customers depend on Napatech for reliable delivery, complimentary maintenance and upgrades, and experienced global customer support. Napatech is headquartered in Copenhagen (Denmark) with offices in Mountain View, Andover, Washington D.C. (USA), Tokyo (Japan), Seoul (South Korea) and Sao Paulo (Brazil).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2037
Published: 2014-11-26
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.

CVE-2014-6609
Published: 2014-11-26
The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.

CVE-2014-6610
Published: 2014-11-26
Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dia...

CVE-2014-7141
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.

CVE-2014-7142
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (crash) via a crafted (1) ICMP or (2) ICMP6 packet size.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?