Risk
2/27/2014
05:19 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Napatech Unveils Network Analysis Adapter To Enhance Appliance Throughput

Four-port 10 Gbps network analysis adapter provides full 40 Gbps analysis

BARCELONA, Spain and SAN FRANCISCO, Feb. 25, 2014 /PRNewswire/ -- (Mobile World Congress, Booth#6K20 and RSA Booth#1932) -- Napatech (OSE: NAPA), the world's leading supplier of network analysis adapters, today announced the availability of a new 4 port 10 Gbps adapter. This new product will help network equipment manufacturers stay ahead of the data growth curve by offering higher throughput with multi-port appliance solutions, while reducing time to market and risk.

(Logo: http://photos.prnewswire.com/prnh/20130917/LA81677LOGO)

PRODUCT FEATURES:

4 port 10 Gbps network analysis adapter provides full 40 Gbps analysis with guaranteed data delivery to applications.

Napatech Software Suite provides hardware abstraction that allows up to eight network adapters in an appliance to appear as one, enabling up to 320 Gbps of throughput per appliance.

Real-time data from multiple points in the network can be collected and merged into a single analysis stream, allowing for easier correlation of analysis data.

Precise merging is made possible by nanosecond precision time-stamping of every Ethernet frame, based on flexible support of multiple time synchronization schemes including IEEE1588-2008 Precision Time Protocol (PTP).

State-of-the-art monitoring of air temperature, voltage and power consumption.

Heat exhausts on the front of the adapter, double cooling and a unique housing ensure a consistent temperature in the most demanding environments.

Napatech will debut the new product at both Mobile World Congress in Barcelona, Spain from Feb. 24-27 and the RSA Conference in San Francisco, USA from Feb. 24-28.

SUPPORTING QUOTE:

Erik Norup, president and CMO, Napatech, said:

"Network equipment manufacturers are focused on improving efficiency, performance and cost. To stay ahead of the data growth curve, our customers will need higher capacity appliances with multiple analysis ports that help them reduce their time to market and risk. Our new 4 port 10G product and Napatech Software Suite addresses these needs. Napatech will continue to offer the broadest portfolio to enable unprecedented throughput with guaranteed delivery of data."

About Napatech

Napatech is the leading supplier of real-time analysis adapters with over 140,000 Ethernet ports deployed worldwide. Designed for use with Commercial Off-The-Shelf (COTS) servers, Napatech adapters enable rapid development of powerful appliances for high performance analysis. Napatech adapters guarantee real-time delivery of data at speeds up to 40 Gbps. Intelligent features allow network data analysis to be off-loaded, thereby accelerating application analysis for managing, securing and optimizing networks and services. When performance matters, the world's largest equipment vendors in telecom, enterprise, financial and government markets choose Napatech. Customers depend on Napatech for reliable delivery, complimentary maintenance and upgrades, and experienced global customer support. Napatech is headquartered in Copenhagen (Denmark) with offices in Mountain View, Andover, Washington D.C. (USA), Tokyo (Japan), Seoul (South Korea) and Sao Paulo (Brazil).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-0460
Published: 2014-04-16
The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.

CVE-2011-0993
Published: 2014-04-16
SUSE Lifecycle Management Server before 1.1 uses world readable postgres credentials, which allows local users to obtain sensitive information via unspecified vectors.

CVE-2011-3180
Published: 2014-04-16
kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.

CVE-2011-4089
Published: 2014-04-16
The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.

CVE-2011-4192
Published: 2014-04-16
kiwi before 4.85.1, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands as demonstrated by "double quotes in kiwi_oemtitle of .profile."

Best of the Web