Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

3/20/2019
01:03 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Array Networks Launches Monitoring and Reporting System for Transforming Application Data into Actionable Intelligence

Monitoring and Reporting System (MARS) analyzes data from Array ADCs to identify and visualize traffic patterns in real-time and improve application availability, security and performance

Milpitas, CA – March 19, 2019 – Array Networks Inc. today announced the release of the Monitoring and Reporting System (MARS), which provides highly granular in-depth monitoring and reporting for one or more physical or virtual Array APV Series Application Delivery Controllers (ADCs). MARS enables IT admins to ensure network uptime, application security, and a superior user experience by providing on-demand visibility into traffic patterns, potential server availability or responsiveness issues, handshake and authorization issues, and other indicators of risks to application security and server efficiency. 

“IT departments the world over are under increasing pressure to maximize the performance and availability of applications and servers, as well as the overall user experience, in order to support greater productivity,” said Vinod Pisharody, chief technology officer at Array Networks. “Through MARS, network administrators now have a powerful tool to proactively address problematic servers and other trends, and ensure a strong security posture appropriate for their organization.”

Available in Basic or Advanced versions to fit the needs of customers running as few as a single Array ADC or as many as 32 Array ADCs, MARS provides a centralized console with graphical dashboards of user and server behaviors as well as traffic managed by Array server load balancing. Because of the unique position of the APV Series in the network – in front of data and application servers – and due to their ability to decrypt SSL traffic at near wire speed, MARS can provide unique insights that allow network administrators to quickly spot trends and trouble spots and remediate as needed to ensure performance and user experience.

MARS is available as a virtual appliance for VMware environments or for Array’s AVX Series Network Functions Platform, and offers five standard dashboards that are customizable in the Advanced version: 

• HTTP Response Codes Dashboard – Provides visualization of server performance and optimizations as well as server error codes for fast diagnosis and remediation of problem areas

• Cache Results Dashboard – Array ADCs can cache frequently requested information and pages in memory to speed response times. The dashboard provides an overview of uncached URLs that could benefit from caching, top users and requests, and other information to help administrators better manage data caching

• Server Delay Dashboard – Displays server response times and highlights server delays to help pinpoint bottlenecks that decrease overall performance and impact the user experience

• SSL Traffic Dashboard – Displays SSL/TLS versions and cipher suites utilized by traffic processed by the Array ADCs, giving the administrator insights to help configure and fine tune the organization’s security posture

• Alerts Dashboard – Graphically represents trends, priorities, problematic IP addresses and other performance issues, and allows prioritization based upon impact and severity

MARS is available immediately through Array authorized resellers worldwide.

 

About Array Networks

Array Networks solves performance and complexity challenges for businesses moving toward virtualized networking, security and application delivery. Headquartered in Silicon Valley, Array addresses the growing market demand for Network Functions Virtualization (NFV), cloud computing, and software-centric networking. Proven at more than 5,000 worldwide customer deployments, Array is recognized by leading analysts, enterprises, service providers and partners for pioneering next-generation technology that delivers agility at scale. To learn more, visit: www.arraynetworks.com

 

Press Contact: 

Nichols Communications for Array Networks Inc.

Jay Nichols, +1 408-772-1551

 

Jay Nichols
Nichols Communications
O: 415-913-7380
M: 408-772-1551
Skype: piratejay
[email protected]
@jayfish

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-7201
PUBLISHED: 2019-05-22
CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel.
CVE-2018-7803
PUBLISHED: 2019-05-22
A CWE-754 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Triconex TriStation Emulator V1.2.0, which could cause the emulator to crash when sending a specially crafted packet. The emulator is used infrequently for application logic testing. It is susceptible to an attack...
CVE-2018-7844
PUBLISHED: 2019-05-22
A CWE-200: Information Exposure vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause the disclosure of SNMP information when reading memory blocks from the controller over Modbus.
CVE-2018-7853
PUBLISHED: 2019-05-22
A CWE-248: Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause denial of service when reading invalid physical memory blocks in the controller over Modbus
CVE-2018-7854
PUBLISHED: 2019-05-22
A CWE-248 Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause a denial of Service when sending invalid debug parameters to the controller over Modbus.