Network Instruments announced the release of its GigaStor appliance with integrated security forensics
MINNEAPOLIS -- Network Instruments, a leading provider of innovative analysis solutions for in-depth network intelligence and continuous availability, today announced the release of its GigaStor appliance with integrated security forensics. The comprehensive forensic analysis solution identifies and resolves network, application, and security issues, allowing network and security teams to work together on quick problem resolution.
When troubleshooting enterprise-level networks, engineers from security and network teams often do not have the visibility required to quickly isolate and resolve issues. This can result in time wasted by attempting to replicate the network issue or fighting with other network teams over the cause of the issue.
To facilitate fast problem resolution, Network Instruments has expanded the retrospective network analysis capabilities of GigaStor to identify security breaches. GigaStor operates like a security camera, recording everything traversing the network for future analysis. With Security Forensics, GigaStor determines whether a security breach occurred by comparing the historical traffic against a list of thousands of known attacks and anomalies. If a breach is identified, GigaStor provides drill-down analysis to determine the source and time of the occurrence.
"GigaStor dramatically changes the way an enterprise can troubleshoot application and network issues," said Douglas Smith, president of Network Instruments. "It gives the network team the benefit of 20/20 hindsight in identifying and resolving problems. Having the event recorded, the team is able to see everything unfold as well as run extensive Expert analysis on the historical data, which improves their accuracy and speed in diagnosing the underlying network problem. The addition of over 8,000 security experts to GigaStor will now change the way security teams investigate and resolve breaches on their networks."
About the Author(s)
You May Also Like
Defending Against Today's Threat Landscape with MDR
April 18, 2024The fuel in the new AI race: Data
April 23, 2024Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024