GigaStor Provides ForensicsGigaStor Provides Forensics
Network Instruments announced the release of its GigaStor appliance with integrated security forensics
March 12, 2007

MINNEAPOLIS -- Network Instruments, a leading provider of innovative analysis solutions for in-depth network intelligence and continuous availability, today announced the release of its GigaStor appliance with integrated security forensics. The comprehensive forensic analysis solution identifies and resolves network, application, and security issues, allowing network and security teams to work together on quick problem resolution.
When troubleshooting enterprise-level networks, engineers from security and network teams often do not have the visibility required to quickly isolate and resolve issues. This can result in time wasted by attempting to replicate the network issue or fighting with other network teams over the cause of the issue.
To facilitate fast problem resolution, Network Instruments has expanded the retrospective network analysis capabilities of GigaStor to identify security breaches. GigaStor operates like a security camera, recording everything traversing the network for future analysis. With Security Forensics, GigaStor determines whether a security breach occurred by comparing the historical traffic against a list of thousands of known attacks and anomalies. If a breach is identified, GigaStor provides drill-down analysis to determine the source and time of the occurrence.
"GigaStor dramatically changes the way an enterprise can troubleshoot application and network issues," said Douglas Smith, president of Network Instruments. "It gives the network team the benefit of 20/20 hindsight in identifying and resolving problems. Having the event recorded, the team is able to see everything unfold as well as run extensive Expert analysis on the historical data, which improves their accuracy and speed in diagnosing the underlying network problem. The addition of over 8,000 security experts to GigaStor will now change the way security teams investigate and resolve breaches on their networks."
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023