Apr 11, 2007
Endace will empower you!Back
SECURITY|Africa|Application Partners|Endace|Flow|Resources|Security|System|Systems|Africa|Security|Access To Network|Corporate Network|Flow|High-speed Real-time Traffic Processing|Maintenance|Network Monitoring Infrastructure|Product|Products|Revenue-generating Security Monitoring Services|Security|Service|Services|Software Applications|Systems|Telecommunications Carriers|Threat Reporting Software|Wireless Network|Wireless Network Operators|Financial Institution|Government Agency|Infrastructure|Security|Endace DAG Technology|Ethernet|Gigabit|Load Balancing|PDH|SDH|SONET|TCP/IP|WAN
© Reuse this
Are you a . . .
For your capacity planning, service delivery, management and compliance with lawful intercept regulations, Endace provides complete access to network traffic statistics and whole content, enabling Network Managers to sustain and build their network and customer base profitably.
Your automated trading systems make buy/sell decisions in milliseconds so the performance of your corporate network and your service providers' networks is crucial to your profitability. Leading financial trading houses rely on Endace to identify any potential threats to their network performance, and can use the very accurate records of transaction timing from their Endace probes for reporting.
Your Intellectual Property and information is highly sensitive and valuable - like any other such asset, it needs protecting. Endace's products enable 100% inspection of all traffic in/out of your organisation so that you can be sure of your information security, even under attack conditions. Only with this guaranteed level of performance can you be truly sure that nothing slips by.
Mobile network monitoring
Endace network monitoring infrastructure enables wireless network operators to monitor all traffic across layers in their Radio Access Network (RAN) and IP data core. Our Application Partners provide protocol reassembly for GPRS and UMTS RAN signaling protocols plus application-level TCP/IP session reassembly with detailed reporting of potential issues.
Together we enable network operators to build their networks cost-effectively, guarantee service performance, and grow their mobile data revenues for maximum profitability.
Information security in Enterprise networks
Your Intellectual Property and information is highly sensitive and valuable - like any other such asset, it needs protecting. Endace enables 100% inspection of all network traffic entering your organization so that you can be sure of your information security, even under attack conditions. Only with this guaranteed level of performance can you be truly sure that nothing slips by.
Our application partners combine their leading intrusion detection, anomaly detection and threat reporting software with Endace network monitoring infrastructure in order to provide network-wide security monitoring.
Lawful Intercept in Carrier networks
Using Endace network monitoring infrastructure, telecommunications carriers can provide secure and separate access to targeted network traffic for Lawful Interception, while leveraging the same infrastructure investment for WAN security and management.
The monitoring infrastructure can also be used to ensure network service delivery and provide revenue-generating security monitoring services. Our customers are able to generate a meaningful ROI on an asset base that would otherwise only serve for regulatory compliance. Unlike router-based options, Endace monitoring probes ensure lossless capture of target traffic, invisible operation, and zero compromise of network performance.
Carrier network flow analysis
Managing a complex and distributed network with many elements, many users, and many application protocols requires you to have a real-time network-wide view of activity. This visibility is vital to ensure the availability and security of your network services.
Endace network monitoring infrastructure supports a wide range of legacy, SONET/SDH, and Ethernet network types so that your flow analysis and deep packet inspection software can access traffic from all areas of your network and provide you with the precise intelligence that you need.
Anti-data leakage (ADL) / Information leak prevention (ILP)
Endace network appliances enable your existing information leak prevention software to operate losslessly at multi-Gigabit speed, wherever you need to deploy them in your network to ensure that your intellectual property is protected from insider threats.
By deploying Endace network monitoring infrastructure throughout your network, you can enforce policy using your preferred anti-data leakage application, while concurrently supporting other network management and intrusion-detection applications on the same platforms.
Financial network transaction time monitoring
Your automated trading systems make buy/sell decisions in milliseconds so the performance of your corporate network and your service providers' networks is crucial to your profitability. Leading financial trading houses rely on Endace to identify any potential threats to their network performance. They also use the very accurate records of transaction timing to comply with transparency regulations such as the EU's MiFID (the Markets in Financial Instruments Directive).
Working with Endace, you can be assured of your trading system performance and profitability.
DAG CARDS - Ethernet, Sonnet/SDH, PDH/TDM
Endace DAG network monitoring interface cards provide 100% packet or cell capture, regardless of interface type, packet size, or network loading. On top of this zero-loss performance, Endace DAG cards offload the data handling workload from the CPU, allowing software applications to inspect and process traffic at much higher speed.
More recent DAG cards feature the Endace Data Stream Manager (DSM) which provides hardware-based traffic filtering, data stream replication, and CPU load balancing functions. These effectively accelerate application performance, enabling Network Managers to be confident that every packet has been inspected and reported on, and that nothing has been missed.
Edited by: Creamer Media Reporter© Reuse this Comment Guidelines (150 word limit)
Other News This Week News
Updated 1 hour 3 minutes ago Ensuring that small, medium-sized and microenterprises (SMMEs) were included in the mainstream economy had to form part of the “radical economic transformation” targeted by the current administration, Small Business Development Minister Lindiwe Zulu said on Tuesday....
Updated 1 hour 40 minutes ago Uganda could rely on income from future oil exports to finance an $8-billion railway if funding talks with China fail to bear fruit, its president said. Yoweri Museveni confirmed that Uganda had started negotiations with China on building the line that would link to...
Updated 2 hours 39 minutes ago JSE-listed materials supplier Afrimat expects to report basic earnings per share (EPS) of between 59c and 64c, when it releases its interim results for the six months ended August 31. This would be between 20% and 30% higher than the EPS of 49.1c recorded in the...
Recent Research Reports
Defence 2014: A review of South Africa's defence industry (PDF Report)
Creamer Media’s Defence 2014 report examines South Africa’s defence industry, with particular focus on the key participants in the sector, the innovations that have come out of the sector, local and export demand, South Africa’s controversial multibillion-rand...
Road and Rail 2014: A review of South Africa's road and rail infrastructure (PDF report)
Creamer Media’s Road and Rail 2014 report examines South Africa’s road and rail transport system, with particular focus on the size and state of the country’s road and rail network, the funding and maintenance of these respective networks, and the push to move road...
Real Economy Year Book 2014 (PDF Report)
This edition drills down into the performance and outlook for a variety of sectors, including automotive, construction, electricity, transport, steel, water, coal, gold, iron-ore and platinum.
Real Economy Insight: Automotive 2014 (PDF Report)
This four-page brief covers key developments in the automotive industry over the past 12 months, including an overview of South Africa’s automotive market, trade figures, production and the policies influencing the sector.
Real Economy Insight: Construction 2014 (PDF Report)
This five-page brief covers key developments in the construction industry over the past 12 months. It provides an overview of the sector and includes details of employment in the sector, infrastructure and municipal spending, as well as insight into companies’...
Real Economy Insight: Electricity 2014 (PDF Report)
This five-page brief covers key developments in the electricity industry over the past 12 months, including details of State-owned power utility Eskom’s generation activities, funding and tariffs, independent power producers and prospects for the sector.
This Week's Magazine
The broad-based black economic-empowerment (BBBEE) alignment process in the con-struction sector has begun, dur-ing which the sector codes of the Construction Sector Charter Council (CSCC) will be aligned with the revised Codes of Good Practice (CoGP), which come...
It is second time lucky for Toby Venter. Ten years ago he negotiated to buy the Kyalami racetrack, but “the deal did not materialise”.
Environmental solutions company I-Cat started construction work on its R22-million, 1 949 m2 environmentally sustainable office and warehouse facility, commissioned by I-CAT Environmental Solutions, at a launch event in October. The new sustainable I-CAT campus,...
Effective file synchronisation and sharing across an organisation’s structures can provide the basis for robust mobile-device and document management while maintaining proper backup, version control and content distribution. These are the lessons learned by complex...
Hotel group Carlson Rezidor currently holds the largest hotel pipeline in Africa with 30 hotels and 6 300 rooms under development. The hotel group develops and operates Radisson Blu in the upper upscale segment and Park Inn by Radisson in the mid-market segment. With...