http://www.engineeringnews.co.za
  SEARCH
Login
R/€ = 17.22Change: -0.39
R/$ = 14.99Change: -0.38
Au 1279.73 $/ozChange: -7.52
Pt 1056.50 $/ozChange: -11.00
 
 
Note: Search is limited to the most recent 250 articles. Set date range to access earlier articles.
Where? With... When?








Start
 
End
 
 
And must exclude these words...
Close Main Search
Close Main Login
My Profile News Alerts Newsletters Logout Close Main Profile
 
Agriculture   Automotive   Chemicals   Competition Policy   Construction   Defence   Economy   Electricity   Energy   Environment   ICT   Metals   Mining   Science and Technology   Services   Trade   Transport & Logistics   Water  
What's On Press Office Tenders Suppliers Directory Research Jobs Announcements Letters About Us
 
 
 
RSS Feed
Article   Comments   Other News   Research   Magazine  
 
 
Apr 11, 2007

Endace will empower you!

Back
Africa|Business|Design|Flow|Resources|SECURITY|System|Systems|Technology|Wireless|Africa|Flow|Maintenance|Product|Products|Service|Services|Systems|Infrastructure|Operations
Africa|Business|Design|Flow|Resources|SECURITY|System|Systems|Technology|Wireless|Africa|Flow|Maintenance|Products|Service|Services|Systems|Infrastructure|Operations
africa-company|business|design|flow-company|resources|security|system|systems-company|technology|wireless|africa|flow-industry-term|maintenance|product|products|service|services|systems|infrastructure|operations

Are you a . . .

  • Telecommunications & Wireless Network Operator
For your capacity planning, service delivery, management and compliance with lawful intercept regulations, Endace provides complete access to network traffic statistics and whole content, enabling Network Managers to sustain and build their network and customer base profitably.
  • Financial Institution
Your automated trading systems make buy/sell decisions in milliseconds so the performance of your corporate network and your service providers' networks is crucial to your profitability. Leading financial trading houses rely on Endace to identify any potential threats to their network performance, and can use the very accurate records of transaction timing from their Endace probes for reporting.
  • Enterprise, Government Agency or University
Your Intellectual Property and information is highly sensitive and valuable - like any other such asset, it needs protecting. Endace's products enable 100% inspection of all traffic in/out of your organisation so that you can be sure of your information security, even under attack conditions. Only with this guaranteed level of performance can you be truly sure that nothing slips by.
  • Telecommunications Systems Integration House

Your ability to get to the market with a product that meets your customer's expectations, with the minimum of delay, is the life-blood of your business. Endace can provide the edge, by allowing you to build on a reliable platform, freeing up your resources to focus on your core applications.


Where Endace excells!

  • Monitor
Mobile network monitoring
Endace network monitoring infrastructure enables wireless network operators to monitor all traffic across layers in their Radio Access Network (RAN) and IP data core. Our Application Partners provide protocol reassembly for GPRS and UMTS RAN signaling protocols plus application-level TCP/IP session reassembly with detailed reporting of potential issues.
Together we enable network operators to build their networks cost-effectively, guarantee service performance, and grow their mobile data revenues for maximum profitability.
  • Detect
Information security in Enterprise networks
Your Intellectual Property and information is highly sensitive and valuable - like any other such asset, it needs protecting. Endace enables 100% inspection of all network traffic entering your organization so that you can be sure of your information security, even under attack conditions. Only with this guaranteed level of performance can you be truly sure that nothing slips by.
Our application partners combine their leading intrusion detection, anomaly detection and threat reporting software with Endace network monitoring infrastructure in order to provide network-wide security monitoring.
  • Intercept
Lawful Intercept in Carrier networks
Using Endace network monitoring infrastructure, telecommunications carriers can provide secure and separate access to targeted network traffic for Lawful Interception, while leveraging the same infrastructure investment for WAN security and management.
The monitoring infrastructure can also be used to ensure network service delivery and provide revenue-generating security monitoring services. Our customers are able to generate a meaningful ROI on an asset base that would otherwise only serve for regulatory compliance. Unlike router-based options, Endace monitoring probes ensure lossless capture of target traffic, invisible operation, and zero compromise of network performance.
  • Analyse
Carrier network flow analysis
Managing a complex and distributed network with many elements, many users, and many application protocols requires you to have a real-time network-wide view of activity. This visibility is vital to ensure the availability and security of your network services.
Endace network monitoring infrastructure supports a wide range of legacy, SONET/SDH, and Ethernet network types so that your flow analysis and deep packet inspection software can access traffic from all areas of your network and provide you with the precise intelligence that you need.
  • Prevent
Anti-data leakage (ADL) / Information leak prevention (ILP)
Endace network appliances enable your existing information leak prevention software to operate losslessly at multi-Gigabit speed, wherever you need to deploy them in your network to ensure that your intellectual property is protected from insider threats.
By deploying Endace network monitoring infrastructure throughout your network, you can enforce policy using your preferred anti-data leakage application, while concurrently supporting other network management and intrusion-detection applications on the same platforms.
  • Capture
Financial network transaction time monitoring
Your automated trading systems make buy/sell decisions in milliseconds so the performance of your corporate network and your service providers' networks is crucial to your profitability. Leading financial trading houses rely on Endace to identify any potential threats to their network performance. They also use the very accurate records of transaction timing to comply with transparency regulations such as the EU's MiFID (the Markets in Financial Instruments Directive).
Working with Endace, you can be assured of your trading system performance and profitability.


ENDACE PRODUCTS

DAG CARDS - Ethernet, Sonnet/SDH, PDH/TDM

Endace DAG network monitoring interface cards provide 100% packet or cell capture, regardless of interface type, packet size, or network loading. On top of this zero-loss performance, Endace DAG cards offload the data handling workload from the CPU, allowing software applications to inspect and process traffic at much higher speed.

Accessories

More recent DAG cards feature the Endace Data Stream Manager (DSM) which provides hardware-based traffic filtering, data stream replication, and CPU load balancing functions. These effectively accelerate application performance, enabling Network Managers to be confident that every packet has been inspected and reported on, and that nothing has been missed.


NinjaProbe appliances

Endace NinjaProbe appliances provide a hardware-optimised system to take advantage of the wire-speed capabilities of Endace DAG technology. Options are available for high-speed capture to disk, high-speed real-time traffic processing, and full line-rate flow record generation.

NinjaProbe appliances deliver unmatched performance and support a wide range of traffic analysis applications. They can be quickly installed and deployed, with secure remote management, update, roll-back, and configuration backup capabilities.


DEPLOYMENT MODEL

Enterprise IT Managers and Managed Security Service Providers benefit by gaining secure access to 100% of traffic at the key perimeter points of their corporate networks.

Network Operators' security and operations teams both gain secure access to the core, edge, and peering traffic that concerns them, while the same infrastructure supports their Lawful Intercept obligations.
Implemented out-of-band, Endace network monitoring systems are vendor-neutral and completely invisible to every other network element. They provide information on network traffic at all layers of the network stack. This enables pinpoint selection of any protocol and any endpoint on the network to watch.

SOUTH AFRICAN APPLICATION PARTNER


Data & Systems Technology (Pty) Ltd represents Endace in Southern Africa.
We can assist with sales, consultation, system design, development, deployment and maintenance of systems.

For more information please contact:


Data & Systems Technology (Pty) Ltd

012 346 5667
082 447 3289
Deon Herbst

Or visit www.endace.com

 

Edited by: Creamer Media Reporter

To subscribe email subscriptions@creamermedia.co.za or click here
To advertise email advertising@creamermedia.co.za or click here
 
Comment Guidelines (150 word limit)
 
 
 
 
 
 
 
 
Other News This Week News
The two spent-fuel pools at Eskom’s 1 800 MW Koeberg nuclear power station, in the Western Cape, will be full by 2018, increasing the urgency on the State-owned utility to begin pursuing alternative storage options. Koeberg has, over the past 32 years, accumulated a...
South Africa lacks the skills necessary to implement the government’s plan to build 9.6 GWe of new nuclear energy capacity, warns nuclear-qualified Quality Strategies International CEO David Crawford. “Apart from the concern about the affordability of the programme,...
DOROS HADJIZENONOS The 700-series devices provide network security monitoring, app control, URL filtering, VPN security, antivirus, antispam, antibot, and advanced intrusion prevention and detection functionality
Cybersecurity multinational Check Point has released its latest 700-series cybersecurity systems for small businesses, which draw on its international threat intelligence to provide up-to-date cybersecurity, says Check Point South Africa country manager Doros...
More
 
 
Latest News
Brenda Berlin
Updated 6 hours ago Platinum mining company Impala Platinum (Implats) has secured a court order against a US platinum recycler, from which it is claiming $201-million. Implats said on Wednesday that the order, issued by the US District Court for the Eastern District of Pennsylvania,...
Andrew Hinkly
Updated 7 hours ago A potentially far-reaching step has been taken towards the viable roll-out of hydrogen refuelling infrastructure for platinum-using fuel cell electric vehicles (FCEVs) with the launch of a system that allows hydrogen to be stored and transported in conventional fuel...
Johannesburg mayor Parks Tau
Updated 7 hours ago At least R14-billion in investments had seen the economic development of the City of Johannesburg, resulting in economic hubs that created jobs and further opportunities for the city’s citizens, mayor Parks Tau said on Wednesday. The city had begun redesigning the...
More
 
 
Recent Research Reports
Energy Roundup – May 2016 (PDF Report)
The May 2016 roundup covers activities across South Africa for April 2016 and includes details of the National Energy Regulator of South Africa’s proposal to introduce a coal benchmark cost as part of its final decision on Eskom’s multiyear price determination...
Automotive 2016: A review of South Africa's automotive sector (PDF Report)
Creamer Media’s Automotive 2016 Report provides an overview of South Africa’s automotive industry over the past 12 months. The report provides insight into local demand and production, vehicle imports and exports, investment and competitiveness in the sector, as well...
Energy Roundup – April 2016 (PDF Report)
The April 2016 roundup covers activities across South Africa for March 2016 and includes details of a North Gauteng High Court Judge’s dismissal of a court application to postpone the 9.4% electricity tariff increase, which the National Energy Regulator of South...
Electricity 2016: A review of South Africa's electricity sector (PDF Report)
Creamer Media’s Electricity 2016 report provides an overview of South Africa’s electricity sector, focusing on State-owned power utility Eskom and independent power producers, electricity planning, transmission, distribution and the theft thereof, besides other issues.
Energy Roundup – March 2016 (PDF Report)
The March 2016 roundup covers activities across South Africa for February 2016 and includes details of the Department of Energy’s plans to announce the preferred bidders for the first tranche of the coal independent power producer procurement programme; the Council...
Steel 2016: A review of South Africa's steel sector (PDF Report)
Creamer Media’s Steel 2016 Report examines South Africa’s steel industry over the past 12 months. The report provides insight into the global steel market and and particularly into South South Africa’s steel sector, including production and consumption, main...
 
 
 
 
 
This Week's Magazine
The two spent-fuel pools at Eskom’s 1 800 MW Koeberg nuclear power station, in the Western Cape, will be full by 2018, increasing the urgency on the State-owned utility to begin pursuing alternative storage options. Koeberg has, over the past 32 years, accumulated a...
South Africa lacks the skills necessary to implement the government’s plan to build 9.6 GWe of new nuclear energy capacity, warns nuclear-qualified Quality Strategies International CEO David Crawford. “Apart from the concern about the affordability of the programme,...
DOROS HADJIZENONOS The 700-series devices provide network security monitoring, app control, URL filtering, VPN security, antivirus, antispam, antibot, and advanced intrusion prevention and detection functionality
Cybersecurity multinational Check Point has released its latest 700-series cybersecurity systems for small businesses, which draw on its international threat intelligence to provide up-to-date cybersecurity, says Check Point South Africa country manager Doros...
Daimler Trucks and Buses Southern Africa (DTBSA) saw a marked slip in new-vehicle sales in 2015 compared with 2014, with sales dropping from 5 897 units to 5 300 units. The decline came as the South African new truck and bus market declined from 31 558 units in 2014...
Group of 20 (G-20) economies threatened to penalise havens that don’t share information on their banking clients after the leak of the Panama Papers provoked a global uproar over tax evasion. The G-20 will consider “defensive measures” against financial centers and...
 
 
 
 
 
 
 
 
 
Alert Close
Embed Code Close
content
Research Reports Close
Research Reports are a product of the
Research Channel Africa. Reports can be bought individually or you can gain full access to all reports as part of a Research Channel Africa subscription.
Find Out More Buy Report
 
 
Close
Engineering News
Completely Re-Engineered
Experience it now. Click here
*website to launch in a few weeks
Subscribe Now for $149 Close
Subscribe Now for $149