Apr 11, 2007
Endace will empower you!Back
© Reuse this
Are you a . . .
For your capacity planning, service delivery, management and compliance with lawful intercept regulations, Endace provides complete access to network traffic statistics and whole content, enabling Network Managers to sustain and build their network and customer base profitably.
Your automated trading systems make buy/sell decisions in milliseconds so the performance of your corporate network and your service providers' networks is crucial to your profitability. Leading financial trading houses rely on Endace to identify any potential threats to their network performance, and can use the very accurate records of transaction timing from their Endace probes for reporting.
Your Intellectual Property and information is highly sensitive and valuable - like any other such asset, it needs protecting. Endace's products enable 100% inspection of all traffic in/out of your organisation so that you can be sure of your information security, even under attack conditions. Only with this guaranteed level of performance can you be truly sure that nothing slips by.
Mobile network monitoring
Endace network monitoring infrastructure enables wireless network operators to monitor all traffic across layers in their Radio Access Network (RAN) and IP data core. Our Application Partners provide protocol reassembly for GPRS and UMTS RAN signaling protocols plus application-level TCP/IP session reassembly with detailed reporting of potential issues.
Together we enable network operators to build their networks cost-effectively, guarantee service performance, and grow their mobile data revenues for maximum profitability.
Information security in Enterprise networks
Your Intellectual Property and information is highly sensitive and valuable - like any other such asset, it needs protecting. Endace enables 100% inspection of all network traffic entering your organization so that you can be sure of your information security, even under attack conditions. Only with this guaranteed level of performance can you be truly sure that nothing slips by.
Our application partners combine their leading intrusion detection, anomaly detection and threat reporting software with Endace network monitoring infrastructure in order to provide network-wide security monitoring.
Lawful Intercept in Carrier networks
Using Endace network monitoring infrastructure, telecommunications carriers can provide secure and separate access to targeted network traffic for Lawful Interception, while leveraging the same infrastructure investment for WAN security and management.
The monitoring infrastructure can also be used to ensure network service delivery and provide revenue-generating security monitoring services. Our customers are able to generate a meaningful ROI on an asset base that would otherwise only serve for regulatory compliance. Unlike router-based options, Endace monitoring probes ensure lossless capture of target traffic, invisible operation, and zero compromise of network performance.
Carrier network flow analysis
Managing a complex and distributed network with many elements, many users, and many application protocols requires you to have a real-time network-wide view of activity. This visibility is vital to ensure the availability and security of your network services.
Endace network monitoring infrastructure supports a wide range of legacy, SONET/SDH, and Ethernet network types so that your flow analysis and deep packet inspection software can access traffic from all areas of your network and provide you with the precise intelligence that you need.
Anti-data leakage (ADL) / Information leak prevention (ILP)
Endace network appliances enable your existing information leak prevention software to operate losslessly at multi-Gigabit speed, wherever you need to deploy them in your network to ensure that your intellectual property is protected from insider threats.
By deploying Endace network monitoring infrastructure throughout your network, you can enforce policy using your preferred anti-data leakage application, while concurrently supporting other network management and intrusion-detection applications on the same platforms.
Financial network transaction time monitoring
Your automated trading systems make buy/sell decisions in milliseconds so the performance of your corporate network and your service providers' networks is crucial to your profitability. Leading financial trading houses rely on Endace to identify any potential threats to their network performance. They also use the very accurate records of transaction timing to comply with transparency regulations such as the EU's MiFID (the Markets in Financial Instruments Directive).
Working with Endace, you can be assured of your trading system performance and profitability.
DAG CARDS - Ethernet, Sonnet/SDH, PDH/TDM
Endace DAG network monitoring interface cards provide 100% packet or cell capture, regardless of interface type, packet size, or network loading. On top of this zero-loss performance, Endace DAG cards offload the data handling workload from the CPU, allowing software applications to inspect and process traffic at much higher speed.
More recent DAG cards feature the Endace Data Stream Manager (DSM) which provides hardware-based traffic filtering, data stream replication, and CPU load balancing functions. These effectively accelerate application performance, enabling Network Managers to be confident that every packet has been inspected and reported on, and that nothing has been missed.
Edited by: Creamer Media Reporter© Reuse this Comment Guidelines (150 word limit)
Other News This Week News
Updated 33 minutes ago The June addition of technology investment group Parsec Holdings to the Ansys stable has invigorated the niche technology-driven engineering group’s interim performance, precipitating a 93% uptick in revenue to R155.1-million and a 333% improvement in earnings before...
Updated 1 hour 44 minutes ago The iron-ore price on Singapore's most active iron-ore futures market was below $40/t for the first time, Investec noted on Monday, when it reported that additional iron-ore supply was about to be shipped from Gina Rinehart’s new Roy Hill iron-ore mine, in Australia....
Updated 2 hours 42 minutes ago World leaders will launch an ambitious attempt on Monday to hold back the earth's rising temperatures, urging each other to find common cause in two weeks of bargaining meant to steer the global economy away from dependence on fossil fuels. They arrive at United...
Recent Research Reports
Water 2015: A review of South Africa's water sector (PDF Report)
Creamer Media’s Water 2015 Report considers the aforementioned issues, not only in the South African context but also in the African and global context in terms of supply and demand, water stress and insecurity, and access to water and sanitation, besides others.
Input Sector Review: Pumps 2015 (PDF Report)
Creamer Media’s 2015 Input Sector Review on Pumps provides an overview of South Africa’s pumps industry with particular focus on pump manufacture and supply, aftermarket services, marketing strategies, local and export demand, imports, sector support, investment...
Liquid Fuels 2015: A review of South Africa's liquid fuels sector (PDF Report)
Creamer Media’s Liquid Fuels 2015 Report examines these issues in the context of South Africa’s business environment; oil and gas exploration; fuel pricing; the development of the country’s biofuels industry; the logistics of transporting liquid fuels; and...
Road and Rail 2015: A review of South Africa's road and rail sectors (PDF Report)
Creamer Media’s Road and Rail 2015 report examines South Africa’s road and rail transport system, with particular focus on the size and state of the country’s road and rail infrastructure and network, the funding and maintenance of these respective networks, and...
Defence 2015: A review of South Africa's defence sector (PDF Report)
Creamer Media’s Coal 2015 report examines South Africa’s coal industry with regards to the business environment, the key participants in the sector, local demand, export sales and coal logistics, projects being undertaken by the large and smaller participants in the...
Real Economy Year Book 2015 (PDF Report)
There are very few beacons of hope on South Africa’s economic horizon. Economic growth is weak, unemployment is rising, electricity supply is insufficient to meet demand and/or spur growth, with poor prospects for many of the commodities mined and exported. However,...
This Week's Magazine
The BMW Group will invest R6-billion at BMW Group South Africa’s (BMW SA’s) Rosslyn plant to produce the next-generation X3 sports-activity vehicle (SAV) for the local and export markets. Rosslyn will continue production of the current 3 Series through its lifecycle,...
The lack of consequences for poor performance and transgressions on the part of contractors remains a significant hurdle to tackling South Africa’s service delivery challenges, delegates heard at the Consulting Engineers South Africa Infrastructure Indaba, on...
City of Ekurhuleni executive mayor Mondli Gungubele earlier this month officially named the city’s bus rapid transit (BRT) system, Harambee.
About 58% of unstructured data stored by companies is dark data, which means that the value or regulatory importance of the data has not been determined. Subsequently, most of the stored data add costs, rather than increasing revenue or reduce regulatory risks, says...
Effective logistics, import/export and manufacturing consulting services require detailed industry knowledge and experience, but can add significant value to these industries by providing expert advice on various technical elements in their value chains, says...