Our whitepapers provide an overview of services, standards and technology, as well as an overview of the advantages and disadvantages, costs and potential savings of a particular problem solution.

Downloading NEOX NETWORKS whitepapers does not require you to fill out a form. For whitepapers from our partners, however, we unfortunately have to ask you for your name and email address!

NEOX NETWORKS

Network TAP vs SPAN/Mirror Port

Monitoring, analysis and out-of-band security tools all have one thing in common: they need a reliable data source from which to obtain network data, and they depend on this source to function. But what is the best way to feed the network data to these tools?

DOWNLOAD

Network TAPs
in the CRITIS area

According to the NIS2 Directive, operators of critical infrastructures (CRITIS), as well as providers of public electronic communication networks or services, wastewater and waste management, manufacturers of certain critical products, and many others in all 27 member states of the EU, as well as Liechtenstein, Iceland and Norway, must take comprehensive measures for the security of their network and information systems by 18 October 2024.

DOWNLOAD

XENA Networks

Whitepaper - XENA-Networks - Terabit-Ethernet-Why_Part-1 - Download

Terabit Ethernet – Why?
Part 1/2

Understanding the commercial drivers for Terabit Ethernet.
This is the first of two White Papers exploring Terabit Ethernet. Here in Part 1, we will look at the commercial factors driving the development of Terabit Ethernet. In Part 2, we will explore the technical drivers for new Terabit Ethernet solutions.

Order

Emulation vs. simulation for layers 4-7

Testing with realistic application emulation is about emulating network traffic that contains realistic traffic patterns and content. This generates results that are far more accurate than using simulation or stateless Layer 2-3 blasting. Being able to analyze the results generated by “real” network testing is essential for providing guaranteed Quality-of-Service (QoS), and high degrees of Quality-of-Experience (QoE)…

Order

Testing SD-WAN

Wide Area Networks (WANs) have been the basis for long-distance communication for decades. Over time their complexity and manageability has increased as new applications and features have been added. This slows down the upgrade process significantly as new features typically requires adding or changing hardware in the network – which all needs to be tested before being brought online…

Order

RFC6349 based TCP Testing

Enterprises will typically sign a Service Level Agreement (SLA) with a service provider for their communication path through a network. The SLA contains worst case values

for parameters like bandwidth, latency, packet jitter, frame loss ratio and availability. The service provider can conduct RFC 2544 and Y.1564 tests…

Order

Testing 400 GE

The widespread availability of exciting new applications like HD video streaming, mobile social media, e-commerce, online banking, Anything-as-a-Service (XaaS) have been fueling the need for more bandwidth for several years now. Many are available as cloud services, and numerous data centers are being built to support this need…

Order

Testing IP Multicast

The need for bandwidth is constantly increasing as numerous new bandwidth hungry applications emerge in our connected and mobile society. Networks are expanded massively to accommodate the users’ requirements. At the same time technologies have been developed to ensure that the available network capacity is used efficiently…

Order

Performance verification of Next Generation Firewalls

Verifying the performance of NGFW and any network security device is essential to the success of the enterprise network it defends. With various advanced protection features such as application identification, intrusion prevention, threat detection, etc., the NGFW can easily become the bottleneck of the network, degrading the overall performance and user experience…

Order

Testing TLS Performance

Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL), are the most popular cryptographic protocols used by the major web browsers, and websites around the world. HTTPS, also called HTTP over TLS, is now the de facto standard for many websites to provide secure services to their users…

Order

Latency and Jitter in Networking Performance

Latency and jitter are key measurement parameters when evaluating and benchmarking the performance of a network, system or device. Different applications have different requirements on traffi c latency and jitter. For example, Voice over IP (VoIP) services are sensitive to latency and jitter, while data transfer is more tolerant…

Order

Microburst

Microburst is a phenomenon where data packets are transmitted in rapid burst. It can lead to periods of full line-rate transmission that overflow packet buffers oft he network stack. Traffic flows and applications often show a bursty behavior when transported across IP networks or in data centers…

Order

Automotive Ethernet

The automotive industry is evolving rapidly. The newest models have features that represent unparalleled innovation – cars that can communicate with each other, the road-side infrastructure, the Internet, plus highly advanced in-car infotainment systems. Cars are also being equipped with sensor-based safety systems…

Order

QoS Validation

Quality of Service (QoS) is the capability of a network to provide better service to selected network traffic over various underlying technologies. It differentiates network traffic and prioritizes different traffic flows to provide a degree of guarantee to different networks services, such as voice, video and data…

Order

NAPATECH

Fulfilling the promise of NFV

After some 49 months of intensive activity, network functions virtualization (NFV) has transitioned from a concept defined in a white paper to commercial reality. But while progress has been formidable, given the magnitude of the changes and challenges, additional steps and decisions must be taken to achieve the total promise of NFV…

Order

Faster than the future in the 100G era

Data delivered in the right way creates insights that enable actions. Being able to understand all the data within networks ensures apps run quickly, videos stream smoothly and end user data is secure. Yet, as volume and complexity of data increase, processing it all becomes increasingly difficult…

Order

How to build an automated NFV infrastructure

The drivers for network function virtualization (NFV) all come down to flexibility, Performance and cost savings. When a group of the world’s largest network operators launched the NFV initiative back in 2012, the original goals were to reduce equipment costs and power consumption, improve operational efficiency, accelerate timeto-market for new services, open the market to new suppliers,…

Order
Die Zeit für größere Präzision ist gekommen

The time has come for greater precision

Packet networks and the Internet Protocol (IP) are now firmly established as the platforms for new communication services. No longer just for “best effort” data transmission, IP has matured to encompass not just one, but a multitude of packet protocols, algorithms and methods designed to enable IP to support real-time services, such as voice, video and real-time transactions…

Order

You can’t save what you can’t see

Securing corporate networks has never been morechallenging. Tried and tested methods, architectures and solutions no longer work, as cybercriminals become more sophisticated and more successful with their exploits. However, just putting more money into the same approaches is not going to be enough…

Order

Accelerated PCAP: An Architecture for Precision Packet Capture and Analysis on High-Speed Networks

There are a number of tools and capabilities available to engineers and administrators to help them manage and secure large and small-scale networks alike. Still, few capabilities are as fundamental to this task as packet capture (PCAP)…

Order

Providing Security, Agility and Insight for Dynamic Cloud Connectivity

Since the turn of the century, Cloud computing has evolved to address a wider range of needs. Applications that one never imagined would leave the premises are now supported by cloud services. Indeed, it is hard to imagine any application that could not be supported using a cloud model…

Order

Extrahop

Extrahop SIEM integration

Enterprise security organizations have made significant investments in SIEM platforms but struggle to optimize their accuracy. SIEM platforms depend on data from your environment to identify threats and enable investigation…

Order

Ransomware Detection and Prevention

The ransomware epidemic has forced IT organizations to think differently about how they surveil and defend their digital assets. Passive observation of transactions on the network empowers IT departments to detect, investigate, and mitigate crypto-ransomware attacks in minutes…

Order

Citrix Troubleshooting Guide

When applications and desktops are delivered over Citrix, the Citrix Administration team becomes the front-line for responding to complaints about slow performance. But more than 60 percent of the time, the root cause of the problem lies outside of the Citrix environment. This white paper explains how wire data analytics…

Order

How Extrahop Supports GDPR

The General Data Protection Regulation (GDPR) is a landmark piece of regulation that will radically transform the data protection landscape of not just Europe, but the world. GDPR creates one standard for European data protection and introduces a number of new security demands for any organisation with customers within the EU…

Order

iTrinegy/NE-ONE

Application Testing over Networks

With a trend towards server consolidation, virtualization, cloud computing, increased remote working and greater reliance on wireless technology, more applications are expected to work over Cloud, Wide Area Networks (WANs), ADSL, GPRS, 3G/4G, Radio or Satellite networks…

Order

Order Whitepaper





     


     

     

     


    The data will be deleted after the processing of your request has been completed.
    Note: You can revoke your consent for the future at any time by e-mail to info@neox-networks.com.
    Detailed information on the handling of user data can be found in our privacy policy.

     

     

     

    We will be happy to consult you and look forward to hearing from you!