Application Testing over Networks

With a trend towards server consolidation, virtualization, cloud computing, increased remote working and greater reliance on wireless technology, more applications are expected to work over Cloud, Wide Area Networks (WANs), ADSL, GPRS, 3G/4G, Radio or Satellite networks…

Order

Extrahop SIEM integration

Enterprise security organizations have made significant investments in SIEM platforms but struggle to optimize their accuracy. SIEM platforms depend on data from your environment to identify threats and enable investigation…

Order

RFC6349 based TCP Testing

Enterprises will typically sign a Service Level Agreement (SLA) with a service provider for their communication path through a network. The SLA contains worst case values

for parameters like bandwidth, latency, packet jitter, frame loss ratio and availability. The service provider can conduct RFC 2544 and Y.1564 tests…

Order

Automotive Ethernet

The automotive industry is evolving rapidly. The newest models have features that represent unparalleled innovation – cars that can communicate with each other, the road-side infrastructure, the Internet, plus highly advanced in-car infotainment systems. Cars are also being equipped with sensor-based safety systems…

Order

Ransomware Detection and Prevention

The ransomware epidemic has forced IT organizations to think differently about how they surveil and defend their digital assets. Passive observation of transactions on the network empowers IT departments to detect, investigate, and mitigate crypto-ransomware attacks in minutes…

Order

Citrix Troubleshooting Guide

When applications and desktops are delivered over Citrix, the Citrix Administration team becomes the front-line for responding to complaints about slow performance. But more than 60 percent of the time, the root cause of the problem lies outside of the Citrix environment. This white paper explains how wire data analytics…

Order

QoS Validation

Quality of Service (QoS) is the capability of a network to provide better service to selected network traffic over various underlying technologies. It differentiates network traffic and prioritizes different traffic flows to provide a degree of guarantee to different networks services, such as voice, video and data…

Order

How Extrahop Supports GDPR

The General Data Protection Regulation (GDPR) is a landmark piece of regulation that will radically transform the data protection landscape of not just Europe, but the world. GDPR creates one standard for European data protection and introduces a number of new security demands for any organisation with customers within the EU…

Order

Providing Security, Agility and Insight for Dynamic Cloud Connectivity

Since the turn of the century, Cloud computing has evolved to address a wider range of needs. Applications that one never imagined would leave the premises are now supported by cloud services. Indeed, it is hard to imagine any application that could not be supported using a cloud model…

Order

Accelerated PCAP: An Architecture for Precision Packet Capture and Analysis on High-Speed Networks

There are a number of tools and capabilities available to engineers and administrators to help them manage and secure large and small-scale networks alike. Still, few capabilities are as fundamental to this task as packet capture (PCAP)…

Order

Latency and Jitter in Networking Performance

Latency and jitter are key measurement parameters when evaluating and benchmarking the performance of a network, system or device. Different applications have different requirements on traffi c latency and jitter. For example, Voice over IP (VoIP) services are sensitive to latency and jitter, while data transfer is more tolerant…

Order

Microburst

Microburst is a phenomenon where data packets are transmitted in rapid burst. It can lead to periods of full line-rate transmission that overflow packet buffers oft he network stack. Traffic flows and applications often show a bursty behavior when transported across IP networks or in data centers…

Order

Network TAPs 101

Providing unfettered access to all of the bits, bytes and packets flowing through a network is a critical piece of network design. Without it, security appliances, monitoring devices and analytical solutions cannot function optimally – a critical issue in a world where downtime or a security breach could cost millions.

Order

You can’t save what you can’t see

Securing corporate networks has never been morechallenging. Tried and tested methods, architectures and solutions no longer work, as cybercriminals become more sophisticated and more successful with their exploits. However, just putting more money into the same approaches is not going to be enough…

Order

Testing TLS Performance

Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL), are the most popular cryptographic protocols used by the major web browsers, and websites around the world. HTTPS, also called HTTP over TLS, is now the de facto standard for many websites to provide secure services to their users…

Order

Testing 400 GE

The widespread availability of exciting new applications like HD video streaming, mobile social media, e-commerce, online banking, Anything-as-a-Service (XaaS) have been fueling the need for more bandwidth for several years now. Many are available as cloud services, and numerous data centers are being built to support this need…

Order
Die Zeit für größere Präzision ist gekommen

The time has come for greater precision

Packet networks and the Internet Protocol (IP) are now firmly established as the platforms for new communication services. No longer just for “best effort” data transmission, IP has matured to encompass not just one, but a multitude of packet protocols, algorithms and methods designed to enable IP to support real-time services, such as voice, video and real-time transactions…

Order

Performance verification of Next Generation Firewalls

Verifying the performance of NGFW and any network security device is essential to the success of the enterprise network it defends. With various advanced protection features such as application identification, intrusion prevention, threat detection, etc., the NGFW can easily become the bottleneck of the network, degrading the overall performance and user experience…

Order

Testing IP Multicast

The need for bandwidth is constantly increasing as numerous new bandwidth hungry applications emerge in our connected and mobile society. Networks are expanded massively to accommodate the users’ requirements. At the same time technologies have been developed to ensure that the available network capacity is used efficiently…

Order

Order Whitepaper

() /

If you want to order other whitepapers as well please list them in the comment field.

I would like to receive the free newsletter (in German) from NEOX NETWORKS GmbH. 


I have read the privacy policy and the conditions for ordering whitepapers and agree to them. 


We are happy to advise you and look forward to