Whitepapers & Solution Briefs
Our whitepapers provide an overview of services, standards and technology, as well as an overview of the advantages and disadvantages, costs and potential savings of a particular problem solution.
Downloading NEOX NETWORKS whitepapers does not require you to fill out a form. For whitepapers from our partners, however, we unfortunately have to ask you for your name and email address!
NEOX NETWORKS
Network TAP vs
SPAN/Mirror Port
Monitoring, analysis and out-of-band security tools all have one thing in common: they need a reliable data source from which to obtain network data, and they depend on this source to function. But what is the best way to feed the network data to these tools?
Network TAPs
in the CRITIS area
According to the NIS2 Directive, operators of critical infrastructures (CRITIS), as well as providers of public electronic communication networks or services, wastewater and waste management, manufacturers of certain critical products, and many others in all 27 member states of the EU, must take comprehensive measures for the security of their network and information systems by 18 October 2024.
NEOX & Corelight
NDR Solution Brief
Proactive Threat Detection and Mitigation based on Network Detection and Response.
Driving Meaningful Network Intelligence from Net-Generation Network Visibility.
XENA Networks
Terabit Ethernet – Why?
Part 1/2
Understanding the commercial drivers for Terabit Ethernet.
This is the first of two White Papers exploring Terabit Ethernet. Here in Part 1, we will look at the commercial factors driving the development of Terabit Ethernet. In Part 2, we will explore the technical drivers for new Terabit Ethernet solutions.
Emulation vs. simulation for layers 4-7
Testing with realistic application emulation is about emulating network traffic that contains realistic traffic patterns and content. This generates results that are far more accurate than using simulation or stateless Layer 2-3 blasting. Being able to analyze the results generated by “real” network testing is essential for providing guaranteed Quality-of-Service (QoS), and high degrees of Quality-of-Experience (QoE)…
OrderTesting SD-WAN
Wide Area Networks (WANs) have been the basis for long-distance communication for decades. Over time their complexity and manageability has increased as new applications and features have been added. This slows down the upgrade process significantly as new features typically requires adding or changing hardware in the network – which all needs to be tested before being brought online…
OrderRFC6349 based TCP Testing
Enterprises will typically sign a Service Level Agreement (SLA) with a service provider for their communication path through a network. The SLA contains worst case values
for parameters like bandwidth, latency, packet jitter, frame loss ratio and availability. The service provider can conduct RFC 2544 and Y.1564 tests…
OrderTesting 400 GE
The widespread availability of exciting new applications like HD video streaming, mobile social media, e-commerce, online banking, Anything-as-a-Service (XaaS) have been fueling the need for more bandwidth for several years now. Many are available as cloud services, and numerous data centers are being built to support this need…
OrderTesting IP Multicast
The need for bandwidth is constantly increasing as numerous new bandwidth hungry applications emerge in our connected and mobile society. Networks are expanded massively to accommodate the users’ requirements. At the same time technologies have been developed to ensure that the available network capacity is used efficiently…
OrderPerformance verification of Next Generation Firewalls
Verifying the performance of NGFW and any network security device is essential to the success of the enterprise network it defends. With various advanced protection features such as application identification, intrusion prevention, threat detection, etc., the NGFW can easily become the bottleneck of the network, degrading the overall performance and user experience…
OrderTesting TLS Performance
Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL), are the most popular cryptographic protocols used by the major web browsers, and websites around the world. HTTPS, also called HTTP over TLS, is now the de facto standard for many websites to provide secure services to their users…
OrderLatency and Jitter in Networking Performance
Latency and jitter are key measurement parameters when evaluating and benchmarking the performance of a network, system or device. Different applications have different requirements on traffi c latency and jitter. For example, Voice over IP (VoIP) services are sensitive to latency and jitter, while data transfer is more tolerant…
OrderMicroburst
Microburst is a phenomenon where data packets are transmitted in rapid burst. It can lead to periods of full line-rate transmission that overflow packet buffers oft he network stack. Traffic flows and applications often show a bursty behavior when transported across IP networks or in data centers…
OrderAutomotive Ethernet
The automotive industry is evolving rapidly. The newest models have features that represent unparalleled innovation – cars that can communicate with each other, the road-side infrastructure, the Internet, plus highly advanced in-car infotainment systems. Cars are also being equipped with sensor-based safety systems…
OrderQoS Validation
Quality of Service (QoS) is the capability of a network to provide better service to selected network traffic over various underlying technologies. It differentiates network traffic and prioritizes different traffic flows to provide a degree of guarantee to different networks services, such as voice, video and data…
Order
NAPATECH
Fulfilling the promise of NFV
After some 49 months of intensive activity, network functions virtualization (NFV) has transitioned from a concept defined in a white paper to commercial reality. But while progress has been formidable, given the magnitude of the changes and challenges, additional steps and decisions must be taken to achieve the total promise of NFV…
OrderFaster than the future in the 100G era
Data delivered in the right way creates insights that enable actions. Being able to understand all the data within networks ensures apps run quickly, videos stream smoothly and end user data is secure. Yet, as volume and complexity of data increase, processing it all becomes increasingly difficult…
OrderHow to build an automated NFV infrastructure
The drivers for network function virtualization (NFV) all come down to flexibility, Performance and cost savings. When a group of the world’s largest network operators launched the NFV initiative back in 2012, the original goals were to reduce equipment costs and power consumption, improve operational efficiency, accelerate timeto-market for new services, open the market to new suppliers,…
OrderThe time has come for greater precision
Packet networks and the Internet Protocol (IP) are now firmly established as the platforms for new communication services. No longer just for “best effort” data transmission, IP has matured to encompass not just one, but a multitude of packet protocols, algorithms and methods designed to enable IP to support real-time services, such as voice, video and real-time transactions…
OrderYou can’t save what you can’t see
Securing corporate networks has never been morechallenging. Tried and tested methods, architectures and solutions no longer work, as cybercriminals become more sophisticated and more successful with their exploits. However, just putting more money into the same approaches is not going to be enough…
OrderAccelerated PCAP: An Architecture for Precision Packet Capture and Analysis on High-Speed Networks
There are a number of tools and capabilities available to engineers and administrators to help them manage and secure large and small-scale networks alike. Still, few capabilities are as fundamental to this task as packet capture (PCAP)…
OrderProviding Security, Agility and Insight for Dynamic Cloud Connectivity
Since the turn of the century, Cloud computing has evolved to address a wider range of needs. Applications that one never imagined would leave the premises are now supported by cloud services. Indeed, it is hard to imagine any application that could not be supported using a cloud model…
Order
Extrahop
Extrahop SIEM integration
Enterprise security organizations have made significant investments in SIEM platforms but struggle to optimize their accuracy. SIEM platforms depend on data from your environment to identify threats and enable investigation…
OrderRansomware Detection and Prevention
The ransomware epidemic has forced IT organizations to think differently about how they surveil and defend their digital assets. Passive observation of transactions on the network empowers IT departments to detect, investigate, and mitigate crypto-ransomware attacks in minutes…
OrderCitrix Troubleshooting Guide
When applications and desktops are delivered over Citrix, the Citrix Administration team becomes the front-line for responding to complaints about slow performance. But more than 60 percent of the time, the root cause of the problem lies outside of the Citrix environment. This white paper explains how wire data analytics…
OrderHow Extrahop Supports GDPR
The General Data Protection Regulation (GDPR) is a landmark piece of regulation that will radically transform the data protection landscape of not just Europe, but the world. GDPR creates one standard for European data protection and introduces a number of new security demands for any organisation with customers within the EU…
Order
iTrinegy/NE-ONE
Application Testing over Networks
With a trend towards server consolidation, virtualization, cloud computing, increased remote working and greater reliance on wireless technology, more applications are expected to work over Cloud, Wide Area Networks (WANs), ADSL, GPRS, 3G/4G, Radio or Satellite networks…
Order