Press Coverage

 

2017 Press Coverage

  • CRN Exclusive: Savvius Launches New Partner Program, Repositions Sales Strategy Around Channel
    Savvius has launched a new partner program as the network visibility and security performance company looks to expand its business from the high-end data center to the small and medium enterprise markets.
    CRN - June 22nd 2017
  • The Trouble with Network Performance Monitoring
    NPM dashboards fail to provide real-time insight into trouble spots.
    Network Computing - June 15th 2017
  • Packet analyser wants European eco-system builders
    Packet analyst vendor Savvius is changing fast to keep up with the market and is looking at new routes to market to help reach cloud users and SMBs.
    ITEuropa - June 12th 2017
  • Why UC Applications Still Cause Network Headaches (And How to Fix Them)
    Unified Communications (UC) applications such as VoIP and Video streaming have been around in the enterprise setting now for almost two decades. It's rather remarkable, then, that for all of their business benefits and popularity, UC applications still post so many headaches for network engineers.
    APMdigest - June 9th 2017
  • Ixia Delivers End-to-End Visibility for Public Cloud
    Ixia (Nasdaq: XXIA), a leading provider of network testing, visibility, and security solutions, today announced it has further extended the reach delivered by the CloudLens™ Platform to the public cloud. CloudLens Public provides Visibility-as-a-Service (VaaS) and is the first to be implemented as a pure Software-as-a-Service (SaaS) solution. It is designed from the ground up to retain the benefits of the cloud - elastic scale, flexibility, and agility. CloudLens Public provides intelligent and automated visibility as a service that scales with public cloud infrastructures.
    Ixia - April 4th 2017
  • Essential Steps to Become Agile - Part 1
    This is an opportunity to gain guidance from some of the world's leading DevOps experts on what Agile truly means, and how to make Agile a reality in your organization, and ultimately gain the benefits Agile has to offer.
    Devops Digest - April 3rd 2017
  • Automating Data Collection to Improve Cyber Security
    Data breaches are bad news. We have yet to fully understand the impact of the massive Yahoo breach, which looks like it will go down in the history books as the largest breach to date, but that doesn't mean that smaller and just as damaging breaches aren't taking place every single day. Because they are.
    Cyber Defense Magazine - March 3rd 2017
  • 19 "Move To The Top Of Your Queue" Network Improvement Tips
    A CIO’s job requires non-stop situational awareness. On a daily basis, he or she is maintaining and growing the intertwined health of the business, network, applications, services, and staff. To pull off that multi-disciplinary responsibility, CIOs must confront a never-ending stream of risk-based business decisions.
    Forbes - March 1st 2017
  • Evaluating Commercial vs. Open Source APM
    Choosing an application performance monitoring (APM) solution can be a daunting task. A quick Google search will show popular products, but there's also a long list of less-well-known open source products available, too. So how do you choose the right solution?
    APM Digest - January 17th 2017
  • Savvius Sr. Manager of Technical Alliances Joins the Vendor Forum
    Chris Bloom, Senior Manager of Technical Alliances at Savvius, has joined the APMdigest Vendor Forum.
    APM Digest - January 17th 2017
  • Savvius goes from Packet Capture to Cyber Forensics in one move
    Despite greater information flows and ever-evolving criminals, security is constantly fighting to get things done quicker and easier.
    IDG Connect - January 6th 2017
  • What will be the single biggest security threat of 2017?
    At the very end of 2015 we ran a straw poll of individuals in the security space to determine what the single biggest security threat of 2016 would be. We divided the 74 “unstructured” comments into a number of lose sections with “people” emerging as the most popular response.
    IDG Connect - January 5th 2017

2016 Press Coverage

  • Traffic tools enable St. Luke’s to find network bottlenecks
    When St. Luke’s University Health Network migrated to a new data center in 2011, it also started implementing technology from security vendor Savvius to improve the troubleshooting of its information systems. Before using those capabilities, its hospitals didn’t know if a network or information system was having trouble until it manifested with slow response times, typically indicated by phone calls from users to the information technology department for the system, based in Bethlehem, Pa., and operating seven hospitals and a network of 300 physicians.
    Health Data Management - December 16th 2016
  • 2017 Application Performance Management Predictions - Part 2
    PMdigest's 2017 Application Performance Management Predictions is a forecast by the top minds in APM today. Industry experts — from analysts and consultants to users and the top vendors — offer thoughtful, insightful, and often controversial predictions on how APM and related technologies will evolve and impact business in 2017. Part 2 covers the expanding scope of Application Performance Management (APM) and Network Performance Management (NPM).
    APM Digest - December 14th 2016
  • Gazing ahead: Security predictions, Part 6
    As more IT infrastructure transitions to become cloud-based and accessible from anywhere, hackers will focus on targeting browsers as the weak point. Browsers are essentially the operating system today, no matter whether you are using Windows, Mac OS or Linux. Employees spend most of their time in the browser, talking on Hangouts, drafting documents on Google Docs, and using multiple plug-ins. It's a very large attack surface that hasn't been fully used by hackers, but that is about to change. And once hackers find a vulnerability within a browser, they'll have access to everybody who uses Chrome as their browser, regardless of OS. This will be a nightmare for IT security professionals, unless they are using incredibly sophisticated analytics tools.
    SC Media - December 13th 2016
  • Professional Packet Analyzers
    Cross-site data flow and application control for the enterprise network — this sounds like a technology that is only reserved for larger companies. But that is not the case, as we found with Savvius Omnipeek 9.2.

    German Version

    Lanline - November 30th 2016
  • Savvius looks to help security teams with forensic investigations
    Savvius, Inc. is looking to broaden its user base for OmniPeek 10, the company’s latest major update to its software for network performance diagnostics and troubleshooting, by appealing to security teams with features to help with their investigations.
    IT World Canada - November 1st 2016
  • Forensic Focus
    Tom Rowley of Savvius explains how post-breach forensics can play a vital role in regaining the upper hand against cyber criminals.
    Data Centre News - November 1st 2016
  • The Eight Keys to Implementing Virtual Networks
    Most companies are using some form of virtual networks these days. And for good reason, since they can be cheaper, more flexible, and more scalable. However, they can also be implemented badly, resulting in a network that performs worse than whatever was in place before. Because of this, the implementation of virtual networks can present many difficult challenges for network admins who have to deploy and manage them.
    Virtual strategy Magazine - October 31st 2016
  • The challenges SMEs face with security analytics
    SMEs are in for a great deal of work in order to set up an effective security programme, argues Tom Rowley.
    SmallBusiness.co.uk - October 19th 2016
  • Top Factors That Impact Application Performance 2016 - Part 3
    In 2013, APMdigest published a list called 15 Top Factors That Impact Application Performance. Even today, this is one of the most popular pieces of content on the site. And for good reason – the whole concept of Application Performance Management (APM) starts with identifying the factors that impact application performance, and then doing something about it. However, in the fast moving world of IT, many aspects of application performance have changed in the 3 years since the list was published. And many new experts have come on the scene. So APMdigest is updating the list for 2016, and you will be surprised how much it has changed.
    APM Digest - October 14th 2016
  • The real cost of a slack cybersecurity strategy
    Mandana Javaheri, CTO at Savvius, looks at the increase in financially-motivated cybercrime and the immediate and long-term repercussions for enterprise and the security sector…
    The Stack - October 3rd 2016
  • Five simple steps to reduce the impact of cyber security breaches
    It feels like almost every day we’re confronted by news of yet another high-profile breach, resulting in millions in damage and bruised reputations and there are many small breaches that we even don’t hear about.
    ITProPortal - July 26th 2016
  • Q&A: Dealing with complacency in network security
    As security breaches continue to dominate headlines, businesses of all sizes and in all industries simply cannot afford to underestimate the importance of network security.
    ITProPortal - July 25th 2016
  • New products of the week 7.25.16
    Our roundup of intriguing new products from companies such as Acronis Networks and Savvius.
    Network World - July 25th 2016
  • How 802.11ac Wave 2 Complicates WiFi Troubleshooting
    For all intents and purposes, 802.11ac has been a great success. Since its approval by the IEEE nearly two years ago, the WiFi standard has introduced thousands of compatible routers, laptops, mobile phones, IoT devices and other wireless gadgets operating at blazing speeds in the 5 GHz band. And the revolution has just begun.
    Network Computing - July 22nd 2016
  • Examining the scene of the (cyber) crime with network forensics
    Enterprise security teams have historically spent most of their time, human resources, and money on defences like firewalls and Intrusion Detection Systems (IDS) to protect and monitor the security of their networks. However, a quick look at the news will tell you that these barriers are far from foolproof. With breaches becoming more common (and costly), enterprise teams are turning to tools that help them respond quickly to security incidents as soon as the attack has been discovered. Network forensics looks at information such as log data, network flow, and packet data to answer the question ‘how did the attackers get in?’
    ITProPortal - July 11th 2016
  • What security pros can learn from the networking team
    You might find dealing with the networking side frustrating—but they have a lot to teach you.
    Network World - July 1st 2016
  • Peek Into Your Wireless LANs
    Troubleshooting wireless LANs need not be expensive nor overly complicated, and yet trying to isolate problems without the right tools can make it so. If this is your challenge, consider a Wi-Fi adapter from Savvius.
    No Jitter - June 17th 2016
  • Cyberattack CSI: Forensics investigations should start with pre-attack analysis
    Enterprise security teams have historically spent a lot of time, human resources, and money on developing strong defenses such as firewalls and deploying equipment and software like intrusion detection systems (IDS) to monitor the security of their networks. In fact, most enterprises have built an impressive level of expertise when it comes to configuring and monitoring these tools.

    Nevertheless, as we all know, breach detection and prevention technologies are not foolproof. Given attackers’ success in penetrating standard corporate defenses, enterprise teams are looking beyond these well-known technologies and incorporating better tools and training that deal specifically with incident response once attacks have been discovered.

    TechBeacon - May 20th 2016
  • The LTE-U Vs. WiFi Debate
    If carriers use unlicensed spectrum, it may not be the WiFi disaster that some expect.

    LTE-U, an emerging technology that aims to reduce cell phone data congestion by offloading traffic onto unlicensed spectrum, has been a hot topic in the wireless world. Carriers like AT&T, T-Mobile and Verizon are proponents of rolling out this technology while wireless companies and coalitions like the Wi-Fi Alliance worry that it will degrade WiFi performance. In fact, they have gone so far as to say that LTE-U would be disastrous. Is this just hype, or a valid concern? It may be too early to tell, but let’s look at what we know so far.

    Network Computing - May 12th 2016
  • Optimizing Network Security With Packet Intelligence
    Enterprise security teams devote an incredible amount of resources to monitoring and defending their networks. Everyone knows there are professional grade tools that can monitor networks 24×7 providing detailed information about usage as well as enabling the in-depth examination of captured traffic once an Intrusion Detection System (IDS) has identified an activity that needs to be investigated.
    LoveMyTool - May 9th 2016
  • The Value Of The Packet
    Networks are complex, and always changing. Trying to troubleshoot them – or find the cause of a breach – can be a huge undertaking, but this task can be made much easier if packet data is available. You can learn a tremendous amount from a single data packet. Just from the header you can determine who the sender and receiver are, the general characteristics of the communication – whether TCP (receipt acknowledgement requested), UDP (just make the best effort), or RTP (time-critical so resending just isn’t practical), and even a clue about the packet contents based on the port used to send the traffic, like Secure or Remote Shell (SSH or RSH), HTTP, and thousands of others.
    Network Computing - March 28th 2016
  • The top three network alerts you need to monitor. Hint: it’s all about utilisation
    Every network is different, but they all share similar challenges. For the engineers and IT managers tasked with monitoring, analysing and troubleshooting corporate networks, there are a multitude of alerts and alarms that can be triggered by abnormal activity.

    In the case of organisations with large, distributed networks and multiple local branches or smaller offices, it can be even more difficult to isolate and remedy problems from a remote location. Sending dedicated staff to troubleshoot at those offices is both time-consuming and costly.

    ITProPortal - March 15th 2016
  • Network Forensics at 40G and 100G Speeds
    The 40G and 100G market will generate tens of billions of dollars in revenue in the next few years according to a recent Infonetics market forecast (link is external). Growth in traffic, which some analysts (link is external) estimate will reach 50 to 60 percent annually, enables new opportunities but also puts enormous pressure on networks and creates new challenges.

    Network forensics is one of these new challenges. Although network forensics is most commonly associated with investigating security incidents and breaches, it is also very valuable for providing visibility into network activities, troubleshooting issues quickly and diagnosing common network problems such as connectivity, unexpected change in utilization, or poor VoIP call quality.

    APM Digest - February 23rd 2016
  • Packets still rule when it comes to useful network traffic analysis
    It seems obvious to say that network traffic is growing in volume and speed. And of course, it means that IT staff are always looking for faster ways to detect any problems that would interfere with the reliable movement of data, but simply monitoring traffic flow has proven to be insufficient.
    IT World Canada - February 4th 2016
  • Savvius OmniPeek 9.1 aims to accelerate time to resolution for network problems
    The latest version of Savvius' OmniPeek was designed to make it easier for network administrators and engineers to get more intuitive data visualizations and work toward a faster time to resolution for network issues.
    Fierce Enterprise Communications - February 3rd 2016
Contact Us Savvius Blog Follow Savvius on Twitter Like Savvius on Facebook Follow Savvius on LinkedIn Follow Savvius on YouTube