- Traffic tools enable St. Luke’s to find network bottlenecks
When St. Luke’s University Health Network migrated to a new data center in 2011, it also started implementing technology from security vendor Savvius to improve the troubleshooting of its information systems.
Before using those capabilities, its hospitals didn’t know if a network or information system was having trouble until it manifested with slow response times, typically indicated by phone calls from users to the information technology department for the system, based in Bethlehem, Pa., and operating seven hospitals and a network of 300 physicians.
Health Data Management - December 16th 2016
- 2017 Application Performance Management Predictions - Part 2
PMdigest's 2017 Application Performance Management Predictions is a forecast by the top minds in APM today. Industry experts — from analysts and consultants to users and the top vendors — offer thoughtful, insightful, and often controversial predictions on how APM and related technologies will evolve and impact business in 2017. Part 2 covers the expanding scope of Application Performance Management (APM) and Network Performance Management (NPM).
APM Digest - December 14th 2016
- Gazing ahead: Security predictions, Part 6
As more IT infrastructure transitions to become cloud-based and accessible from anywhere, hackers will focus on targeting browsers as the weak point. Browsers are essentially the operating system today, no matter whether you are using Windows, Mac OS or Linux. Employees spend most of their time in the browser, talking on Hangouts, drafting documents on Google Docs, and using multiple plug-ins. It's a very large attack surface that hasn't been fully used by hackers, but that is about to change. And once hackers find a vulnerability within a browser, they'll have access to everybody who uses Chrome as their browser, regardless of OS. This will be a nightmare for IT security professionals, unless they are using incredibly sophisticated analytics tools.
SC Media - December 13th 2016
- Professional Packet Analyzers
Cross-site data flow and application control for the enterprise network — this sounds like a technology that is only reserved for larger companies. But that is not the case, as we found with Savvius Omnipeek 9.2.
Lanline - November 30th 2016
- Savvius looks to help security teams with forensic investigations
Savvius, Inc. is looking to broaden its user base for OmniPeek 10, the company’s latest major update to its software for network performance diagnostics and troubleshooting, by appealing to security teams with features to help with their investigations.
IT World Canada - November 1st 2016
- Forensic Focus
Tom Rowley of Savvius explains how post-breach forensics can play a vital role in regaining the upper hand against cyber criminals.
Data Centre News - November 1st 2016
- The Eight Keys to Implementing Virtual Networks
Most companies are using some form of virtual networks these days. And for good reason, since they can be cheaper, more flexible, and more scalable. However, they can also be implemented badly, resulting in a network that performs worse than whatever was in place before. Because of this, the implementation of virtual networks can present many difficult challenges for network admins who have to deploy and manage them.
Virtual strategy Magazine - October 31st 2016
- The challenges SMEs face with security analytics
SMEs are in for a great deal of work in order to set up an effective security programme, argues Tom Rowley.
SmallBusiness.co.uk - October 19th 2016
- Top Factors That Impact Application Performance 2016 - Part 3
In 2013, APMdigest published a list called 15 Top Factors That Impact Application Performance. Even today, this is one of the most popular pieces of content on the site. And for good reason – the whole concept of Application Performance Management (APM) starts with identifying the factors that impact application performance, and then doing something about it. However, in the fast moving world of IT, many aspects of application performance have changed in the 3 years since the list was published. And many new experts have come on the scene. So APMdigest is updating the list for 2016, and you will be surprised how much it has changed.
APM Digest - October 14th 2016
- The real cost of a slack cybersecurity strategy
Mandana Javaheri, CTO at Savvius, looks at the increase in financially-motivated cybercrime and the immediate and long-term repercussions for enterprise and the security sector…
The Stack - October 3rd 2016
- Five simple steps to reduce the impact of cyber security breaches
It feels like almost every day we’re confronted by news of yet another high-profile breach, resulting in millions in damage and bruised reputations and there are many small breaches that we even don’t hear about.
ITProPortal - July 26th 2016
- Q&A: Dealing with complacency in network security
As security breaches continue to dominate headlines, businesses of all sizes and in all industries simply cannot afford to underestimate the importance of network security.
ITProPortal - July 25th 2016
- New products of the week 7.25.16
Our roundup of intriguing new products from companies such as Acronis Networks and Savvius.
Network World - July 25th 2016
- How 802.11ac Wave 2 Complicates WiFi Troubleshooting
For all intents and purposes, 802.11ac has been a great success. Since its approval by the IEEE nearly two years ago, the WiFi standard has introduced thousands of compatible routers, laptops, mobile phones, IoT devices and other wireless gadgets operating at blazing speeds in the 5 GHz band. And the revolution has just begun.
Network Computing - July 22nd 2016
- Examining the scene of the (cyber) crime with network forensics
Enterprise security teams have historically spent most of their time, human resources, and money on defences like firewalls and Intrusion Detection Systems (IDS) to protect and monitor the security of their networks. However, a quick look at the news will tell you that these barriers are far from foolproof. With breaches becoming more common (and costly), enterprise teams are turning to tools that help them respond quickly to security incidents as soon as the attack has been discovered. Network forensics looks at information such as log data, network flow, and packet data to answer the question ‘how did the attackers get in?’
ITProPortal - July 11th 2016
- What security pros can learn from the networking team
You might find dealing with the networking side frustrating—but they have a lot to teach you.
Network World - July 1st 2016
- Peek Into Your Wireless LANs
Troubleshooting wireless LANs need not be expensive nor overly complicated, and yet trying to isolate problems without the right tools can make it so. If this is your challenge, consider a Wi-Fi adapter from Savvius.
No Jitter - June 17th 2016
- Cyberattack CSI: Forensics investigations should start with pre-attack analysis
Enterprise security teams have historically spent a lot of time, human resources, and money on developing strong defenses such as firewalls and deploying equipment and software like intrusion detection systems (IDS) to monitor the security of their networks. In fact, most enterprises have built an impressive level of expertise when it comes to configuring and monitoring these tools.
Nevertheless, as we all know, breach detection and prevention technologies are not foolproof. Given attackers’ success in penetrating standard corporate defenses, enterprise teams are looking beyond these well-known technologies and incorporating better tools and training that deal specifically with incident response once attacks have been discovered.
TechBeacon - May 20th 2016
- The LTE-U Vs. WiFi Debate
If carriers use unlicensed spectrum, it may not be the WiFi disaster that some expect.
LTE-U, an emerging technology that aims to reduce cell phone data congestion by offloading traffic onto unlicensed spectrum, has been a hot topic in the wireless world. Carriers like AT&T, T-Mobile and Verizon are proponents of rolling out this technology while wireless companies and coalitions like the Wi-Fi Alliance worry that it will degrade WiFi performance. In fact, they have gone so far as to say that LTE-U would be disastrous. Is this just hype, or a valid concern? It may be too early to tell, but let’s look at what we know so far.
Network Computing - May 12th 2016
- Optimizing Network Security With Packet Intelligence
Enterprise security teams devote an incredible amount of resources to monitoring and defending their networks. Everyone knows there are professional grade tools that can monitor networks 24×7 providing detailed information about usage as well as enabling the in-depth examination of captured traffic once an Intrusion Detection System (IDS) has identified an activity that needs to be investigated.
LoveMyTool - May 9th 2016
- The Value Of The Packet
Networks are complex, and always changing. Trying to troubleshoot them – or find the cause of a breach – can be a huge undertaking, but this task can be made much easier if packet data is available. You can learn a tremendous amount from a single data packet. Just from the header you can determine who the sender and receiver are, the general characteristics of the communication – whether TCP (receipt acknowledgement requested), UDP (just make the best effort), or RTP (time-critical so resending just isn’t practical), and even a clue about the packet contents based on the port used to send the traffic, like Secure or Remote Shell (SSH or RSH), HTTP, and thousands of others.
Network Computing - March 28th 2016
- The top three network alerts you need to monitor. Hint: it’s all about utilisation
Every network is different, but they all share similar challenges. For the engineers and IT managers tasked with monitoring, analysing and troubleshooting corporate networks, there are a multitude of alerts and alarms that can be triggered by abnormal activity.
In the case of organisations with large, distributed networks and multiple local branches or smaller offices, it can be even more difficult to isolate and remedy problems from a remote location. Sending dedicated staff to troubleshoot at those offices is both time-consuming and costly.
ITProPortal - March 15th 2016
- Network Forensics at 40G and 100G Speeds
The 40G and 100G market will generate tens of billions of dollars in revenue in the next few years according to a recent Infonetics market forecast (link is external). Growth in traffic, which some analysts (link is external) estimate will reach 50 to 60 percent annually, enables new opportunities but also puts enormous pressure on networks and creates new challenges.
Network forensics is one of these new challenges. Although network forensics is most commonly associated with investigating security incidents and breaches, it is also very valuable for providing visibility into network activities, troubleshooting issues quickly and diagnosing common network problems such as connectivity, unexpected change in utilization, or poor VoIP call quality.
APM Digest - February 23rd 2016
- Packets still rule when it comes to useful network traffic analysis
It seems obvious to say that network traffic is growing in volume and speed. And of course, it means that IT staff are always looking for faster ways to detect any problems that would interfere with the reliable movement of data, but simply monitoring traffic flow has proven to be insufficient.
IT World Canada - February 4th 2016
- Savvius OmniPeek 9.1 aims to accelerate time to resolution for network problems
The latest version of Savvius' OmniPeek was designed to make it easier for network administrators and engineers to get more intuitive data visualizations and work toward a faster time to resolution for network issues.
Fierce Enterprise Communications - February 3rd 2016