Category Archives Enterprise

When a speck of dust looms as large as an iceberg When the RMS Titanic floated out of its drydock in 1911, its architect and owners hailed it as “unsinkable” and the most advanced ship of its time. But on the fateful night of April 14th, 1912 those claims were put to the test, and […]

Cyber investigators reveal how harvesting the right data can help solve network security issues and provide legal peace of mind. While much of the world is harvesting crops in preparation for the coming winter, network teams are, as usual, harvesting network data. As anyone who captures packets knows, sometimes these payloads contain surprises. As you […]

Packet Pioneer Chris Greer reveals his own Wireshark nightmare while dealing with trace files in the popular analyzer. “I’m a big user of Wireshark,” says Chris Greer, network and application analyst and founder of Packet Pioneer. “I own and operate an independent consulting company. What I do is I sit on the beach in Costa […]

A shift to cloud computing may appear to offer great relief but it also delivers a host of new network challenges. Through cloud computing, organizations perform tasks or use applications that harness massive third-party computing and processing power via the internet cloud. This allows enterprises to quickly scale services and avoid purchasing network assets for […]

With intellectual property, customer data, trade secrets, employee information, and more traversing the network, IT teams need to be aware of the latest network trends – and how to monitor them. One of the most important assets to an enterprise is the network. If the network is not directly responsible for revenue, why even have […]

Plug-and-play technology has been around for a long time, and it’s one reason why even non-tech-savvy consumers can upgrade and expand their own electronics. We all like plug-and-play capabilities because it’s a fast, easy way to activate a new capability. As the name says, just make the connection and you’re ready to go. The beauty […]

Financial services adopt comprehensive network security strategy for breach detection and remediation post-event. Being a senior network engineer charged with ensuring secure financial services to tens of thousands of customers can be a lot of pressure. However, a more robust security strategy including close alignment with security teams can help keep everything running smoothly. The […]

New Observer Apex offers faster loading speeds, connection dynamics functionality for packet visibility, on-demand application dependency mapping (ADM), improved widget editor for faster insights, VoIP service-level agreement assurance based on threshold monitoring, faster alarms, and more. On-Demand ADM On-demand ADM offers fast discovery of application interdependencies, building maps that visualize these complex relationships with simple […]

GDPR Myth Busting Image

Korrektur von drei Missverständnissen zur DSGVO Wir alle haben den ganzen Rummel miterlebt, die Presseberichte gelesen, E-Mails erhalten und an Webinaren teilgenommen, oder? Doch trotzdem gibt es mehrere Missverständnisse und Kommunikationspannen zur Datenschutz-Grundverordnung (DSGVO) der EU, die am 25. Mai 2018 in Kraft treten wird – ob Sie nun darauf vorbereitet sind oder nicht! Hier wollen wir […]

Close