Category Archives Enterprise

GDPR Myth Busting Image

Busting Three GDPR Myths We’ve all heard the hype, read the articles, received the emails, sat on the webinars, right? But there are still several misunderstandings and miscommunication out there surrounding the EU General Data Privacy Regulations (GDPR) which will come into effect on 25 May 2018, whether you are ready for them, or not. […]

In the case of WannaCry and other exploits, capturing traffic in the core of the network with the ability to go back in time for several days is a best-of-breed solution for both security and network teams. The recent WannaCry exploit (WannaCrypt/WannaCrypt0r and variants) is ransomware that was leaked by the Shadow Brokers hacker group […]

Network security forensics offers insight for enterprises after WannaCry ransomware exploit. Security is a top concern for anyone running a network today. The recent WannaCry ransomware attack and other high-profile hacks have shined a new light on the fact that security strategies in the enterprise must constantly evolve to meet the challenges of new and […]

Effective preparation, including investment in network performance monitoring tools such as packet capture, delivers network security forensics capabilities that are ready when attacks occur. The three main phases of a network security stance today are prevention, detection, and remediation. A recent survey by ServiceNow of 300 Chief Information Security Officers (CISOs) investigates the state of […]

Prior to purchasing the Observer Platform for network monitoring and security forensics, Cisco Systems was experiencing a lack of visibility during and after network events. Headquartered in San Jose, California, Cisco Systems designs, manufactures, and sells networking equipment. With nearly $50 billion in revenue and over 70,000 employees, Cisco is also the largest networking company […]

IT teams recount some of their most problematic network challenges – and how they eventually resolved them with the Observer Platform. A Retailer’s Remorse Major retailers often rely on Black Friday deals to remain profitable. In some cases, technical snafus can put the brakes on sales. For one Fortune 500 retail company, the quick thinking of […]

For a worldwide leader in online gaming technology, service degradation and application issues are important considerations in the ongoing quest for end-user satisfaction. A security breach, however, is an entirely different enemy and can quickly spell ‘game over.’ “If there are any application issues, they want to know about it,” says Viavi Solutions Western Territory […]

For many organizations, solving performance challenges faster improves the bottom line. But for a telecom carrier, a strict service level agreement (SLA) means the network team has only hours to resolve performance issues – otherwise they risk paying the client money for downtime and outages. Founded in 1996 and located in west central Germany, GELSEN-NET provides regional telecommunications services […]

When developing a cloud monitoring strategy, you’ll need to cover the 5 essentials. This handy checklist will help you vet any new cloud or hybrid IT infrastructure monitoring solution to make sure that your team establishes the visibility needed in this new environment.  Multitenancy Everyone knows that IT departments have silos. Different groups want to […]

  It’s that time of year again when real Viavi customers share their greatest network nightmares. These bloodcurdling tales of IT terror will give you chills and send you scrambling for your monitoring tools. 1. The Case of the Disappearing Network Let’s face it, nothing’s worse than logging on to find that your entire network […]

Close