Comdate is a leading supplier of solutions to the Telecommunications and Information Technology industries.

EndaceFabric

EndaceFabric: Network-wide Recording & Analytics Hosting

 

EndaceFabric enables multiple EndaceProbe™ Analytics Platforms to be connected into a network-wide fabric that is centrally searchable and provides visibility into, and accurate recording of, network traffic across an entire network– including visibility into high-speed 40Gbps and 100Gbps links. The distributed fabric is centrally managed using the EndaceCMS Central Management Server™ which provides low OPEX and CAPEX.

 EndaceProbes can also be synchronized with a common, accurate time source - such as a GPS time source - to ensure packet time-stamping retains its nanosecond-level accuracy even across complex, highly distributed networks. This precision makes it possible to reconstruct network events accurately even on distributed networks.

Fabric-wide Network History Investigation

Fabric-wide investigations are enabled using a range of built-in and optional third-party tools. Network Security and Network Operations teams (NetOps and SecOps) can use EndaceConsole's intuitive web-interface to quickly locate, retrieve and analyze packets of interest from petabytes of recorded Network History distributed across the EndaceProbes in the fabric.

EndaceVision™ and EndacePackets™ provide built-in browser-based investigation tools. EndaceVision offers a range of visualizations for investigating network history including the MicroVision™ feature which enables users to visualize events on a 10-microsecond scale – small enough to investigate the cause of disruptive microburst activity. EndacePackets is a protocol decode tool based on Wireshark. Using these tools history can be examined directly on a single EndaceProbe or across multiple EndaceProbes in the fabric.

API integration provides tight integration of EndaceVision and EndacePackets with tools from Endace partners such as Cisco, Dynatrace, Splunk and Plixer. Analysts can click on alerts in these tools and jump straight to the related packet-level history to see exactly what’s happened.

 

 

 

 

Click HERE to contact us for more information