Network Associates adds to Netasyst line

Musich, Paula
April 2004
eWeek;4/19/2004, Vol. 21 Issue 16, p34
Network Associates Inc. is expanding its Netasyst line of network management tools for SMB with a pair of new distributed network analyzers. The Netasyst D and Netasyst DX tools obviate the need for portable protocol analyzers. Both provide remote troubleshooting of 10/100Mbps Ethernet LAN segments from a central location and let operators see what kind of protocol traffic is traversing WAN links from remote LAN locations. The Netasyst DX option adds expert protocol analysis and diagnostics to the base Netasyst D. Both run on Microsoft Corp.'s Windows XP. "The system takes knowledge accumulated over 17 years, looks at network traffic and picks out problems. It runs off rules that cover the data to the applications layer," said Steve Finegan, product launch manager at Network Associates, in Santa Clara, California. Netasyst DX can decode applications such as Microsoft's Exchange and SQL Server. The network analyzers can be used to identify over-used or underused links, spot poor server response due to a lack of central processing unit or memory resources, spot non-business-related traffic as well as inefficient and chatty applications, see server backups occurring during peak usage times and find unauthorized protocols traversing the network.


Related Articles


    This article reports on the launch of the Sniffer Portable Lab 10 Gigabit Ethernet Analyzer from Network Associates Inc., a provider of intrusion prevention solutions. This is the first product from the Sniffer Portable Lab Series designed to optimize performance and maximize throughput on...

  • Is it time to move to 10 Gigabit Ethernet? Schatt, Stan // Computer Weekly;5/27/2003, p36 

    For IEEE 802.3ae specification, there are several different options for this architecture since it supports three unique light frequencies as well as two different types of fibre interfaces. Some interfaces have been developed for wide area networks while others are more appropriate for local...

  • Bandwidth expectations for future twisted-pair networks. Wessels, Rob // Cabling Installation & Maintenance;Sep2005, Vol. 13 Issue 9, p12 

    Focuses on the possible advances in twisted-pair networks in the U.S. Feasibility of forming a working group to standardize 10-Gigabit Ethernet transmission over copper twisted-pair cabling; Transmission of multiple bits per symbol by the Pulse Amplitude Modulation; Methods for measuring AXT on...

  • Getting A Grip On Wide Area Ethernet. Finneran, Michael // Business Communications Review;Jun2005, Vol. 35 Issue 6, p40 

    The article presents information on the performance of wide area Ethernet. Ethernet is making its move into the wide area market. Metro-area Ethernet services were pioneered by, startups like Yipes and Telseon during the late-1990s network boom and after a slow start, service revenues are now...

  • Mezzanine Cards Lighten Server's Secure Network Load. Wong, William // Electronic Design;10/18/2004, Vol. 52 Issue 23, p40 

    The article informs that Internet can be a dangerous place, so exchanging data at high speeds now requires secure communications. Performance Technologies' PMC8300 and FlexTunnel Module bring secure, high-performance Gigabit Ethernet connections to the table without running the host processor...

  • X.86.  // Network Dictionary;2007, p535 

    An encyclopedia entry about "X.86" is presented. It is a physical interface sublayer (PHY) for 802.3 Ethernet Media Access Control (MAC) frames which offers the encapsulation of 802.3 MAC frames in a sublayer-level addresses and control frame, LAPS. It enables 802.3 Ethernet switches and Hubs to...

  • Synchronous Ethernet- Considerations and Implementation of the Packet Network Management Scheme. Gundale, A. S.; Aradhye, Ashwini // AIP Conference Proceedings;11/6/2010, Vol. 1324 Issue 1, p74 

    Packet technologies were designed to work in asynchronous mode, where the oscillators in the equipment are free running. Although this allows the underlying infrastructure to operate, many applications exist that require frequency synchronization. Also, the ability to distribute synchronization...

  • The selfish 'Net and the Big One. Gibbs, Mark // Network World;2/7/2005, Vol. 22 Issue 5, p54 

    This article focuses on the power of the Internet to cause destruction in the global corporate world. A well-known security consultant comments that the Internet continues to function at the whim of those who know how to bring it down. In other words, the people who could do it have so far...

  • There's a need to illuminate the darknet. Johnson, Johna Till // Network World;11/29/2004, Vol. 21 Issue 48, p32 

    This article illuminates on the concept of darknet, the shadowy network of malware applications that operate at a layer above the traditional Internet. Encompassing everything from peer-to-peer applications to instant messaging and voice over Internet protocol vulnerabilities and distributed...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics