Network Associates adds management tools to Sniffer

Network Associates is to announce two new products to ease management of its distributed Sniffer network probes and expand the...

Network Associates is to announce two new products to ease management of its distributed Sniffer network probes and expand the reporting based on data collected by the boxes.

Sniffer network probes are used to monitor and analyse network performance. Probes can be installed at various points in a network.

The products, called network Performance Orchestrator (nPO) Manager and nPO Visualizer, are two separate rack-mountable boxes aimed at customers who have more than 20 Sniffer boxes installed, said Stuart Beattie, senior field marketing manager for Network Associates.

Manager adds the ability to change user passwords and install software updates on all Sniffer boxes in an organisation at once. It also makes it possible to access Sniffer data in widely used network management software.

Until now, password and software changes had to be made on each box and Sniffer data was accessed separately from other network management tools.

Visualizer pulls information together from Sniffer boxes and displays it so that a network manager can monitor network usage patterns and identify problems. Reports from nPO Visualizer could help a network manager when making his case to management for new infrastructure or a bandwidth upgrade, Beattie said.

A typical Sniffer probe user would need one nPO Manager and one nPO Visualizer box. The products should be available from Sniffer resellers before the end of the year and cost from $30,000 (£19,144) for nPO Manager and from $40,000 (£25,525) for nPO Visualizer.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Business applications

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close