Feeds

Packeteer offers free WAN evals

Fighting the app-independent tide with video plug-ins

Providing a secure and efficient Helpdesk

WAN optimisation specialist Packeteer is offering free WAN application performance evaluations, plus software to track video usage over the network.

The evaluation service involves plugging one of the company's PacketShaper appliances into an organisation's WAN connection to automatically discover which applications are running, their response times and how much bandwidth they're consuming.

"It's the kind of thing delivered in WAN probes such as NetScout or Network General Sniffer, but those are only recently adding Layer 7 capabilities," said Packeteer CEO Dave Cote. He claimed that Packeteer's analysis provided more granularity and depth than either WAN probes or other WAN optimisation appliances.

According to Cote, a single PacketShaper can identify and classify over 600 applications and protocols. When used in pairs at either end of a WAN connection, the devices can use this information to accelerate network traffic, prioritise some applications while limiting the bandwidth available to others, and reduce latency.

Packeteer also announced software modules that enable PacketShaper to identify and manage Flash-based IP video streams from sources such as YouTube, VideoGoogle, MySpace, ABC, and ESPN, plus online TV channels and podcasts.

Cot said that with video increasingly being used for business as well as for amusement, it is vital to classify it accurately. That means understanding what applications are running on the network, not merely what protocols or ports are in use.

"An awful lot of our competitors accelerate certain applications but without knowledge of the other applications running on the network," he claimed.

"We're talking about a step before that - to discover what's running on the network. At most, the others are doing port-level identification. We go a step further, not only checking at layer 7 that it's really Oracle, say, and not something else spoofing Oracle, but we can even identify the traffic by database name."

Cote had harsh words too for those WAN optimisation vendors - such as Silver Peak and the Citrix-owned Orbital Data - who say they don't need application-specific modules because they can optimise all traffic.

"Saying 'We accelerate everything' is wrong. If you do it indiscriminately, you may also be accelerating iTunes or a worm, say. Or if you accelerate a big file attachment and the same network is running your SAP, your critical business application might get crushed by your email."®

Security for virtualized datacentres

More from The Register

next story
Wanna keep your data for 1,000 YEARS? No? Hard luck, HDS wants you to anyway
Combine Blu-ray and M-DISC and you get this monster
US boffins demo 'twisted radio' mux
OAM takes wireless signals to 32 Gbps
Apple flops out 2FA for iCloud in bid to stop future nude selfie leaks
Millions of 4chan users howl with laughter as Cupertino slams stable door
No biggie: EMC's XtremIO firmware upgrade 'will wipe data'
But it'll have no impact and will be seamless, we're told
Students playing with impressive racks? Yes, it's cluster comp time
The most comprehensive coverage the world has ever seen. Ever
Run little spreadsheet, run! IBM's Watson is coming to gobble you up
Big Blue's big super's big appetite for big data in big clouds for big analytics
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.