Feeds

Network analyser gets trigger happy

Fluke handheld has text strings in its sights

Top 5 reasons to deploy VMware with Tegile

Fluke Networks says it has added security features to the latest version of its OptiView handheld network analyser, including the ability to use string matching to trigger the capturing of network traffic.

The idea of searching for, or filtering on, text strings is hardly new. However, Fluke says OptiView Series III can use free string matching to scan for words or phrases in the network traffic in real time, even at Gigabit speeds.

It claims that the technique allows the handheld device to detect events such as security violations and solve intermittent network performance problems. The text string could be an error message, say, or something relating to an unauthorised program, and would trigger OptiView to capture network traffic for analysis.

"The combination of free string match and trigger is a great tool to solve an issue I run into frequently. Now I can enter the error message the terminal receives from the server, trigger on it and capture the traffic around the event - before and after," said OptiView user Mike Pennacchi, of Network Protocol Specialists.

Fluke said that other new features in OptiView Series III include 802.1x authentication, Gigabit line-rate traffic generation and Internetwork Throughput testing, encapsulation-independent protocol filtering, application-level traffic analysis, and application-layer bounce charts for application performance visualisation.

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Getting ahead of the compliance curve
Learn about new services that make it easy to discover and manage certificates across the enterprise and how to get ahead of the compliance curve.