Networking Software

Safety & Security Equipment, Software

Emergency Response System offers web-based communications.

August 31, 2015

Included in Rapid Emergency Response System, Command & Control Incident Management System uses web-based communication portal to manage life-threatening events such as armed intruders and natural disasters. When activated, text/email/voice notifications are sent to pre-determined stakeholders and Command Group is established. Command Group accesses portal via internet-enabled device for secure 2-way communication with first responders and occupants as well as link to live security camera video. Read More


Network Asset Management Plug-in enhances VSA capabilities.

April 22, 2015

ESET Remote Administrator (ERA) Plug-in for Kaseya® VSA provides central management of ESET Endpoint Solutions across distributed networks. Integrating with Kaseya VSA, solution offers ability to plug-in to multiple ERA servers, notification functionality, as well as ability to initiate scans and update tasks on ESET clients when notifications are triggered. With customizable graphs and charts displaying threat data, dashboard provides users with high-level overview of network health. Read More


Wi-Fi Planning Software eliminates time-consuming tasks.

April 17, 2015

With intelligent Wall Outlining Wizard, Ekahau Site Survey v8.0 eliminates need for manual wall material definitions. CAD architectural blueprints of building can be imported into application and automatically converted into simple but accurate representation of planning environment. Once converted, Auto-Planner suggests locations of Wi-Fi APs on map, based on user defined requirements. Site survey capabilities allow heavy-duty testing of network to ensure smooth operation of applications. Read More


Server-Side Caching Software increases data center performance.

April 10, 2015

FlashSoft® reduces I/O latency in VMware® vSphere®, Windows® Server® and Linux® environments through use of server-side, flash-based storage caching, which helps increase application performance in virtualized and non-virtualized computing environments. Solid-state software supports Microsoft Hyper-V with Clustered Shared Volumes (CSV), HDDs and SSDs formatted with 4K sector size as well as 512K, as well as Red Hat® Enterprise Linux (RHEL) and SUSE kernels. Read More


Network Surveillance Software analyzes GSM Mobile calls.

April 8, 2015

Utilizing intrusive and non-intrusive PC Probes at strategic locations in network, NetSurveyorWeb™ identifies, segregates, and analyzes different types of GSM Mobile calls over TDM and IP transport networks. Probes transmit and collect voice, data, protocol, statistics, and performance information and relay information to NMS. Web-based network monitoring and diagnostic system is suitable for billing verification, remote protocol analysis, and traffic engineering. Read More

Software, Computer Hardware & Peripherals

PHY Management Products support high-density applications.

April 3, 2015

Combining hardware and software elements with connection point identification technology, Quareo Physical Layer Management System provides state of physical network at all times. NG4access optical distribution frame, featuring Quareo technology (QNG4), offers access to high-density fiber terminations up to 3,456 fibers/frame. High-density 1RU fiber optical panel, featuring Quareo technology (QHDEP), provides 6 access trays, each serving up to 24 LC fiber connections or 8 MPO fiber connections. Read More


Network Assessment Software helps defend against major breaches.

April 3, 2015

Combining data collection, logic, and visualization, Orkos identifies critical credential theft risks in organizational networks. Solution identifies critical links that attackers will exploit in major breach, immediate risks, as well as higher-order effects to show total risk of credential theft. Credential assessment capability also supports remediation through simulation of network changes that would prevent attacker from compromising additional systems with stolen credentials. Read More


Real-Time Software solves enterprise application security challenges.

April 2, 2015

Leveraging distributed agents, Contrast Enterprise enables vulnerability identification as applications run at enterprise scale. REST API and scriptable zero-configuration installers provide complete automation of application security into any software development life cycle, while 10+ information sources are used to discover vulnerabilities while eliminating false positives. Deployed and operating within 7 min, solution supports Java 8 and legacy versions of Microsoft .NET. Read More


Cyber Threat Detection Platform protects enterprise blind spots.

April 2, 2015

S-series sensor extends real-time cybersecurity into all corners of organization, including such blind spots as remote sites and internal network segments, to automatically see indicators of cyber attack anywhere in network. Detection Triage functionality, included, lets security teams identify and track risky behaviors that can enable or obscure network attacks. Ability to customize and track detections of such behaviors using local context ensures cyber attacks are not overlooked. Read More


Fragmentation Prevention Solution optimizes SAN storage.

March 26, 2015

Operating at physical server layer where I/O operations originate, Diskeeper 15 Server uses IntelliWrite® 2.0 to prevent fragmentation from occurring so files are written in sequential state for servers with local storage, DAS, and SAN. Instant Defrag™ 2.0 monitors volumes to resolve critically fragmented files in real-time. With InvisiTasking® 2.0 intelligent resource monitoring technology, Diskeeper background operations can run with near-zero resource impact on current activities. Read More


Security Software protects distributed enterprise blind spots.

March 25, 2015

S-series sensor provides threat detection platform that extends automated, real-time cybersecurity into all corners of organization, including remote sites and internal network segments. In addition to security visibility, solution offers Detection Triage functionality that lets security teams identify and track risky behaviors that can enable/obscure network attacks. Ability to customize and track detections using local context is critical to ensure cyber attacks are not overlooked. Read More

Computer Hardware & Peripherals, Software, Communication Systems & Equipment

Network Interface Card accelerates SDN and NFV.

March 24, 2015

Running on COTS servers, ACE-NIC accelerates performance of vEPC and vCPE NFV platform by 50 times, minimizing end-to-end latency. Card is equipped with 4 x 10GE ports, software and hardware designed for FPGA SoC based on ENET flow processor, supporting PCIe Gen3, and optional Intel 40G Fortville component. Dedicated acceleration functions include: frame header manipulation and offloading, virtual switch implementation, programmable frame fragmentation, QoS, counters, and billing information. Read More

Computer Hardware & Peripherals, Test & Measuring Instruments, Software

Network Testing Software identifies VoIP issues.

March 24, 2015

Comprising appliance, soft client, and management portal, VoIP Scout lets Hosted PBX and SIP Trunking resellers conduct extensive self-service testing of their customers' data networks, identifying and helping mitigate potential issues. System lets partners simulate, over 3–5 business days, full potential load VoIP services could put on network. During testing process, VoIP Scout captures and analyzes key metrics from simulated calls and provides partners with periodic updates on key milestones. Read More


Management Software locates network traffic issues in real-time.

March 17, 2015

MXstudio® 2.1 can automatically detect network devices, provide real-time availability monitoring, display topological representation of networks, generate event logs, and provide virtual panel displays to indicate real-time status of device ports. Traffic Load Visualization tool helps implementers achieve optimization goals, and multiple snapshots of network help accelerate network problems diagnoses. MIB compiler with basic SNMP support for third-party devices is also standard. Read More

Test & Measuring Instruments, Software, Computer Hardware & Peripherals

Network Recorders support 10, 40, and 100 GbE networks.

March 12, 2015

Designed to manage and make sense of massive traffic volumes created by continual business demands, EndaceProbe™ Intelligent Network Recorders and EndaceVision™ 6.0 Network Visibility Software enable application acceleration and maximize network availability. Products help manage physical, virtual, and software-defined networks by enabling network and security professionals to rapidly capture, analyze, and diagnose potential and actual network and security issues in real-time. Read More

Software, Computer Hardware & Peripherals

Attack Mitigation Platform handles high-volume cyber attacks.

March 12, 2015

Intended for carriers and cloud providers, DefensePro® x4420 can address volumetric DDoS attacks while simultaneously picking out and mitigating sophisticated non-volume threats. Solution offers 100 Gb interfaces, can handle 230 million packets per second of attack traffic, and supports up to 1,000 active policies, separate processing capabilities, and customized management and reporting per tenant. Offering up to 300 Gbps of mitigation capacity, solution suits multi-tenant environments. Read More

Software, Services

Predictive Anti-Fraud Analytics uncover telecom frauds.

March 11, 2015

As predictive, machine learning-based fraud prevention solution, Mobileum Anti-Fraud Analytics helps telecom operators arrest revenue leakage. Solution runs on Wisdom Big Data and Analytics platform, which can mine through billions of unsuspected usage transactions in real-time to discover anomalous patterns of emerging fraudulent behaviors. This breadth helps detect deviations in known types of frauds and identify unknown frauds across voice, data, and SMS scenarios. Read More


Hosted HLR/HSS increases scalability for M2M and IoT companies.

March 6, 2015

Offering capacity for third parties as hosted managed solution, software-based Home Location Register (HLR) supports range of potential customers, including (virtual) mobile network operator, M2M, and OEM companies, looking for outsourced-managed HLR/HSS solution. Fully 3GPP-compliant HLR, connected to 400+ MNO networks through international signaling integrations, enables accelerated provisioning of multi IMSIs. Organizations can launch new services within few weeks. Read More


Website Building Tool helps practices grow online presense.

March 5, 2015

Offered as Web-based tool, Site-Builder lets medical practices design, optimize, and promote their own websites. Functionality enables creation of complete Web presence that drives new patient Internet traffic to practice's website. In addition to facilitating secure, Web-based physician-patient communications, solution empowers patients to schedule appointments online and reduces required office staff time by automating workflows. Read More

Computer Hardware & Peripherals, Software

Gateways enable phased migration of legacy control systems.

March 5, 2015

By leveraging DH+™ for PanelView™ features, Migration Gateway lets end-users take phased migration approach when replacing or upgrading legacy DH+ and Remote I/O™ PanelViews. EtherNet/IP™ to Square D® Remote I/O Gateway, also available, allows Rockwell Automation® PACs to control Square D Remote I/O devices. Autoscan feature reduces configuration time, and configuration data is stored on micro SD card that can be used for disaster recovery. Read More