View

Sorting

Products found: 10

logo
Offer a reference bonus
1.00

CA Network Flow Analysis

With enhanced visibility into your network’s applications, hosts, conversations and QoS information, you can proactively manage your network to reduce outages, solve problems faster and ensure efficient and cost-effective operations. CA Network Flow Analysis can help you align resources to support business results, gain credibility and support with data-driven decisions and stop being the default target for blame. CA Network Flow Analysis is recognized as the industry standard for flow-based network traffic analysis in Global 4000 enterprises and large service providers. It integrates with CA Performance Center, CA Application Delivery Analysis, CA Unified Communications Monitor and many CA Technologies third-party or custom IT management tools. And it’s a key component within the CA Technologies Application-Driven Network Performance Management (ANPM) solution. CA Network Flow Analysis. Real results, right now. Better application performance through faster problem resolution Recognizes potential security events and issues Greater alignment of IT resources to business results
... Learn more
-
ROI-calculator
Configurator
ROI-
-
19
5
logo
Offer a reference bonus
1.00

CA Performance Management

It was built to meet the unique demands of big data and modern networks architectures, including highly dynamic and complex hybrid cloud and software-defined networks (SDN).  The platform is design to reduce complexity inherent in modern networks built across numerous technology stacks through advanced network performance monitoring and relationship mapping for improved operational assurance. Combined with CA Virtual Network Assurance, the platform extends operator visibility through advanced discovery and network performance monitoring of highly sensitive cloud and multi-layered SDN networks and service chains. Designed for high scalability at low cost with big data in mind, our network performance monitoring solution delivers agnostic multi-vendor data collection and adaptive visualizations to provide easy insights into availability and business service integrity across any size network environment. The platform enables less clicks to problem resolution and faster triage through service–oriented prescriptive analytics along with guided workflows and capacity analysis for meaningful and actionable insights you should expect from a modern network performance monitoring solution. Built on an open API architecture, our next-gen network performance monitoring platform delivers a truly innovative network operations experience. The platform provides advanced analysis and intelligent data presentation though aggregation, relationships and build-block views through customizable and intuitive dashboards that delivers the right data to the right people faster. The platform offers: - Unified Network Performance Monitoring that enables seamless management of traditional, cloud and SDN networks in a one-dashboard experience - Big-data architecture supporting four million items at 500,000 metrics per second to reliably meet the expanding monitoring needs of modern network architectures. - Prescriptive analytics that provides meaningful and actionable insights for faster triage. 
... Learn more
-
ROI-calculator
Configurator
ROI-
-
12
19
logo
Offer a reference bonus
1.00

CA Spectrum

CA Spectrum can enable your organization to discover, optimize and improve its infrastructure and the business services running on top of it. By delivering large-enterprise scalability, robust features and superior root cause analysis, this solution can help your organization effectively manage its dynamic, complex IT infrastructure—including physical, virtual and cloud environments as well as network virtualization. The improved architecture of CA Spectrum reduces time and cost associated with the administration of multiple management consoles by supporting tens of thousands of devices and millions of models—increasing scalability while simplifying staff management. CA Spectrum can help your organization improve network service levels. And by integrating automated fault management, fault isolation, proactive change management and root cause analysis into a single platform, this solution can help reduce fault monitoring costs as well. This solution automates fault management across multi-vendor and multi-technology infrastructures, tailoring information views and management capabilities to meet the needs of a broad range of technical and non-technical users. CA Spectrum. Real results, right now. Accelerate issue resolution. Leverage automated discovery, event correlation and root cause analysis capabilities that improve MTTR. Boost service levels. Improve system availability and performance by minimizing erroneous changes. Speed innovation. Capitalize on innovative technologies and approaches, such as cloud and virtualization, while using a single management platform.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
2
5
logo
Offer a reference bonus
1.40

CellMining CX-DRIVEN SON

It combines Behavior-Based SON™—including Centralized SON (C-SON) features—with the advanced analytics of Subscriber Experience Hub. The solution is compliant with 3GPP specifications, and supports NFV/SDN technology paradigms. It delivers the most accurate, comprehensive, real-time/offline network optimization, driven by customer experience. With its open architecture, Behavior-Based SON™ can co-exist with conventional SON products. CEM teams use the unique, comprehensive dashboards to gain insight into their network subscriber experience. Mobile network operators can now realize their vision of delivering dynamic, CX-driven network optimization. Advantages
  • Revolutionary technology based on innovative subscriber experience analytics
  • Probe-free
  • Detection of network faults and misconfigurations (e.g crossed cables, PIM and interference, more)
  • Detection of poor quality in call and data sessions
  • In-depth insight into communications quality of experience (QoE)
  • Robust SON features for GSM networks, as well as 3G and 4G
  • Optimal GSM – UMTS – LTE traffic management
  • Big data analytics supports hundreds of millions of experience events
  • Optimizes to meet comprehensive subscriber experience KPIs
Benefits
  • Network-agnostic – simplifies integration efforts and abstracts complexity to support future technologies
  • Single underlying technology serves as basis for both SON and subscriber experience insights
  • Hassle-free integration via a CDR abstraction layer
  • Field-Proven in a live HetNet environment, including multi-vendor GSM, UMTS, LTE and small cells
SON benefits
  • Subscriber-aware – analyzes and makes network decisions based on subscriber usage patterns
  • Cost-saving – performs automatic engineering tasks, saves energy and defers capital investment
  • Reduced need for physical drive tests (DT) due to Virtual DT features
  • Open architecture – supporting deployment alongside conventional SON products
CEM benefits
  • Supplements existing customer profile data with network experience insight
  • Integrates with CEM systems and applications
  • Enables drilling down to subscriber dimensions (VIP, business, inbound roamers) and network dimensions (cells, roads, geographical coverage)
  • Handset model compatibility reports
... Learn more
-
ROI-calculator
Configurator
ROI-
-
6
9
logo
Offer a reference bonus
2.40

HPE Intelligent Management Center (IMC)

Network managers, engineers, and operators face complex challenges in their mission to deliver a reliable and available network infrastructure. IMC is a comprehensive management platform that simplifies how IT staff can successfully meet these challenges. IMC was built from the ground up to support the FCAPS model for comprehensive management of the network infrastructure. In addition, IMC was designed to support the ITIL operational center of excellence IT practices model. IMC’s single–pane management paradigm enables end-to-end business management of IT services to address the stringent demands of today’s mission-critical enterprise IT operations. IMC provides scalability by supporting distributed and hierarchical system architectures, through additional operating system and database support to meet the requirements of complex networks. IMC uses a SOA model to provide full resource, service, and user management. Its modular design enables the integration of traditionally separate management tools. IMC enables enterprises to expand their infrastructure management in scale and to seamlessly accommodate new technologies at the same time. IMC base platform features IMC consists of a base platform and service components that offer additional functionalities. The base platform provides administrators and operators with the basic and advanced functionality needed to manage IMC and the devices managed by IMC. The IMC base platform provides the following functions: • Administrative controls for managing IMC and access to it. This includes granting or restricting operator access to IMC features through operator and operator group management. The base platform also includes features for the system-wide management of device data collection and information shared by all IMC modules. Features include:  The creation and maintenance of device, user, and service groups  Device vendor, series, and device model information.  SNMP MIB management and other system-wide settings and functions. See "Role based administrative controls." • A broad feature set for network device management, from the ability to manage SNMP, Telnet, and SSH configurations on a device to configuring Spanning Tree and PoE energy management for managed switches and much more. See "Resource management." • Management of the configuration and system software files on devices managed by IMC. This includes storing, backing up, base-lining, comparing, and deploying configuration and software files. See "Configuration and change management." • Real time management of events and the translation of events into faults and alarms in IMC. This includes creating, managing, and maintaining alarm lists, trap and Syslog filters and definitions, and configurations for notifications of alarms. See "Real time fault management." • Monitoring, reporting, and alarming on the performance of the network and the devices that comprise it. This includes managing global and device specific monitors and thresholds as well as creating views and reports for displaying performance information. See "Performance monitoring and management." • Access control list (ACL) management. This includes creating and maintaining ACL templates, resources, and rule sets and deploying ACL rule sets to devices managed by IMC. It also includes monitoring and leveraging ACLs that exist on devices for deployment to other network devices. See "Global ACL management." • Monitoring and managing security attacks and the alarms they generate. See "Security monitoring." • Global management of VLANs on all devices that support VLANs, managed by IMC. See "Global VLAN management." These are the functional areas of IMC’s base platform. In addition, the IMC framework and suite of services also includes service components for extending the scope and reach of IMC’s ability to manage the network infrastructure. 
... Learn more
ROI-calculator
Configurator
ROI-
-
8
5
logo
Offer a reference bonus
1.00

Qualcomm Unveils Mesh Networking Platform

“Qualcomm Technologies helped create a new category of mesh networks that are transforming in-home connectivity. With our new Qualcomm Mesh Networking Platform, we are building upon that foundation to accelerate the next generation of mesh systems to further enhance connected services in the home,” said Gopi Sirineni, vice president, product management, Qualcomm Technologies, Inc. “New capabilities like voice assistance and IoT radio integration will not only transform consumer experiences at home, but along with carrier-grade feature enhancements, make it easier for our customers to adopt and deploy mesh systems aligned to how people want their networks to perform.” Driving the Mesh Networking Transition  The Qualcomm Mesh Networking Platform is based upon the Qualcomm® IPQ40x8/9 network system-on-chip, which is used in nearly every mesh networking product available today. The Qualcomm Mesh Networking Platform includes: • Qualcomm® Wi-Fi Self-Organizing (SON) feature suite serves as one of the first collection of SON features designed to ensure corner-to-corner Wi-Fi coverage, easy set-up, automatic management and traffic optimization with near-zero user intervention, as well as additional security safeguards. • Carrier-Grade features are designed to make it easier for carriers to enhance their broadband services with Wi-Fi SON, making application programming interfaces (APIs) available for easier porting of SON on to other silicon platforms. Qualcomm Technologies is also enabling software features, such as cloud-based diagnostics to enable remote monitoring, diagnostics and analytics for troubleshooting. • Integrated voice capabilities allow consumers to control and interact with devices on their network using their voice. The Qualcomm Mesh Networking Platform can support a built-in microphone array and speaker, voice recognition software, and supports APIs to the most popular cloud-based assistant applications. • Backhaul flexibility offers a variety of backhaul options that can be used to maximize the performance of mesh networks, including 802.11ac, 802.11ad, 802.11ax, or Powerline technologies.  • Qualcomm® IoT Connectivity Feature Suite is designed to help ensure compatible and simultaneous use of Wi-Fi, Bluetooth, CSRmesh™ connectivity, and 802.15.4-based technologies across a network, while also supporting previously announced communication protocols, cloud services and software frameworks. This allows it to act as a universal translator of diverse connectivity technologies and ecosystems, to minimize complexity and ease fragmentation challenges for manufacturers, developers and consumers. • Qualcomm Mesh Networking Reference Design offers manufacturers an expedient path for the commercialization of next-generation networking products with cutting-edge features. This allows for completely new avenues of differentiation and business partnerships for OEMs, cloud providers and the IoT client/device ecosystem by centralizing the connectivity and control mechanics into the network.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
1
0
logo
Offer a reference bonus
0.00

Skybox Change Manager (CM)

Enterprises have to deal with a constant stream of firewall change requests. Despire the pressure that may be felt by the volume of those requests, or any implementation errors, it’s important that availability, security and compliance are not compromised. Skybox® Change Manager fully automates firewall change management workflows, including rule creation, recertification and deprovisioning. And its analytics–driven automation ensures each change is properly handled from request to implementation and verification. Change Manager delivers automated modeling capabilities to assess potential business impacts, and closed-loop rule life cycle management to verify that every change is executed as intended. With customized, automated workflows, IT security teams can improve change management efficiency by up to 80 percent.* With Skybox Change Manager, you can:
  • Fully automate firewall change management workflows, improving communication and efficiency across security teams
  • Validate proposed firewall changes by checking for access and rule policy violations, as well as new vulnerabilities
  • Use formalized tickets and closed-loop workflows to ensure changes match the original intent
  • Customize and simplify processes to reduce change management time by 80 percent*
  • Establish end-to-end rule life cycle management for secure infrastructure and optimized firewalls
Change Manager Benefits Fully Automates Firewall Change Workflows
  • Reduces the chance of human errors and rollbacks of incorrect changes
  • Enables customizable change workflow based on type of request
  • Ensures accurate change planning and implementation within the context of the network
  • Provides option for automated provisioning for select firewall changes
Simplifies and Formalizes Rule Recertification
  • Automates rule recertification workflow
  • Calculates change risk to inform decisions on when next to review rule
  • Streamlines review process by maintaining information on stakeholders
Assesses Risk and Compliance Issues of Proposed Changes
  • Identifies potential compliance issues and vulnerability exposures to new portions of the network a proposed change could introduce
  • Models change impact on network security and compliance before implementation
Ensures Change Compliance
  • Establishes a fully automated approval process from change request through implementation and verification
  • Delivers a complete and verifiable audit trail and change reconciliation report
  • Provides closed-loop change management capabilities to ensure all changes are implemented as intended
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
11
18
logo
Offer a reference bonus
0.00

Skybox Network Assurance (NA)

Skybox® Network Assurance provides seamless visibility across physical IT, multi–cloud and operational technology (OT) environments, giving you the context needed to understand how network devices and security controls work together or leave you exposed. It continually ensures that the existing access in your infrastructure doesn’t exceed the desired access designed in your policies, and uncovers potential attack vectors, including those that could be used in lateral movement. Designed to support large and complex enterprise networks, Network Assurance empowers you to:
  • Visualize and interact with a model of your entire network topology, assets and security controls
  • Keep security zones and device configurations in continuous compliance and working to reduce your attack surface
  • Troubleshoot network connectivity and identify root causes of network outages to ensure business continuity and continuous uptime
When managing a complex network environment — whether on–prem or in the cloud — you need to understand what the human eye can’t see. Network Assurance creates a model of your network so you can easily visualize complex security zones, network paths, compliance violations and configuration issues. And Network Assurance helps you focus on high–impact issues requiring immediate action to ensure continuous availability, security and compliance. BENEFITS Delivers Continuous Detection of Security Threats and Compliance Risks
  • Collects data from 130+ network and security devices (see the full list on our website)
  • Displays detailed, normalized configurations of firewalls and routers, as well as virtual assets
  • Creates a network topology map that unifies traditional IT, public and private clouds and OT networks that can be exported to Microsoft Visio
Speeds Network Troubleshooting to Keep Business Services Running 24/7
  • Minimizes downtime by reducing network configuration errors
  • Troubleshoots network device configurations and previews changes before implementation
  • Identifies root causes of outages quickly and accurately
  • Improves visibility and workflow for network security teams
Uncovers Access Issues and Attack Vectors
  • Correlates all ACLs (including those for cloud assets), security tags, routing rules, NAT, proxies, VPNs and more to find blocked or allowed access
  • Incorporates asset vulnerability data for physical or virtual machines in network path analysis
  • Analyzes network paths in public and private cloud environments for both north–south and east–west traffic
Maintains Continuous Compliance
  • Performs continuous compliance analysis for configurations and security zone policies
  • Normalizes security tags and other access rules throughout hybrid networks
  • Enables security policy customization
... Learn more
-
ROI-calculator
Configurator
ROI-
-
13
12
logo
Offer a reference bonus
0.00

Skybox Security Suite

The Skybox® Security Suite is a cyber risk management platform built to conquer security challenges in complex enterprise networks. By integrating with more than 120 networking and security technologies, the Suite gives exceptional and seamless visibility across physical IT, multi–cloud and OT networks. Our analytics and intelligence provide the context needed to bridge the gaps between point solutions, so security teams can fulfill the goals of vulnerability, threat, firewall and security policy management programs — even in the world’s largest organizations. TOTAL VISIBILITY See everything in your hybrid network in one view Skybox analyzes information from your organization’s assets and networks to provide a contextual understanding of your risk of cyberattack so you can proactively address that risk. Collecting data from a variety of sources, Skybox builds a model encompassing your:
  • Network topology (routers, load balancers, switches)
  • Security controls (firewalls, IPS, VPN)
  • Assets (servers, workstations, networks including traditional IT, multi–cloud and OT)
  • Vulnerabilities and threats
The model is regularly and automatically updated to reflect the actual state of your network. THREAT–CENTRIC VULNERABILITY MANAGEMENT Stop chasing the wrong vulnerabilities Skybox takes a fundamentally different approach to vulnerability management. Using asset, network and threat context, we focus remediation on vulnerabilities most likely to be attacked: those with active exploits in the wild and exposed in your environment. Skybox analyzes multiple factors to prioritize remediation, including:
  • Vulnerability severity
  • Compliance
  • Age
  • Location
  • Exploitability
  • Prevalence (density)
  • Asset role
  • Asset value
  • Threats
  • Network topology
  • Security controls
SECURITY POLICY MANAGEMENT Automate and orchestrate across your entire network Skybox delivers automated tasks and workflows to simplify and centralize security policy management across traditional IT, multi–cloud and OT networks.
  • Create analytics–driven, automated processes that scale and adapt to a growing network
  • Ensure firewall rules and security policies enable reliable connectivity and continuous compliance — without exposing the organization to risky attack vectors
  • Streamline the creation of new firewall rules and efficiently manage rule recertification
  • Perform same–day audits and simplify reporting
The Suite includes 5 modules and Research Lab’s intelligence feed on a common platform. Modules can be licensed individually or together:
  • Skybox® Vulnerability Control
  • Skybox® Change Manager
  • Skybox® Firewall Assurance
  • Skybox® Network Assurance
  • Skybox® Horizon
  • Skybox® Research Lab
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
7
10
logo
Offer a reference bonus
1.00

Subscriber Network Analytics Technology

Analysis of CDR data that determines the nature of use and reconstructs calls and data flows Patented methods for analyzing call reconstruction and data flow sessions for the entire subscriber base. When networked data is used using certain templates, two types of profiles are created: - network profiles to accurately identify performance issues and opportunities to improve labeling - subscriber profiles that enrich the CEM and application systems Profile data has feedback from the network through OSS interfaces, providing recommendations for a closed and open loop. This ensures that the network is continuously optimized based on the dynamic needs and experience of the subscribers. User profiles contain a huge amount of information of individual and group level - phones, routes, places, information about roaming, and much more. All this is available in powerful dashboard formats, and can also be used to inform external applications.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
10

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.