Infrastr. Monitoring

A key attribute of QoE is the status of all elements involved in the performance of specific applications. Fluctuations in behaviour, availability or performance of a single element of the system disrupts our perception of the system. Delays or fluctuations in the applications have an impact on the system as a whole, and users who access the application system subjectively assess the fluctuations. There are many factors that affect the behaviour of individual network components; It can be caused by overload of applications, hardware errors, targeted attacks, or the impact of a higher power. It is essential that we not only know the current status of all elements of the system, but also evaluate the history to calculate trends and predict error conditions.

 

Monitoring of SLA for increasing QoE and forensic analysis is only applicable on robust and flexible network architectures, which ensures data collection even under difficult circumstances and is not limited to a small set of elements. All elements of the monitoring system must be redundant and the monitoring function must be a distributed one. In order to attain valid data, the module of testing elements has to be compatible with the monitored objects. This is especially true when monitoring applications, where it is not enough to monitor data transferred to an application port, its mandatory to simulate client behaviour towards particular applications in order to measure the response.

 

More Less
SOLUTION LIST

Active network security

Most of today’s networks is protected from Internet attack considered to be the greatest safety risk. In reality an overwhelming majority of attacks at corporate networks is lead from inside the corporation – from the local network. Corporate local network are expanding and it is often complicated to retroactively map all active ports; standard Ethernet hubs are added to locally increase the number of ports. At the same time more and more users access the network wirelessly both from company and private laptops and from various mobile devices as well. It is almost impossible to find out who connected from what location, to what application and what data was transferred. We do not know an exact address plan, we reserve addresses that are unused for a long time. In case of an attack we are defenseless and we cannot identify the attacker.

Solution details

DDoS Protection

DDoS attacks are nothing new, and the principle is simple. The attacker is trying to "overwhelm" the service (application servers, infrastructure, etc.). Lately, however, we may experience a significant increase in these attacks. Increasing not only their frequency but also the duration (in the world are now even users who are under constant attack), complexity (the attacks are thoroughly prepared and often combine more than 5 ways). There are increasing a different goals. We can say that today there is no firm or a market segment that could not become victims.

Solution details
10
:72:120:
Do you wish to receive our newsletter? Yes, I am interested

Získejte

DOKUMENT ZA KONTAKT
popup





I give consent to the company VUMS Datacom, Ltd. based Lužná 591, 16000 Prague 6, ID: 48585611, registered in the Commercial Register of the Municipal Court in Prague, Section C, File 17811, to collect and process in accordance with law no. 101/2000 Coll. as amended, my name and e-mail address and other personal data provided for inclusion in the database in order to offer products, services and sending commercial messages by electronic means pursuant to applicable law no. 480/2004 Coll., on indefinitely until further notice.