SolarWinds Inc. has updated its NetFlow Traffic Analyzer, giving the software a significant boost in performance.

The company said Wednesday that NTA 4.0 now processes 50,000 flows per second, which is 400 per cent faster than the previous version. As a result network staff can capture data from continuous streams of traffic.

It can now also retain one-minute granularity of network traffic data, in addition to longer periods of time, so administrators can see exactly when an issue occurred. This can help quickly identify bandwidth spikes or microbursts, as well as unlimited data retention

Data captured is converted into simple charts that quantify exactly how the corporate network is being used, by whom and for what purpose, the company says.

NTA analyzes Cisco NetFlow, Juniper J-Flow, IPFIX, sFlow, Huawei NetStream and other flow data.

“With SolarWinds NTA’s new ability to show traffic patterns over months, days, or minutes, IT pros can determine when a network issue or anomaly occurs and investigate its source for immediate troubleshooting,” Chris LaPoint, SolarWinds’ [NYSE: SWI] vice-president of product marketing, said in a statement.

“So, for example, if an IT pro checks in after the weekend and sees there has been a questionable network traffic spike on Saturday, he can identify exactly what minute it happened and understand the nature of this traffic in order to get to the bottom of the issue: security breach, impact on application performance, etc.”

Pricing starts at US$1,795 and includes the first year of maintenance. There’s downloadable, free 30-day evaluation version here.

Related Download
IDC Analyst Connection - Unified Threat Management: Benefits of an Integrated Approach to Network Security Sponsor: Fortinet
IDC Analyst Connection – Unified Threat Management: Benefits of an Integrated Approach to Network Security
This IDC Analyst Connection looks at the the benefits of using a UTM platform integrated with network connectivity and how it will save the enterprise money, reduce the number of vendors' products needed to be purchased, improve the communications between devices, offer the opportunity for organizations to deploy more sophisticated capabilities, and vastly improve security.
Register Now
Share on LinkedIn Share with Google+ Comment on this article
More Articles