Top Five Things You Should Know About Network Forensics

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Top Five Things You Should Know About Network Forensics-5 Next

When you should apply network forensics

Forensics can be applied to many situations to solve performance, security and policy problems on today’s high-speed networks. These include:

  • Finding proof of a security attack
  • Troubleshooting intermittent performance issues
  • Monitoring user activity for compliance with IT and HR policies
  • Identifying the source of data leaks
  • Monitoring business transactions
  • Troubleshooting VoIP and video over IP

Network forensics is the process of capturing, storing and analyzing activity that takes place on a computer network. While it’s often associated with solving network security breaches, the practice can also help solve far more common network issues, like spikes in utilization, drops in VoIP call quality, identifying rogue activity, and improving both network and application performance.

In this slideshow, WildPackets, provider of network and application performance analysis solutions, explains the basics of network forensics and how it can be used to improve network performance at all organizations.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.