198:. The technology enables a global understanding of network traffic for applications that need to correlate information such as who contacts whom, when, where and how, or who accesses what database, when, and the information viewed. When combined with traditional BI tools that examine service quality and customer care, NI creates a powerful nexus of subscriber and network data.
141:
DPI focuses on recognizing different types of IP traffic as part of a CSP's infrastructure. NI provides more granular analysis. It enables vendors to create an information layer with metadata from IP traffic to feed multiple applications for more detailed and expansive visibility into network-based
158:
In much the same way that BI technology synthesizes business application data from a variety of sources for business visibility and better decision-making, NI technology correlates network traffic data from a variety of data communication vehicles for network visibility, enabling better cyber
145:
NI technology goes beyond traditional DPI, since it not only recognizes protocols but also extracts a wide range of valuable metadata. NI's value-add to solutions traditionally based on DPI has attracted the attention of industry analysts who specialize in DPI market research. For example,
125:
solutions therefore need to address the exponential increases in IP traffic, methods of access, types of activity and volume of content generated. Traditional DPI tools from established vendors have historically addressed specific network infrastructure applications such as
327:
Real-time network metrics are equally important for companies to deliver and manage services. NI classifies protocols and applications from layers 2 through 7, generates metadata for communication sessions, and correlates activity between all layers, applicable for
233:
Because NI captures detailed information from the hundreds of IP applications that cross mobile networks, it provides the required visibility and analysis of user demand to create and deliver differentiating services, as well as manage usage once deployed.
159:
security and IP services. With ongoing changes in communications networks and how information can be exchanged, people are no longer linked exclusively to physical subscriber lines. The same person can communicate in multiple ways –
408:. Real-time data capture, extraction and analysis allow security specialists to take preventive measures and protect network assets in real time as a complement post-mortem analysis after an attack.
85:, governments and large enterprises. NI extends network controls, business capabilities, security functions and data mining for new products and services needed since the emergence of
510:
316:
Customer metrics are especially important for telecom companies to understand consumer behaviors and create personalized IP services. NI enables faster and more sophisticated
113:
technologies offer possibilities for new types of products and services, as well as opportunities for hackers and criminal organizations to exploit weaknesses and perpetrate
388:
and an irrefutable audit trail of all network transaction – communication and content – related to a customer's account, assuming compliance to regulation and standards.
190:
NI provides the means to quickly identify, examine and correlate interactions involving
Internet users, applications, and protocols whether or not the protocols are
581:
835:
380:
of network activity, and critical transparency to allay fears of potential customers. A vendor can demonstrate hardened network security to prevent
462:
855:
81:
and cyber security. It is currently being incorporated into a wide range of applications by vendors who provide technology solutions to
428:
and
Network Protection. The network visibility afforded by NI can also be used to build enhancements and next-generation solutions for
54:
for rapid analysis of data relationships and communications patterns. Also, sometimes referred to as
Network Acceleration or piracy.
713:"IDC Finds Cloud Computing Entering Period of Accelerating Adoption and Poised to Capture IT Spending Growth Over the Next Five Years"
365:
804:
712:
840:
329:
82:
39:
669:
437:
429:
691:
626:
850:
168:
223:
738:
845:
219:
43:
207:
47:
381:
211:
184:
160:
27:
782:
397:
377:
373:
369:
337:
333:
218:
business models. The cost savings and revenue opportunities driving smart pipe strategies also apply to
35:
602:
466:
352:
is fueling rapid adoption by companies and government agencies. Among concerns, however, are risks of
353:
317:
127:
58:
401:
191:
131:
78:
66:
417:
227:
135:
118:
511:"The Everyday Relationship Between You and 'Your' Information: What's Out There on the Internet"
396:
NI extracts and correlates information such as who contacts whom, when where and how, providing
57:
NI is used as a middleware to capture and feed information to network operator applications for
441:
421:
172:
74:
70:
760:
433:
122:
808:
488:
349:
62:
559:
425:
405:
321:
114:
31:
829:
716:
150:
now includes NI companies on its Deep Packet
Inspection Semi-Annual Market Tracker.
357:
176:
420:
with IP metadata extraction, it enhances the effectiveness of applications for
385:
215:
187:– and from different access points via desktops, laptops and mobile devices.
195:
627:"Big Data and Bigger Breaches With Alex Pentland of Monument Capital Group"
647:
361:
110:
106:
51:
582:"Qosmos Network Intelligence Helps Development of Smart Pipe Solutions"
164:
86:
463:"Light Reading report: Network Acceleration - Managing Data Growth"
180:
26:) is a technology that builds on the concepts and capabilities of
489:"Network Intelligence is Key to Profiting from Anywhere Demand"
537:
147:
94:
90:
560:"Market Research: New Opportunity for Service Providers?"
603:"MessageLabs Intelligence: 2008 Annual Security Report"
214:
are under increasing competitive pressures to move to
312:
NI as enabling technology for smart pipe applications
670:"A Brave New World: 700M New Net Users Seen By 2013"
538:"Deep Packet Inspection Semi-Annual Market Tracker"
692:"Will P2P Soon Be the Scourge of Mobile Networks?"
444:, and internal billing of networked applications.
805:"Gartner: Seven cloud-computing security risks"
531:
529:
527:
69:(including usage-based and content billing),
8:
763:. Government Information Security Podcasts
236:
77:, market research mega panel analytics,
739:"More Cash for Cloud Computing in 2009"
453:
154:Business Intelligence for data networks
83:Communications Service Providers (CSPs)
50:used and extracting packet content and
364:. NI mitigates the risks by providing
348:The economics and deployment speed of
330:bandwidth & resource optimization
286:Identify / deliver / manage services
7:
761:"DISA's Cloud Computing Initiatives"
297:Quality of Experience (QoE) analysis
294:Content / application-aware billing
38:(BI). It examines, in real time,
690:Stacey Higginbotham (2009-07-21).
509:Thibaut Bechetoille (2009-03-25).
366:Infrastructure as a Service (IaaS)
291:Bandwidth / resources optimization
14:
715:. IDC. 2008-10-20. Archived from
208:Internet Service Providers (ISPs)
836:Packets (information technology)
783:"The dangers of cloud computing"
759:Henry Sienkiewicz (2008-04-30).
781:Ephraim Schwartz (2008-07-07).
648:"2008 Internet Security Trends"
465:. Light Reading. Archived from
212:Mobile Network Operators (MNOs)
487:Brian Partridge (2010-05-17).
461:Jessica Schieve (2011-02-23).
438:Customer Experience Management
430:Network Performance Management
416:Because NI combines real-time
332:, QoS, Content-Based Billing,
1:
558:Aditya Kishore (2008-07-21).
324:, and Personalized Services.
807:. Info World. Archived from
668:Jordan Golson (2009-07-21).
491:. Yankee Group Anchor Report
374:Software as a Service (SaaS)
370:Platform as a Service (PaaS)
360:, regulatory compliance and
336:, VoIP Fraud Monitoring and
105:The evolution and growth of
856:Business intelligence terms
737:Tom Sullivan (2008-03-29).
254:Understand customer demand
220:Network Equipment Providers
872:
803:Jon Brodkin (2008-07-02).
580:Shireen Dee (2009-02-03).
320:, User Behavior Analysis,
230:that serve the industry.
202:Use in telecommunications
132:performance optimization
376:vendors with real-time
44:communications networks
841:Deep packet inspection
344:Use in cloud computing
262:User behavior analysis
28:deep packet inspection
398:situational awareness
378:situational awareness
338:regulatory compliance
334:quality of experience
322:Customer Segmentation
303:Regulatory compliance
300:VoIP fraud monitoring
268:Personalized services
265:Customer segmentation
246:Example Applications
65:, policy management,
36:business intelligence
354:information security
318:Audience Measurement
278:service ( Delivery )
259:Audience measurement
128:bandwidth management
119:Network optimization
67:charging and billing
59:bandwidth management
20:Network intelligence
851:Networking hardware
608:. MessageLabs. 2009
536:Simon Sherrington.
402:Lawful Interception
228:Systems Integrators
79:lawful interception
46:by identifying the
16:Internet technology
418:network monitoring
136:quality of service
846:Network analyzers
442:Content Filtering
426:Database Auditing
422:Database Security
392:Use in government
313:
309:
308:
251:Customer Metrics
173:instant messaging
75:revenue assurance
71:service assurance
863:
820:
819:
817:
816:
800:
794:
793:
791:
790:
778:
772:
771:
769:
768:
756:
750:
749:
747:
746:
734:
728:
727:
725:
724:
709:
703:
702:
700:
699:
687:
681:
680:
678:
677:
665:
659:
658:
656:
655:
650:. IronPort. 2008
644:
638:
637:
635:
634:
623:
617:
616:
614:
613:
607:
599:
593:
592:
590:
589:
577:
571:
570:
568:
567:
555:
549:
548:
546:
545:
533:
522:
521:
519:
518:
506:
500:
499:
497:
496:
484:
478:
477:
475:
474:
458:
434:WAN Optimization
311:
275:Network Metrics
237:
224:Software Vendors
871:
870:
866:
865:
864:
862:
861:
860:
826:
825:
824:
823:
814:
812:
802:
801:
797:
788:
786:
780:
779:
775:
766:
764:
758:
757:
753:
744:
742:
736:
735:
731:
722:
720:
711:
710:
706:
697:
695:
689:
688:
684:
675:
673:
667:
666:
662:
653:
651:
646:
645:
641:
632:
630:
625:
624:
620:
611:
609:
605:
601:
600:
596:
587:
585:
579:
578:
574:
565:
563:
562:. Light Reading
557:
556:
552:
543:
541:
540:. Heavy Reading
535:
534:
525:
516:
514:
508:
507:
503:
494:
492:
486:
485:
481:
472:
470:
460:
459:
455:
450:
414:
412:Use in business
394:
350:cloud computing
346:
204:
185:social networks
156:
103:
63:traffic shaping
40:IP data packets
17:
12:
11:
5:
869:
867:
859:
858:
853:
848:
843:
838:
828:
827:
822:
821:
795:
773:
751:
729:
704:
682:
660:
639:
618:
594:
572:
550:
523:
501:
479:
452:
451:
449:
446:
413:
410:
406:Cyber Security
393:
390:
345:
342:
307:
306:
305:
304:
301:
298:
295:
292:
287:
284:
283:
282:
279:
272:
271:
270:
269:
266:
263:
260:
255:
252:
248:
247:
244:
241:
203:
200:
194:or follow the
155:
152:
102:
99:
97:technologies.
32:packet capture
15:
13:
10:
9:
6:
4:
3:
2:
868:
857:
854:
852:
849:
847:
844:
842:
839:
837:
834:
833:
831:
811:on 2009-03-18
810:
806:
799:
796:
784:
777:
774:
762:
755:
752:
740:
733:
730:
719:on 2009-11-23
718:
714:
708:
705:
693:
686:
683:
671:
664:
661:
649:
643:
640:
628:
622:
619:
604:
598:
595:
583:
576:
573:
561:
554:
551:
539:
532:
530:
528:
524:
512:
505:
502:
490:
483:
480:
469:on 2011-05-11
468:
464:
457:
454:
447:
445:
443:
439:
435:
431:
427:
423:
419:
411:
409:
407:
403:
399:
391:
389:
387:
383:
379:
375:
371:
367:
363:
359:
355:
351:
343:
341:
339:
335:
331:
325:
323:
319:
314:
302:
299:
296:
293:
290:
289:
288:
285:
280:
277:
276:
274:
273:
267:
264:
261:
258:
257:
256:
253:
250:
249:
245:
242:
239:
238:
235:
231:
229:
225:
221:
217:
213:
209:
201:
199:
197:
193:
188:
186:
182:
178:
174:
170:
166:
162:
153:
151:
149:
148:Heavy Reading
143:
139:
137:
133:
129:
124:
120:
116:
112:
108:
100:
98:
96:
92:
89:and wireless
88:
84:
80:
76:
72:
68:
64:
60:
55:
53:
49:
45:
41:
37:
33:
29:
25:
21:
813:. Retrieved
809:the original
798:
787:. Retrieved
785:. Info World
776:
765:. Retrieved
754:
743:. Retrieved
732:
721:. Retrieved
717:the original
707:
696:. Retrieved
685:
674:. Retrieved
663:
652:. Retrieved
642:
631:. Retrieved
621:
610:. Retrieved
597:
586:. Retrieved
575:
564:. Retrieved
553:
542:. Retrieved
515:. Retrieved
504:
493:. Retrieved
482:
471:. Retrieved
467:the original
456:
415:
395:
382:Data Leakage
347:
326:
315:
310:
240:Requirement
232:
205:
189:
157:
144:
140:
104:
56:
23:
19:
18:
358:e-discovery
177:online chat
115:cyber crime
42:that cross
830:Categories
815:2009-07-28
789:2009-07-28
767:2009-07-28
745:2009-07-28
741:. PC World
723:2009-07-28
698:2009-07-27
676:2009-07-27
654:2009-07-27
633:2015-01-14
612:2009-07-27
588:2009-07-27
566:2009-07-27
544:2010-06-15
517:2010-06-15
495:2010-06-15
473:2011-03-15
448:References
386:Data Theft
216:smart pipe
142:activity.
101:Background
196:OSI model
48:protocols
694:. GigaOM
672:. GigaOM
584:. TMCnet
513:. TMCnet
362:auditing
243:Purpose
206:Telcos,
192:tunneled
138:(QoS).
123:security
111:wireless
107:Internet
52:metadata
165:Webmail
87:Web 2.0
30:(DPI),
629:. 2015
281:events
606:(PDF)
181:blogs
404:and
400:for
372:and
226:and
210:and
169:VoIP
134:and
121:and
109:and
93:and
34:and
384:or
161:FTP
832::
526:^
440:,
436:,
432:,
424:,
368:,
356:,
340:.
222:,
183:,
179:,
175:,
171:,
167:,
163:,
130:,
117:.
95:4G
91:3G
73:,
61:,
24:NI
818:.
792:.
770:.
748:.
726:.
701:.
679:.
657:.
636:.
615:.
591:.
569:.
547:.
520:.
498:.
476:.
22:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.