Knowledge

Network intelligence

Source 📝

198:. The technology enables a global understanding of network traffic for applications that need to correlate information such as who contacts whom, when, where and how, or who accesses what database, when, and the information viewed. When combined with traditional BI tools that examine service quality and customer care, NI creates a powerful nexus of subscriber and network data. 141:
DPI focuses on recognizing different types of IP traffic as part of a CSP's infrastructure. NI provides more granular analysis. It enables vendors to create an information layer with metadata from IP traffic to feed multiple applications for more detailed and expansive visibility into network-based
158:
In much the same way that BI technology synthesizes business application data from a variety of sources for business visibility and better decision-making, NI technology correlates network traffic data from a variety of data communication vehicles for network visibility, enabling better cyber
145:
NI technology goes beyond traditional DPI, since it not only recognizes protocols but also extracts a wide range of valuable metadata. NI's value-add to solutions traditionally based on DPI has attracted the attention of industry analysts who specialize in DPI market research. For example,
125:
solutions therefore need to address the exponential increases in IP traffic, methods of access, types of activity and volume of content generated. Traditional DPI tools from established vendors have historically addressed specific network infrastructure applications such as
327:
Real-time network metrics are equally important for companies to deliver and manage services. NI classifies protocols and applications from layers 2 through 7, generates metadata for communication sessions, and correlates activity between all layers, applicable for
233:
Because NI captures detailed information from the hundreds of IP applications that cross mobile networks, it provides the required visibility and analysis of user demand to create and deliver differentiating services, as well as manage usage once deployed.
159:
security and IP services. With ongoing changes in communications networks and how information can be exchanged, people are no longer linked exclusively to physical subscriber lines. The same person can communicate in multiple ways –
408:. Real-time data capture, extraction and analysis allow security specialists to take preventive measures and protect network assets in real time as a complement post-mortem analysis after an attack. 85:, governments and large enterprises. NI extends network controls, business capabilities, security functions and data mining for new products and services needed since the emergence of 510: 316:
Customer metrics are especially important for telecom companies to understand consumer behaviors and create personalized IP services. NI enables faster and more sophisticated
113:
technologies offer possibilities for new types of products and services, as well as opportunities for hackers and criminal organizations to exploit weaknesses and perpetrate
388:
and an irrefutable audit trail of all network transaction – communication and content – related to a customer's account, assuming compliance to regulation and standards.
190:
NI provides the means to quickly identify, examine and correlate interactions involving Internet users, applications, and protocols whether or not the protocols are
581: 835: 380:
of network activity, and critical transparency to allay fears of potential customers. A vendor can demonstrate hardened network security to prevent
462: 855: 81:
and cyber security. It is currently being incorporated into a wide range of applications by vendors who provide technology solutions to
428:
and Network Protection. The network visibility afforded by NI can also be used to build enhancements and next-generation solutions for
54:
for rapid analysis of data relationships and communications patterns. Also, sometimes referred to as Network Acceleration or piracy.
713:"IDC Finds Cloud Computing Entering Period of Accelerating Adoption and Poised to Capture IT Spending Growth Over the Next Five Years" 365: 804: 712: 840: 329: 82: 39: 669: 437: 429: 691: 626: 850: 168: 223: 738: 845: 219: 43: 207: 47: 381: 211: 184: 160: 27: 782: 397: 377: 373: 369: 337: 333: 218:
business models. The cost savings and revenue opportunities driving smart pipe strategies also apply to
35: 602: 466: 352:
is fueling rapid adoption by companies and government agencies. Among concerns, however, are risks of
353: 317: 127: 58: 401: 191: 131: 78: 66: 417: 227: 135: 118: 511:"The Everyday Relationship Between You and 'Your' Information: What's Out There on the Internet" 396:
NI extracts and correlates information such as who contacts whom, when where and how, providing
57:
NI is used as a middleware to capture and feed information to network operator applications for
441: 421: 172: 74: 70: 760: 433: 122: 808: 488: 349: 62: 559: 425: 405: 321: 114: 31: 829: 716: 150:
now includes NI companies on its Deep Packet Inspection Semi-Annual Market Tracker.
357: 176: 420:
with IP metadata extraction, it enhances the effectiveness of applications for
385: 215: 187:– and from different access points via desktops, laptops and mobile devices. 195: 627:"Big Data and Bigger Breaches With Alex Pentland of Monument Capital Group" 647: 361: 110: 106: 51: 582:"Qosmos Network Intelligence Helps Development of Smart Pipe Solutions" 164: 86: 463:"Light Reading report: Network Acceleration - Managing Data Growth" 180: 26:) is a technology that builds on the concepts and capabilities of 489:"Network Intelligence is Key to Profiting from Anywhere Demand" 537: 147: 94: 90: 560:"Market Research: New Opportunity for Service Providers?" 603:"MessageLabs Intelligence: 2008 Annual Security Report" 214:
are under increasing competitive pressures to move to
312:
NI as enabling technology for smart pipe applications
670:"A Brave New World: 700M New Net Users Seen By 2013" 538:"Deep Packet Inspection Semi-Annual Market Tracker" 692:"Will P2P Soon Be the Scourge of Mobile Networks?" 444:, and internal billing of networked applications. 805:"Gartner: Seven cloud-computing security risks" 531: 529: 527: 69:(including usage-based and content billing), 8: 763:. Government Information Security Podcasts 236: 77:, market research mega panel analytics, 739:"More Cash for Cloud Computing in 2009" 453: 154:Business Intelligence for data networks 83:Communications Service Providers (CSPs) 50:used and extracting packet content and 364:. NI mitigates the risks by providing 348:The economics and deployment speed of 330:bandwidth & resource optimization 286:Identify / deliver / manage services 7: 761:"DISA's Cloud Computing Initiatives" 297:Quality of Experience (QoE) analysis 294:Content / application-aware billing 38:(BI). It examines, in real time, 690:Stacey Higginbotham (2009-07-21). 509:Thibaut Bechetoille (2009-03-25). 366:Infrastructure as a Service (IaaS) 291:Bandwidth / resources optimization 14: 715:. IDC. 2008-10-20. Archived from 208:Internet Service Providers (ISPs) 836:Packets (information technology) 783:"The dangers of cloud computing" 759:Henry Sienkiewicz (2008-04-30). 781:Ephraim Schwartz (2008-07-07). 648:"2008 Internet Security Trends" 465:. Light Reading. Archived from 212:Mobile Network Operators (MNOs) 487:Brian Partridge (2010-05-17). 461:Jessica Schieve (2011-02-23). 438:Customer Experience Management 430:Network Performance Management 416:Because NI combines real-time 332:, QoS, Content-Based Billing, 1: 558:Aditya Kishore (2008-07-21). 324:, and Personalized Services. 807:. Info World. Archived from 668:Jordan Golson (2009-07-21). 491:. Yankee Group Anchor Report 374:Software as a Service (SaaS) 370:Platform as a Service (PaaS) 360:, regulatory compliance and 336:, VoIP Fraud Monitoring and 105:The evolution and growth of 856:Business intelligence terms 737:Tom Sullivan (2008-03-29). 254:Understand customer demand 220:Network Equipment Providers 872: 803:Jon Brodkin (2008-07-02). 580:Shireen Dee (2009-02-03). 320:, User Behavior Analysis, 230:that serve the industry. 202:Use in telecommunications 132:performance optimization 376:vendors with real-time 44:communications networks 841:Deep packet inspection 344:Use in cloud computing 262:User behavior analysis 28:deep packet inspection 398:situational awareness 378:situational awareness 338:regulatory compliance 334:quality of experience 322:Customer Segmentation 303:Regulatory compliance 300:VoIP fraud monitoring 268:Personalized services 265:Customer segmentation 246:Example Applications 65:, policy management, 36:business intelligence 354:information security 318:Audience Measurement 278:service ( Delivery ) 259:Audience measurement 128:bandwidth management 119:Network optimization 67:charging and billing 59:bandwidth management 20:Network intelligence 851:Networking hardware 608:. MessageLabs. 2009 536:Simon Sherrington. 402:Lawful Interception 228:Systems Integrators 79:lawful interception 46:by identifying the 16:Internet technology 418:network monitoring 136:quality of service 846:Network analyzers 442:Content Filtering 426:Database Auditing 422:Database Security 392:Use in government 313: 309: 308: 251:Customer Metrics 173:instant messaging 75:revenue assurance 71:service assurance 863: 820: 819: 817: 816: 800: 794: 793: 791: 790: 778: 772: 771: 769: 768: 756: 750: 749: 747: 746: 734: 728: 727: 725: 724: 709: 703: 702: 700: 699: 687: 681: 680: 678: 677: 665: 659: 658: 656: 655: 650:. IronPort. 2008 644: 638: 637: 635: 634: 623: 617: 616: 614: 613: 607: 599: 593: 592: 590: 589: 577: 571: 570: 568: 567: 555: 549: 548: 546: 545: 533: 522: 521: 519: 518: 506: 500: 499: 497: 496: 484: 478: 477: 475: 474: 458: 434:WAN Optimization 311: 275:Network Metrics 237: 224:Software Vendors 871: 870: 866: 865: 864: 862: 861: 860: 826: 825: 824: 823: 814: 812: 802: 801: 797: 788: 786: 780: 779: 775: 766: 764: 758: 757: 753: 744: 742: 736: 735: 731: 722: 720: 711: 710: 706: 697: 695: 689: 688: 684: 675: 673: 667: 666: 662: 653: 651: 646: 645: 641: 632: 630: 625: 624: 620: 611: 609: 605: 601: 600: 596: 587: 585: 579: 578: 574: 565: 563: 562:. Light Reading 557: 556: 552: 543: 541: 540:. Heavy Reading 535: 534: 525: 516: 514: 508: 507: 503: 494: 492: 486: 485: 481: 472: 470: 460: 459: 455: 450: 414: 412:Use in business 394: 350:cloud computing 346: 204: 185:social networks 156: 103: 63:traffic shaping 40:IP data packets 17: 12: 11: 5: 869: 867: 859: 858: 853: 848: 843: 838: 828: 827: 822: 821: 795: 773: 751: 729: 704: 682: 660: 639: 618: 594: 572: 550: 523: 501: 479: 452: 451: 449: 446: 413: 410: 406:Cyber Security 393: 390: 345: 342: 307: 306: 305: 304: 301: 298: 295: 292: 287: 284: 283: 282: 279: 272: 271: 270: 269: 266: 263: 260: 255: 252: 248: 247: 244: 241: 203: 200: 194:or follow the 155: 152: 102: 99: 97:technologies. 32:packet capture 15: 13: 10: 9: 6: 4: 3: 2: 868: 857: 854: 852: 849: 847: 844: 842: 839: 837: 834: 833: 831: 811:on 2009-03-18 810: 806: 799: 796: 784: 777: 774: 762: 755: 752: 740: 733: 730: 719:on 2009-11-23 718: 714: 708: 705: 693: 686: 683: 671: 664: 661: 649: 643: 640: 628: 622: 619: 604: 598: 595: 583: 576: 573: 561: 554: 551: 539: 532: 530: 528: 524: 512: 505: 502: 490: 483: 480: 469:on 2011-05-11 468: 464: 457: 454: 447: 445: 443: 439: 435: 431: 427: 423: 419: 411: 409: 407: 403: 399: 391: 389: 387: 383: 379: 375: 371: 367: 363: 359: 355: 351: 343: 341: 339: 335: 331: 325: 323: 319: 314: 302: 299: 296: 293: 290: 289: 288: 285: 280: 277: 276: 274: 273: 267: 264: 261: 258: 257: 256: 253: 250: 249: 245: 242: 239: 238: 235: 231: 229: 225: 221: 217: 213: 209: 201: 199: 197: 193: 188: 186: 182: 178: 174: 170: 166: 162: 153: 151: 149: 148:Heavy Reading 143: 139: 137: 133: 129: 124: 120: 116: 112: 108: 100: 98: 96: 92: 89:and wireless 88: 84: 80: 76: 72: 68: 64: 60: 55: 53: 49: 45: 41: 37: 33: 29: 25: 21: 813:. Retrieved 809:the original 798: 787:. Retrieved 785:. Info World 776: 765:. Retrieved 754: 743:. Retrieved 732: 721:. Retrieved 717:the original 707: 696:. Retrieved 685: 674:. Retrieved 663: 652:. Retrieved 642: 631:. Retrieved 621: 610:. Retrieved 597: 586:. Retrieved 575: 564:. Retrieved 553: 542:. Retrieved 515:. Retrieved 504: 493:. Retrieved 482: 471:. Retrieved 467:the original 456: 415: 395: 382:Data Leakage 347: 326: 315: 310: 240:Requirement 232: 205: 189: 157: 144: 140: 104: 56: 23: 19: 18: 358:e-discovery 177:online chat 115:cyber crime 42:that cross 830:Categories 815:2009-07-28 789:2009-07-28 767:2009-07-28 745:2009-07-28 741:. PC World 723:2009-07-28 698:2009-07-27 676:2009-07-27 654:2009-07-27 633:2015-01-14 612:2009-07-27 588:2009-07-27 566:2009-07-27 544:2010-06-15 517:2010-06-15 495:2010-06-15 473:2011-03-15 448:References 386:Data Theft 216:smart pipe 142:activity. 101:Background 196:OSI model 48:protocols 694:. GigaOM 672:. GigaOM 584:. TMCnet 513:. TMCnet 362:auditing 243:Purpose 206:Telcos, 192:tunneled 138:(QoS). 123:security 111:wireless 107:Internet 52:metadata 165:Webmail 87:Web 2.0 30:(DPI), 629:. 2015 281:events 606:(PDF) 181:blogs 404:and 400:for 372:and 226:and 210:and 169:VoIP 134:and 121:and 109:and 93:and 34:and 384:or 161:FTP 832:: 526:^ 440:, 436:, 432:, 424:, 368:, 356:, 340:. 222:, 183:, 179:, 175:, 171:, 167:, 163:, 130:, 117:. 95:4G 91:3G 73:, 61:, 24:NI 818:. 792:. 770:. 748:. 726:. 701:. 679:. 657:. 636:. 615:. 591:. 569:. 547:. 520:. 498:. 476:. 22:(

Index

deep packet inspection
packet capture
business intelligence
IP data packets
communications networks
protocols
metadata
bandwidth management
traffic shaping
charging and billing
service assurance
revenue assurance
lawful interception
Communications Service Providers (CSPs)
Web 2.0
3G
4G
Internet
wireless
cyber crime
Network optimization
security
bandwidth management
performance optimization
quality of service
Heavy Reading
FTP
Webmail
VoIP
instant messaging

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.