Fibre cuts, transponder failures and errors can take down data streams that can result with unhappy customers and financial loss.
Our All-Optical Switches offer an efficient drop-in solution for link protection, and support both manual and automated protection switching operation.
Remote users, or NMS systems, can manually switch between working and protection lines and monitor connection status.
In automated mode, protection switching is triggered when the optical traffic signal moves outside of the user-programmable alarm range.
Our Automated Protection Switch can also be programmed to automatically revert to the working line-pair after the fault is repaired and a stable signal power is measured on the working line input.
Traffic volumes are increasing to cater for growth of cloud computing, home working, and video streaming.
Our All-Optical Switches bring huge value to Data Centres, including:
Our SDN-enabled All-Optical switches offer Data Centres various right-sized port densities in a compact form factor that can be used for pre-provisioning, real-time provisioning, and link protection. Our Switches are data rate independent and protocol agnostic.
We can enable real-time (and retrospective) network performance analysis without introducing risk, by copying and conditioning your network traffic, then sending it to your desired destination for analysis.
Our scalable Network TAPs will copy just the traffic you need, then our Network Packet Brokers will condition it to a speed and format that your monitoring tools can understand.
In addition to this, our multi-terabit visibility platform can generate enriched 100G IPFIX metadata to help you secure and monitor your peering links up to, and including 100G.
Please contact us to discuss your needs.
Scalable Network Taps
When you need to copy thousands of high capacity fibre and copper communication links, you need the ability to easily up-scale tapping capabilities. For this we recommend our scalable Network Taps that provide reliable and continuous visibility of all the network traffic you need.
Now you have copies of traffic, do you know the network transport technology being used? Is it Ethernet or OTN? What is the wavelength? With growth of network links, data, and transport technologies, we can bring automation to content discovery to with rapid WAN network survey and high capacity unsampled network metadata generation.
Now that you have identified the transport technologies, you want to send traffic to your desired destination, but with 100G network growth, there is so much to process that we think introducing Automation to mass fibre link scanning and sending content to desired locations will enable surveillance continuity over 100G networks.
You can’t analyse content until it has been unlocked, and to do this you need to decrypt at high speeds with dedicated line rate decryption layers– in short, your decryption tools should not be tasked with performing any other function. Our decryption tools can unlock traffic at line rate and feed it striaght to the next step in the process.
High Speed, Lossless Packet Capture
Once the content has been unlocked, you may wish to store the critical ingredients needed for full forensic reconstruction, and you can’t do this with full fidelity unless you have every single data packet regardless of traffic level or packet size.
Our Toyo Sysnesis solution is an all-in-one portable packet capture system that continuously captures and stores every packet at up to 100Gbps.
Learn more about our Toyo Synesis platform here.
Fast Forensic Reconstruction
Now with the full copies of everything, you will want to quickly reconstruct and analyse the content of interest – essentially, find the actionable intel you seek. And this is another area for which we excel thanks to our Niksun platform that quickly reconstructs precise detail of things like web pages, chat, email, and other IP sessions from raw data packets.
Validate and Tune
Let’s not forget; you need to know the end-to-end tools and processes work, and the only way to know is to test everything with massive scale real application mix background traffic, malicious traffic, and encrypted traffic profiles.
Our Keysight PerfectStorm, and PerfectStorm ONE platforms can generate high speed network traffic, inject malware and application mixes, and simulate millions of end users and environments to help you test your end-to-end surveillance capability.