News Article | May 16, 2017
— Rising demand for cloud based solutions, growing need for secure networks from advanced attacks are the key factors favouring the network forensics market. Furthermore, strict regulatory compliances, rising security concern across different industries along with rapid economic growth in emerging markets, increasing digital trend, rise in Sophisticated attacking/hacking techniques are the drivers for market growth. However, lack of skilled investigators is inhibiting the Network Forensics market. With continuous advancements in existing technologies, Network Forensic tools would find broad range of applications in BFSI, Energy and utilities, education and other application areas. Some of the major players in global Network Forensics market include AccessData, Cisco Systems, Inc., EMC RSA, Fireeye, Inc., IBM Corporation, Logrhythm, Inc., Narus, WildPackets, Netscout Systems, Inc., NetWitness, Niksun, Savvius, Inc., Solera Networks, Symantec Corporation and Viavi Solutions. Services Covered: • Managed services • Professional services .Consulting services o Design and integration o Incident response services o Support and maintenance o Training and education Size of the Organization Covered: • Large enterprises • Small and Medium Enterprises (SMEs) End Users Covered: • Banking, Financial Services, and Insurance (BFSI) • Education • Energy and utilities • Government • Healthcare • Manufacturing • Retail • Telecom and IT • Other End Users o Aerospace & defense o Hospitality o Media & entertainment Regions Covered: • North America o US o Canada o Mexico • Europe o Germany o France o Italy o UK o Spain o Rest of Europe • Asia Pacific o Japan o China o India o Australia o New Zealand o Rest of Asia Pacific • Rest of the World o Middle East o Brazil o Argentina o South Africa o Egypt What our report offers: - Market share assessments for the regional and country level segments - Market share analysis of the top industry players - Strategic recommendations for the new entrants - Market forecasts for a minimum of 6 years of all the mentioned segments, sub segments and the regional markets - Market Trends (Drivers, Constraints, Opportunities, Threats, Challenges, Investment Opportunities, and recommendations) - Strategic recommendations in key business segments based on the market estimations - Competitive landscaping mapping the key common trends - Company profiling with detailed strategies, financials, and recent developments - Supply chain trends mapping the latest technological advancements About Stratistics MRC We offer wide spectrum of research and consulting services with in-depth knowledge of different industries. We are known for customized research services, consulting services and Full Time Equivalent (FTE) services in the research world. We explore the market trends and draw our insights with valid assessments and analytical views. We use advanced techniques and tools among the quantitative and qualitative methodologies to identify the market trends. Our research reports and publications are routed to help our clients to design their business models and enhance their business growth in the competitive market scenario. We have a strong team with hand-picked consultants including project managers, implementers, industry experts, researchers, research evaluators and analysts with years of experience in delivering the complex projects. For more information, please visit http://www.strategymrc.com
News Article | May 26, 2017
DUBLIN--(BUSINESS WIRE)--Research and Markets has announced the addition of the "North America Network Forensics Market (2016-2022)" report to their offering. Network forensics is a process of investigating and analyzing information about a network or network events. The network forensics is a specialized category within the more general field of digital forensics, and the technology is applicable in the various forms of IT data investigations. Typically, network forensics is a process of network analysis that tracks security attacks and other types of criminal activities on a network. Criminal attack groups are now getting into advanced level of cyber-attacks. Cyber criminals use extensive resources and skilled technical staff to carry out attacks on unsecure networks; attack groups are focusing on vulnerable security systems and then exploit the same before any counter-measures are carried out to thwart the threats. Key companies profiled in the report include Viavi Solutions, Niksun, Logrhythm, Inc., IBM Corporation, Cisco Systems, Inc., Fireeye, Inc., Symantec Corporation, and EMC RSA (Dell). For more information about this report visit http://www.researchandmarkets.com/research/g4z9x2/north_america
News Article | June 27, 2017
PRINCETON, N.J.--(BUSINESS WIRE)--NIKSUN® Inc., the world leader in developing real-time and forensics-based cyber security and network performance monitoring solutions, is pleased to announce that the company has been granted three certificates for its implementation of approved cryptographic algorithms. These certificates are a momentous recognition that NIKSUN is fully compliant with and satisfies the standards set forth by the U.S. government. This set of certifications are issued by the National Institute of Standards & Technology (NIST) after approval by the U.S. government. They are pursuant to the Federal Information Security Management Act (FISMA) and Cryptographic Algorithm Validation Program (CAVP), which are a set of publicly announced standards for use in computer systems by government contractors, non-military government agencies, and vendors who work with these agencies. NIKSUN’s NIKOS FIPS Object Module, a software library that provides cryptographic services to a vast array of NIKSUN solutions, received certificates for CVL #1194 (Diffie-Hellman SP 800-56A without KDF), RSA #2455 (SigGen and SigVer), and RSA #2458 (KeyGen), further accrediting it as the most dependable platform on the market today. “These certificate validations are an significant step for NIKSUN towards meeting strict guidelines for the National Information Assurance Partnership (NIAP) Common Criteria certification,” stated Dr. Parag Pruthi, NIKSUN’s Founder and CEO. “Being compliant with CAVP further reinforces that NIKSUN, as a chosen provider of full packet capture at many high-profile commercial, government, and service provider customers, is committed to providing the necessary security protection required both today and in the future.” The independent algorithm implementations were successfully performed and tested as part of the NIST CAVP by Booz Allen Hamilton, a NIST-accredited testing laboratory. NIKSUN is the recognized worldwide leader in making the Unknown Known. The company develops a highly scalable array of real time and forensics-based cyber security and network performance management solutions for government & intelligence agencies, service providers, financial services companies, and large enterprises such as retailers and manufacturers. NIKSUN's award-winning appliances deliver unprecedented flexibility and packet capture power. The company's patented real-time analysis and recording technology is the industry's most comprehensive solution for secure and reliable network infrastructure and services. NIKSUN, headquartered in Princeton, New Jersey, has sales offices and distributors throughout the US, Europe, the Mid East and Asia-Pacific. NIKSUN, NetDetector, NetDetectorLive, NetVCR, NetOmni, Supreme Eagle and other NIKSUN marks are either registered trademarks or trademarks of NIKSUN, Inc. in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. For more information, including a complete list of NIKSUN marks, visit NIKSUN's website at www.niksun.com.
Pruthi S.,Niksun Inc.
Wireless Personal Communications | Year: 2012
The field of Robotics is one of the most fascinating areas of research in the world. Right now, hundreds of universities, corporations, and governments are spending billions researching and developing intelligent robotic systems for use in automation, military, medicine, electronics, food and beverage, service and a host of other industries. There is no doubt that robotic systems will play a major role in shaping the future of the world and as research and industry merge, progress in robotics technology will advance several times beyond the current level. This progress will be driven by a need to not only make life easier for consumers, but also to improve communities and even nations as a whole. The market for wireless robots and robotic systems far exceeds the current utilization and as technology advances, the use of robots will be incorporated primarily or indirectly in almost all fields. Of course the most interesting application is use of mobile and communicative robotic systems in everyday life. The possibilities are limited only by human creativity and intellect - the driving force that can turn this industry into the forerunner for an autonomous robot assisted future. Two of the most important areas for furthering the wide scale adaption of robotics are "autonomous mobility" and "wireless communications". The field of endeavor by which robotic systems communicate wirelessly is known as Wireless Robotics. Advances in the field of Wireless Robotics are necessary to further the growth of robotic systems and their use in everyday life. Research and development in this field needs to progress more rapidly in order to see faster adoption of robots in everyday life. One way to stimulate this growth is by leveraging expertise on a global scale. But for people to cooperate in a global environment and be able to design systems without running into compatibility issues, standards are necessary. In this paper, we shall provide a brief background on the origin of robots and our fascination with them, discuss various use cases in current life, and provide the motivation for standardization in the field of Wireless Robotics. © Springer Science+Business Media, LLC. 2012.
Niksun Inc. | Date: 2012-09-13
Methods and systems for dynamically provisioning a network are disclosed. A network may be dynamically provisioned by detecting network congestion due to data on the network, identifying a transmission from a source computer to a destination computer for distinct routing based on at least one packet of the transmission, directing at least one other packet of the identified transmission to be marked for distinct routing, and instructing a router to distinctively route the other marked packets in response to the detection of network congestion. A controller and a monitoring device may be used to implement dynamic network provisioning.
Niksun Inc. | Date: 2011-12-20
A method of monitoring data on a first communication line. Data is received from the first communication line (402) and a plurality of packets (406) are extracted (416) from the data. Statistics are then recursively generated (408), the statistics corresponding to the plurality of packets.
Niksun Inc. | Date: 2014-07-03
Methods, systems, and apparatus for monitoring network devices and identifying packet anomalies are described herein. Anomalies may be identified by receiving packets from a network device at a network monitor, each packet having a first time stamp added by the network device, adding a second time stamp to the packets by the network monitor, comparing the first time stamp and the second time stamp of each packet, and identifying an anomaly associated with a packet in response to a difference metric generated based on the first and second time stamps exceeding a threshold.
Niksun Inc. | Date: 2013-07-25
Configurable network monitoring systems, apparatus, and methods are described. The configurable system includes storage devices, processing modules, and a system chassis housing the processing modules. Each processing module includes a processing unit, a network interface card coupled to the processing unit and configured for receiving data from a communication network, a storage controller coupled to the processing unit and configured to access a corresponding one of the storage devices, and a module chassis housing the processing unit, the network interface card, and the storage controller. The system can be reconfigured by adding/removing processing modules from the system chassis.
Niksun Inc. | Date: 2014-03-17
Computer hardware and software for network security; computer hardware and software for intrusion detection and prevention; enterprise security hardware and software; computer hardware and software for monitoring and recording network traffic; computer hardware and software for limiting website, social media and application access; computer hardware and software for filtering content and access.