|By Marketwired .||
|November 14, 2012 05:00 AM EST||
THOUSAND OAKS, CA -- (Marketwire) -- 11/14/12 -- Xirrus®, the leader in high-performance wireless networks, today announced a wireless industry first: comprehensive Layer 7 application visibility and control directly at the wireless network edge. Xirrus Application Control builds on the power of next-generation Deep Packet Inspection (DPI) technology to provide rich information about applications accessing the network, allowing Xirrus Wireless Arrays to prioritize critical applications, restrict usage of bandwidth-heavy applications, block restricted applications, and detect new threats to the network. Application Control enables management of wireless traffic where you need it most -- at the network edge before it enters the core network -- to provide full control to network administrators to manage the exploding usage and unpredictable nature of Bring Your Own Device (BYOD).
This announcement establishes a new paradigm for wireless network administration, improving on traditional approaches that utilize centralized gateways to provide visibility and enforce policies. The new Xirrus offering utilizes a distributed approach to controlling applications, placing the classification and policy enforcement engines directly at the edge of the network where bandwidth, security threats, and policies can be controlled before the traffic enters and impacts the core network. This functionality is enabled by the unique Xirrus Array architecture which employs from two to six core processors per Array to deliver the compute performance required to execute full DPI, unlike the one core processor designs of most traditional Access Points (APs) that rely on centralized controller models.
"When we first enabled Application Control, it was a revelatory experience for us to see what was actually running on our wireless network," said Scot Hollingsworth, Technical Supervisor of the Rankin County, Mississippi School District. "We have been a Xirrus customer for several years, and this capability allows us to optimize the network to an even greater extent. With Application Control at the edge of the network, we have been able to improve student attention to coursework by limiting access to social media games and applications during school hours. Further, we have been able to preserve network bandwidth for blackboard-type e-learning streaming video applications by blocking non-relevant internet-sourced streaming videos, such as sports broadcasts. The granular ability to do this at the edge of the network -- not at the gateway or the firewall -- has proven to be invaluable to our wireless deployment."
"Over a period of just months, network capacity planning, traffic management, and security have become orders of magnitude more challenging as the BYOD craze continues almost unabated," said Zeus Kerravala, Principal Analyst, ZK Research and Yankee Group Affiliate. "The influx of new smartphones and tablets into the enterprise has exposed the network to new, non-managed devices and applications that can bring a wireless LAN to its knees. Xirrus helps to eliminate that risk by giving network directors deep insight into applications, users and devices to optimize the wireless user experience."
With the new Application Control offering, Xirrus takes DPI beyond rudimentary port-based, protocol-based, or regex classification schemes to provide best-in-class deep detection of packet data. Where other DPI implementations stop, Xirrus takes application classification to the next level using multiple inspection techniques, including surgical pattern matching, conversation semantics, heuristic behavioral analysis, and future flow awareness. These multi-layered techniques provide superior accuracy and coverage of more types of applications. For example, Application Control will not just identify Facebook traffic, but the Farmville game operating inside Facebook.
Application Control answers the critical need for increased control of application activity on corporate and campus networks. For example:
- Higher Education. Network managers can control application usage by location, such as allowing P2P file sharing applications in dorms but not in lecture halls.
- Large Public Venues. Event IT personnel running high user density wireless networks can shape traffic to manage Internet uplink usage and monitor users for potential malicious activities.
- Healthcare. IT directors can prioritize life-critical applications and systems such as voice traffic or wireless clinical equipment over patient/visitor Internet traffic.
Xirrus Application Control delivers seamless, linear scalability, increasing DPI scope and compute power as new Wireless Arrays are added to the network. The distributed deployment of DPI across Arrays is also more resilient because it is executed on each Array as opposed to a centralized system that can become a choke point or single point of failure.
Enables Intelligence-based Bandwidth Assignment and Policy Setting
"Managing wireless network traffic with intelligent application-based policies has been a dream of network administrators for years," said Shane Buckley, CEO of Xirrus. "First-generation approaches identify applications at a high level but stop short of providing the granular visibility or control needed to finish the job. Application Control from Xirrus provides quantum-level improvements, enabling identification of end devices, users, and applications, plus 'applications within applications.' Arming themselves with this kind of intelligence puts network administrators back in command."
Application Control uses a simple graphical interface to enable network personnel to manage the Xirrus wireless network, delivering real-time graphical views of application traffic across network segments and users. Historical reports run over any time period deliver network analytics to monitor usage trends and enable future capacity planning. Application Control integrates with the Xirrus Array policy engine to add application context to the firewall/filter manager.
Xirrus Application Control will be available in December on XR Wireless Arrays. For more information, contact Xirrus at [email protected].
About Xirrus, Inc.
Xirrus is the leading provider of high-performance wireless networks. Xirrus' Array-based solutions perform under the most demanding circumstances with wired-like reliability and superior security. The Xirrus wireless solutions provide a vital strategic business and IT infrastructure advantage to the education, healthcare, government and enterprise industries that depend on wireless to operate business-critical applications. Headquartered in Thousand Oaks, CA, Xirrus is a privately held company that designs and manufactures its products and solutions in the USA. For more information please visit: http://www.xirrus.com/ and follow us on Twitter: @Xirrus.
Xirrus and XMS are trademarks or registered trademarks of Xirrus. Other trade names used in this document are or may be the property of their respective owners.
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Dec. 5, 2016 04:15 AM EST Reads: 1,608
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Dec. 5, 2016 04:00 AM EST Reads: 5,400
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Dec. 5, 2016 04:00 AM EST Reads: 5,087
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Dec. 5, 2016 04:00 AM EST Reads: 4,676
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 5, 2016 03:30 AM EST Reads: 934
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 5, 2016 03:30 AM EST Reads: 623
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection. In his session at 18th Cloud Expo, Bradley Holt, a Developer Advocate with IBM Cloud Data Services, discussed...
Dec. 5, 2016 01:00 AM EST Reads: 3,326
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Dec. 5, 2016 12:45 AM EST Reads: 1,569
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Dec. 5, 2016 12:45 AM EST Reads: 1,806
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Dec. 5, 2016 12:30 AM EST Reads: 6,083
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
Dec. 5, 2016 12:15 AM EST Reads: 3,815
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Dec. 5, 2016 12:15 AM EST Reads: 1,159
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 4, 2016 11:45 PM EST Reads: 920
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 4, 2016 10:45 PM EST Reads: 1,000
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
Dec. 4, 2016 08:30 PM EST Reads: 1,807
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
Dec. 4, 2016 07:00 PM EST Reads: 4,920
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Dec. 4, 2016 06:30 PM EST Reads: 2,178
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
Dec. 4, 2016 06:30 PM EST Reads: 2,036
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Dec. 4, 2016 06:00 PM EST Reads: 1,545
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Dec. 4, 2016 05:45 PM EST Reads: 1,531