Observer GigaStor


1800 268 378
Field is required!
Field is required!
Field is required!
Field is required!
Field is required!
Field is required!
Field is required!
Field is required!

Observer GigaStor

Capture Critical IT Service Events

The undisputed leader in back-in-time analysis, Observer GigaStor™ eliminates the time-consuming task of recreating problems for troubleshooting. Go back in time to review past network activity. Navigate to the exact moment of any service anomaly to see detailed, packet-level views before, during, and after the occurrence. GigaStor packet-based analytics offer robust data intelligence for regulatory compliance, security forensics, and network troubleshooting. GigaStor is available in rack-based and portable form factors or as software for cloud and hybrid IT applications.

Key Features and Benefits:

  • Bigger Storage, Smaller Footprint with Gen 4
    The Gen 4 GigaStor delivers provides more than a petabyte of data storage all in a 67% smaller footprint – saving you space and operational costs in your data center, while letting you store more data for longer periods of recording time. Easier installation with fewer enclosures, less disruptive deployment, significantly reduced rack requirement means keeping the lid on costs.and and business expectations.
  • 3rd Party Validated 60 Gbps Packet Capture Rates with Gen 4
    GigaStor Gen 4 has been validated by Tolly Research Group to capture traffic at 60 Gbps – the fastest independently validated rate available in the market. With more than 50% improvement, the benefits to your organization are numerous. Compared with other solutions that can drop packets or restrict filtering that can create monitoring blind spots, Observer delivers the power and capacity to ensure your performance management solution meets critical demands.
  • Gen3 100 Gb Capture Card
    To stay ahead of surging traffic volumes, VIAVI has developed a new third-generation capture card that incorporates the latest in integrated circuit and bus technologies to support network speeds up to 100Gb. To keep up with the packet deluge, the Gen3 is back-ended with an optimized and accelerated analytics engine to capture, analyze, index, and encrypt traffic as well as generate metadata in real-time.
  • Line-Rate Packet Capture
    GigaStor supports line-rate 1, 10 Gb, and 40 Gb ingress network capture performance, ensuring total transaction visibility and intelligence. Tuned hardware-software design, with an advanced GigaStor accelerated analytics engine, achieves simultaneous line-rate capture and the fastest packet capture mining in the industry for nearly instant network traffic awareness.
  • Root-Cause Analysis
    Sift through more than a petabyte of data, perform analysis, and find the problem through root-cause analysis – minimizing downtime and end-user impact. From an enterprise-wide view, you can track bandwidth utilization, network Top Talkers, application metrics, and even VoIP quality statistics.
    Have more than one GigaStor, Multi-GigaStor Analysis allows you to extract and combine data from numerous appliances into one console. This provides a consolidated view of all GigaStor data, making visualization of the entire network path simple.
  • Unique Enclosure Designs
    GigaStor appliances are built on custom-configured foundation, tuned to deliver the best packet capture, analysis, and reliability in the industry. Available in 2U and 4U enclosures or an exclusive portable formfactor for fast, take-anywhere troubleshooting. GigaStor appliances are developed to support five years of uninterrupted, 100% duty-cycle, line-rate capture without dropping a single packet for the ultimate in network conversation visibility and peace of mind.
  • Network Security Forensics
    GigaStor makes collaboration between the network, operations, and security teams simple. It captures and stores all network conversations for later analysis and reporting, making it ideal for augmenting existing real-time security solutions and for satisfying compliance objectives. GigaStor not only shows conversations, it can reconstruct the mined data – providing evidence such as phone conversations, web pages, instant messages, and emails while also allowing security teams to determine which assets were compromised.

You may also like…

CoverTel Telecommunications Group
Shopping Cart
There are no products in the cart!
Continue Shopping