Today organisations are increasingly dependent on the performance of their business applications – which, in turn, depend on the performance of their network. To keep the business running smoothly, the performance of both applications and the network must be maintained at the highest levels. The traditional approach has been to monitor network and application performance separately, using different systems run by different teams. However, the increasing interdependency of applications and networks mean that organisations need an integrated solution if they are to identify the source of any performance problems quickly and solve them before incurring costly downtime.

“Cyber Security Is Not Just the Responsibility of the I.T. Department, It’s Everyone’s Responsibility.”
In recent years, coverage of Cyber Security incidents in the mainstream media has increased dramatically
to the point that it is now common for some form of incident to be reported on a daily basis. While the world
has no doubt become more aware of Cyber Security as a result of such reporting, the fact remains that Cyber
Criminals are using increasingly more complex and sophisticated mechanisms as part of their day-to-day

Download white paper


Field testing of screened cabling systems has always required that the tester verify that there is continuity of the screen to the remote end of the test, however some field testers can incorrectly report screen continuity and fail to highlight potential problems with the cabling system. This article discusses the issues with measurements of screen continuity, how it can influence other cabling test parameters and how the Fluke Networks shield integrity approach can correctly assure compliance of cabling installations according to the Level 2G requirements of TIA 1152A

Download white paper


“Category 8 will play a major role in data centers and mission-critical environments upgrading to 25/40GBASE-T, says Mark Dearing, Senior Product Manager at Leviton.

“Cabling manufacturers are now engineering solutions with additional quality and flexibility to meet these demanding new applications. But even the most advanced infrastructure relies on high-quality installation practices to ensure the network will operate at its best. Proper testing and certification in the field translates to less chance of disruption, downtime, and unforeseen costs in the future.”

Download white paper


This paper highlights the silo approach in which organizations tend to focus on a single issue within different groups, even if there may be huge implications across the entire organization ranging from the end user to the CEO. The performance management approach brings these disparate issues, views and groups together and focuses on providing a holistic view to improving overall performance of critical resources, applications and staff. This document will focus on key attributes and best practices for organizations looking to successfully deploy performance management strategy across their enterprise.

Download white paper

The IT network is at the heart of most enterprises, supporting business-critical applications, providing the data on which business decisions are made and facilitating communications with customers, partners, suppliers and co-workers. More than ever before, it is a strategic asset to the business, and any downtime or degradation in network or application performance will directly impact the organisation’s bottom line.

End-face contamination is a leading cause of fiber failures in data center, campus and other enterprise or telecom networking environments. See how easy fiber inspection becomes with the IEC 61300-3-35 compliant Fiber Inspector from Fluke Networks.

As the industry moves to higher data speeds, more stringent loss budgets and new multi-fiber connectors, proactively inspecting and cleaning fiber end-faces is more important than ever to ensure network uptime, performance and equipment reliability. However, relying on subjective human inspection of fiber end-faces often produces inconsistent results.

There are discussions that we have with almost every customer we meet: evaluating the cost of performance degradation. Even if the cost is not obvious, after going through some simple steps, almost every customer realizes how big the operational loss induced by performance degradations is important. Here is a sample discussion we had with one of our customer, which could almost be any of our customers.

Session-based / Flow-aware Load Balancing increases user control of traffic distribution amongst multiple monitoring tools, increasing output capacity while maintaining session integrity. Packets from a unique session flow will be balanced to the same tool port, always, using up to 10 balancing criteria, e.g. source and / or destination MAC address, EtherType, IP address, TCP/UDP port, and GTP TEID. Standard Load Balancing allows users to balance traffic based on up to ten criteria.

VSS Monitoring Uniquely Defends Against Today’s Advanced Cyber-Attacks and Scales for Big Mobile Data Explosion with New Network Packet Broker Platforms

Cyber Attacks in South Korea, Saudi Arabia and Russia Highlight Major Gaps in Today’s Security, While Mobile Operators Struggle to Gain Visibility into Rapidly Expanding LTE Traffic

Accesses traffic from full-duplex networks, making them available for network intelligence tools and are the foundation for Network Intelligence Optimization system building. All VSS’ TAP Series products are failsafe for 100% guaranteed network uptime. Features such as aggregation, replication, regeneration, and L2-L4 filters provide a wide range of options for accessing Ethernet networks.