Network Instruments Unveils 40 Gb Data Center Monitoring Platform

New interface captures, validates full-duplex 40 Gb performance.

Note: ESJ’s editors carefully choose vendor-issued press releases about new or upgraded products and services. We have edited and/or condensed this release to highlight key features but make no claims as to the accuracy of the vendor's statements.

Network Instruments, a network and application performance monitoring vendor, has released its new hardware and software interface for capturing and analyzing full-duplex 40 Gb data center performance.

The platform is the first, full-duplex analysis interface for 40 Gb networks. Coupled with the GigaStor retrospective network analysis appliance, IT teams can store up to 5 PB of traffic to validate and manage network and application performance on critical 40 Gb links.

“Our enterprise customers, as they build new data centers, are seriously investigating 40 Gb,” said Charles Thompson, director of product strategy for Network Instruments. “With the new platform, we guarantee the transition to higher-speed networks will be seamless and potential visibility gaps eliminated.”

Network Instruments released the new Gen2 capture card, designed and developed in house to handle the significant data acquisition and analysis demands of 40 Gb network environments. The new card operates on both single and multimode 40 Gb links. With onboard hardware acceleration, filtering, and de-duplication, the Gen2 product line features the fastest capture cards available with the capacity to support full-duplex gigabit, 10 Gb, and 40 Gb environments.

Another key component of the company’s 40 Gb offering is the new 40 Gb multimode optical nTAP. The full-duplex, optical nTAP is the first in the industry to provide permanent, passive access to full-duplex 40 Gb traffic. It will not introduce points of failure on the network or impact the performance of other devices. Because it does not have an IP address or require power to function, the device is secure from hack attacks.

More information is available at

Must Read Articles