NETSCOUT Case Studies High-Flying Agency Assures Critical Aviation R&D with NETSCOUT
Edit This Case Study Record
NETSCOUT Logo

High-Flying Agency Assures Critical Aviation R&D with NETSCOUT

NETSCOUT
Analytics & Modeling - Real Time Analytics
Cybersecurity & Privacy - Intrusion Detection
Cybersecurity & Privacy - Malware Protection
Cybersecurity & Privacy - Network Security
Networks & Connectivity - Network Management & Analysis Software
Aerospace
Discrete Manufacturing
Product Research & Development
Cybersecurity
Intrusion Detection Systems
Real-Time Location System (RTLS)
Cloud Planning, Design & Implementation Services
Cybersecurity Services
Data Science Services
System Integration
Testing & Certification
The agency's Information Technology (IT) team places paramount importance on maintaining the integrity and availability of the R&D environment supporting the activities of their researchers. The legacy technology located in the primary data center provides log management and packet forensics analysis, with IT also deploying a mix of packet brokers to pass traffic to their network and security tools. The agency wanted to transform this approach to encompass a proactive network, application, and cybersecurity monitoring framework that also leveraged their existing technology investments. The agency’s Cybersecurity team contacted a range of industry-leading service assurance and cyber threat/DDoS protection providers to identify a next-generation solution. The agency had tight budget limitations for this project and encouraged vendors to sharpen their pencils when submitting price proposals.
Read More
The customer is a government agency that specializes in advanced global flight solutions. The agency’s innovation activities are distributed across a dozen facilities, with their main research & development (R&D) center providing an operations base for more than 3,000 aviation experts. The agency is known for its high-flying activities and its success in the aviation industry. The agency's Information Technology (IT) team places paramount importance on maintaining the integrity and availability of the R&D environment supporting the activities of their researchers. The agency's funding is largely focused on R&D activities, and they have tight budget limitations for IT projects.
Read More
The agency implemented a converged NETSCOUT® service assurance and cybersecurity solution at their primary data center that singularly leverages NETSCOUT’s Adaptive Service Intelligence™ (ASI) technology for smart data. The NETSCOUT nGeniusONE Service Assurance platform leverages COTS InfiniStreamNG (COTS ISNG) Adaptive Service Intelligence (ASI) software to provide the global visibility the agency needed to better support the effectiveness of network and application performance management. The agency addressed their virtual network visibility issues by deploying the vSTREAM virtual appliance, which complements the COTS ISNG. The agency also deployed the Arbor Threat Analytics high-performance internal network traffic security solution, which enables the Cybersecurity team to detect and confirm hidden threats quickly and accurately. The agency also automatically detects and blocks inbound threats (e.g., DDoS attacks, malware) and outbound malicious communications (e.g., bad URLs) by using the Arbor Edge Defense (AED) solution at their network perimeter (i.e., between router and firewall).
Read More
The agency quickly realized the value of the NETSCOUT solution as a Business Operations Analysis tool that assures mission-critical R&D technology environment performance and frees the agency from cyberthreats.
The agency is improving protection of their R&D assets by transitioning from a service assurance solution based on packet forensics and log management analyses to a next-generation NETSCOUT approach leveraging end-to-end visibility and real-time network, application, and cybersecurity smart analytics.
The agency uses the Arbor cybersecurity solutions for threat hunting, allowing them to maintain system integrity by seeing “who has been on their network, where they’ve been, and what they’ve touched.”
Download PDF Version
test test