Business Performance Management Case Studies
01
How to Resolve Working Mechanism Conflicts Between Network Devices
02
How to Discover Network Loop Issues in Large Networks
03
How to Resolve Application Access Issues for Some Users
04
How to Locate the Root Cause of Large-Scale System Access Failures
05
How to Resolve Business Application Access Failures
06
How to Resolve Remote VPN Connection Failures
07
How to Locate the Root Cause of Network Packet Loss
08
How to Analyze Diskless Client Startup Issues
09
Why Normal Applications are Being Blocked
10
How to Locate the Root Cause of Low FTP Transfer Efficiency
11
How to Locate the Root Cause of Application Interruptions
12
How to Discover Application Failures Caused by Device Mechanisms
13
How to Resolve SSO Single Sign-On Redirect Issues
14
How to Resolve Intermittent Payment Transaction Failures
15
How to Locate the Root Cause of Large-Scale System Access Failures
Network Security Analysis Case Studies
01
Discovering 0-Day Vulnerability Events Using Full Traffic Analysis Technology
02
How to Identify Application Layer Denial of Service Attacks
03
How to Analyze Attacks on Email Systems
04
How to Verify IPS Device Attacks Through Network Analysis
05
How to Identify Attacks Based on Spoofed Source Addresses
06
How to Analyze and Understand Port Scanning Behavior
07
How to Analyze Brute Force Database Password Attacks
08
How to Identify ARP Virus Attacks
09
How to Identify UDP Attacks on Internal Networks
10
How to Discover DNS Amplification Attacks on Servers
11
How to Identify Internal Hosts Sending Forged Data
12
How to Discover Internal Hosts with Backdoors
13
How to Identify Compromised Hosts in Internal Networks
14
How to Discover Attacks Exploiting Struts2 Vulnerabilities
15
How to Discover and Prevent Covert CC Attacks
16
How to Analyze the Causes of DDoS Attacks on Websites
17