A Hidden Security Danger: Network Timing by SymmetricomWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Research Abstract
A Hidden Security Danger: Network Timing
by Symmetricom

> View this now

Published on: December 27, 2010
Type of content: WHITE PAPER
Format: Unknown
Length: 5 pages
Price: FREE


Most anyone who uses a PC no doubt sees the little clock at the bottom of the screen,dutifully ticking off the minutes of the passing day. But chances are they don’to often think about the role that clock plays in the network to which the PC is attached.In fact, virtually every piece of equipment attached to a data network has a similar clock, although it may not actually show the time of day to anyone.

Until, that is, something goes wrong.Should a portion of the network go down,the clocks on every network device suddenly take on added importance.Administrators will turn to network management systems, which continuously collect log files from network devices, to try to determine what went wrong. That effort will be made far more difficult, if not futile, if the events depicted on the log files are not all working off the same, synchronized clock. If a router thinks the time is 12:05p.m. but an application server thinks it’s12:15 p.m., good luck to the network administrator responsible for figuring out what happened and when.

> View Company Report
> View all content by this company
> Return to Search Results

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts