Quantcast
Channel: Ixia
Viewing all 1358 articles
Browse latest View live

Without a way to properly validate cloud application workload and security controls, customer QoE is at risk


Ver- und Entschlüsselung von SSL ohne Leistungseinbußen

The Role of Active SSL Decryption In Network Monitoring

$
0
0
The Role of Active SSL Decryption In Network MonitoringKeith BromleyTue, 08/08/2017 - 12:17

SSL technology significantly impacts the way IT departments now monitor their networks. Data that could once be captured and sent to security and monitoring tools for analysis is now completely unreadable by those same tools. Learn how a network packet broker (NPB) that has integrated SSL decryption capabilities can be used to overcome this issue.

The NPB can decrypt the data and then aggregate, filter, and data mask the data as needed before it is sent to monitoring and security tools for analysis. In the case of inline monitoring solutions, once the data has been analyzed, the NPB can re-encrypt the data and send it on down line to its final destination - without impacting tool performance or causing compliance issues.

 

White Papers
The Role of Active SSL Decryption in Network Monitoring
Role of Active SSL Decryption
Visibility – Network Packet Brokers

Ixia Network Visibility Solutions Achieve Federal Information Processing Standard (FIPS) Publication 140-2 Accreditation

$
0
0
Ixia Network Visibility Solutions Achieve Federal Information Processing Standard (FIPS) Publication 140-2 Accreditation

CALABASAS, CA— August 8, 2017 — Ixia, a leading provider of network testing, visibility, and security, today announced it has achieved the Federal Information Processing Standard (FIPS) Publication 140-2 accreditation for its industry leading Vision ONE™ and Vision™ 7300 network packet brokers (NPB) solutions.

This accreditation signifies that these Ixia products meet the stringent security requirements of all U.S. government agencies, and serves as another meaningful demonstration of the company’s leadership in the network visibility market.

The FIPS PUB 140-2 covers security requirements in 11 areas related to the design and implementation of a cryptographic module. This standard specifies the security requirements that will be satisfied by a cryptographic module utilized within a security system protecting sensitive but unclassified information.

“Ixia works diligently to ensure that our products meet the stringent security requirements of federal agencies, while meeting the dynamic needs of our customers and partners, “stated Recep Ozdag, Vice President of Product Management at Ixia. “This accreditation serves as a meaningful demonstration of Ixia’s ongoing commitment to the network visibility and federal markets.”

The following Ixia Network Visibility Solutions have received FIPS accreditation:

  • Ixia’s Vision ONE network packet broker enables organizations to maintain security as well as identify and resolve performance problems across physical and virtual infrastructures from a single platform. Whether fighting against threats hidden in encrypted traffic, or feeding the right data to the right forensic solution, Vision ONE boosts network protection without negatively impacting performance.
  • Ixia’s Vision 7300, enables centralized control of a network monitoring system in a single, simple, rack-mountable unit. It combines disparate solutions into a smaller data center footprint, saving power and rack space while improving return on investment. This unprecedented visibility protects tool investments and scales with the network as monitoring needs grow, new applications debut, and security threats emerge.

About Ixia

Ixia, now part of Keysight Technologies, provides testing, visibility, and security solutions to strengthen networks and cloud environments for enterprises, service providers, and network equipment manufacturers. Ixia offers companies trusted environments in which to develop, deploy, and operate. Customers worldwide rely on Ixia to verify their designs, optimize their performance, and ensure protection of their networks and cloud environments. Learn more at www.ixiacom.com.

About Keysight Technologies

Keysight Technologies is a leading technology company that helps its engineering, enterprise and service provider customers optimize networks and bring electronic products to market faster and at a lower cost. Keysight's solutions go where the electronic signal goes, from design simulation, to prototype validation, to manufacturing test, to optimization in networks and cloud environments. Customers span the worldwide communications ecosystem, aerospace and defense, automotive, energy, semiconductor and general electronics end markets. Keysight generated revenues of $2.9B in fiscal year 2016. In April 2017, Keysight acquired Ixia, a leader in network test, visibility, and security. More information is available at www.keysight.com.

Ixia and the Ixia logo are trademarks or registered trademarks of Ixia in the United States and other jurisdictions. All other trademarks used herein are the property of their respective owners.

Connect with Ixia:

LinkedIn
Twitter
Ixia Blog
YouTube

Ixia Media Contact:

Denise Idone, Director of Corporate Communications
Email: didone@ixiacom.com
Office: (631) 849-3500
Mobile: (516) 659-7049

Divya NatarajanTue, 08/08/2017 - 00:22

Security and Performance Monitoring in Public Cloud

$
0
0
Security and Performance Monitoring in Public Cloudlohaver@ixiacom.comWed, 08/09/2017 - 13:13

Even as workloads move to the cloud, IT must continue to maintain data and application security, optimize performance, and resolve issues as quickly as possible. But getting access to traffic data in the public cloud can be a challenge. Then once you have the data, you need a way to sort and filter it, so your tools can process it with maximum efficiency. This paper explores the pros and cons of different approaches to monitoring data in the public cloud.

 

 

White Papers
Security and Performance Monitoring in the Public Cloud
Downloaded Security and Performance Monitoring in the Public Cloud
Visibility – Cloud/Virtualization

SPAN Port: The ABCs of Network Visibility

$
0
0
SPAN Port: The ABCs of Network VisibilityKeith BromleyThu, 08/10/2017 - 07:31

Are You An Expert On Network Visibility?

$
0
0
Are You An Expert On Network Visibility?Keith BromleyThu, 08/10/2017 - 07:59

See how easy it is learn and understand network monitoring and network visibility. This infographic highlights how a new ebook (The ABCs of Network Visibility) can help you quickly understand the various terms and definitions of network monitoring.

 

Infographics

Like Winter, 5G is Coming

$
0
0
Like Winter, 5G is ComingJason LackeyThu, 08/10/2017 - 12:33

Public Cloud: The ABCs of Network Visibility

$
0
0
Public Cloud: The ABCs of Network Visibilitylohaver@ixiacom.comFri, 08/11/2017 - 10:10

Understanding The Impact Of Packet Loss Within Your NPB

$
0
0
Understanding The Impact Of Packet Loss Within Your NPBKeith BromleyMon, 08/14/2017 - 06:44

Network packet brokers (NPBs) are an important component of any network monitoring strategy. However, how do you know that your NPB is doing what it should, when it should? Blind faith in what the manufacturer tells you could be detrimental to your network security and be costing you additional money. Your NPB could be dropping packets that your monitoring tools needed and you don't even know it. It is important to understand how your NPB will behave under both normal and high load conditions.

Read this solution brief to see how you can validate NPB operation and perform the following:

  • Reduce the business risk from network security attacks
  • Better understand how your NPB will behave under real-world conditions
  • Validate whether your NPB is dropping packets or not
Solution Briefs
Understanding the Impact of Packet Loss Within Your NPB
Understanding Impact Packet Loss NPB
Visibility – Network Packet Brokers

Validate Your Security Device Readiness Before Bad Actors Get A Chance

$
0
0
Validate Your Security Device Readiness Before Bad Actors Get A ChanceKeith BromleyMon, 08/14/2017 - 07:07

Networks are under constant attack by hackers and various other security threats. As such, it is especially important to make sure that security devices are as up to date as possible and that you know what patches have been applied. However, keeping up with security tool patch management can get confusing, especially if you are new to this company's IT department.

This solution brief provides an easy way to validate if security patches have been applied and are working to prevent costly damages from network security attacks.

Solution Briefs
Validate Your Security Device Readiness Before Bad Actors Get A Chance
Validate Your Security Device Readiness
Test – Applications and Security

The Key To Reducing SIEM Alerts and Lost Productivity

$
0
0
The Key To Reducing SIEM Alerts and Lost ProductivityKeith BromleyMon, 08/14/2017 - 07:32

The sheer volume of network security alerts being generated places a huge processing strain on IT security teams and the network infrastructure. By pre-filtering known bad IP addresses and traffic from untrusted countries, you can stop unwanted traffic from reaching your firewall and signifcantly reduce the amount of alerts that you need to review.

Read this solution brief to learn how you can:

  • Reduce the volume of unnecessary SIEM alerts by up to 80%
  • Inspect more potential security threats
  • Increase internal productivity and reduce costs
Solution Briefs
The Key To Reducing SIEM Alerts and Lost Productivity
Key Reducing SIEM Alerts
Security – ThreatARMOR

RSA + Ixia: Secure Visibility within Your Public Cloud

$
0
0
RSA + Ixia: Secure Visibility within Your Public CloudMayra SalmanMon, 08/14/2017 - 16:00

Many enterprise organizations, across a variety of different verticals, are migrating to the cloud. This trend is growing because the cloud offers increased flexibility and agility. With this mass migration, organizations have more segments to manage and more potential blind spots in their networks.

Enter Ixia’s CloudLens™, a cloud visibility solution that addresses the challenges of granular data access in the public, private or hybrid cloud environments....

Download to learn how RSA and Ixia bring security to the public cloud.

Tech Partner Collateral
RSA + Ixia

Black hat hack risk

Performance Benchmark on Disaggregated Networks

$
0
0
Performance Benchmark on Disaggregated Networkskoneil@ixiacom.comTue, 08/15/2017 - 15:31

Visibility Helps Retailer Reduce Mean-Time-to-Resolution by 75%

$
0
0
Visibility Helps Retailer Reduce Mean-Time-to-Resolution by 75% lohaver@ixiacom.comMon, 08/14/2017 - 16:58

A large retail pharmacy was able to increase data access and the efficiency of their growing portfolio of monitoring tools by implementing Ixia taps and Vision ONE packet brokers. By eliminating blind spots in their view of network traffic, the company was able to more quickly identify and resolve performance issues.

Videos
Case Studies
Retailer reduces mean-time-to-repair with better network visibility
Industries
Visibility – Network Packet Brokers
Visibility – Taps

GDPR: Is Your Network Ready?

$
0
0
GDPR: Is Your Network Ready?lohaver@ixiacom.comTue, 08/15/2017 - 09:32

You are not ready for GDPR if your security solutions are not seeing all your network traffic. This infographic lays out five steps to take now--in advance of the May 25, 2018 deadline--to ensure your network is ready.

Infographics
GDPR: Is Your Network Ready?
Visibility – Network Packet Brokers
Visibility – Taps

The Need for 400 Gigabit Ethernet Speed

$
0
0
The Need for 400 Gigabit Ethernet Speedjharris@ixiacom.comWed, 08/16/2017 - 07:07

Automation 101—Large-Scale Application Testing Needs? DIY Build a Machine Gun

$
0
0
Automation 101—Large-Scale Application Testing Needs? DIY Build a Machine GunDarcy ReynoldsWed, 08/16/2017 - 09:52

Terabit SDN routing and DDoS security vendor finds the right test solution to stay ahead of disruption

$
0
0
Terabit SDN routing and DDoS security vendor finds the right test solution to stay ahead of disruptiongnamburi@ixiacom.comThu, 08/17/2017 - 14:27

 

Videos
Case Studies
Tech Partner Collateral
SDN routing and switching
Industries
Test – L2/3
Test – Applications and Security

A high performance OpenFlow SDN routing and switching, and DDoS mitigation vendor was able to accelerate time-to-market by quickly isolating issues and validating their latest carrier designs under the most realistic conditions. By using the only solution in the market consisting of Ixia’s IxNetwork with NOVUS R-100 and Breaking Point DDoS test software, the networking vendor was able to anticipate market disruption.

Viewing all 1358 articles
Browse latest View live




Latest Images