hpc-asia
Without a way to properly validate cloud application workload and security controls, customer QoE is at risk
Ver- und Entschlüsselung von SSL ohne Leistungseinbußen
NetzPalaver
The Role of Active SSL Decryption In Network Monitoring
SSL technology significantly impacts the way IT departments now monitor their networks. Data that could once be captured and sent to security and monitoring tools for analysis is now completely unreadable by those same tools. Learn how a network packet broker (NPB) that has integrated SSL decryption capabilities can be used to overcome this issue.
The NPB can decrypt the data and then aggregate, filter, and data mask the data as needed before it is sent to monitoring and security tools for analysis. In the case of inline monitoring solutions, once the data has been analyzed, the NPB can re-encrypt the data and send it on down line to its final destination - without impacting tool performance or causing compliance issues.
Ixia Network Visibility Solutions Achieve Federal Information Processing Standard (FIPS) Publication 140-2 Accreditation
CALABASAS, CA— August 8, 2017 — Ixia, a leading provider of network testing, visibility, and security, today announced it has achieved the Federal Information Processing Standard (FIPS) Publication 140-2 accreditation for its industry leading Vision ONE™ and Vision™ 7300 network packet brokers (NPB) solutions.
This accreditation signifies that these Ixia products meet the stringent security requirements of all U.S. government agencies, and serves as another meaningful demonstration of the company’s leadership in the network visibility market.
The FIPS PUB 140-2 covers security requirements in 11 areas related to the design and implementation of a cryptographic module. This standard specifies the security requirements that will be satisfied by a cryptographic module utilized within a security system protecting sensitive but unclassified information.
“Ixia works diligently to ensure that our products meet the stringent security requirements of federal agencies, while meeting the dynamic needs of our customers and partners, “stated Recep Ozdag, Vice President of Product Management at Ixia. “This accreditation serves as a meaningful demonstration of Ixia’s ongoing commitment to the network visibility and federal markets.”
The following Ixia Network Visibility Solutions have received FIPS accreditation:
- Ixia’s Vision ONE network packet broker enables organizations to maintain security as well as identify and resolve performance problems across physical and virtual infrastructures from a single platform. Whether fighting against threats hidden in encrypted traffic, or feeding the right data to the right forensic solution, Vision ONE boosts network protection without negatively impacting performance.
- Ixia’s Vision 7300, enables centralized control of a network monitoring system in a single, simple, rack-mountable unit. It combines disparate solutions into a smaller data center footprint, saving power and rack space while improving return on investment. This unprecedented visibility protects tool investments and scales with the network as monitoring needs grow, new applications debut, and security threats emerge.
About Ixia
Ixia, now part of Keysight Technologies, provides testing, visibility, and security solutions to strengthen networks and cloud environments for enterprises, service providers, and network equipment manufacturers. Ixia offers companies trusted environments in which to develop, deploy, and operate. Customers worldwide rely on Ixia to verify their designs, optimize their performance, and ensure protection of their networks and cloud environments. Learn more at www.ixiacom.com.
About Keysight Technologies
Keysight Technologies is a leading technology company that helps its engineering, enterprise and service provider customers optimize networks and bring electronic products to market faster and at a lower cost. Keysight's solutions go where the electronic signal goes, from design simulation, to prototype validation, to manufacturing test, to optimization in networks and cloud environments. Customers span the worldwide communications ecosystem, aerospace and defense, automotive, energy, semiconductor and general electronics end markets. Keysight generated revenues of $2.9B in fiscal year 2016. In April 2017, Keysight acquired Ixia, a leader in network test, visibility, and security. More information is available at www.keysight.com.
Ixia and the Ixia logo are trademarks or registered trademarks of Ixia in the United States and other jurisdictions. All other trademarks used herein are the property of their respective owners.
Connect with Ixia:
LinkedIn
Twitter
Ixia Blog
YouTube
Ixia Media Contact:
Denise Idone, Director of Corporate Communications
Email: didone@ixiacom.com
Office: (631) 849-3500
Mobile: (516) 659-7049
Security and Performance Monitoring in Public Cloud
Even as workloads move to the cloud, IT must continue to maintain data and application security, optimize performance, and resolve issues as quickly as possible. But getting access to traffic data in the public cloud can be a challenge. Then once you have the data, you need a way to sort and filter it, so your tools can process it with maximum efficiency. This paper explores the pros and cons of different approaches to monitoring data in the public cloud.
SPAN Port: The ABCs of Network Visibility
Are You An Expert On Network Visibility?
See how easy it is learn and understand network monitoring and network visibility. This infographic highlights how a new ebook (The ABCs of Network Visibility) can help you quickly understand the various terms and definitions of network monitoring.
Like Winter, 5G is Coming
Public Cloud: The ABCs of Network Visibility
Understanding The Impact Of Packet Loss Within Your NPB
Network packet brokers (NPBs) are an important component of any network monitoring strategy. However, how do you know that your NPB is doing what it should, when it should? Blind faith in what the manufacturer tells you could be detrimental to your network security and be costing you additional money. Your NPB could be dropping packets that your monitoring tools needed and you don't even know it. It is important to understand how your NPB will behave under both normal and high load conditions.
Read this solution brief to see how you can validate NPB operation and perform the following:
- Reduce the business risk from network security attacks
- Better understand how your NPB will behave under real-world conditions
- Validate whether your NPB is dropping packets or not
Validate Your Security Device Readiness Before Bad Actors Get A Chance
Networks are under constant attack by hackers and various other security threats. As such, it is especially important to make sure that security devices are as up to date as possible and that you know what patches have been applied. However, keeping up with security tool patch management can get confusing, especially if you are new to this company's IT department.
This solution brief provides an easy way to validate if security patches have been applied and are working to prevent costly damages from network security attacks.
The Key To Reducing SIEM Alerts and Lost Productivity
The sheer volume of network security alerts being generated places a huge processing strain on IT security teams and the network infrastructure. By pre-filtering known bad IP addresses and traffic from untrusted countries, you can stop unwanted traffic from reaching your firewall and signifcantly reduce the amount of alerts that you need to review.
Read this solution brief to learn how you can:
- Reduce the volume of unnecessary SIEM alerts by up to 80%
- Inspect more potential security threats
- Increase internal productivity and reduce costs
RSA + Ixia: Secure Visibility within Your Public Cloud
Many enterprise organizations, across a variety of different verticals, are migrating to the cloud. This trend is growing because the cloud offers increased flexibility and agility. With this mass migration, organizations have more segments to manage and more potential blind spots in their networks.
Enter Ixia’s CloudLens™, a cloud visibility solution that addresses the challenges of granular data access in the public, private or hybrid cloud environments....
Download to learn how RSA and Ixia bring security to the public cloud.
Black hat hack risk
Mining Monthly
Performance Benchmark on Disaggregated Networks
Visibility Helps Retailer Reduce Mean-Time-to-Resolution by 75%
A large retail pharmacy was able to increase data access and the efficiency of their growing portfolio of monitoring tools by implementing Ixia taps and Vision ONE packet brokers. By eliminating blind spots in their view of network traffic, the company was able to more quickly identify and resolve performance issues.
GDPR: Is Your Network Ready?
You are not ready for GDPR if your security solutions are not seeing all your network traffic. This infographic lays out five steps to take now--in advance of the May 25, 2018 deadline--to ensure your network is ready.
The Need for 400 Gigabit Ethernet Speed
Automation 101—Large-Scale Application Testing Needs? DIY Build a Machine Gun
Terabit SDN routing and DDoS security vendor finds the right test solution to stay ahead of disruption
A high performance OpenFlow SDN routing and switching, and DDoS mitigation vendor was able to accelerate time-to-market by quickly isolating issues and validating their latest carrier designs under the most realistic conditions. By using the only solution in the market consisting of Ixia’s IxNetwork with NOVUS R-100 and Breaking Point DDoS test software, the networking vendor was able to anticipate market disruption.