Quantcast
Channel: Ixia
Viewing all 1358 articles
Browse latest View live

How To Thwart The ATM Cash-out Security Attack

$
0
0
How To Thwart The ATM Cash-out Security AttackKeith BromleyFri, 08/31/2018 - 07:19

Elasticsearch and Kibana (post 5 in a series)

$
0
0
Elasticsearch and Kibana (post 5 in a series)kris.raney@key…Fri, 08/31/2018 - 09:27

Dissecting CVE-2018-4990, an Adobe Reader Vulnerability

$
0
0
Dissecting CVE-2018-4990, an Adobe Reader VulnerabilityJason LackeyFri, 08/31/2018 - 10:02

Cloud native network visibility (part 2 in a series)

$
0
0
Cloud native network visibility (part 2 in a series)winston.liu@ke…Tue, 09/04/2018 - 07:19

Bro Frontend (post 6 in a series)

$
0
0
Bro Frontend (post 6 in a series)kris.raney@key…Wed, 09/05/2018 - 11:04

How IoT is Transforming the Future of Healthcare

$
0
0
How IoT is Transforming the Future of Healthcarecheryl.ajluni@…Thu, 09/06/2018 - 05:53

The world's older population is growing dramatically. Global life expectancy at birth is projected to increase by almost eight years. Chronic illness is also on the rise. Together, these trends are pushing current healthcare systems beyond their limits and driving new innovation into the Internet of Medical Things (IoMT).

The IoMT is revolutionizing the healthcare industry, with Internet of Things (IoT) devices and networks quickly establishing themselves as a critical part of modern healthcare. This white paper explores key technological advancements in the healthcare industry and how they are helping healthcare professionals be more efficient and provide an increased level of patient care. Read this white paper to gain new insight into IoT healthcare trends and to obtain a greater understanding of the challenges that still need to be addressed.

White Papers
The Future of Healthcare is the Internet of Things
How IoT is Transforming the Future of Healthcare
Test – Wi-Fi

Strutting to Remote Code Execution: Anatomy of CVE-2018-11776

$
0
0
Strutting to Remote Code Execution: Anatomy of CVE-2018-11776koneil@ixiacom.comThu, 09/06/2018 - 15:58

Bro Hosting (post 7 in a series)

$
0
0
Bro Hosting (post 7 in a series)kris.raney@key…Mon, 09/10/2018 - 13:57

Four Things to Consider Before You Move Everything to the Cloud

$
0
0
Four Things to Consider Before You Move Everything to the CloudKeith BromleyTue, 09/11/2018 - 11:54

A Four Step Approach to Improve Security Threat Response

$
0
0
A Four Step Approach to Improve Security Threat ResponseKeith BromleyWed, 09/12/2018 - 08:18

Network security is extremely important to any government agency or organization. To support this initiavtive, there are four actions you need to take to strengthen network security. These actions will accelerate security data acquisition and reduce manual processes, resulting in a more agile security response.

Read this whitepaper to learn how to:

  • Maximize intrusion prevention by updating perimeter threat detection
  • Enhance real-time inspection of suspicious data
  • Simplify the data capture and analysis process
  • Automate responses to remove time delays in manual processes
White Papers
AFour Step Approach To Improve Security Threat Response
Industries
Four Step Approach Improve Security Threat Response
Test – Applications and Security
Visibility – Packet Brokers

Kudos to Tesla and the COSIC Group at KU Leuven

$
0
0
Kudos to Tesla and the COSIC Group at KU LeuvenJason LackeyWed, 09/12/2018 - 11:37

Deploying Inline Security Architecture: Key Considerations

$
0
0
Deploying Inline Security Architecture: Key Considerationslohaver@ixiacom.comWed, 09/12/2018 - 12:00

The key to efficient inline security monitoring is to enable failsafe tool deployment, maximize traffic inspection, and protect network availability. To address these issues, many organizations are deploying a highly resilient security architecture. With this approach, you can get access to 100% of your physical and virtual network traffic, increase monitoring tool efficiency, apply security-specific intelligence to improve threat detection, and achieve near instant failover. This paper describes how to deploy a high performance security architecture that provides:

  • Failsafe network availability
  • Increased efficiency of security monitoring
  • Resilient security with near instant failover
  • Context aware data processing
  • Up-to-date threat intelligence 
  • Maximum return on your security investments
White Papers
Deploying an Inline Security Architecture
Deploying Inline Security Architecture
Security – ThreatARMOR
Visibility – Bypass Switches

A sample cloud IDS solution (part 3 in a series)

$
0
0
A sample cloud IDS solution (part 3 in a series)winston.liu@ke…Thu, 09/13/2018 - 08:06

CloudLens- Public, Private, and Hybrid Cloud Visibility

$
0
0
CloudLens- Public, Private, and Hybrid Cloud Visibilityallison.dartt@…Thu, 09/13/2018 - 09:08

Organizations are migrating workloads to the cloud because it offers scale, agility and flexibility. These organizations require visibility to adhere to their security, compliance and monitoring policies in the public, private and hybrid cloud. However, traditional visibility solutions are unable to address the key considerations of providing visibility in the cloud.

Product Briefs
CloudLens- Public, Private, and Hybrid Cloud Visibility
CloudLens- Public, Private, and Hybrid Cloud Visibility
Visibility – Public Cloud

When the [Cyber] battle's lost and won

$
0
0
When the [Cyber] battle's lost and wonDivya NatarajanFri, 09/14/2018 - 00:18

Ixia, a Keysight Business, and InnoLight Demonstrate 400 GE Interoperability Achieving 3.2 Tbps Live Ethernet Traffic with OSFP Optical Transceivers

$
0
0
Ixia, a Keysight Business, and InnoLight Demonstrate 400 GE Interoperability Achieving 3.2 Tbps Live Ethernet Traffic with OSFP Optical Transceivers

SANTA ROSA, Calif., September 17, 2018 – Keysight Technologies, Inc. (NYSE: KEYS), a leading technology company that helps enterprises, service providers, and governments accelerate innovation to connect and secure the world, today announced the first demonstration of interoperability in the 400 Gigabit Ethernet (GE) ecosystem with InnoLight Technology (Suzhou) Ltd.  The demonstration over InnoLight’s OSFP optical transceivers, leveraged Ixia’s AresONE-400GE OSFP 8x400GE test system to deliver 3.2 Tbps of Ethernet test traffic.

The 400GE ecosystem is growing with vendors delivering technology innovations to serve hyperscale data centers and cloud providers who need increasing bandwidth. As the industry moves ahead, the 400GE ecosystem also needs to demonstrate interoperability among vendors to prove that it is ready for real-world applications.

“As the 400GE ecosystem evolves and begins to ramp it becomes necessary for vendors to demonstrate interoperability,” said Alan Weckel, founding analyst for 650 Group. “It is critical that vendors working in the 400GE ecosystem work together on demonstrations like this to showcase the strides vendors have made towards interoperability, this is the essence of Ethernet and why it is such a ubiquitous technology. We are pleased to see that companies can demonstrate that 3.2 Tbps total test traffic throughput and line rate 400GE capacity on all ports is possible.” 

InnoLight and Ixia Demonstrate Interoperability with OSFP Interfaces at 3.2 Tbps

InnoLight and Ixia demonstrated interoperability with a major network manufacturer’s OSFP 400GE switch at full line rate using InnoLight optical transceivers. This is the first known interoperability test that delivered live Ethernet traffic using InnoLight’s 400GBASE-SR8 optical transceiver and Active Optical Cable for multimode fiber, and the 400GBASE-2xFR4 optical transceiver for single mode fiber.  

"Proving that next generation 400GE optics can deliver 3.2 Tb speeds are an integral part getting the 400GE ecosystem ready for our customers," said Osa Mok, Chief Marketing Officer of InnoLight Technology. "Demonstrations of interoperability using a proven test system such as Ixia‘s AresONE are key to bringing 400GE to market.”

Ixia‘s AresONE-400GE test systems enable network equipment providers to test high-port-density devices such as routers, switches and servers for all Ethernet speeds, 400GE/200GE/100GE/50GE, based on the IEEE802.3bs and IEEE802.3cd standards. It is the first high-density 8-port 400GE test system made available to the industry in a 2 rack-unit (RU) fixed chassis based on 56 Gb/s electrical interface with PAM-4 encoded signaling, to support both OSFP or QSFP-DD pluggable interfaces. It runs IxNetwork, Ixia‘s field-proven L2/3 emulation performance and scale test software. AresONE is available in full and reduced, 4-port and 8-port models.

“This interoperability test is a great milestone for the 400GE ecosystem with the first known demonstration of multimode and single mode OSFP optical transceivers delivering real network traffic on a major manufacturer’s switch,” said Sunil Kalidindi, vice president of product management at Keysight’s Ixia Solutions Group. “These tests show the versatility of the AresONE for testing different types of optical transceivers for 400GE and 200GE speeds as well as the forthcoming 4x100GE and 8X50GE multi-rate Ethernet speeds that these optics will eventually support.”

About Keysight Technologies 

Keysight Technologies, Inc. (NYSE: KEYS) is a leading technology company that helps enterprises, service providers, and governments accelerate innovation to connect and secure the world.  Keysight's solutions optimize networks and bring electronic products to market faster and at a lower cost with offerings from design simulation, to prototype validation, to manufacturing test, to optimization in networks and cloud environments. Customers span the worldwide communications ecosystem, aerospace and defense, automotive, energy, semiconductor and general electronics end markets. Keysight generated revenues of $3.2B in fiscal year 2017. In April 2017, Keysight acquired Ixia, a leader in network test, visibility, and security. More information is available at www.keysight.com.

# # #

Additional information about Keysight Technologies is available in the newsroom at https://www.keysight.com/go/news and on Facebook, Google+, LinkedIn, Twitter and YouTube

CONTACTS:
Beth Hespe, Americas
+1 609-994-7442
beth.hespe@keysight.com

Magda Antone, Europe
+34 (93) 3434612
press.emea@keysight.com

Fusako Dohi, Asia
+81 42 660-2162
fusako_dohi@keysight.com
 

Darcy ReynoldsMon, 09/17/2018 - 08:06

Bro Feature Requests (post 8 in a series)

$
0
0
Bro Feature Requests (post 8 in a series)kris.raney@key…Mon, 09/17/2018 - 09:54

Quick Tips To Create Self-Provisioning Packet Brokers

$
0
0
Quick Tips To Create Self-Provisioning Packet BrokersKeith BromleyMon, 09/17/2018 - 13:25

According to research conducted by Enterprise Management Associates in October of 2016, 47% of IT personnel experience improved productivity from deploying network packet brokers (NPBs). However, this is heavily dependent upon the NPB choice. The usability of the NPB is what will ultimately determine productivity increases and total cost of ownership (TCO) savings. Therefore, the system must not only be easy to set up, but must be easy to maintain as well.

Read this application note to learn how to overcome the following issues for network monitoring systems:

  • Provisioning delays and higher costs due to manual configuration processes
  • Increased costs due to higher complexity for monitoring systems
  • High costs and long provisioning times for post-deployment configuration changes and routine updates
Application Note
Quick Tips To Create Self-Provisioning Packet Brokers
Quick Tips Self-Provisioning Packet Brokers
Visibility – Packet Brokers

Five strategies to boost your existing cloud security

$
0
0
Five strategies to boost your existing cloud securitylohaver@ixiacom.comWed, 09/19/2018 - 11:57

Why You Can’t Trust Your Market Data Feed- Current Approaches to Feed Monitoring

$
0
0
Why You Can’t Trust Your Market Data Feed- Current Approaches to Feed Monitoringsarah.gross@ke…Thu, 09/20/2018 - 10:24
Viewing all 1358 articles
Browse latest View live




Latest Images