Ixia’s Inline Security ArchitectureKeith BromleyMon, 12/09/2019 - 12:39
Organizations are finding themselves fighting security battles on many fronts. This includes:
- an increase in the velocity and variety of cyberattacks
- an increase in the number of alerts they need to investigate
- malware camouflaged within encrypted traffic
- and breaches that are harder than ever to spot
Read this architectural reference to better understand how to set up your own inline security architecture to implement the following:
- increase network reliability with better fail-over
- improve security appliance survivability
- perform Secure Sockets Layer (SSL) decryption to expose hidden security threats
- reduce security architectural complexity
- better capture of indicators of compromise (IOC)
Technical Guide

Ixia Inline Security Architecture
Security – ThreatARMOR
Visibility – Bypass Switches
Visibility – Packet Brokers