Defining an Inside Out Security Policy
Defining an Inside Out Security PolicyAuthor Jeff Harris. "It isn't just about bad apples — people that are deliberately out to steal information or harm organizations." That, from a recent CIO.com...
View ArticleAre You Prepared for the Golden Hour of a Security Intrusion
Are You Prepared for the Golden Hour of a Security Intrusion Author: Keith Bromley Are you prepared for the Golden Hour of a network security intrusion? Most enterprises are not. According to an Ixia...
View ArticleCVE-2015-7919 Ixia's Application and Threat Intelligence (ATI) Research...
CVE-2015-7919 Ixia's Application and Threat Intelligence (ATI) Research Center Discovers Zero-Day SearchBlox VulnerabilitiesAuthor: Oana Murarasu. Ixia’s ATI Research Center recently discovered...
View ArticleIxia Congratulates 2015 Partner of the Year Recipients at Worldwide Annual...
Ixia Congratulates 2015 Partner of the Year Recipients at Worldwide Annual Sales Meeting Ixia Congratulates 2015 Partner of the Year Recipients at Worldwide Annual Sales Meeting
View ArticleThe Death of RC4 in TLS
The Death of RC4 in TLSAuthor: Anthony Lecorchick. In February 2015, the Internet Engineering Task Force (IETF) released RFC 7465, prohibiting the RC4 cipher suite in TLS. At this point, the IETF...
View ArticleAcademic Cooperation Program of the Year - 2016
Academic Cooperation Program of the Year - 2016Romanian National Association of Software Industry (ANIS), organized the first edition for Gala Awards for the Software Industry. Ixia is the winner at...
View ArticleThe Denver Broncos Know How to Address IT's Biggest Challenge
The Denver Broncos Know How to Address IT's Biggest ChallengeAuthor: Roark Pollock It's a college football legend, Paul (Bear) Bryant, who is credited with the adage so many sports fans, players,...
View ArticleHow Wi-Fi Became Mission Critical
How Wi-Fi Became Mission CriticalThe Ethernet port is dead on mobile. That means our brands, revenue, and reputations run over Wi-Fi. How does this impact mobile device use and development?
View ArticleThe NSA Does Not Want You to Know About Taps for Network Security
The NSA Does Not Want You to Know About Taps for Network SecurityAuthor: Jonathan Petkevich. It is well known that using network taps for out-of-band monitoring is an effective way to improve both...
View ArticleWhen medical devices and hospital networks become a health risk
When medical devices and hospital networks become a health riskAuthor: Areg Alimian The Food and Drug Administration (FDA) recently issued guidance to medical device manufacturers recommending they...
View ArticleUser experience monitoring in NFV environments
User experience monitoring in NFV environmentsBy Roark Pollock
View ArticleConnected cars in the wild - are you ready and are they ready?
Connected cars in the wild - are you ready and are they ready?There's a fine line between security and convenience when it comes to connected cars, so when will the public be ready to embrace them fully?
View ArticleBefore You Hire a Hacker, Use a Robo Hacker
Before You Hire a Hacker, Use a Robo HackerAuthor: Jason Landry
View ArticleMEDIA ALERT: Ixia at the RSA Conference 2016
MEDIA ALERT: Ixia at the RSA Conference 2016CALABASAS, CA — February 17, 2016, Ixia, a leading provider of network testing, visibility, and security solutions, will be exhibiting (Booth # 3201 North...
View ArticleIxia Announces Vision ONE for End-to-End Network Visibility
Ixia Announces Vision ONE for End-to-End Network VisibilityIxia, a leading provider of network testing, visibility, and security solutions, today launched Vision ONE™, a turn-key device that rapidly...
View ArticleIxia and Anritsu Demonstrate Customer Experience Assurance on the HPE OpenNFV...
Ixia and Anritsu Demonstrate Customer Experience Assurance on the HPE OpenNFV Platform at 2016 Mobile World CongressIxia, a leading provider of network test, visibility and security solutions; Hewlett...
View ArticleIxia's Lori Cornmesser recognized as one of CRN's Channel Chief's of 2016
Ixia's Lori Cornmesser recognized as one of CRN's Channel Chief's of 2016Ixia's Vice President of Global Channel Sales, Lori Cornmesser, has been chosen to be one of CRN’s 2016 Channel Chiefs. This...
View ArticleIntroduction of HTTP/2 and Performance Comparison of HTTP/1 and HTTP/2
Introduction of HTTP/2 and Performance Comparison of HTTP/1 and HTTP/2Date: 2/25/2015, Author: Haiyang Si, Adrian Hada. Ixia ATI’s second strikepack of 2015 brought an implementation of one of the...
View ArticleSSDP Reflection DDoS Attacks Emulation on BreakingPoint
SSDP Reflection DDoS Attacks Emulation on BreakingPointDate: 10/27/2014, Author: Haiyang Si. Simple Service Discovery Protocol (SSDP) is part of the Universal Plug and Play (UPnP) Protocol. UPnP...
View Article