Quantcast
Browsing all 1358 articles
Browse latest View live

Celebrate the “Human Element” of Security with Us at RSA

Celebrate the “Human Element” of Security with Us at RSAliza.kurtz@key…Tue, 02/04/2020 - 06:37

View Article


Image may be NSFW.
Clik here to view.

IxChariot with Vision Edge 1S

IxChariot with Vision Edge 1Skoneil@ixiacom.comFri, 02/07/2020 - 17:04Open the document referenced here to understand how Ixia products and solutions can solve your network performance and visibility...

View Article


Image may be NSFW.
Clik here to view.

Keysight to Highlight Solutions that Help Organizations Accelerate Defenses...

Keysight to Highlight Solutions that Help Organizations Accelerate Defenses with Dynamic Network Intelligence at RSA 2020What: Edge computing, cloud environments, advanced persistent threats and...

View Article

Image may be NSFW.
Clik here to view.

Ixia’s Guide to Visibility Use Cases - Removing Network Blind Spots

Ixia’s Guide to Visibility Use Cases - Removing Network Blind SpotsKeith BromleyMon, 02/10/2020 - 12:00Unnoticed network vulnerabilities are blind spots, especially as they pertain to application...

View Article

(Way Too) OpenSMTPD: An overview of CVE-2020-7247

(Way Too) OpenSMTPD: An overview of CVE-2020-7247koneil@ixiacom.comMon, 02/10/2020 - 19:00

View Article


Image may be NSFW.
Clik here to view.

AresONE-400GE QSFP-DD High-Performance 4-Port Test System

AresONE-400GE QSFP-DD High-Performance 4-Port Test Systemkoneil@ixiacom.comTue, 02/11/2020 - 11:20400GE hardware brings better economies of scale and denser configurations, especially of the lower...

View Article

Image may be NSFW.
Clik here to view.

Keysight Survey Shows that Security Professionals are Overconfident in the...

Keysight Survey Shows that Security Professionals are Overconfident in the Effectiveness of their Security Tools Security operations teams face challenges in understanding how their security tools work...

View Article

Image may be NSFW.
Clik here to view.

BreakingPoint Cloud—Microsoft® Azure® DDoS Protection Validation

BreakingPoint Cloud—Microsoft® Azure® DDoS Protection Validation koneil@ixiacom.comWed, 02/12/2020 - 16:43As cloud is the new normal, continuous testing of DDoS protection services on cloud...

View Article


Image may be NSFW.
Clik here to view.

IxANVL Overview

IxANVL Overviewkoneil@ixiacom.comWed, 02/12/2020 - 18:16VALIDATION THAT KEEPS COSTS DOWN, CONFIDENCE UPWith Ixia’s IxANVL (Automated Network Validation Library), you can quickly and effortlessly access...

View Article


Image may be NSFW.
Clik here to view.

Security Operations Effectiveness

Security Operations EffectivenessDarcy ReynoldsThu, 02/13/2020 - 11:10Today’s security operations teams face an unrelenting stream of attacks from both outside and inside of their organizations....

View Article

Image may be NSFW.
Clik here to view.

Metronome Timing System (MTS)

Metronome Timing System (MTS)koneil@ixiacom.comTue, 02/18/2020 - 15:06Ixia’s Metronome is a precision test instrument that seamlessly integrates with Ixia test solutions to enable large-scale,...

View Article

ThemeREX Addons WordPress Plugin Remotes Code Execution: The Technical Bits

ThemeREX Addons WordPress Plugin Remotes Code Execution: The Technical Bitskoneil@ixiacom.comThu, 02/20/2020 - 13:25

View Article

Image may be NSFW.
Clik here to view.

IxNetwork Overview

IxNetwork Overviewkoneil@ixiacom.comFri, 02/21/2020 - 00:00IxNetwork overview of how it delivers performance testing under the most challenging conditions. Capable of generating multiple terabytes of...

View Article


Image may be NSFW.
Clik here to view.

Threat Simulator: Breach And Attack Simulation

Threat Simulator: Breach And Attack Simulationmike.hodge@key…Mon, 02/24/2020 - 09:48A breach and attack simulation (BAS) platform built on 20+ years of leadership in network security testing, Threat...

View Article

Image may be NSFW.
Clik here to view.

Threat Simulator: Get Ahead of Attacks and Optimize Cybersecurity

Threat Simulator: Get Ahead of Attacks and Optimize Cybersecuritymike.hodge@key…Mon, 02/24/2020 - 12:00You can’t manage what you can’t measure, and security effectiveness is notoriously difficult to...

View Article


Image may be NSFW.
Clik here to view.

Breach Defense: SecOps Tools

Breach Defense: SecOps Toolsmike.hodge@key…Mon, 02/24/2020 - 12:34Security is never static, and constant change demands continuous validation. That's why companies trust Breach Defense to fight back...

View Article

Image may be NSFW.
Clik here to view.

How To Create An Effective Breach Defense Strategy

How To Create An Effective Breach Defense Strategymike.hodge@key…Mon, 02/24/2020 - 12:56Creation of a proper breach defense strategy is paramount to every government agency and enterprise. When various...

View Article


Introducing Breach Defense: Enterprise SecOps Tools

Introducing Breach Defense: Enterprise SecOps Toolsmike.hodge@key…Mon, 02/24/2020 - 15:55

View Article

Image may be NSFW.
Clik here to view.

Keysight’s New Security Operations Platform Enables Organizations to Measure...

Keysight’s New Security Operations Platform Enables Organizations to Measure and Improve Effectiveness of Operational SecurityKeysight’s Threat Simulator delivers actionable recommendations for...

View Article

What is Breach and Attack Simulation?

What is Breach and Attack Simulation?Jason LackeyTue, 02/25/2020 - 15:09

View Article
Browsing all 1358 articles
Browse latest View live