Celebrate the “Human Element” of Security with Us at RSA
Celebrate the “Human Element” of Security with Us at RSAliza.kurtz@key…Tue, 02/04/2020 - 06:37
View ArticleIxChariot with Vision Edge 1S
IxChariot with Vision Edge 1Skoneil@ixiacom.comFri, 02/07/2020 - 17:04Open the document referenced here to understand how Ixia products and solutions can solve your network performance and visibility...
View ArticleKeysight to Highlight Solutions that Help Organizations Accelerate Defenses...
Keysight to Highlight Solutions that Help Organizations Accelerate Defenses with Dynamic Network Intelligence at RSA 2020What: Edge computing, cloud environments, advanced persistent threats and...
View ArticleIxia’s Guide to Visibility Use Cases - Removing Network Blind Spots
Ixia’s Guide to Visibility Use Cases - Removing Network Blind SpotsKeith BromleyMon, 02/10/2020 - 12:00Unnoticed network vulnerabilities are blind spots, especially as they pertain to application...
View Article(Way Too) OpenSMTPD: An overview of CVE-2020-7247
(Way Too) OpenSMTPD: An overview of CVE-2020-7247koneil@ixiacom.comMon, 02/10/2020 - 19:00
View ArticleAresONE-400GE QSFP-DD High-Performance 4-Port Test System
AresONE-400GE QSFP-DD High-Performance 4-Port Test Systemkoneil@ixiacom.comTue, 02/11/2020 - 11:20400GE hardware brings better economies of scale and denser configurations, especially of the lower...
View ArticleKeysight Survey Shows that Security Professionals are Overconfident in the...
Keysight Survey Shows that Security Professionals are Overconfident in the Effectiveness of their Security Tools Security operations teams face challenges in understanding how their security tools work...
View ArticleBreakingPoint Cloud—Microsoft® Azure® DDoS Protection Validation
BreakingPoint Cloud—Microsoft® Azure® DDoS Protection Validation koneil@ixiacom.comWed, 02/12/2020 - 16:43As cloud is the new normal, continuous testing of DDoS protection services on cloud...
View ArticleIxANVL Overview
IxANVL Overviewkoneil@ixiacom.comWed, 02/12/2020 - 18:16VALIDATION THAT KEEPS COSTS DOWN, CONFIDENCE UPWith Ixia’s IxANVL (Automated Network Validation Library), you can quickly and effortlessly access...
View ArticleSecurity Operations Effectiveness
Security Operations EffectivenessDarcy ReynoldsThu, 02/13/2020 - 11:10Today’s security operations teams face an unrelenting stream of attacks from both outside and inside of their organizations....
View ArticleMetronome Timing System (MTS)
Metronome Timing System (MTS)koneil@ixiacom.comTue, 02/18/2020 - 15:06Ixia’s Metronome is a precision test instrument that seamlessly integrates with Ixia test solutions to enable large-scale,...
View ArticleThemeREX Addons WordPress Plugin Remotes Code Execution: The Technical Bits
ThemeREX Addons WordPress Plugin Remotes Code Execution: The Technical Bitskoneil@ixiacom.comThu, 02/20/2020 - 13:25
View ArticleIxNetwork Overview
IxNetwork Overviewkoneil@ixiacom.comFri, 02/21/2020 - 00:00IxNetwork overview of how it delivers performance testing under the most challenging conditions. Capable of generating multiple terabytes of...
View ArticleThreat Simulator: Breach And Attack Simulation
Threat Simulator: Breach And Attack Simulationmike.hodge@key…Mon, 02/24/2020 - 09:48A breach and attack simulation (BAS) platform built on 20+ years of leadership in network security testing, Threat...
View ArticleThreat Simulator: Get Ahead of Attacks and Optimize Cybersecurity
Threat Simulator: Get Ahead of Attacks and Optimize Cybersecuritymike.hodge@key…Mon, 02/24/2020 - 12:00You can’t manage what you can’t measure, and security effectiveness is notoriously difficult to...
View ArticleBreach Defense: SecOps Tools
Breach Defense: SecOps Toolsmike.hodge@key…Mon, 02/24/2020 - 12:34Security is never static, and constant change demands continuous validation. That's why companies trust Breach Defense to fight back...
View ArticleHow To Create An Effective Breach Defense Strategy
How To Create An Effective Breach Defense Strategymike.hodge@key…Mon, 02/24/2020 - 12:56Creation of a proper breach defense strategy is paramount to every government agency and enterprise. When various...
View ArticleIntroducing Breach Defense: Enterprise SecOps Tools
Introducing Breach Defense: Enterprise SecOps Toolsmike.hodge@key…Mon, 02/24/2020 - 15:55
View ArticleKeysight’s New Security Operations Platform Enables Organizations to Measure...
Keysight’s New Security Operations Platform Enables Organizations to Measure and Improve Effectiveness of Operational SecurityKeysight’s Threat Simulator delivers actionable recommendations for...
View ArticleWhat is Breach and Attack Simulation?
What is Breach and Attack Simulation?Jason LackeyTue, 02/25/2020 - 15:09
View Article