Ixia Partners with Network Security Providers to Better Combat Cybercrime
FREMONT, CA: Ixia, a provider of network testing, visibility and security solution, partners with security solution providers to deliver a full lifecycle security solution against cybercrime. The partners include Cisco, FireEye, Fortinet, HPE Security, Imperva, Intel Security, LogRhythm, Radware, Savvius and Vectra.
By helping to build and deploy security solutions in the most demanding customer environments, Ixia enables organizations defend against advanced threats along with providing them network resiliency.
Ixia’s set of security solutions include:
BreakingPoint Solution (BPS) – Application and Security Test
Using Ixia’s BreakingPoint application and security test solution, enterprises, service providers, and equipment manufacturers can validate the stability, accuracy, and quality of networks and network devices. It creates real-world scenarios of legitimate traffic, distributed denial of service (DDoS) attacks, exploits, and malware to test the performance limits and security effectiveness of next generation appliances and software capabilities in the development labs. The BPS solution enables technology partners to model and replicate advanced cyber threats to harden their security offerings.
Ixia's new PerfectStorm ONE network test and assessment solutions have been developed specifically for enterprise personnel to help them ensure security resiliency and perform proof-of-concept (POC) testing against vendor claims and architectural changes. It trains them on how to defend critical infrastructure assets and launch attacks against simulated critical infrastructure targets in a real life scenario.
A single platform providing granular view of network security, Vision ONE, enables organizations to maintain security across physical and virtual infrastructures without impacting network performance.
“Ixia understands that to win the cyber-war we must arm organizations with the tools that not only defend against attack, but proactively protect their networks and applications. Finding a breach quickly, and addressing it after the fact is good, but not as good as stopping it in the first place. Our security partners are experts in what they do, but they aren’t as effective when incomplete data is being fed to them. Optimal security posture requires the best products, training, and architectures,” says Scott Westlake, Vice President of Business Development, Ixia.
By Nancy S. Wolk, CIO, Alcoa - Global Business Services
By John Kamin, EVP and CIO, Old National Bancorp
By Gregg T. Martin, VP & CIO, Arnot Health
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Bryson Koehler, EVP & CIO, The Weather Company, an IBM...
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Lowell Gilvin, Chief Process Officer, Jabil
By Dennis Hodges, CIO, Inteva Products
By Gerri Martin-Flickinger, CIO, Adobe Systems
By Walter Carvalho, VP& Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Kushagra Vaid, GM, Server Engineering, Microsoft
By Steve Beason, Enterprise CTO, Scientific Games
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Alberto Ruocco, CIO, American Electric Power