Ixia Partners with Network Security Providers to Better Combat Cybercrime

By CIOReview | Tuesday, March 22, 2016
685
1210
244

FREMONT, CA: Ixia, a provider of network testing, visibility and security solution, partners with security solution providers to deliver a full lifecycle security solution against cybercrime. The partners include Cisco, FireEye, Fortinet, HPE Security, Imperva, Intel Security, LogRhythm, Radware, Savvius and Vectra.

By helping to build and deploy security solutions in the most demanding customer environments, Ixia enables organizations defend against advanced threats along with providing them network resiliency.

Ixia’s set of security solutions include:

BreakingPoint Solution (BPS) – Application and Security Test

Using Ixia’s BreakingPoint application and security test solution, enterprises, service providers, and equipment manufacturers can validate the stability, accuracy, and quality of networks and network devices. It creates real-world scenarios of legitimate traffic, distributed denial of service (DDoS) attacks, exploits, and malware to test the performance limits and security effectiveness of next generation appliances and software capabilities in the development labs. The BPS solution enables technology partners to model and replicate advanced cyber threats to harden their security offerings.

PerfectStorm ONE

Ixia's new PerfectStorm ONE network test and assessment solutions have been developed specifically for enterprise personnel to help them ensure security resiliency and perform proof-of-concept (POC) testing against vendor claims and architectural changes. It trains them on how to defend critical infrastructure assets and launch attacks against simulated critical infrastructure targets in a real life scenario.

Vision ONE

A single platform providing granular view of network security, Vision ONE, enables organizations to maintain security across physical and virtual infrastructures without impacting network performance.

“Ixia understands that to win the cyber-war we must arm organizations with the tools that not only defend against attack, but proactively protect their networks and applications. Finding a breach quickly, and addressing it after the fact is good, but not as good as stopping it in the first place. Our security partners are experts in what they do, but they aren’t as effective when incomplete data is being fed to them. Optimal security posture requires the best products, training, and architectures,” says Scott Westlake, Vice President of Business Development, Ixia.