Ixia Partners with Network Security Providers to Better Combat Cybercrime
FREMONT, CA: Ixia, a provider of network testing, visibility and security solution, partners with security solution providers to deliver a full lifecycle security solution against cybercrime. The partners include Cisco, FireEye, Fortinet, HPE Security, Imperva, Intel Security, LogRhythm, Radware, Savvius and Vectra.
By helping to build and deploy security solutions in the most demanding customer environments, Ixia enables organizations defend against advanced threats along with providing them network resiliency.
Ixia’s set of security solutions include:
BreakingPoint Solution (BPS) – Application and Security Test
Using Ixia’s BreakingPoint application and security test solution, enterprises, service providers, and equipment manufacturers can validate the stability, accuracy, and quality of networks and network devices. It creates real-world scenarios of legitimate traffic, distributed denial of service (DDoS) attacks, exploits, and malware to test the performance limits and security effectiveness of next generation appliances and software capabilities in the development labs. The BPS solution enables technology partners to model and replicate advanced cyber threats to harden their security offerings.
Ixia's new PerfectStorm ONE network test and assessment solutions have been developed specifically for enterprise personnel to help them ensure security resiliency and perform proof-of-concept (POC) testing against vendor claims and architectural changes. It trains them on how to defend critical infrastructure assets and launch attacks against simulated critical infrastructure targets in a real life scenario.
A single platform providing granular view of network security, Vision ONE, enables organizations to maintain security across physical and virtual infrastructures without impacting network performance.
“Ixia understands that to win the cyber-war we must arm organizations with the tools that not only defend against attack, but proactively protect their networks and applications. Finding a breach quickly, and addressing it after the fact is good, but not as good as stopping it in the first place. Our security partners are experts in what they do, but they aren’t as effective when incomplete data is being fed to them. Optimal security posture requires the best products, training, and architectures,” says Scott Westlake, Vice President of Business Development, Ixia.
By Phil Jarvis, VP, IT, Thirty-One Gifts
By Dr.Chris Ewell, CISO, Seattle Children
By Eloise Young, CIO, Philadelphia Gas Works
By Phil Stevens, CIO, The Exchange
By Herman Nell, SVP & CIO, Rent-A-Center
By John Honeycutt, CTO, Discovery Communications
By Mark Wead, Chief Enterprise Architect– North America...
By Federico Flórez, Chief Information & Innovation Officer,...
By David Berry, CIO, Daymon Worldwide
By Douglas Turk, Chief Marketing Officer, JLT Speciality
By Tekin Gulsen, CIO, Global IT & Corporate Planning...
By John Sprague, Deputy CTO, IT and the End User Architect,...
By Craig C Shrader, CIO Engagement Partner, Tatum, a...
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Tom Bressie, Vice President, Oracle Cloud
By Jeff Katz, CTO, Energy & Utilities, IBM [NYSE:IBM]
By Dr Dirk E Mahling, VP, Technology, Alliant Energy
By Steven John, CIO, AmeriPride Services
By Leon Ravenna, CISO, KAR Auction Services, Inc.