Ixia Partners with Network Security Providers to Better Combat Cybercrime
FREMONT, CA: Ixia, a provider of network testing, visibility and security solution, partners with security solution providers to deliver a full lifecycle security solution against cybercrime. The partners include Cisco, FireEye, Fortinet, HPE Security, Imperva, Intel Security, LogRhythm, Radware, Savvius and Vectra.
By helping to build and deploy security solutions in the most demanding customer environments, Ixia enables organizations defend against advanced threats along with providing them network resiliency.
Ixia’s set of security solutions include:
BreakingPoint Solution (BPS) – Application and Security Test
Using Ixia’s BreakingPoint application and security test solution, enterprises, service providers, and equipment manufacturers can validate the stability, accuracy, and quality of networks and network devices. It creates real-world scenarios of legitimate traffic, distributed denial of service (DDoS) attacks, exploits, and malware to test the performance limits and security effectiveness of next generation appliances and software capabilities in the development labs. The BPS solution enables technology partners to model and replicate advanced cyber threats to harden their security offerings.
Ixia's new PerfectStorm ONE network test and assessment solutions have been developed specifically for enterprise personnel to help them ensure security resiliency and perform proof-of-concept (POC) testing against vendor claims and architectural changes. It trains them on how to defend critical infrastructure assets and launch attacks against simulated critical infrastructure targets in a real life scenario.
A single platform providing granular view of network security, Vision ONE, enables organizations to maintain security across physical and virtual infrastructures without impacting network performance.
“Ixia understands that to win the cyber-war we must arm organizations with the tools that not only defend against attack, but proactively protect their networks and applications. Finding a breach quickly, and addressing it after the fact is good, but not as good as stopping it in the first place. Our security partners are experts in what they do, but they aren’t as effective when incomplete data is being fed to them. Optimal security posture requires the best products, training, and architectures,” says Scott Westlake, Vice President of Business Development, Ixia.
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....