SYS-CON MEDIA Authors: Elizabeth White, Yeshim Deniz, Pat Romanski, Liz McMillan, William Schmarzo

News Feed Item

Ixia, a Keysight Business, Enhances Visibility Solutions With Threat Insights Into Malicious Activity

Keysight Technologies, Inc. (NYSE: KEYS), a leading technology company that helps enterprises, service providers, and governments accelerate innovation to connect and secure the world, has added advanced threat insights to Ixia solutions including Vision ONE and Vision 7300 network packet brokers (NPBs) and CloudLens Private, Ixia’s cloud visibility solution. The new capability recognizes malware, botnet, intrusion attempts, hijacked IPs and phishing activity. This enhanced visibility is provided in the SecureStack feature set, a key component of Ixia’s security and visibility intelligence framework.

Today’s organizations are under cyberattack. Malware can find its way into an organization in a multitude of ways including email, clicking on malicious links, mobile devices, USBs used by employees, as well as physical intrusions into a network. Cyber Security Ventures reported that ransomware will attack a business every 14 seconds by the end of 2019.1

Leveraging threat insights from Ixia’s Application and Threat Intelligence (ATI) Research Center, Ixia’s Vision ONE, Vision 7300, and CloudLens Private solutions now deliver real-time information about malicious activity on an organization’s network. This eliminates the need for an expensive threat intelligence feed, while improving efficiency. Users can easily identify threats and indicators of compromise with Vision ONE, Vision 7300, or CloudLens Private, and report that threat information automatically via NetFlow to existing security and monitoring tools.

“In today’s ever-expanding cyber threat climate, it is critical to gain visibility into security anomalies quickly and efficiently,” said Scott Register, vice president cloud and security product management for Ixia. “By building threat insights from our ATI research into the Vision ONE and Vision 7300 network packet brokers, as well as into CloudLens Private, Ixia enables organizations to maintain security, as well as identify and resolve performance problems across physical and virtual infrastructures from a single platform.”

Vision ONE fights against threats hidden in encrypted traffic, detects IoT attacks, and feeds the right data to the right forensic solution to boost network protection without negatively impacting performance. AppStack and SecureStack capabilities enable Ixia’s solutions to filter and visualize Level 2-4 traffic, as well as Layer 7 application traffic. As a result, suspicious applications can be tagged and watched to quickly spot rogue applications or unusual activity, including traffic to or from unauthorized geographies, questionable file transfers, brute-force attacks, ransomware connections, and connections to phishing sites.

The Ixia Vision family of NPBs and CloudLens Private deliver end-to-end network visibility across both physical and virtual networks, with flexible functionality that includes traffic aggregation, filtering, secure socket layer (SSL) decryption with data masking, deduplication, and intelligent packet management to the tools that manage, analyze, and secure networks.

Vision 7300 enables line rate, zero-loss packet processing on networks up to 100 GE for both Layer 2–4 traffic, and Layer 7 application-level data. It expands as network monitoring needs grow, and adapts as new applications are added or new security threats occur.

CloudLens, Ixia's platform for public, private and hybrid cloud visibility, addresses the challenges of granular data access in the cloud. It offers organizations the visibility they need, while keeping aligned to "all cloud," hybrid cloud, multi-cloud or any cloud strategy. CloudLens Private supports private cloud technologies, and can tap, filter, process and manipulate traffic in a cloud environment.

About Keysight Technologies

Keysight Technologies, Inc. (NYSE: KEYS) is a leading technology company that helps enterprises, service providers, and governments accelerate innovation to connect and secure the world. Keysight's solutions optimize networks and bring electronic products to market faster and at a lower cost with offerings from design simulation, to prototype validation, to manufacturing test, to optimization in networks and cloud environments. Customers span the worldwide communications ecosystem, aerospace and defense, automotive, energy, semiconductor and general electronics end markets. Keysight generated revenues of $3.2B in fiscal year 2017. In April 2017, Keysight acquired Ixia, a leader in network test, visibility, and security. More information is available at www.keysight.com.

Additional information about Keysight Technologies is available in the newsroom at www.keysight.com/go/news, Keysight blog, and on Facebook, Google+, LinkedIn, Twitter and YouTube.

1 Ransomware Damage Report 2017, https://cybersecurityventures.com/ransomware-damage-report-2017-part-2/

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The dream is universal: heuristic driven, global business operations without interruption so that nobody has to wake up at 4am to solve a problem. Building upon Nutanix Acropolis software defined storage, virtualization, and networking platform, Mark will demonstrate business lifecycle automation with freedom of choice and consumption models. Hybrid cloud applications and operations are controllable by the Nutanix Prism control plane with Calm automation, which can weave together the following: ...
Inzata is a powerful, revolutionary data analytics platform for integrating, exploring, and analyzing data of any kind, from any source, at massive scale. Powerful AI-assisted Modeling and a patented analytics engine help users quickly load, blend and model raw and unstructured data into powerful enterprise data models, actionable real-time analytics and engaging visualizations. Go beyond spreadsheets and slides and compose a powerful narrative about how your business is performing, and how y...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO Silicon Valley 2019 will cover all of these tools, with the most comprehensive program and with 222 rockstar speakers throughout our industry presenting 22 Keynotes and General Sessions, 250 Breakout Sessions along 10 Tracks, as well as our signature Power Panels. Our Expo Floor will bring together the leading global 200 companies throughout the world of Cloud Computing, DevOps, IoT, Smart Cities, FinTech, Digital Transformation, and all they entail. As ...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
Only Adobe gives everyone - from emerging artists to global brands - everything they need to design and deliver exceptional digital experiences. Adobe Systems Incorporated develops, markets, and supports computer software products and technologies. The Company's products allow users to express and use information across all print and electronic media. The Company's Digital Media segment provides tools and solutions that enable individuals, small and medium businesses and enterprises to cre...
In today's always-on world, customer expectations have changed. Competitive differentiation is delivered through rapid software innovations, the ability to respond to issues quickly and by releasing high-quality code with minimal interruptions. DevOps isn't some far off goal; it's methodologies and practices are a response to this demand. The demand to go faster. The demand for more uptime. The demand to innovate. In this keynote, we will cover the Nutanix Developer Stack. Built from the foundat...
Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes. We are offering early bird savings...
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO Silicon Valley 2019 will cover all of these tools, with the most comprehensive program and with 222 rockstar speakers throughout our industry presenting 22 Keynotes and General Sessions, 250 Breakout Sessions along 10 Tracks, as well as our signature Power Panels. Our Expo Floor will bring together the leading global 200 companies throughout the world of Cloud Computing, DevOps, IoT, Smart Cities, FinTech, Digital Transformation, and all they entail.
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo...
ClaySys Technologies is one of the leading application platform products in the ‘No-code' or ‘Metadata Driven' software business application development space. The company was founded to create a modern technology platform that addressed the core pain points related to the traditional software application development architecture. The founding team of ClaySys Technologies come from a legacy of creating and developing line of business software applications for large enterprise clients around the ...
The benefits of automated cloud deployments for speed, reliability and security are undeniable. The cornerstone of this approach, immutable deployment, promotes the idea of continuously rolling safe, stable images instead of trying to keep up with managing a fixed pool of virtual or physical machines. In this talk, we'll explore the immutable infrastructure pattern and how to use continuous deployment and continuous integration (CI/CD) process to build and manage server images for any platfo...
DevOpsSUMMIT at CloudEXPO, to be held June 25-26, 2019 at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...