we make networks stronger · stronger applications, tighter security, and higher return on it...

9
Are users complaining “the network is slow”? Or “Skype isn’t working?” Is your security team chasing too many false positives? Will your data center investment produce the return on investment (ROI) your e-staff expects? Stronger applications, tighter security, and higher return on IT investment all hinge on being able to see inside your network. Only with total visibility across your physical and virtual networks can your teams—and your tools—make exactly the right decisions at exactly the right time. Page 1 915-8092-01-9061 Rev A 26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com We Make Networks Stronger Visibility for the Enterprise

Upload: others

Post on 16-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: We Make Networks Stronger · Stronger applications, tighter security, and higher return on IT investment all hinge on being able to see inside your network. Only with total visibility

Are users complaining “the network is slow”?

Or “Skype isn’t working?”

Is your security team chasing too many false positives?

Will your data center investment produce the return on investment

(ROI) your e-staff expects?

Stronger applications, tighter security, and higher return on IT

investment all hinge on being able to see inside your network.

Only with total visibility across your physical and virtual networks

can your teams—and your tools—make exactly the right decisions at

exactly the right time.

Page 1915-8092-01-9061 Rev A

26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com

We Make Networks Stronger

Visibility for the Enterprise

Page 2: We Make Networks Stronger · Stronger applications, tighter security, and higher return on IT investment all hinge on being able to see inside your network. Only with total visibility

Page 2915-8092-01-9061 Rev A

26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com

Ixia: Better Data for Better Decisions If you operate a network, connect to the Internet, or run cloud-based

applications, you are likely already benefitting from Ixia technology. The

world’s leading enterprises, networking manufacturers, and service and

solution providers trust us to ensure performance and security during

every phase of the technology lifecycle, and so can you.

Ixia maintains global leadership in network and wireless testing and

boasts clear advantages in visibility and security.

WAT C H T H E V I D E O :

I X I A O V E R V I E W

WHO IS IXIA?• FOU NDED I N 19 97

• $ 500M + REVENUES

• XX I A ON NASDAQ

EXCHANGE

• 2 0+ FAC I L I T I ES

WORL DW I DE

• W I DELY U SED BY

FORTU NE 100

Page 3: We Make Networks Stronger · Stronger applications, tighter security, and higher return on IT investment all hinge on being able to see inside your network. Only with total visibility

Page 3915-8092-01-9061 Rev A

26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com

What is Network Visibility?Visibility into the network starts with, but goes well beyond,

monitoring links to collect data. Ixia visibility solutions add the

intelligence you need to derive the greatest benefit from your data

and tool investments as easily and cost-effectively as possible.

End-to-end visibility promotes high availability, resilient security, and

cost reduction, all with less strain on your IT department. Toward this

end, our unrivaled network visibility portfolio delivers:

• Access to data — physical or virtual

• Intelligent packet processing

• Proactive monitoring

• Inline security resilience

Let’s take these one at a time.

Access to Data: Network performance data is often collected

using switched port analyzer (SPAN) ports or physical and virtual

taps (vTaps). Taps provide a more reliable and efficient solution

than high-cost ports on switches.

Accessing data also includes using intelligent bypass switches to make

sure nothing gets missed should devices, links, or power stop working.

TA P S V S . S PA N P O R T S

I X I A B Y PA S S S W I T C H E S

WAT C H T H E V I D E O

Page 4: We Make Networks Stronger · Stronger applications, tighter security, and higher return on IT investment all hinge on being able to see inside your network. Only with total visibility

Page 4915-8092-01-9061 Rev A

26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com

Intelligent Packet Processing: Here, Ixia’s network packet

brokers (NPBs) are used to optimize the flow of data between

access points in the network (taps and SPAN ports) and the

monitoring and security tools that act upon it. These purpose-

built switches play an increasingly vital role in realizing value

from your data. NPBs equip you to:

• Deliver the right traffic to the right tool at the right time

• Eliminate dangerous blind spots

• Balance the workload to boost efficiency and extend investments in legacy tools

• Bridge the gap between physical and virtual environments

• Scale connectivity between networks and analytic tools

Ixia’s Vision ONE™ and Net Tool Optimizer® (NTO) packet brokers

deliver unrivaled intelligence, performance, and flexibility.

Proactive Performance Monitoring: The sooner you spot

issues the better. Ixia recently added Hawkeye, an active

performance monitoring solution for the live network that

delivers ongoing visibility into challenging applications such

as Voice over IP (VoIP), unified communications (like Skype for

Business), streaming video, and cloud-based services. Proactive

monitoring aids in detecting and isolating issues before they

impact the user experience.

WAT C H T H E V I D E O : I X I A V I S I O N O N E

Page 5: We Make Networks Stronger · Stronger applications, tighter security, and higher return on IT investment all hinge on being able to see inside your network. Only with total visibility

Page 5915-8092-01-9061 Rev A

26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com

Inline Security Resilience: Ixia’s first-of-its-kind Security Fabric™ delivers 4 critical layers of

visibility to uniquely equip security tools with exactly the data they

need. Consisting mainly of network packet brokers and intelligent

bypass, the security fabric intuitively and intelligently routes and

load balances traffic to enhance security and analytics.

An intelligent Security Fabric provides:

• Data Access Everywhere: 100% access to physical or virtual

network traffic without requiring expensive switches to be

deployed with ports allocated to collecting data.

• Network Resilience: Intelligent bypass keeps inline tools

available during link, device, or power failure, and allows them to be

taken out of service for maintenance without requiring downtime.

• Context-Aware Data Processing equips network packet

brokers to precisely identify applications and provide rich context

such as geolocation, browser and device information on each packet.

• Security Intelligence including decryption of fast-rising

threats hidden in Security Socket Layer (SSL) traffic. Threat

intelligence feeds aid in blocking known bad IP addresses

which reduces the noise on the network, and in turn, frees up

resources to optimize security operations.

Network Packet Brokers (HA)

Bypass Switch SwitchServer

ServerSwitch

Monitored Tool Links via Heartbeat Packets

Switch

Out-of-BandSandboxing

Threat Intelligence Gateway

Switch Bypass Switch

Inline Security Tool Farm

Page 6: We Make Networks Stronger · Stronger applications, tighter security, and higher return on IT investment all hinge on being able to see inside your network. Only with total visibility

Page 6915-8092-01-9061 Rev A

26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com

Choosing the Right Network Packet Broker NPBs render vital intelligence in today’s complex data centers, but

not all are created equal—far from it. The best fit for your network

will be one that:

• Delivers the richest feature set

• Promotes the greatest ease of use

• Employs a superior product architecture

• Outperforms the competition

Ixia delivers powerful advantages on all counts.

R I C H F E AT U R E S E T: I N N O VAT I O N + F L E X I B I L I T Y

Vision ONE and NTO perform several functions to optimize the

flow, delivery, and utilization of data, including:

• Aggregation of traffic from multiple taps or SPAN ports

• Filtering of traffic so that each monitoring or inline security

tool receives exactly the right data

• Load-balancing of traffic to multiple analysis tools. This improves

ROI and extends legacy investments by allowing, for example, data

tapped from 10G links to be distributed efficiently across 1G tools

• SSL decryption to quickly detect emerging threats encrypting

exploits within application traffic

• L7 application awareness. Here again, not all “awareness” is

created equal. Ixia efficiently allows for packet processing based

on unique applications—for example, you can automatically

filter and regulate use of Netflix, Hulu, and Facebook, as well as

traffic originating from specific regions

Ixia packet brokers also bridge the gap between physical and

virtual network monitoring—and between inline and out-of-band

operation—for the most versatile and scalable visibility.

T H E F I X E R S H O W S H O W I X I A N E T W O R K V I S I B I L I T Y T A K E S O N T H E H A C K E R

WAT C H T H E V I D E O

Page 7: We Make Networks Stronger · Stronger applications, tighter security, and higher return on IT investment all hinge on being able to see inside your network. Only with total visibility

Page 7915-8092-01-9061 Rev A

26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com

E A S E O F U S E : A D VA N TA G E I X I A

Along with Ixia’s simple drag-and-drop graphical user interface

(GUI), Vision ONE and NTO automatically address issues

associated with overlapping rules. Our patented Automated Filter

Compiler streamlines operation by multiple users at multiple sites

to keep users from missing vital clues to pending threats.

P R O D U C T A R C H I T E C T U R E : T H E P O W E R O F H A R D W A R E

Where competitive solutions employ software-based architectures,

Ixia NPBs use hardware-based field-programmable gate arrays

(FPGAs) for processing to ensure true line-rate performance in

even the most complex scenarios.

P R O V E N R E L I A B L E P E R F O R M A N C E :

T H E U LT I M AT E D I F F E R E N C E - M A K E R

In third-party testing by Tolly, Ixia network packet brokers

were the only products able to process traffic at line-rate with

multiple advanced features running—without dropping packets.

Reliable performance is the ultimate differentiator as you

cannot afford to risk dropping packets or refrain from turning on

advanced features for fear of compromising results.

Page 8: We Make Networks Stronger · Stronger applications, tighter security, and higher return on IT investment all hinge on being able to see inside your network. Only with total visibility

Page 8915-8092-01-9061 Rev A

26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com

Don’t Take Our Word for It Time and time again, Ixia wins in proof-of-concept (PoC)

demonstrations where NPBs compete head-to-head. We would be

glad to arrange a demonstration based on your company’s unique IT

goals and challenges.

Just let us know when and where.

Browse Other Enterprise SolutionsAlong with ensuring visibility into their networks, leading

businesses worldwide partner with Ixia to optimize deployments

of challenging applications such as VoIP and unified

communications (UC), to secure data, and to validate investments

in Wi-Fi, public and private clouds, and other technologies. Other

powerful Ixia solutions and services for the enterprise include:

BreakingPoint™ Virtual Edition (VE) provides IT departments

with the same high-fidelity, real-world testing that leading security

vendors and service providers rely upon, in an elastic, software-

based deployment model. Validate the resilience of both physical

and virtualized infrastructures against a wide range of threat and

attack profiles.

Page 9: We Make Networks Stronger · Stronger applications, tighter security, and higher return on IT investment all hinge on being able to see inside your network. Only with total visibility

Page 9915-8092-01-9061 Rev A | © Keysight Technologies, 2017

26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com

IxChariot® lets you simulate application traffic and analyze key

performance metrics to improve the performance of business

applications across wired, wireless, and virtual data center

networks. Pre-deployment, you can model “what-if” scenarios to

predict an application’s impact on your network. Later, conduct

on-demand network diagnostics to maintain ultra-high quality.

Testing as a Service: Ixia’s global Professional Services

Organization (PSO) conducts readiness assessments and health

checks that ensure the success of network, Wi-Fi, UC, and other

high-profile initiatives.

ThreatARMOR™: Innovative IP-address filtering based on geo-

location or known bad behavior. By reducing unwanted noise

and traffic on the network, ThreatARMOR makes security teams

and operations more efficient, and makes it easier to leverage

more features on next-gen firewalls . “Rap sheets” provide

proof of malicious activities, with cloud-based updates keeping

threat intelligence current.

IXIA WORLDWIDE26601 W. AGOURA RD.

CALABASAS, CA 91302

(TOLL FREE NORTH AMERICA)

1.877.367.4942

(OUTSIDE NORTH AMERICA)

+1.818.871.1800

(FAX) 1.818.871.1805

www.ixiacom.com

IXIA EUROPECLARION HOUSE, NORREYS DRIVE

MAIDENHEAD SL6 4FL

UNITED KINGDOM

SALES +44.1628.408750

(FAX) +44.1628.639916

IXIA ASIA PACIFIC101 THOMSON ROAD,

#29-04/05 UNITED SQUARE,

SINGAPORE 307591

SALES +65.6332.0125

(FAX) +65.6332.0127