we make networks stronger · stronger applications, tighter security, and higher return on it...
TRANSCRIPT
Are users complaining “the network is slow”?
Or “Skype isn’t working?”
Is your security team chasing too many false positives?
Will your data center investment produce the return on investment
(ROI) your e-staff expects?
Stronger applications, tighter security, and higher return on IT
investment all hinge on being able to see inside your network.
Only with total visibility across your physical and virtual networks
can your teams—and your tools—make exactly the right decisions at
exactly the right time.
Page 1915-8092-01-9061 Rev A
26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com
We Make Networks Stronger
Visibility for the Enterprise
Page 2915-8092-01-9061 Rev A
26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com
Ixia: Better Data for Better Decisions If you operate a network, connect to the Internet, or run cloud-based
applications, you are likely already benefitting from Ixia technology. The
world’s leading enterprises, networking manufacturers, and service and
solution providers trust us to ensure performance and security during
every phase of the technology lifecycle, and so can you.
Ixia maintains global leadership in network and wireless testing and
boasts clear advantages in visibility and security.
WAT C H T H E V I D E O :
I X I A O V E R V I E W
WHO IS IXIA?• FOU NDED I N 19 97
• $ 500M + REVENUES
• XX I A ON NASDAQ
EXCHANGE
• 2 0+ FAC I L I T I ES
WORL DW I DE
• W I DELY U SED BY
FORTU NE 100
Page 3915-8092-01-9061 Rev A
26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com
What is Network Visibility?Visibility into the network starts with, but goes well beyond,
monitoring links to collect data. Ixia visibility solutions add the
intelligence you need to derive the greatest benefit from your data
and tool investments as easily and cost-effectively as possible.
End-to-end visibility promotes high availability, resilient security, and
cost reduction, all with less strain on your IT department. Toward this
end, our unrivaled network visibility portfolio delivers:
• Access to data — physical or virtual
• Intelligent packet processing
• Proactive monitoring
• Inline security resilience
Let’s take these one at a time.
Access to Data: Network performance data is often collected
using switched port analyzer (SPAN) ports or physical and virtual
taps (vTaps). Taps provide a more reliable and efficient solution
than high-cost ports on switches.
Accessing data also includes using intelligent bypass switches to make
sure nothing gets missed should devices, links, or power stop working.
TA P S V S . S PA N P O R T S
I X I A B Y PA S S S W I T C H E S
WAT C H T H E V I D E O
Page 4915-8092-01-9061 Rev A
26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com
Intelligent Packet Processing: Here, Ixia’s network packet
brokers (NPBs) are used to optimize the flow of data between
access points in the network (taps and SPAN ports) and the
monitoring and security tools that act upon it. These purpose-
built switches play an increasingly vital role in realizing value
from your data. NPBs equip you to:
• Deliver the right traffic to the right tool at the right time
• Eliminate dangerous blind spots
• Balance the workload to boost efficiency and extend investments in legacy tools
• Bridge the gap between physical and virtual environments
• Scale connectivity between networks and analytic tools
Ixia’s Vision ONE™ and Net Tool Optimizer® (NTO) packet brokers
deliver unrivaled intelligence, performance, and flexibility.
Proactive Performance Monitoring: The sooner you spot
issues the better. Ixia recently added Hawkeye, an active
performance monitoring solution for the live network that
delivers ongoing visibility into challenging applications such
as Voice over IP (VoIP), unified communications (like Skype for
Business), streaming video, and cloud-based services. Proactive
monitoring aids in detecting and isolating issues before they
impact the user experience.
WAT C H T H E V I D E O : I X I A V I S I O N O N E
Page 5915-8092-01-9061 Rev A
26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com
Inline Security Resilience: Ixia’s first-of-its-kind Security Fabric™ delivers 4 critical layers of
visibility to uniquely equip security tools with exactly the data they
need. Consisting mainly of network packet brokers and intelligent
bypass, the security fabric intuitively and intelligently routes and
load balances traffic to enhance security and analytics.
An intelligent Security Fabric provides:
• Data Access Everywhere: 100% access to physical or virtual
network traffic without requiring expensive switches to be
deployed with ports allocated to collecting data.
• Network Resilience: Intelligent bypass keeps inline tools
available during link, device, or power failure, and allows them to be
taken out of service for maintenance without requiring downtime.
• Context-Aware Data Processing equips network packet
brokers to precisely identify applications and provide rich context
such as geolocation, browser and device information on each packet.
• Security Intelligence including decryption of fast-rising
threats hidden in Security Socket Layer (SSL) traffic. Threat
intelligence feeds aid in blocking known bad IP addresses
which reduces the noise on the network, and in turn, frees up
resources to optimize security operations.
Network Packet Brokers (HA)
Bypass Switch SwitchServer
ServerSwitch
Monitored Tool Links via Heartbeat Packets
Switch
Out-of-BandSandboxing
Threat Intelligence Gateway
Switch Bypass Switch
Inline Security Tool Farm
Page 6915-8092-01-9061 Rev A
26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com
Choosing the Right Network Packet Broker NPBs render vital intelligence in today’s complex data centers, but
not all are created equal—far from it. The best fit for your network
will be one that:
• Delivers the richest feature set
• Promotes the greatest ease of use
• Employs a superior product architecture
• Outperforms the competition
Ixia delivers powerful advantages on all counts.
R I C H F E AT U R E S E T: I N N O VAT I O N + F L E X I B I L I T Y
Vision ONE and NTO perform several functions to optimize the
flow, delivery, and utilization of data, including:
• Aggregation of traffic from multiple taps or SPAN ports
• Filtering of traffic so that each monitoring or inline security
tool receives exactly the right data
• Load-balancing of traffic to multiple analysis tools. This improves
ROI and extends legacy investments by allowing, for example, data
tapped from 10G links to be distributed efficiently across 1G tools
• SSL decryption to quickly detect emerging threats encrypting
exploits within application traffic
• L7 application awareness. Here again, not all “awareness” is
created equal. Ixia efficiently allows for packet processing based
on unique applications—for example, you can automatically
filter and regulate use of Netflix, Hulu, and Facebook, as well as
traffic originating from specific regions
Ixia packet brokers also bridge the gap between physical and
virtual network monitoring—and between inline and out-of-band
operation—for the most versatile and scalable visibility.
T H E F I X E R S H O W S H O W I X I A N E T W O R K V I S I B I L I T Y T A K E S O N T H E H A C K E R
WAT C H T H E V I D E O
Page 7915-8092-01-9061 Rev A
26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com
E A S E O F U S E : A D VA N TA G E I X I A
Along with Ixia’s simple drag-and-drop graphical user interface
(GUI), Vision ONE and NTO automatically address issues
associated with overlapping rules. Our patented Automated Filter
Compiler streamlines operation by multiple users at multiple sites
to keep users from missing vital clues to pending threats.
P R O D U C T A R C H I T E C T U R E : T H E P O W E R O F H A R D W A R E
Where competitive solutions employ software-based architectures,
Ixia NPBs use hardware-based field-programmable gate arrays
(FPGAs) for processing to ensure true line-rate performance in
even the most complex scenarios.
P R O V E N R E L I A B L E P E R F O R M A N C E :
T H E U LT I M AT E D I F F E R E N C E - M A K E R
In third-party testing by Tolly, Ixia network packet brokers
were the only products able to process traffic at line-rate with
multiple advanced features running—without dropping packets.
Reliable performance is the ultimate differentiator as you
cannot afford to risk dropping packets or refrain from turning on
advanced features for fear of compromising results.
Page 8915-8092-01-9061 Rev A
26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com
Don’t Take Our Word for It Time and time again, Ixia wins in proof-of-concept (PoC)
demonstrations where NPBs compete head-to-head. We would be
glad to arrange a demonstration based on your company’s unique IT
goals and challenges.
Just let us know when and where.
Browse Other Enterprise SolutionsAlong with ensuring visibility into their networks, leading
businesses worldwide partner with Ixia to optimize deployments
of challenging applications such as VoIP and unified
communications (UC), to secure data, and to validate investments
in Wi-Fi, public and private clouds, and other technologies. Other
powerful Ixia solutions and services for the enterprise include:
BreakingPoint™ Virtual Edition (VE) provides IT departments
with the same high-fidelity, real-world testing that leading security
vendors and service providers rely upon, in an elastic, software-
based deployment model. Validate the resilience of both physical
and virtualized infrastructures against a wide range of threat and
attack profiles.
Page 9915-8092-01-9061 Rev A | © Keysight Technologies, 2017
26601 W. Agoura Road | Calabasas, CA 91302 USA | Tel + 1-818-871-1800 | www.ixiacom.com
IxChariot® lets you simulate application traffic and analyze key
performance metrics to improve the performance of business
applications across wired, wireless, and virtual data center
networks. Pre-deployment, you can model “what-if” scenarios to
predict an application’s impact on your network. Later, conduct
on-demand network diagnostics to maintain ultra-high quality.
Testing as a Service: Ixia’s global Professional Services
Organization (PSO) conducts readiness assessments and health
checks that ensure the success of network, Wi-Fi, UC, and other
high-profile initiatives.
ThreatARMOR™: Innovative IP-address filtering based on geo-
location or known bad behavior. By reducing unwanted noise
and traffic on the network, ThreatARMOR makes security teams
and operations more efficient, and makes it easier to leverage
more features on next-gen firewalls . “Rap sheets” provide
proof of malicious activities, with cloud-based updates keeping
threat intelligence current.
IXIA WORLDWIDE26601 W. AGOURA RD.
CALABASAS, CA 91302
(TOLL FREE NORTH AMERICA)
1.877.367.4942
(OUTSIDE NORTH AMERICA)
+1.818.871.1800
(FAX) 1.818.871.1805
www.ixiacom.com
IXIA EUROPECLARION HOUSE, NORREYS DRIVE
MAIDENHEAD SL6 4FL
UNITED KINGDOM
SALES +44.1628.408750
(FAX) +44.1628.639916
IXIA ASIA PACIFIC101 THOMSON ROAD,
#29-04/05 UNITED SQUARE,
SINGAPORE 307591
SALES +65.6332.0125
(FAX) +65.6332.0127