Digital Transformation / DX
Artificial Intelligence / AI
Internet of Things
Ixia stories - Page 2
Virtual environments blurring the edges for network managers
"This situation is further complicated when IT infrastructures are moved to the cloud in multiple stages."
Top tips to achieve cloud visibility in your cloud environment
While cloud is the word in enterprise strategy this year, the path to digital visibility is still a bumpy road, says Ixia.
Ixia launches global ‘invitation-only’ program for channel partners
Network security provider Ixia is on a mission to provide partners with greater profitability and new revenue through its 'invitation only' program.
SecurityBrief Asia revisits 2016's year on the wild, wild web
New threats, new malware, new attacks, new chaos and new ways to fight back: A look back at Asia cybersecurity in 2016.
Ixia's Singapore Executive Briefing Center a safe haven for cyber defence simulations
“The Ixia Executive Briefing Center is unique and a highly valuable offering for IT professionals who struggle to run real-time stress-testing."
Ixia unveils security test platform for hyperscale data centers
"It is necessary to have tools that enable cloud providers and enterprises to be ready for the cloud."
Key to inline security success: 'Traffic inspection and detection', exec says
“If one of your security tools becomes congested or fails, you still want to be able to keep traffic moving."
Ixia unveils new solution to reduce data corruption in the enterprise
Ixia has launched the latest addition to the company’s network taps family of products to fortify business critical application security.
Augmented reality: What are the cyber security dangers?
“Businesses shouldn’t avoid AR; it can offer significant benefits. But it’s essential to understand the risks and protect your organisation."
How to be the cat - not the mouse - in the fight against zero-day malware
Zero-day malware mutations can spell disaster for networks, as they can often get in completely undetected by traditional security protection.
What role does security play in the age of IoT within the enterprise?
"It is essential to test through all stages of development and continuously monitor the devices. IoT really begins in the lab."
The unbalanced fight against network security threats
“Perhaps the most important success factor is unobstructed network visibility."
Ixia delivers revolutionary zero-day malware solution
The latest from security solution company, Ixia, automatically blocks malware and ransomware mutations.
Ixia: Developers must improve security testing and nab those anomalies
65% of developers are releasing applications to market with bugs still in them, and 31% admitted applications would need patching in future.
Robust security architecture vital to maximise resilience
"Too many organisations rely on security measures that only kick in after an attack has successfully breached their architecture.”
Say hello to Ixia's TrafficREWIND
Ixia have announced a new solution that captures traffic patterns from a production network and accurately recreates them in a controlled environment.
The public cloud dilemma with virtualised network monitoring
“The biggest struggle is to achieve the same level of network performance and security monitoring as that of their private data center."
Network blind spots and what you should do about them
“Being proactive with installation, maintenance and ongoing training related to IT infrastructure helps overcome potential threats."
Radical transition for testing equipment provider Ixia
Ixia started as a manufacturer of testing & measurement hardware. In the last 2-3 years they've expanded network testing solutions for telco services.
Security breaches: When, not if
Security breaches. It is no longer a matter of if a breach will happen, but when and how often.
Solid foundation vital for smart security
In order for a business to build a strong, secure network, they need to lay a solid foundation for the architecture to handle rapid changes.
Ixia launches new partner programme, focuses on enabling collaboration
“The goal of the Xceed programme is to accelerate value for end-users, while driving new and profitable sales opportunities for partners."
Does automation trump professionals when it comes to hacking?
"organisations can harden their systems and applications against potential threats prior to embarking on a bug bounty program or hiring hackers."
The first hour of a security intrusion prudent, says experts
"The actions taken within the first hour of a security intrusion can make the difference between minimal impact and major fallout."