Virtualization Technology News and Information
Ixia Leverages the Cloud to Streamline Network Threat Intelligence


Ixia, a leading provider of network testing, visibility, and security solutions, announced today that the company’s threat intelligence gateway – ThreatARMOR – now includes both cloud-powered centralized management and mobile access to essential security-related information to improve IT operational efficiency and ensure rapid response to potential network breaches.

The primary challenges facing network operators and security teams today is the time needed to confront the avalanche of security alerts and events, operate multiple security consoles, and understand evolving security threats, such as zero-day malware mutations. This time crunch can result in missing critical security events that indicate active breaches, targeted attacks, and data theft. Network operators need to deploy security and analytics tools that improve efficiency as opposed to creating additional time demands.

Cloud-based Centralized Threat Intelligence Management

ThreatARMOR Central Management provides a convenient, secure portal for managing global deployments of ThreatARMOR devices. Leveraging the elastic processing afforded by the cloud, it provides scalable management, log collection, and centralized reporting of policy, inventory, licensing, device health, and synchronization status, as well as aggregated blocking data. ThreatARMOR Central Management requires zero setup by network operators, and hosting and data storage capabilities are provided by Ixia via the cloud. Central management is now available to all ThreatARMOR (1G or 10G) customers currently under subscription, at no additional cost.

“Constantly evolving security threats require multiple tools to keep our network and end points safe and secure. I believe Ixia's ThreatARMOR is one of these tools. It provides that extra layer of defense and instantly starts filtering traffic with little to no configuration necessary,” stated Mike Halaychick, I.S. Network Manager, MVP Sports Clubs. “The new ThreatARMOR Central Management capability is an added benefit, as it delivers a single pane of glass to monitor all of my ThreatARMOR devices from one location. Overall, in today’s battle against Cyberattacks, I am extremely satisfied with the ThreatARMOR solution and the role it plays in my CyberSecurity defense strategy.”


Access to Threat Intelligence from Anywhere

The new ThreatARMOR Mobile Application offers a quick, portable method for checking ThreatARMOR statistics regardless of location, including blocked threats, traffic throughput, and geolocation of blocked connections. It provides users with at-a-glance insight into ThreatARMOR device status, the current Protection Score, which indicates recent blocking bursts, and overall network throughput, by geography. The initial release of the ThreatARMOR mobile application is available via Apple iOS devices.

Continuously Updated Threat Intelligence

ThreatARMOR threat intelligence is kept current with a feed from the company’s Application Threat Intelligence (ATI) Research Center, which is updated every five minutes, and provides access to 300 plus application protocols and over 36,000 security attacks. This real-time, cloud-based threat intelligence enables ThreatARMOR to deliver continuous protection, filtering out untrusted countries, malicious sites, and harmful IP addresses (malware distribution, phishing sites, botnet C&C sites, spam distribution, bogons, hijacked domains, and unassigned IPs). The ATI Research Center performs both manual and automated analysis of malware and techniques used by hackers to compromise networks, 24x7, 365 days a year.

Published Wednesday, November 09, 2016 9:36 AM by David Marshall
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
<November 2016>