Ixia today announced its new Vision Edge OS solution,
a software version of Ixia's network packet broker (NPB) product that
allows Ixia's NPB's patented, feature rich capabilities to run on open
networking switches, such as those from Edgecore Networks. Vision Edge OS embraces
the movement of disaggregating software and hardware in software
defined data center (SDDC) networks.
NPBs
aggregate, filter, and load-balance network packet data to seamlessly
and efficiently deliver that packet data to security, forensics, and
performance management tools. Ixia's Vision Edge OS is a software solution that
transforms open switches into NPBs, providing rack and data center level
visibility. It offers complete access to network packets to facilitate
real-time visibility, insight, and security for high density hyperscale,
microscale, and SDDC networks, even as they expand.
"New
approaches for pervasive network visibility in web scale and
software-defined data centers are enabling cloud service providers,
telecom service providers and enterprises to gain deeper, valuable
insights into network services using increasingly cost-effective and
flexible approaches," said Jeff Catlin, VP Technology, Edgecore
Networks. "Edgecore is pleased to collaborate with Ixia, to enable
customers to benefit from Ixia's Vision Edge OS on Edgecore's open networking switches, as a feature-rich and
powerful visibility platform for these modern disaggregated cloud and
telecom infrastructures."
Vision Edge OS delivers control, coverage, and performance to help protect and improve
crucial networking, data center, and cloud business assets on open
networking switches being adopted in the marketplace, delivering the
following customer benefits:
- Flexibility
- Easily download and install on certified open networking switches
- Activate capabilities as needed
- Control costs by separating software and hardware
- Total visibility
- Supports top-of-the-rack aggregation at the required throughput to help eliminate blind spots
- Offers aggregation, replication, load balancing, and source port labeling
- Works seamlessly with Ixia's Vision ONE and Vision 7300 network packet brokers
- Ease of use
- Point-and-click
web-interface offers an intuitive network-to-tools layout, enabling
users to easily translate to real-life physical configurations
- Three
stages of filtering: ingress, dynamic, and egress; naturally providing a
built-in capability for AND/OR logic, and simplifying configuration of
complex Boolean filtering rules
- Automatically resolves overlapping rules with Ixia's patented filter compiler technology
"IT
management will appreciate the flexibility of Ixia's Vision Edge OS," says Recep
Ozdag, Vice President of Product Management at Ixia. "Customers can
build a data-center of any size by leveraging existing hardware or the
hardware solution of their choice, which is ideal for creating an
efficient and cost-effective IT operation."
Ixia's Security Fabric Powers Visibility
Ixia's Vision Edge OS, on an open switch, can be used as a standalone device, much like a Ixia's Vision Edge network packet brokers, or as part of Ixia's robust Security Fabric solution when combined with the company's turnkey Vision ONE or Vision 7300 network
packet brokers. This combination creates a powerful visibility engine
that delivers the right traffic to the right security and monitoring
tools, while enabling customers to leverage Ixia's advanced visibility
intelligence features such as deduplication, packet trimming,
application filtering, SSL decryption and encryption, and more.
Ixia continues to drive innovations in network visibility
Ixia Visibility Solutions provide
real-time, end-to-end visibility, insight, and security into physical,
virtual, SDN, and NFV networks, delivering the control, coverage and
performance in a seamless fashion to help protect and improve crucial
networking, data center, and cloud business assets. The company offers a
wide range of advanced network visibility solutions, including network packet brokers to help ensure every security and monitoring tool sees exactly the data it needs, as well as a real-time application and threat intelligence subscription, network Taps, and bypass switches that help maximize resiliency and minimize downtime during deployment.