Hi [[ session.user.profile.firstName ]]

The Art of the Test—Is Your Network Security Ready for the Real World? (NEMs)

Often, the best way to make sure something works is to try it out. When it comes to network security, trying it out before an attacker does is an excellent idea. Since developing and executing security tests can be a challenge, Ixia and NSS Labs have come together to show you best practices to perform your own security validation. Security vendors and network equipment manufacturers will want to view this webinar recording to better understand why more network security may not mean better security, how to measure security effectiveness now, and how to ensure network resiliency while under attack, all by using proven test methodologies and real-world application and security simulations.
Recorded Nov 19 2014 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Fred Kost Vice President, Security Solutions, Ixia and Vikram Phatak Chief Executive Officer, NSS Labs, Inc.
Presentation preview: The Art of the Test—Is Your Network Security Ready for the Real World? (NEMs)

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Containers and Kubernetes: Visibility through CloudLens Recorded: Oct 3 2018 35 mins
    Sushil K. Srinivasan, Sr. Product Manager, Ixia, a Keysight Business. Chris Hein, Partner Solutions Architect, Amazon
    As systems evolved from physical servers to virtual machines to the public cloud to containers, the design focus shifted from building a single robust, stable component to building a more stable microservice oriented system where individual service components can be modified or replaced without affecting the overall system. Enterprises in this evolution cycle continue to have a mix of their applications running on physical hardware, virtualized platforms, in public cloud infrastructures and Kubernetes container clusters.

    During this webinar, experts from AWS and Ixia, a Keysight business will share:
    •Strategies to provide packet visibility to your workloads in any environment
    •Insights into planning and implementing strategies
    •Review emerging designs and best practices

    You will also see a step-by-step demonstration of how you can establish packet visibility into your workloads in Physical, Virtual, Cloud, Container or in a Kubernetes Cluster by continuing to maximize on your existing investment in APM, NPM and IDS tools.

    Register to watch this webinar and demo now.
  • Ovum + Ixia: What You Can Do To Strengthen Security Over Your Clouds Recorded: Jul 20 2018 60 mins
    Maxine Holt, Research Director, Security, Ovum Research. Scott Register, VP, Product Management, Ixia, A Keysight Business
    Cloud is transforming enterprises in every segment, yet security in the cloud may not be as strong as it should be. Responsibility for the security of data, applications, and services in the cloud remains with the enterprise, but control is limited. View this webinar to hear Maxine Holt, Research Director of Ovum, detail how to make your hybrid cloud environment visible and secure.

    Learn about how:
    •Cloud expands your attack surface
    •Your security architecture needs to adapt
    •To keep pace with cloud adoption

    Discover how you can leverage your existing security solutions to keep your cloud data, applications, and customer experience safe from cyberattacks.
  • RSA + Ixia: Cloud Security is a Marathon: How to Get a Running Start Recorded: Jul 20 2018 36 mins
    Mike Gallegos, RSA. Sushil Srinivasan, Ixia, A Keysight Business
    The process of securing public, private and hybrid clouds is not unlike training for a marathon. To be successful in either endeavor, preparation—having a training plan—is key. During this webinar, experts from RSA and Ixia will share strategies for securing your workloads in various cloud environments.

    We’ll share insights into planning and implementing these strategies, review emerging designs and best practices, and provide a step-by-step demonstration of how you can:
    •Establish visibility into your workloads in public, private and hybrid clouds
    •Detect, identify, and remediate malicious activity
    •Complement data shared by cloud providers
    •Cost-efficiently retain data for long-term analysis
    •Future-proof investments / ensure scalability

    As with any test of skill and endurance, you need to set goals, develop a schedule and dedicate time to prepare and execute. Attending this session and viewing the demo will help you devise the right strategy to secure your cloud and go the distance.
  • SANS Review on BreakingPoint: A Multi-Function Tool for Application and Security Recorded: May 30 2018 62 mins
    Serge Borso, SANS Analyst and Sashi Jeyaretnam, Ixia Solutions Group.
    The ability to thoroughly test equipment during a proof of concept phase, or understand how an environment handles DOS attacks, is critical to enterprise decision makers. Watch this webinar to hear from SANS Analyst Serge Borso as he discusses the insights he gained during his hands-on testing of the BreakingPoint appliance.

    Ixia’s BreakingPoint is a multifaceted tool used to provide actionable data in the realm of network security testing and infrastructure validation. BreakingPoint works by simulating traffic aimed at your network appliances and applications. In this webcast, you will also hear from Ixia’s product expert, Sashi Jeyaretnam, as she details scenarios where the tool can offer some unexpected wins for your enterprise.
  • Reimagining Wireless: Testing 5G RAN and Core Recorded: May 29 2018 60 mins
    Chris DePuy, Analyst 650 Group and Kalyan Sundhar, Author of 5G for Dummies
    In this webinar our subject matter experts Chris DePuy, Founder and Technology Analyst of 650 Group and Kalyan Sundhar, Vice President of Mobility, Virtualization and Applications at Ixia Solutions Group, a Keysight business will talk about the 5G RAN and Core as well as associated design, test and measurement considerations and challenges.

    5G is the first wireless standard designed without the smartphone at the center. The 5G Radio Access Network (RAN), connecting subscribers to service providers, will be architecturally and technically very different from past generations. The core network, fundamental in managing and routing data, voice and video traffic, is also reimagined in 5G.

    5G introduces higher frequencies (millimeter wave), wider bandwidths, advanced multi-antenna access schemes, small cells, and network slicing including network function virtualization, and orchestration. Predicting and measuring the performance of the network in support of devices such as IoT sensors, smartphones, and self-driving autos will be challenging. Network Equipment, Service Providers and Device Designers will need to troubleshoot never-before-seen issues in the rigorous R&D validation environment.

    Join this webinar to understand how you can reimagine wireless.
  • Viavi+Ixia: 6 Steps to Maintaining Control in the Cloud Recorded: Apr 24 2018 46 mins
    VIAVI: Casey Louisiana and Steve Brown, Ixia: Sushil Srinivasan and Greg Copeland
    When an organization moves to the cloud, IT still needs to monitor, troubleshoot, and maximize ROI. Join VIAVI and Ixia to learn the critical steps to bring the same caliber of visibility, control, and understanding of performance you enjoy with on-premises architectures to the cloud.

    Learn how to:
    • Intelligently filter and deliver data to APM solutions
    • Acquire and store data on-premises or in the cloud
    • Perform detailed analysis
    • Manage cloud providers to troubleshoot with Amazon, Azure, and more
    • Measure and report success

    An easy-to-follow troubleshooting demo shows you how VIAVI Observer® combines with the Ixia CloudLens™ visibility platform to help maintain performance while bridging the gap between your data center and the cloud.
  • ActualTech Media + Ixia: Visibility Solutions EcoCast Recorded: Oct 6 2017 34 mins
    Recep Ozdag
    In case you haven’t noticed, the enterprise network is changing, and changing fast. Traditional physical routers, switches, and firewalls are quickly being replaced by their software-defined counterparts, networks are moving to the cloud, and networks are spanning the world. How is the enterprise to not only leverage the latest network innovations but just try to keep pace? We have the answer!

    You will hear from Ixia, Cumulus Networks, Big Switch Networks and Pluribus Networks about how the latest network innovations can help your company and how to make the transition to a more efficient, more scalable, more secure, and less costly network of the future.
  • Don't Let Ransomware Keep You up at Night Recorded: Sep 28 2017 42 mins
    Chuck McAuley, Principal Security Research Engineer II, Ixia
    The proliferation of complex and resilient ransomware variants has dominated recent media headlines. This year has heralded the emergence of self-replicating, worm-like, ransomware in the form WannaCry and Petya. This class of ransomware is leveraging vulnerabilities in victim’s machines thus circumventing the need for users to mistakenly open a malicious attachment.

    Research has shown that the main perpetrators of this class of attacks are professional ransomware developers who are affiliated with well-funded criminal organizations such as the Lazarus Group. Furthermore, these types of attacks have proven themselves to be most devastating to businesses and professional organizations.

    In this Webinar, Ixia Security Researchers will discuss the current landscape of attackers, dissect couple of popular ransomware attacks and focus on the need for continuous assessment to protect your networks.
  • Privacy and Protection in the Changing World of SSL Recorded: Sep 27 2017 51 mins
    Scott Register, VP of Product Management, Ixia
    SSL encryption is one of the key enabling technologies of the Internet. We use it for e-commerce, collaborating with partners, and even email. But increasingly, encryption is also used to shield malicious activities – such as malware and ransomware downloads – from detection by network security devices.

    Join this interactive webinar to learn:
    - How the new TLS1.3 standard increases both privacy and the difficulty in detecting malware and data leak
    - Understand best practices for adapting to the changing environment
  • The 4 Keys to Understanding TLS 1.3 and Active SSL Recorded: Sep 26 2017 51 mins
    Scot Register
    As you may know, encryption is a double-edged sword—the same SSL that can protect your network can also be used by malware and other threats to hide from security and monitoring tools. Ixia’s Active SSL allows you to see these threats hidden in SSL traffic while improving network speed and security.
  • PacketPushers + Ixia: CloudLens and Cloud Visibility Recorded: Aug 9 2017 43 mins
    Ixia - Recep Ozdag, Kris Raney, and Murali Allada. PacketPushers - Greg Ferro and Ethan Banks
    Join Ixia’s Recep Ozdag—VP Product Management, Kris Raney—Sr. Architect—Cloud and Virtualization, and Murali Allada—Principal Software Engineer along with Greg Ferro, Author at Packet Pushers and Ethan Banks, Co-Founder of Packet Pushers for a podcast that covers how to access packet data in the cloud for security and monitoring.

    Their discussion begins with an overview of traditional data center visibility tools and why they cannot meet the demands of a cloud infrastructure, covers the need for security and monitoring in the cloud, the benefits of a cloud-native solution, and details how Ixia’s CloudLens platform allows you to access, filter, and forward packet data in the public cloud.
  • 3 Things to Know When Securing Mixed, Multi-Cloud Environments Recorded: Jul 21 2017 57 mins
    David Gold of ProtectWise and Scott Register of Ixia
    Enterprises cannot move to the cloud quickly enough. In fact, Gartner estimates that by 2020, “cloud-first” and “cloud-only” will be standard corporate policies rather than exceptions.
    That’s a big problem for traditional security infrastructures. There’s a hodgepodge of disparate, disconnected security products that were not made to secure the cloud. Some vendors have “cloud-washed” their products, but these deliver questionable value. In real-world situations, these products perform poorly, lack critical functionality, and cannot provide the visibility time-strapped security teams require to be effective.

    ProtectWise and Ixia make it easy to secure workloads in the cloud, including multi-cloud environments, in addition to traditional on-premises networks. Running entirely from the cloud, the ProtectWise Grid delivers pervasive visibility via automatic real-time and retrospective threat detection, long-term retention of full-fidelity packet capture (PCAP) and unlimited forensic exploration. Ixia CloudLens™ simplifies capture of network traffic from public cloud, virtual, or physical environments and delivers it to The ProtectWise Grid seamlessly. Through this integration, ProtectWise and Ixia give security teams a single solution for end-to-end visibility across heterogenous public cloud, enterprise, and hybrid environments.

    Attend this webinar and learn how easy it is to secure the cloud with the joint ProtectWise-Ixia solution and:
    Why security in mixed- and multi-cloud environments can be difficult
    How moving to the cloud limits visibility for legacy security solutions
    How a modern approach to security provides pervasive visibility
  • 4 Things Your Data Center Needs Recorded: Jun 21 2017 58 mins
    Taran Singh and Recep Ozdag
    Expanding your hyperscale data center or adding microscale data centers? Watch this webinar on-demand to learn how you can enhance visibility from core to remote sites with Ixia Vision Edge 40 and Vision Edge 100 network packet brokers (NPBs). These versatile and cost-effective NPBs will ensure better visibility and manageability for your network.
  • Monitoring and Performance EcoCast Recorded: Jun 12 2017 26 mins
    Nicolas Ribault, Product Manager
    Today’s enterprise datacenters have become so complex that even teams of experts struggle to keep critical applications running at peak performance to meet the end user expectation of the “ALWAYS ON data center. What infrastructure administrators really need are smart tools that can give them visibility across silos, through clouds, and into applications.
  • Ixia Enterprise Security EcoCast Recorded: May 11 2017 39 mins
    Scott Register, VP of Security Products
    Ixia - Bring Efficiency to Security Operations
  • Savvius + Ixia: On-Premises Visibility vs. Visibility-as-as-Service Recorded: May 9 2017 40 mins
    John Delfeld of Ixia and Nadeem Zahid od Savvius
    Mega trends such as data center consolidation, cloud migration, and migration to Infrastructure-as-a-Service (IaaS) and Software-as-a-Service (SaaS) solutions disrupt the way enterprises host and run business-critical applications.

    In this webinar you will learn how network visibility is key to the performance and security of the network and the applications that run on it. It is expected that on-premises visibility needs will increase, while the need for visibility in the cloud continues to grow and evolve. Visibility-as-a-Service (VaaS) enables organizations to access network traffic across their entire infrastructure on demand, whether that data is in a public or private cloud, branch office, campus, or data center.
  • If You Can See It, You Can Protect It: Visibility & Cybersecurity Recorded: Feb 16 2017 61 mins
    Jeff Harris, Ixia -- Glenn Chagnot, Ixia -- Zeus Kerravala, ZK Research
    Where business security is concerned, IT needs to move with speed and without hesitation. Visibility can make all the difference.

    Join our experts from Ixia and ZK Research as they discuss the critical nature of unobstructed visibility in network security. Viewers will learn:

    · The building blocks of the Digital Enterprise and Digitization

    · Why the current state of IT Security is not scalable and how businesses are falling behind

    · How Visibility can tip the Security Scales in IT’s favor by exposing persistent threats and enabling the ability to “see” insider threats.
  • Testapedia + Ixia: Test and Measurement - Five Hot Buttons for 2017 Recorded: Feb 10 2017 64 mins
    Cory Tinkess
    2017 will be a year of significant change for many operators. Efforts to virtualize network functions and increase levels of automation; projects to upgrade fixed and mobile networks with new access technologies; and the need to manage evolving types and patterns of traffic will all leading to significant infrastructure upheaval. Against this backdrop, operators still need to ensure customers are getting what they pay for, which means their test and measurement activities need to alter too. Meanwhile, the T&M industry itself is being subjected to some of these changes: for instance, replacement of hardware probes with virtual probes, and the automation of test procedures.

    This on-demand webinar will look at hot themes in test and measurement in the coming year, and what these will mean for operators.
  • Real Life Threat Reduction Recorded: Feb 9 2017 52 mins
    Scott Register
    We have all seen the headlines about major data breaches at Yahoo, the Veterans Administration, Target, Anthem, and more, but have you ever stopped to think—those companies all had firewalls, IPS, SIEMs, and security pros on staff… how did the attacks get through? With Ixia’s ThreatARMOR, you can make your firewall and security team more efficient and effective.
  • Ixia and Mentor Graphics Networking Webinar Recorded: Feb 9 2017 34 mins
    Ron Squiers and Aniket Khosla
    The integration between Mentor Graphics and IXIA offers networking customers the ability to seamlessly integrate an IXIA virtual environment into an emulation-based verification flow, bringing the powerful advantages of emulation to the lab environment. This allows the reuse of traffic flow generation scripts for greater efficiency and improved debug, faster time-to-market, and gives design teams the ability to de-risk the challenges of complex chip designs.
Ixia makes hardware, software and system applications run stronger
Ixia provides the tools and capabilities organizations can use to test, visualize and secure their networks so their applications run stronger.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Art of the Test—Is Your Network Security Ready for the Real World? (NEMs)
  • Live at: Nov 19 2014 6:30 pm
  • Presented by: Fred Kost Vice President, Security Solutions, Ixia and Vikram Phatak Chief Executive Officer, NSS Labs, Inc.
  • From:
Your email has been sent.
or close