Hi [[ session.user.profile.firstName ]]

Ixia Application and Threat Intelligence Processor

The Application and Threat Intelligence (ATI) Processor delivers real-time application data to monitoring tools so that customers can be empowered to make better decisions with better data.
Recorded Dec 2 2014 4 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Keith Bromley
Presentation preview: Ixia Application and Threat Intelligence Processor

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Five Ways to Maximize the Value of Security and Monitoring Tools Recorded: Sep 19 2016 56 mins
    Lora O'Haver and Keith Bromley
    Webinar on extending the life of security and monitoring tools.
  • Ixia Security MegaCast Recorded: Sep 13 2016 31 mins
    Scott Register
    A video presenting the solutions Ixia can offer in Network Security
  • Increase the Return on your Next Gen Firewall in 2016 and Beyond Recorded: Aug 12 2016 29 mins
    Lora O'Haver and Roark Pollock
    Upgrading your Firewall? It's Time for an Inline Security Fabric
  • Evaluating Inline Security Fabric Solutions Recorded: Aug 4 2016 30 mins
    Lora O'Haver and Jeff Harris
    Learn the key aspects of a high-performing security fabric—one that protects network availability and increases the inspection of traffic.
  • You Can't Protect What You Can't See Recorded: Apr 5 2016 61 mins
    Jeff Harris, Ixia -- Glenn Chagnot, Ixia -- Zeus Kerravala, ZK Research
    Where business security is concerned, IT needs to move with speed and without hesitation. Visibility can make all the difference. Join Ixia experts and industry analyst Zeus Kerravala of ZK Research for our upcoming webinar.
  • The Next Big Thing in Security Recorded: Dec 9 2015 55 mins
    Kushar Perera, Senior Product Manager, DNA and Peter Bahas, Senior Systems Engineer, Ixia
    - What challenges exist around operationalizing security protection
    - How to boost the performance of customers’ security investments while lowering overhead
    - How to minimize your exposure to the Internet Threat Landscape
  • What's on Tap Recorded: Dec 2 2015 60 mins
    Jason Landry (Ixia Sr. Manager, Solutions Marketing), Jonathan Petkevich (Product Mgr) and Rich Higgins (Master Cicerone)
    Discover some network monitoring tool tap varieties, then stay for some beer varieties! In the first half of this event, we will show you the different types of network taps along with some details on how they work, when to use them, and what varieties they come in. For the second half, Master Cicerone Rich Higgins will explore the who, what, where, why, and how of what is poured from a beer tap—including beer styles, regions, seasons, and much more.
  • Are Network Operations Teams Missing Out On Application Intelligence? Recorded: Jul 22 2015 37 mins
    Scott Register, Senior Director, Product Management - Ixia
    As enterprise network bandwidth explodes, security threats become more persistent and subtle. Corporate revenue depends on application delivery, and deep network visibility becomes indispensable. The challenge is delivering actionable insight without enormous tool expenditure. Join us to learn how you can gain rapid, meaningful network visibility through Ixia’s application intelligence solution.

    In this live session you will learn:
    • How to isolate issues using L2-7 filtering and Netflow
    • How to deal with the increase in encrypted traffic
    • How Ixia can help you reduce expense and use your tools more effectively

    Register now to reserve your spot.
  • Quantifying the Performance vs. Security Tradeoff in Today’s Encrypted World Recorded: Jun 17 2015 36 mins
    Daniel Munteanu, Product Specialist - Ixia
    While encrypted communication is gaining momentum, are you fully aware of all its implications? Will your networks and services still be able to keep up with the required load and demand once a new security policy was deployed? Join our TechTalk to find out how to assess the performance and security effectiveness of an encrypted environment and its different characteristics.

    In this webinar we will cover:
    • Encryption – where and how it is being used
    • Commonly faced challenges in today`s highly encrypted environments
    • Demo: show you how to validate performance and security resiliency under real world encrypted traffic and attacks.

    Register now to reserve your spot.
  • The Best Kept Secret to Maximizing Network Security Recorded: May 18 2015 51 mins
    Keith Bromley - Ixia, Sr. Product Mktg Mgr and John Kindervag - Forrester Research Inc., VP, Principal Analyst
    One of the biggest challenges for IT staff today is to get the proper
    network information they need, when they need it so that they can make informed decisions about network security and problem resolution. Proper network visibility is the solution. Without this visibility, how do you know that you haven’t been breached? If you have been breached, what was affected? This webinar will provide you with an overview of the value that proper data acquisition can bring to your network security and the basics of how to implement network monitoring correctly. With the proper visibility architecture in place, you’ll be able to see what is (and what is not) happening on your network.

    Join leaders at Ixia and our featured guest speaker from Forrester Research in this live webinar to find out:

    · What a data acquisition network is and why you need one
    · The benefits of merging your security architecture with a data
    acquisition network/visibility architecture
    · Examples of what the merged architectures look like
    · How to optimize your security network by using a life cycle

    Bonus: All seminar attendees will receive a free copy of Ixia’s new eBook, “How To Secure Your Network Through Its Life Cycle.”

    If you provide your (ISC)2 ID certificate number when you register for the webinar, your CPE credit will automatically be added to your (ISC)2 account within 4-6 weeks.
  • Hold Your Service Provider Accountable - Verify New WAN Access Readiness Recorded: May 6 2015 38 mins
    Nicolas Ribault - Ixia, Product Manager
    When deploying new WAN access to connect business-critical sites or data centers, you want to have full knowledge of the service level delivered by your provider. In this webinar, we'll show you how to get visibility of service delivery quality, discover potential performance issues, and quickly gather irrefutable data on whether your service provider delivery is meeting SLA guarantees.

    Join our live Tech Talk to learn how to:

    •Assess network service QoS at delivery time with Ixia's IxChariot software endpoints

    •Make this process cost efficient and easy to communicate back to your service provider

    •Not only measure throughput, but also qualify network delay/jitter/loss and readiness for advanced services like voice or unified communications

    Register now to reserve your spot today.
  • Tech Talk LIVE!: Validate Website DDoS Defense Recorded: Mar 31 2015 38 mins
    Phil Trainor, Manager, Product Management - Ixia
    Practice Makes Perfect When Defending Against DDoS Attacks

    DDoS attacks have been on the rise, especially hard-to-detect Layer 7 attacks that take down websites via resource exhaustion. Take the guesswork out of defending against these attacks by validating your DDoS defense effectiveness using realistic scenarios of real-world users and attacker behavior at scale.

    In this webinar, we will analyze and discuss the techniques and technology necessary to validate defenses against DDoS attacks:
    • Take a deep dive into multi-vector DoS attack strategies
    • Learn how to attack yourself in a controlled, safe environment
    • Create a DDoS Range to test your network defenses, personnel, and incident playbook

    Register now to reserve your spot.
  • WEBINAR: Transforming Network Security with a Life-Cycle Approach Recorded: Feb 18 2015 59 mins
    Keith Bromley, Product Marketing Manager - Ixia & Douglas Hurd, Technical Alliances Manager - Cisco
    Of the largest security breaches ever recorded, 40% occurred in 2013. Is your network resilient enough to defend against these attacks? The webinar, “Transforming Network Security with a Life-Cycle Approach,” shows you how to bolster your network security defenses by using a fresh approach to create a resilient architecture.

    Join leaders at Ixia and Cisco in this live webinar to find out:
    • What a network life-cycle approach to enterprise security is and its benefits
    • How to realize the benefits of a life-cycle approach
    • How Cisco strengthens your network security defenses

    Bonus: All seminar attendees will receive a free copy of Ixia’s new eBook, “How To Secure Your Network Through Its Life Cycle.”

    If you provide your (ISC)2 ID certificate number when you register for the webinar, your CPE credit will automatically be added to your (ISC)2 account within 4-6 weeks.
  • Not sure how that new security device will perform in your network? Recorded: Dec 23 2014 34 mins
    Don Shin
    We’ll Tell You Things Their Data Sheet Won't... Hear about how to best manage the adoption of new security technology by getting the information you need to know how it will impact your network before you buy or implement it.

    This on-demand webinar is available now! Hear about how to best manage the adoption of new security technology by getting the information you need to know how it will impact your network before you buy or implement it.
  • The Real ROI for Network Visibility Webinar Recorded: Dec 19 2014 54 mins
    Andre Kindness, Principal Analyst, Forrester Research, Inc. & Keith Bromley, Product Marketing Manager, Ixia
    Join Ixia and our featured guest from Forrester Research in a webinar discussion
    This discussion will provide:
    - A quick overview of the network visibility market situation
    - A list of questions executives commonly have regarding network visibility
    - Tips on how to use ROI to address executive questions
    - The sources of ROI for network visibility and network packet brokers
    - Examples from Ixia of real world ROI savings from our customers
  • Achieving Optimal Virtualized Server Performance for NFV in the Carrier Cloud Recorded: Dec 6 2014 67 mins
    Michael Haugh, Ixia | Wenjing Chu, Dell | Yann Rapaport 6WIND
    The challenge for carriers is moving NFV solutions from the lab to live deployment. Solutions must be carrier-grade, which means predictable performance and portable within the carrier cloud.

    Join leaders at Ixia, Dell and 6WIND in this On-Demand webinar:
    - Understand challenges carriers face using NFV to deliver network scale, performance, and elasticity
    - How to test NFV in the lab and assess and monitor in the live network
    - Learn about the latest compute platform and how it is used to build cloud solutions from Dell
    - How to accelerate a virtualized server to attain industry leading performance
  • Monitoring in a Virtual Data Center Recorded: Dec 4 2014 61 mins
    Ixia and Corvil
    Over 70% of data centers are attacked each year. At the same time, up to 80% of the inter-VM ("east-west") traffic in a virtualized data center never reaches the physical network, where it can be monitored. This means that substantial part of your data center is hidden from you and a "blind spot" but could be visible and vulnerable to attackers. This webinar, "Monitoring in a Virtual Data Center" shows you how to gain visibility to protect yourself while optimizing network performance.
  • Is Your Network Ready for Unified Communications? Recorded: Dec 3 2014 42 mins
    Nicolas Ribault, Product Manager at Ixia
    xia, the network testing experts, will demonstrate how to overcome the challenges of verifying networks that are ready for transporting critical Unified Communications (UC) traffic.

    Key Topics for Discussion
    - Pitfalls to avoid for delivering optimal real-time services
    - Proven methodologies for assessing network readiness for UC
    - Measuring and monitoring key performance indicators for successful UC
    - Real-world examples
  • Ixia Application and Threat Intelligence Processor Recorded: Dec 2 2014 4 mins
    Keith Bromley
    The Application and Threat Intelligence (ATI) Processor delivers real-time application data to monitoring tools so that customers can be empowered to make better decisions with better data.
  • What is a Virtual Tap Recorded: Dec 1 2014 3 mins
    David Pham
    Watch this video to find out how a virtual tap can improve your network security and performance.
Ixia makes hardware, software and system applications run stronger
Ixia provides the tools and capabilities organizations can use to test, visualize and secure their networks so their applications run stronger.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ixia Application and Threat Intelligence Processor
  • Live at: Dec 2 2014 7:50 pm
  • Presented by: Keith Bromley
  • From:
Your email has been sent.
or close