- What challenges exist around operationalizing security protection
- How to boost the performance of customers’ security investments while lowering overhead
- How to minimize your exposure to the Internet Threat Landscape
RecordedDec 9 201555 mins
Your place is confirmed, we'll send you email reminders
In case you haven’t noticed, the enterprise network is changing, and changing fast. Traditional physical routers, switches, and firewalls are quickly being replaced by their software-defined counterparts, networks are moving to the cloud, and networks are spanning the world. How is the enterprise to not only leverage the latest network innovations but just try to keep pace? We have the answer!
You will hear from Ixia, Cumulus Networks, Big Switch Networks and Pluribus Networks about how the latest network innovations can help your company and how to make the transition to a more efficient, more scalable, more secure, and less costly network of the future.
Chuck McAuley, Principal Security Research Engineer II, Ixia
The proliferation of complex and resilient ransomware variants has dominated recent media headlines. This year has heralded the emergence of self-replicating, worm-like, ransomware in the form WannaCry and Petya. This class of ransomware is leveraging vulnerabilities in victim’s machines thus circumventing the need for users to mistakenly open a malicious attachment.
Research has shown that the main perpetrators of this class of attacks are professional ransomware developers who are affiliated with well-funded criminal organizations such as the Lazarus Group. Furthermore, these types of attacks have proven themselves to be most devastating to businesses and professional organizations.
In this Webinar, Ixia Security Researchers will discuss the current landscape of attackers, dissect couple of popular ransomware attacks and focus on the need for continuous assessment to protect your networks.
SSL encryption is one of the key enabling technologies of the Internet. We use it for e-commerce, collaborating with partners, and even email. But increasingly, encryption is also used to shield malicious activities – such as malware and ransomware downloads – from detection by network security devices.
Join this interactive webinar to learn:
- How the new TLS1.3 standard increases both privacy and the difficulty in detecting malware and data leak
- Understand best practices for adapting to the changing environment
As you may know, encryption is a double-edged sword—the same SSL that can protect your network can also be used by malware and other threats to hide from security and monitoring tools. Ixia’s Active SSL allows you to see these threats hidden in SSL traffic while improving network speed and security.
Ixia - Recep Ozdag, Kris Raney, and Murali Allada. PacketPushers - Greg Ferro and Ethan Banks
Join Ixia’s Recep Ozdag—VP Product Management, Kris Raney—Sr. Architect—Cloud and Virtualization, and Murali Allada—Principal Software Engineer along with Greg Ferro, Author at Packet Pushers and Ethan Banks, Co-Founder of Packet Pushers for a podcast that covers how to access packet data in the cloud for security and monitoring.
Their discussion begins with an overview of traditional data center visibility tools and why they cannot meet the demands of a cloud infrastructure, covers the need for security and monitoring in the cloud, the benefits of a cloud-native solution, and details how Ixia’s CloudLens platform allows you to access, filter, and forward packet data in the public cloud.
David Gold of ProtectWise and Scott Register of Ixia
Enterprises cannot move to the cloud quickly enough. In fact, Gartner estimates that by 2020, “cloud-first” and “cloud-only” will be standard corporate policies rather than exceptions.
That’s a big problem for traditional security infrastructures. There’s a hodgepodge of disparate, disconnected security products that were not made to secure the cloud. Some vendors have “cloud-washed” their products, but these deliver questionable value. In real-world situations, these products perform poorly, lack critical functionality, and cannot provide the visibility time-strapped security teams require to be effective.
ProtectWise and Ixia make it easy to secure workloads in the cloud, including multi-cloud environments, in addition to traditional on-premises networks. Running entirely from the cloud, the ProtectWise Grid delivers pervasive visibility via automatic real-time and retrospective threat detection, long-term retention of full-fidelity packet capture (PCAP) and unlimited forensic exploration. Ixia CloudLens™ simplifies capture of network traffic from public cloud, virtual, or physical environments and delivers it to The ProtectWise Grid seamlessly. Through this integration, ProtectWise and Ixia give security teams a single solution for end-to-end visibility across heterogenous public cloud, enterprise, and hybrid environments.
Attend this webinar and learn how easy it is to secure the cloud with the joint ProtectWise-Ixia solution and:
Why security in mixed- and multi-cloud environments can be difficult
How moving to the cloud limits visibility for legacy security solutions
How a modern approach to security provides pervasive visibility
Expanding your hyperscale data center or adding microscale data centers? Watch this webinar on-demand to learn how you can enhance visibility from core to remote sites with Ixia Vision Edge 40 and Vision Edge 100 network packet brokers (NPBs). These versatile and cost-effective NPBs will ensure better visibility and manageability for your network.
Today’s enterprise datacenters have become so complex that even teams of experts struggle to keep critical applications running at peak performance to meet the end user expectation of the “ALWAYS ON data center. What infrastructure administrators really need are smart tools that can give them visibility across silos, through clouds, and into applications.
Mega trends such as data center consolidation, cloud migration, and migration to Infrastructure-as-a-Service (IaaS) and Software-as-a-Service (SaaS) solutions disrupt the way enterprises host and run business-critical applications.
In this webinar you will learn how network visibility is key to the performance and security of the network and the applications that run on it. It is expected that on-premises visibility needs will increase, while the need for visibility in the cloud continues to grow and evolve. Visibility-as-a-Service (VaaS) enables organizations to access network traffic across their entire infrastructure on demand, whether that data is in a public or private cloud, branch office, campus, or data center.
2017 will be a year of significant change for many operators. Efforts to virtualize network functions and increase levels of automation; projects to upgrade fixed and mobile networks with new access technologies; and the need to manage evolving types and patterns of traffic will all leading to significant infrastructure upheaval. Against this backdrop, operators still need to ensure customers are getting what they pay for, which means their test and measurement activities need to alter too. Meanwhile, the T&M industry itself is being subjected to some of these changes: for instance, replacement of hardware probes with virtual probes, and the automation of test procedures.
This on-demand webinar will look at hot themes in test and measurement in the coming year, and what these will mean for operators.
We have all seen the headlines about major data breaches at Yahoo, the Veterans Administration, Target, Anthem, and more, but have you ever stopped to think—those companies all had firewalls, IPS, SIEMs, and security pros on staff… how did the attacks get through? With Ixia’s ThreatARMOR, you can make your firewall and security team more efficient and effective.
The integration between Mentor Graphics and IXIA offers networking customers the ability to seamlessly integrate an IXIA virtual environment into an emulation-based verification flow, bringing the powerful advantages of emulation to the lab environment. This allows the reuse of traffic flow generation scripts for greater efficiency and improved debug, faster time-to-market, and gives design teams the ability to de-risk the challenges of complex chip designs.
Communications networks are being virtualized because virtualization provides remarkable benefits. Virtualization complicates operations, however. The responsibility for dealing with many of those complications falls on test & measurement companies.
Even some of the network operators who are virtualizing as quickly as technology allows have not anticipated some of these issues. In this one-hour discussion, four leading T&M companies will not only identify the hidden pitfalls of virtualization, but talk about some of the best ways to side-step them. Industry collaboration is key to developing NFV testing and validation techniques that provide carriers with the assurance needed to move virtualization technologies from the lab to production. The importance of active, software-based test and service assurance becomes even greater as operators must ensure that their services are delivered right the first time and any issues can be detected in real-time in an end-to-end manner. Automation will be a key enabler of service agility. And at the end of the day -- or more accurately, at the edge of a virtualized network -- signal integrity will remain critical.
You can't have network security monitoring without visibility to network data. You can't have visibility without context or you risk overwhelming security tools with irrelevant traffic. You can't add context to data without the performance to apply it at line rate. And you can't have performance without resilience to protect security tools and paths.
In this webinar, we will show how to combine the four keys to improving security threat detection into a Security Fabric to deliver greater context and intelligent distribution to monitored traffic. You will learn how to create actionable threat intelligence specific to your organization and increase the value of your existing security tool infrastructure.
What if you could learn about the various cloud models and also gain insight into some of the leading products in each of those models? That’s exactly what you’ll get with the 2016 ActualTech Media Cloud MegaCast
This is your unique opportunity to learn about:
-What’s happening in across the cloud spectrum
-Solutions to some of your most complex data center issues
-Seven leading vendors how they’re driving positive outcomes for their customers.
Today’s networks are increasingly powerful and diverse but can suffer from significant blind spots making them difficult to audit and verify traffic. All too often, seemingly inexpensive solutions end up being unreliable or costly to deploy, or they do not scale as the organization grows.
You need 100% data access and visibility, and the intelligence to evaluate vast volumes of network traffic, without slowing or disrupting your network. A resilient security fabric does all this and helps scale your security infrastructure as needs change.
Your security architecture was designed to protect your business, but does it have the resiliency to deliver results in the event something doesn’t go as planned? Resiliency is attainable – even on a budget – when you take it step by step.