Here’s the page we think you wanted. See search results instead:

 

Contact an Expert

Technical Support

Electronic Measurement

Support by Product Model Number:

1-25 of 1126

Sort:
Ixia’s Guide to Visibility Use Cases Removing Network Blind Spots
Unnoticed network vulnerabilities are blind spots, especially as they pertain to application reliability, performance, and security. Blind spots directly correlate to network problems and outages, increased network security risk, and potential regulatory compliance issues. Identifying blind spots by establishing greater network visibility is critical for identifying hidden threats. This paper outlines how to use network visibility to remove blind spots that reduce network issues, security risk, and compliance issues. Specific topics include: Visibility architectures expose missing and hidden data. Tap deployments improve data collection. Virtual taps reveal hidden east-west traffic in virtual data centers. Regenerating monitoring data for distribution to multiple destinations. Visibility into cloud networks. Eliminate switched port analyzer (SPAN) port overload. Reducing network complexity with visibility architectures. Cisco ACI monitoring. Visibility loss — mergers and acquisitions (M&As) network integrations. Better validation of network designs. Download this whitepaper to read about how to implement these use cases.

Case Study 2020-06-24

PDF PDF
Threat Hunting 101
While security threats in general are a consistent concern for IT departments, the specific types of security threats change over time. For instance, according to the WatchGuard Internet Security Report - Q1 2019, cyber attackers are altering their forms of security attacks that includes: an increase in malware, changes in network attacks, new Mac adware variants, and a surge in web application attacks (like XSS and SQLi). This is important because what you do not know about the security of your network really will hurt you. Since security threats are changing, this could mean that you also need to change, or at least augment, your security tactics. One tactic that has been increasing for a couple years now is to actively hunt for threats on your network. Passive security practices just aren’t good enough anymore. You need to be proactive to stop a breach, as the threats themselves have become much more sophisticated and harder to detect. Read this white paper to get an overview what you need to start a threat hunting practice and how to go about it.

Case Study 2020-06-19

PDF PDF
Inline Security and Why You Need It
Inline security solutions operate more efficiently, troubleshoot faster, and stay online longer with the right inline security architecture. Get the details you need to make the best network visibility and security architecture choices for your business. Download this white paper now to get an understanding of market drivers for inline security, how an inline architecture solves common security problems and how to implement inline security.

Case Study 2020-06-19

PDF PDF
Less Downtime and Faster Recovery
The potential cost of network downtime can run into thousands of dollars — per minute. To mitigate the effects of, or even prevent a network outage, it is critical to have a robust troubleshooting system in place that delivers complete insight into the network through a visibility architecture. To improve network reliability, organizations need to establish greater visibility of the data that flows through their networks, where it goes, and how to control it. This paper outlines how to use network visibility to reduce troubleshooting time and expense.

Case Study 2020-06-19

PDF PDF
Reduce Risk with a Better Measurement Process
Read this white paper to learn how to reduce measurement risk. Topics include contributors to measurement uncertainty and how uncertainty grows over time with an incomplete or improper calibration.

Case Study 2020-06-19

PDF PDF
Stronger Security with Network Packet Brokers
Securing a network requires more than just a menagerie of security tools. You have to ensure that your tools have effective visibility into your network and the traffic on it. Unfortunately many factors including departmental silos, virtualization, rogue IT, SPAN ports and complexity can get in the way and create blind spots. This white paper discusses ways that you can use network packet brokers to better secure your network, touching on topics including: data filtering, uptime, high availability and redundancy, tool chaining, honeypots, and SIEM integration.

Case Study 2020-06-12

PDF PDF
Regulatory Compliance and Other Networking Challenges
A top concern of corporate IT departments today is how to maintain compliance with evolving regulatory initiatives. To maintain compliance, organizations need to establish greater visibility into the data that flows through their networks, where it goes, and how to control it. They can achieve this by creating a visibility architecture, which is end-to-end infrastructure that delivers network, application, and security visibility. This visibility allows you to optimize your network data capture, data privacy, and compliance verification techniques. Deployment of data masking, network monitoring, regular expression (regex) searching, packet trimming, and lawful intercept enables organizations to better comply with local and international regulations.

Case Study 2020-06-12

PDF PDF
Deploying an Inline Security Architecture: Key Considerations
The key to efficient inline security monitoring is to enable fail-safe tool deployment, maximize traffic inspection, and protect network availability. To address these issues, many organizations are deploying a highly resilient security architecture. With this approach, you can get access to 100% of your physical and virtual network traffic, increase monitoring tool efficiency, apply security-specific intelligence to improve threat detection, and achieve near instant fail-over.

Case Study 2020-06-11

PDF PDF
Edge Computing: Four Smart Strategies for Safeguarding Security and User Experience
It is a brave new world for enterprise networks. Smart devices are getting smarter, and edge computing is emerging as a viable way to reduce latency and improve performance. But as network architectures grow increasingly amorphous, what kind of impact will this have on security and performance? Download this white paper to discover how you can boost security, ensure quality of service, and future-proof your network's edge for years to come.

Case Study 2020-06-11

PDF PDF
Best Practices and Use Cases for Network Visibility
Network visibility enables information technology (IT) teams to quickly isolate security threats and resolve performance issues, ultimately ensuring the best possible end-user experience. The easiest way to accomplish network visibility is to implement a visibility architecture—which is an end-to-end infrastructure that enables physical and virtual network, application, and security visibility. Once the architecture is in place, you can implement the various different solutions, i.e. use cases, that you need. This white paper (and the companion book The Definitive Guide to Visibility Use Cases) provide various examples of how to leverage a visibility architecture. This includes examples of how to improve network security, reduce costs, improve reliability, speed up troubleshooting, remove blind spots, optimize network performance, and strengthen regulatory compliance initiatives.

Case Study 2020-06-10

PDF PDF
Achieve Network Visibility in the Public Cloud
Organizations in every market sector are migrating to public cloud, even those not typically associated with technology. This trend is growing because of the increased flexibility and agility the cloud offers. Whether these applications are web servers or critical business apps, they must execute with the same level of performance, security, and compliance. In a traditional data center, these needs are met by providing robust monitoring with copies of the traffic that moves through your physical network infrastructure. When you move workloads to the public cloud, however, you no longer have access to that infrastructure. How can you provide your tools with the data they need--to identify active cyber threats, monitor user experience, and diagnose application issues? This white paper explains how to achieve total network visibility when you use public cloud.

Case Study 2020-06-10

PDF PDF
Waveform Generators Increase Design Efficiency
Waveform sequencing and frequency lists are unique to Trueform Series waveform generators. These capabilities make arb signal generation more flexible and workflow more efficient. With PathWave BenchVue Waveform Builder Pro, you get advanced signal-creation and editing capabilities without spending hours programming.

Case Study 2020-06-05

PDF PDF
DDR Technology Testing Solutions
High-speed technologies such as double data rate (DDR) and low-power double data rate (LPDDR) carry significant design and test challenges. DDR is a memory chip technology that has progressed through multiple generations in the past 10 years. Each DDR generation improves in speed, efficiency, and memory capacity. But as the standard allows for more data transfer at faster rates, margins decrease. Therefore, design work and testing have become more challenging. Bit error rate testers (BERTs), oscilloscopes, probes, and associated compliance software alleviate some of the challenges when working on the physical layer. For a deeper analysis of the OSI layers, logic analyzers can help you test and debug your designs for functional and protocol compliance. Depending on where you fit in the design stage (device characterization, simulation, prototype, firmware, software), here are three types of tests essential to validate the current and next-generation DDR: DDR5 receiver conformance and characterization; physical-layer and compliance testing; functional debug, analysis, and protocol compliance.

Case Study 2020-06-04

PDF PDF
Remove Resistance, Current, and Frequency Measurement Errors in DMMs
This white paper covers the types of measurement errors for resistance, DC and AC currents, including frequency and period. You will learn how to eliminate potential measurement errors to achieve the highest accuracy with a DMM.

Case Study 2020-06-04

PDF PDF
Eliminate Measurement Errors and Achieve the Greatest Accuracy Using a DMM
This white paper covers several sources of system cabling and DC voltage measurement errors and the solutions to get the accuracy you need.

Case Study 2020-06-03

PDF PDF
The New Normal: Six Keys to Optimize User Experience for Employees Working from Home
Spanning subjects such as active network monitoring and VPN performance testing, this white paper outlines six key strategies to help you optimize your network for an increasingly mobile workforce.

Case Study 2020-06-03

PDF PDF
Visibility Architecture – Eliminating Visibility and Security Blind Spots
According to ZK Research, 85% of the mean time to repair (MTTR) is the time taken to identify there is in fact, an issue. If your IT department cannot quickly identify problems, chances are they will constantly hear about issues from unhappy customers. And once the MTTR clock starts ticking, there’s no telling whether IT knows there is an issue or not. If you’re trying to ensure your networks are fast, reliable and secure through approaches that attempt to manage each aspect of their performance—from Network Ops, Application Ops, Security Admins, Server Admins, Forensics, and Privacy and Audit teams—chances are that each of these teams purchased their own set of analytics or monitoring tools. For many, these solutions have not solved the problem, leaving unidentified blind spots that remain a looming threat. In this insightful white paper, Visibility Architecture: Eliminating Visibility and Security Blind Spots, you’ll learn about a once-in-a-generation change that’s creating a shift to public and private cloud computing, virtualized networking, and the growing number of connected devices are structurally changing IT. What you will learn: First, what are the components of good visibility and security? Second, how a visibility architecture can give you 100% ROI, with vastly improved problem identification, isolation, and repair times. Third, how you can effectively comport with many compliance mandates. Fourth, achieve end-to-end visibility for both physical and virtual networks. Fifth, don’t wait for disjointed approaches to security and visibility to create an unforeseen problem. Read this white paper to get the insights you need to make better decisions.

Case Study 2020-06-02

PDF PDF
More than the Telecommunications Standard of the Future
There has been quite a bit of 5G momentum in 2017 with broadband providers, network equipment manufacturers and chipset makers teaming up to deploy or experts predict widespread adoption around 2020 or 2022. Yet that timeline is not on track, according to the businesses across the globe that are already planning—and in some cases, already deploying—5G technology for their organizations.

Case Study 2020-06-01

PDF PDF
5 Ways To Maximize the Value of Security & Monitoring Tools
Return on investment is an important factor for evaluating the value of your security infrastructure. This informative white paper, 5 Ways to Maximize the Value of Security and Monitoring Tools, guides you through the most cost-effective solutions, including the role of a visibility architecture in your network design to help maximize monitoring effectiveness.

Case Study 2020-06-01

PDF PDF
Advanced Security Intelligence with Rap Sheet Analytics
Cyber security is a top priority for almost every large enterprise in the world today. With security breaches on the rise and the threat posed to companies large and small, network and security administrators are necessarily on the alert. The good news is the growing number of tools to address these risks. One organization deeply committed to improving the state of security is the Ixia Application and Threat Intelligence (ATI) Research Center.

Case Study 2020-06-01

PDF PDF
Network Visibility: The Benefits of an Inline Solution
As part of a network visibility solution, network packet brokers and external bypass switches can greatly enhance inline deployments of firewalls, IPS and other security and monitoring tools. Learn more about failover, load balancing and other practical benefits you can enjoy by enhancing inline deployments with network visibility solutions.

Case Study 2020-06-01

PDF PDF
Fast Breach Mitigation Without Network Disruption
A recent report from Verizon revealed that nearly 68% of breaches happen over the course of several days. Ponemon Institute indicates that it is now taking longer to resolve these attacks, averaging 46 days, an increase of 30% over the last six year period in the time required to resolve it. With events like this unfolding with growing frequency, your ability to quickly mitigate a crisis begins with knowing where it occurred, and what data was compromised. This insightful white paper, Fast Breach Mitigation Without Network Disruption, examines how to capture the critical data you need, to respond more rapidly to emerging situations.

Case Study 2020-06-01

PDF PDF
Cloud Visibility Overcomes Security Limitation of Turnkey Private Cloud
For government entities, network security is mission-critical and subject to strict regulations. That is why this customer, who was deploying a turnkey private cloud platform, was concerned when they realized their provider could not supply the data needed by their threat detection and security analytics solutions. Without the ability to examine packets for potential threats, their new private cloud would present a considerable risk to their network. In search of a solution to provide access to packet data, this government customer turned to Ixia, who worked alongside their security solutions provider to deploy a total cloud visibility solution and eliminate this serious security issue.

Case Study 2020-05-31

PDF PDF
Cook Children’s Healthcare System Improves Application Experience Using Network Intelligence
Cook Children's Health Care System is a not-for-profit, nationally recognized pediatric health care organization that operates a medical center, physician network, hospital, pediatric surgery center and health plan. Founded in 1918 and based in Fort Worth, Texas, the integrated system has more than 60 primary and specialty care offices throughout North Texas. They needed to improve their network visibility and monitoring practices to solve application performance and SPAN port contention issues. Read this case study to learn how they reduced their mean time to repair for network issues from days to hours and increased monitoring tool efficiency.

Case Study 2020-05-31

PDF PDF
High Traffic and Need for Security and Visibility Spur 100GE Redesign
The University of Texas at Austin must monitor and manage traffic to guard against increasing cyber threats. Ixia provided a solution that will save the university 20–30% on IDS capacity and improve end-to-end network visibility and security.

Case Study 2020-05-30

PDF PDF

1 2 3 4 5 6 7 8 9 10 ... Next