Here’s the page we think you wanted. See search results instead:

 

Discutez avec un expert

Support technique

Electronic Measurement

Support by Product Model Number:

Refine the List

retirer tout le raffinement

By Industry/Technology

By Type of Content

Par catégorie de produit

1-25 of 1952

Sort:
TDECQ Part II Manufacturing Test Recommendations
This document gives an overview of the adoption of TDECQ in manufacturing tests, and how to efficiently automate FlexDCA for making TDECQ measurements.

Case Study 2020-07-02

PDF PDF
Stronger Security with Network Packet Brokers
Securing a network requires more than just a menagerie of security tools. You have to ensure that your tools have effective visibility into your network and the traffic on it. Unfortunately, many factors including departmental silos, virtualization, rogue IT, SPAN ports and complexity can get in the way and create blind spots. This white paper discusses ways that you can use network packet brokers to better secure your network, touching on topics including data filtering, uptime, high availability and redundancy, tool chaining, honeypots, and SIEM integration.

Case Study 2020-07-01

PDF PDF
The ABCs of Inline Security
Network security is one of today's most important IT functions. Inline security, specifically, refers to solutions deployed in the flow of live network traffic and used to identify and prevent cyberattacks and other security incidents. The goal of this book is to clarify the most frequently encountered concepts of inline security and be a resource as you develop your network security architecture. For each of the 20 terms included, we provide a simple definition, common use cases, and important considerations for deployment. With a better understanding of the concepts of inline security, we hope you will find it easier to strengthen your defenses and protect your organization's assets.

eBook 2020-06-30

PDF PDF
The 5 C's of IoT
Many individuals and organizations use IoT devices to increase productivity and profit. While IoT devices offer great convenience, having large numbers of them in a small space increases complexity in device design, test, performance, and security. Testing these devices is one of the biggest challenges today’s design engineers and device manufacturers face. Learn about testing the 5 C's of IoT through this eBook.

eBook 2020-06-26

PDF PDF
5 Ways to Improve ROI with Network Packet Brokers
A compelling ROI analysis is the difference between a successfully-funded IT project, and one that gets canceled. This is especially true for relatively new technologies that are not well understood by IT management. By reading this eBook, you will learn five different ways you can use network packet brokers (NPBs) to improve your network architecture ROI: expedite troubleshooting, detect breaches faster, reduce the processing burden on your existing tools, extend tool life after a network upgrade, and streamline regulatory compliance.

eBook 2020-06-25

PDF PDF
Ixia’s Guide to Visibility Use Cases Removing Network Blind Spots
Unnoticed network vulnerabilities are blind spots, especially as they pertain to application reliability, performance, and security. Blind spots directly correlate to network problems and outages, increased network security risk, and potential regulatory compliance issues. Identifying blind spots by establishing greater network visibility is critical for identifying hidden threats. This paper outlines how to use network visibility to remove blind spots that reduce network issues, security risk, and compliance issues. Specific topics include: Visibility architectures expose missing and hidden data. Tap deployments improve data collection. Virtual taps reveal hidden east-west traffic in virtual data centers. Regenerating monitoring data for distribution to multiple destinations. Visibility into cloud networks. Eliminate switched port analyzer (SPAN) port overload. Reducing network complexity with visibility architectures. Cisco ACI monitoring. Visibility loss — mergers and acquisitions (M&As) network integrations. Better validation of network designs. Download this whitepaper to read about how to implement these use cases.

Case Study 2020-06-24

PDF PDF
How to Select Your Next Oscilloscope: 12 Tips on What to Consider Before You Buy
How to select an oscilloscope to meet your specific measurement needs and budget is an important task. Read this oscilloscope selection guide first.

Case Study 2020-06-24

PDF PDF
How to Test and Troubleshoot USB4
USB4 is a hardware interface that supports several protocols through the USB Type-C connector. Based on the Thunderbolt protocol specification, the USB4 architecture doubles the bandwidth of USB and enables multiple simultaneous data and display protocols.

Case Study 2020-06-23

PDF PDF
Less Downtime and Faster Recovery
The potential cost of network downtime can run into thousands of dollars — per minute. To mitigate the effects of, or even prevent a network outage, it is critical to have a robust troubleshooting system in place that delivers complete insight into the network through a visibility architecture. To improve network reliability, organizations need to establish greater visibility of the data that flows through their networks, where it goes, and how to control it. This paper outlines how to use network visibility to reduce troubleshooting time and expense.

Case Study 2020-06-19

PDF PDF
Ixia’s Guide to Visibility Use Cases – Cost Containment
As networks grow and become increasingly complex, the cost to maintain those networks increases. Learn how you can increase efficiency and reduce costs by deploying a visibility architecture that reveals where blind spots occur. This paper outlines key network monitoring topics that can help you detect and minimize network inefficiencies as well as reduce monitoring costs.

Case Study 2020-06-19

PDF PDF
Inline Security and Why You Need It
Inline security solutions operate more efficiently, troubleshoot faster, and stay online longer with the right inline security architecture. Get the details you need to make the best network visibility and security architecture choices for your business. Download this white paper now to get an understanding of market drivers for inline security, how an inline architecture solves common security problems and how to implement inline security.

Case Study 2020-06-19

PDF PDF
Increasing Visibility with Ixia’s Vision ONE(TM)
SANS conducted a review of the Ixia Vision ONE network packet broker (NPB). The product was put into multiple different configurations and then tested to see if the functionality behaved as stated. This examination not only included basic functions but also included advanced application deployments like inline architectures, TLS/SSL decryption, application-level detection and filtering, and NetFlow generation. See for yourself what SANS had to say about the Ixia solution.

Article 2020-06-19

PDF PDF
Threat Hunting 101
While security threats in general are a consistent concern for IT departments, the specific types of security threats change over time. For instance, according to the WatchGuard Internet Security Report - Q1 2019, cyber attackers are altering their forms of security attacks that includes: an increase in malware, changes in network attacks, new Mac adware variants, and a surge in web application attacks (like XSS and SQLi). This is important because what you do not know about the security of your network really will hurt you. Since security threats are changing, this could mean that you also need to change, or at least augment, your security tactics. One tactic that has been increasing for a couple years now is to actively hunt for threats on your network. Passive security practices just aren’t good enough anymore. You need to be proactive to stop a breach, as the threats themselves have become much more sophisticated and harder to detect. Read this white paper to get an overview what you need to start a threat hunting practice and how to go about it.

Case Study 2020-06-19

PDF PDF
Reduce Risk with a Better Measurement Process
Read this white paper to learn how to reduce measurement risk. Topics include contributors to measurement uncertainty and how uncertainty grows over time with an incomplete or improper calibration.

Case Study 2020-06-19

PDF PDF
Enterprise Challenges with Network Visibility: Requirements, Considerations, and Use Cases
Enterprises have specific needs to secure and manage the nervous system of their IT system—which is their network. Network visibility helps ensure application performance because most applications are highly dependent on the network. Compliance, auditing, and security requirements demand visibility into how IT resources interoperate, and network visibility is required to gain insights into how well they are functioning. If IT organizations do not have complete network visibility, the resulting blind spots may lead to missing critical security threats and availability or performance anomalies. This ESG White Paper describes how network visibility provides insight into the biggest challenges facing IT, as reported in ESG’s annual research.

Article 2020-06-15

PDF PDF
Regulatory Compliance and Other Networking Challenges
A top concern of corporate IT departments today is how to maintain compliance with evolving regulatory initiatives. To maintain compliance, organizations need to establish greater visibility into the data that flows through their networks, where it goes, and how to control it. They can achieve this by creating a visibility architecture, which is end-to-end infrastructure that delivers network, application, and security visibility. This visibility allows you to optimize your network data capture, data privacy, and compliance verification techniques. Deployment of data masking, network monitoring, regular expression (regex) searching, packet trimming, and lawful intercept enables organizations to better comply with local and international regulations.

Case Study 2020-06-12

PDF PDF
Deploying an Inline Security Architecture: Key Considerations
The key to efficient inline security monitoring is to enable fail-safe tool deployment, maximize traffic inspection, and protect network availability. To address these issues, many organizations are deploying a highly resilient security architecture. With this approach, you can get access to 100% of your physical and virtual network traffic, increase monitoring tool efficiency, apply security-specific intelligence to improve threat detection, and achieve near instant fail-over.

Case Study 2020-06-11

PDF PDF
Edge Computing: Four Smart Strategies for Safeguarding Security and User Experience
It is a brave new world for enterprise networks. Smart devices are getting smarter, and edge computing is emerging as a viable way to reduce latency and improve performance. But as network architectures grow increasingly amorphous, what kind of impact will this have on security and performance? Download this white paper to discover how you can boost security, ensure quality of service, and future-proof your network's edge for years to come.

Case Study 2020-06-11

PDF PDF
Achieve Network Visibility in the Public Cloud
Organizations in every market sector are migrating to public cloud, even those not typically associated with technology. This trend is growing because of the increased flexibility and agility the cloud offers. Whether these applications are web servers or critical business apps, they must execute with the same level of performance, security, and compliance. In a traditional data center, these needs are met by providing robust monitoring with copies of the traffic that moves through your physical network infrastructure. When you move workloads to the public cloud, however, you no longer have access to that infrastructure. How can you provide your tools with the data they need--to identify active cyber threats, monitor user experience, and diagnose application issues? This white paper explains how to achieve total network visibility when you use public cloud.

Case Study 2020-06-10

PDF PDF
Best Practices and Use Cases for Network Visibility
Network visibility enables information technology (IT) teams to quickly isolate security threats and resolve performance issues, ultimately ensuring the best possible end-user experience. The easiest way to accomplish network visibility is to implement a visibility architecture—which is an end-to-end infrastructure that enables physical and virtual network, application, and security visibility. Once the architecture is in place, you can implement the various different solutions, i.e. use cases, that you need. This white paper (and the companion book The Definitive Guide to Visibility Use Cases) provide various examples of how to leverage a visibility architecture. This includes examples of how to improve network security, reduce costs, improve reliability, speed up troubleshooting, remove blind spots, optimize network performance, and strengthen regulatory compliance initiatives.

Case Study 2020-06-10

PDF PDF
Waveform Generators Increase Design Efficiency
Waveform sequencing and frequency lists are unique to Trueform Series waveform generators. These capabilities make arb signal generation more flexible and workflow more efficient. With PathWave BenchVue Waveform Builder Pro, you get advanced signal-creation and editing capabilities without spending hours programming.

Case Study 2020-06-05

PDF PDF
DDR Technology Testing Solutions
High-speed technologies such as double data rate (DDR) and low-power double data rate (LPDDR) carry significant design and test challenges. DDR is a memory chip technology that has progressed through multiple generations in the past 10 years. Each DDR generation improves in speed, efficiency, and memory capacity. But as the standard allows for more data transfer at faster rates, margins decrease. Therefore, design work and testing have become more challenging. Bit error rate testers (BERTs), oscilloscopes, probes, and associated compliance software alleviate some of the challenges when working on the physical layer. For a deeper analysis of the OSI layers, logic analyzers can help you test and debug your designs for functional and protocol compliance. Depending on where you fit in the design stage (device characterization, simulation, prototype, firmware, software), here are three types of tests essential to validate the current and next-generation DDR: DDR5 receiver conformance and characterization; physical-layer and compliance testing; functional debug, analysis, and protocol compliance.

Case Study 2020-06-04

PDF PDF
Remove Resistance, Current, and Frequency Measurement Errors in DMMs
This white paper covers the types of measurement errors for resistance, DC and AC currents, including frequency and period. You will learn how to eliminate potential measurement errors to achieve the highest accuracy with a DMM.

Case Study 2020-06-04

PDF PDF
Eliminate Measurement Errors and Achieve the Greatest Accuracy Using a DMM
This white paper covers several sources of system cabling and DC voltage measurement errors and the solutions to get the accuracy you need.

Case Study 2020-06-03

PDF PDF
The New Normal: Six Keys to Optimize User Experience for Employees Working from Home
Spanning subjects such as active network monitoring and VPN performance testing, this white paper outlines six key strategies to help you optimize your network for an increasingly mobile workforce.

Case Study 2020-06-03

PDF PDF

1 2 3 4 5 6 7 8 9 10 ... Next