New Test Asset Optimisation Services dramatically improves return on test investment and decreases capital and operating expenses for equipment used in R&D and manufacturing
Sydney, Australia – Keysight Technologies, Inc. (NYSE: KEYS), a leading technology company that helps enterprises, service providers, and governments accelerate innovation to connect and secure the world, announced Test Asset Optimisation Services, the industry’s first integrated solution that measures in real-time, asset true utilisation and health.
Keysight’s Test Asset Optimisation Services eliminate the need for companies to assign personnel to manually record when instruments are in use and making measurements. Test Asset Optimisation Services enables customers to dramatically improve return on investments by optimising capital and operating expenses to meet test demands in research and development through manufacturing.
Test budgets are often insufficient to fund projects, yet test departments are pressured to do more with less, which makes full transparency on test equipment critical. Keysight understands these pressures and is introducing Test Asset Optimisation Services to help companies move from just tracking their test equipment to gaining full control over their test equipment.
Read more ❯
CloudStorm 25GE offers testing of converged multi-play services, application delivery, and network security platforms for hyperscale data centres, enterprises and network equipment manufacturers.
Sydney, Australia – Ixia, a Keysight Business and leading provider of network testing, visibility, and security solutions, announced CloudStorm 25GE, an extension of the award-winning CloudStorm network security test portfolio. CloudStorm 25GE is the first cloud-scale, high density application delivery and network security test platform specially designed for hyperscale data centres, enterprises and network equipment manufacturers (NEMs) adopting 25-Gigabit technology to satisfy growing bandwidth demands while ensuring high-quality application delivery and mitigating security risks.
An all encrypted world may not be far away. According to Gartner, “through 2019, more than 80% of enterprises’ web traffic will be encrypted.”1 The scale of traffic continues to grow at an exponential rate along with the move to cloud architectures and growth of IoT. To keep pace, network equipment manufacturers must develop solutions to meet these growing requirements, and hyperscale data centre operators and enterprises are grappling with the need to strike the right balance between efficiency, performance and security.
Read more ❯
Sydney, Australia – Ixia, a Keysight Business and leading provider of network test, visibility and security solutions, announced its new Network Visibility Operating System (NVOS) solution, a software version of Ixia’s network packet broker (NPB) product that allows Ixia’s NPB’s patented, feature rich capabilities to run on open networking switches, such as those from Edgecore Networks. NVOS embraces the movement of disaggregating software and hardware in software defined data center (SDDC) networks.
NPBs aggregate, filter, and load-balance network packet data to seamlessly and efficiently deliver that packet data to security, forensics, and performance management tools. Ixia’s NVOS is a software solution that transforms open switches into NPBs, providing rack and data center level visibility. It offers complete access to network packets to facilitate real-time visibility, insight, and security for high density hyperscale, microscale, and SDDC networks, even as they expand.
“New approaches for pervasive network visibility in web scale and software-defined data centers are enabling cloud service providers, telecom service providers and enterprises to gain deeper, valuable insights into network services using increasingly cost-effective and flexible approaches,” said Jeff Catlin, VP Technology, Edgecore Networks. “Edgecore is pleased to collaborate with Ixia, to enable customers to benefit from Ixia’s Network Visibility Operation System (NVOS) on Edgecore’s open networking switches, as a feature-rich and powerful visibility platform for these modern disaggregated cloud and telecom infrastructures.”
Read more ❯
Sydney, Australia– Ixia, a Keysight Business and leading provider of network testing, visibility, and security solutions, announced BreakingPoint Cloud, a software as a service (SaaS) solution that safely models data breaches and threat vectors to deliver quantifiable evidence and immediate insight into the effectiveness of cloud-based data and application security, whether private, public, or hybrid.
Enterprises continue to move workloads to the cloud, while implementing a hybrid enterprise model in the interim. While the cloud offers unprecedented flexibility, it also expands the network perimeter and attack surface. Data is being sent to the cloud, worked on in the cloud, and stored in the cloud, and according to Forbes, cloud applications will account for 90 percent of worldwide mobile data traffic by 2019. However, in a recent survey commissioned by Ixia, over 90 percent of respondents were concerned about data and application security in public clouds, while nearly 60 percent of respondents reported that public cloud environments make it more difficult to obtain visibility into data traffic.
Read more ❯
Data privacy and compliance, security, and achieving full data visibility among top challenges for IT professionals with responsibility for cloud deployments
Sydney, Australia– Ixia, a Keysight Business and leading provider of network testing, visibility, and security solutions, announced research findings highlighting concerns of IT professionals worldwide in a new Cloud Security survey.
The survey, commissioned by Ixia and conducted by Dimensional Research, polled over 350 IT professionals in companies larger than 1,000 employees with primary responsibility for cloud deployments and management. Based on the survey results, over 90 percent of respondents are concerned about data and application security in public clouds while nearly 60 percent of respondents reported that public cloud environments make it more difficult to obtain visibility into data traffic.
“As cloud adoption grows, concerns are shifting from migration topics to security and data visibility topics in the cloud environment,” said Jeff Harris, chief marketing officer, Ixia. “Companies realise it is vital to have access to comprehensive cloud visibility solutions. This survey highlights how much enterprises are concerned about data visibility in every public and private cloud they operate.”
Read more ❯
CloudLens, World’s First Software-as-a-Service, Network-Level, Cloud-Native Visibility Solution
Sydney, Australia —Ixia, a Keysight Business and leading provider of network visibility and security solutions, announced it has further extended the CloudLens™ Visibility Platform to include support for Microsoft Azure, Google Cloud Platform, IBM Bluemix, and Alibaba Cloud, in addition to the existing support for Amazon Web Services (AWS), and for both Windows and Linux. As a result, Ixia CloudLens is now the first visibility solution to support all leading cloud platforms with multiple operating systems.
IT infrastructures are transforming into a mix of self-hosted applications and cloud-based services on multiple cloud platforms. As business data is exchanged among on-premises applications in private data centers and applications running in multiple public clouds, end-to-end visibility extending across the hybrid environment is a challenge. The lack of granular access to cloud traffic, regardless of the cloud service provider, creates blind spots in the network which could compromise application performance or security, resulting in a degraded customer experience and increased network security risk.
Read more ❯
Sydney, Australia — Ixia, a Keysight Business and a leading provider of network testing, visibility, and security solutions, announced that the company has achieved Amazon Web Services (AWS) Networking Competency Status for the Networking Management category with its CloudLens Visibility Platform by demonstrating expertise and technical proficiency in providing a solution that assists enterprises with adopting, developing, and deploying networks in AWS.
The AWS Competency Program is designed to highlight AWS Partner Network (APN) partners who have demonstrated technical proficiency and proven customer success in specialised solution areas. Attaining an AWS Competency allows AWS Partner Network (APN) members to differentiate themselves to customers by showcasing expertise in a specific solution area.
To achieve this status, Ixia first achieved Advanced Technology Partner status in the APN, which required Ixia’s CloudLens solution to undergo rigorous evaluations by AWS to meet the stringent APN technical validation criteria for reliability, security, performance, and product architecture. For Networking Competency status, CloudLens underwent further evaluations and technical validation specific to the Network Management category, which included:
Read more ❯
New IxLoad-Wireless to be showcased at Mobile World Congress Americas 2017
Sydney, Australia – Ixia, a leading provider of network testing, visibility, and security solutions, announced IxLoad-Wireless, a high-performance Long Term Evolution (LTE) test solution for cellular IoT enhanced Machine-Type Communication(eMTC) and Narrowband IoT (NB-IoT) technologies. These technologies are new 3rd Generation Partnership Project (3GPP)-defined and will help manage the density expected with IoT and lay the foundation for 5G.
Cellular IoT provides wireless communications for devices and applications that need low-power and wide-range communication connectivity, and have infrequent data transmission. A low volume of such devices would have a minimal impact on today’s LTE networks. However, according to Ericsson’s Internet of Things Forecast, 70 percent of wide-area IoT devices will use cellular technology in 2022, and the number of cellular IoT devices will surpass mobile phones in 2018.
Read more ❯
Enables organisations to see inside traffic encrypted with an ephemeral key
Sydney, Australia — Ixia, a leading provider of network test, visibility, and security solutions, announced the addition of its Active SSL™ technology to its SecureStack™ feature set, a key component of the company’s Security and Visibility Intelligence Framework. Active SSL enables organisations to see inside traffic encrypted with ephemeral key to ensure the security of their networks.
According to Gartner, “in 2016, industry reports estimate that encrypted traffic — HTTPS — represents 30% to 40% of enterprise web traffic, growing steadily compared to 2015. Already, Gartner clients frequently face web traffic of which more than 50% is encrypted, with peaks at more than 70% in financial and legal sectors… Through 2019, more than 80% of enterprises’ web traffic will be encrypted.” Securing a network requires comprehensive visibility into all traffic, which necessitates the ability to decrypt traffic that uses ephemeral key encryption mandated by the new TLS1.3 standard.
Read more ❯
Sydney, Australia — Ixia, a leading provider of network testing, visibility and security solutions, offers organisations advice on preventing Industrial Control Systems (ICS) attacks in light of the recent report from Dragos on the CrashOverride malware.This malware took down 30 substations in the Ukraine’s power grid late last year, and left 230,000 residents in the Ukraine without power.
The report from Dragos on CrashOverride was detailed and specific. The possibility of this malware strain permeating critical infrastructure around the world is evidence that plants and power systems continue to be under targeted attacks. In fact, early last year, hackers breached the a water utility company that is referred to as the “Kemuri Water Company”. They took control of hundreds of programmable logic controllers (PLCs) that manage the flow of toxic chemicals used for water treatment, which could have had dire consequences.
“The work required to create malware targeting specific ICS systems indicates nation-state sponsorship. One does not simply go out and build a ‘mirror lab’ of an electrical grid in their basement,” said Chuck McAuley, Principal Security Research Engineer at Ixia. “Human intelligence backed with strong technical knowledge is needed to create this type of software. Countries, and their private partners involved in infrastructure, need to be proactive about their security measures. In a region such as Europe, where the interconnected electrical grid crosses the borders of many countries, operators need to be ready for cyber attacks at all times.”
Read more ❯