Blog

December 3, 2019 | By Amritam Putatunda
When we launched our daily malware service, there were some level of doubt. Before the daily malware, we would generally release a collection of malwares each month. The issue with monthly malware updates is that 30 days is a long time in the hyper-dynamic world of cyberattacks, where malware can…
December 3, 2019 | By Amritam Putatunda
When we launched our daily malware service, there were some level of doubt. Before the daily malware, we would generally release a collection of malwares each month. The issue with monthly malware updates is that 30 days is a long time in the hyper-dynamic world of cyberattacks, where malware can…

November 25, 2019 | By Keith Bromley
I hear this comment all the time, “Yeah, I have enough security defenses deployed.” However, when I press further to understand what the person is doing, all I typically get is the name of a few security products that are being deployed as point solutions. While it is good to know the name of the…
November 25, 2019 | By Keith Bromley
I hear this comment all the time, “Yeah, I have enough security defenses deployed.” However, when I press further to understand what the person is doing, all I typically get is the name of a few security products that are being deployed as point solutions. While it is good to know the name of the…

November 22, 2019 | By Jason Lackey
Recently we have been seeing a lot more on ransomware. In October, the FBI issued an alert on the topic, available here, warning of ransomware using phishing attacks, RDP (remote desktop protocol, a proprietary Microsoft protocol for remote administration and application, in some ways similar to…
November 22, 2019 | By Jason Lackey
Recently we have been seeing a lot more on ransomware. In October, the FBI issued an alert on the topic, available here, warning of ransomware using phishing attacks, RDP (remote desktop protocol, a proprietary Microsoft protocol for remote administration and application, in some ways similar to…

November 18, 2019 | By Lora O'Haver
In our digital world, end users increasingly access applications and services from the edge of networks. The healthcare industry, for example, is embracing edge computing to provide physicians and technicians with mobile access to powerful diagnostic and patient tracking systems. …

November 18, 2019 | By Lora O'Haver
In our digital world, end users increasingly access applications and services from the edge of networks. The healthcare industry, for example, is embracing edge computing to provide physicians and technicians with mobile access to powerful diagnostic and patient tracking systems. …

November 11, 2019 | By Keith Bromley
When deploying an inline network security tool, such as an IPS, it is vital to ensure that traffic continues to flow in all circumstances, even if the inline tool loses power. This ensures that mission-critical business applications remain available to users. A bypass switch is one solution that…
November 11, 2019 | By Keith Bromley
When deploying an inline network security tool, such as an IPS, it is vital to ensure that traffic continues to flow in all circumstances, even if the inline tool loses power. This ensures that mission-critical business applications remain available to users. A bypass switch is one solution that…

November 4, 2019 | By Jason Lackey
At Ixia we are proud of our long association with Tech Field Day and Network Field Day. We are going to be at Tech Field Day 20 on November 15 where we will feature Phil Trainor giving his unique field perspective on security and how better visibility into what’s happening on the network can help…
November 4, 2019 | By Jason Lackey
At Ixia we are proud of our long association with Tech Field Day and Network Field Day. We are going to be at Tech Field Day 20 on November 15 where we will feature Phil Trainor giving his unique field perspective on security and how better visibility into what’s happening on the network can help…

November 1, 2019 | By Christophe Olivier
A long time ago, in a galaxy not so far away, companies used to run applications on physical servers. With this model, it was not easy to manage hardware resources allocated to an application unless you only ran one application per server, something that was not always practical and definitely was…
November 1, 2019 | By Christophe Olivier
A long time ago, in a galaxy not so far away, companies used to run applications on physical servers. With this model, it was not easy to manage hardware resources allocated to an application unless you only ran one application per server, something that was not always practical and definitely was…

October 31, 2019 | By Keith Bromley
Network visibility is an often overlooked but critically important activity for IT. Visibility is what enables you to quickly isolate security threats and resolve performance issues; ultimately ensuring the best possible end-user experience. This is because a proper visibility architecture…
October 31, 2019 | By Keith Bromley
Network visibility is an often overlooked but critically important activity for IT. Visibility is what enables you to quickly isolate security threats and resolve performance issues; ultimately ensuring the best possible end-user experience. This is because a proper visibility architecture…