A powerful visibility engine with the capability to deliver the right traffic to the right tools

Security Fabric™ uses context-awareness and security intelligence to deliver de-duplicated and highly relevant traffic to your inline and out-of-band security tools. Powered by dual data processing engines, Security Fabric is the foundation for stronger inline and out-of-band security deployments.

The Ixia Security Fabric uses 100% data access, resilience, context-aware data processing, and security intelligence processing to ensure the right data gets to the right tools, even at high speeds.

Intelligent Visibility Diagram

Security Through Visibility, Context, and Simplicity


In this white paper, Enterprise Management Associates (“EMA”) explores the benefits of adding visibility, context, performance, and resilience to security operations.

Ixia Security Fabric Security Through Visibility Context and Simplicity

Security Fabric Capabilities

  • DATA ACCESS
  • SECURITY RESILIENCE
  • CONTEXT AWARENESS
  • SECURITY INTELLIGENCE
  • Ixia Security Fabric provides access to traffic across your network.

    DATA ACCESS ANYWHERE

    You want access to data everywhere it exists in your network, not just where a network switch is located. With a combination of fiber, copper, and virtual taps, Ixia Security Fabric provides you with 100% access to physical, virtual, public and private cloud traffic with higher reliability than using only SPAN ports. And even during high-volume traffic conditions, Ixia gives your security and monitoring tools total visibility to network traffic, with zero packet loss.

    Learn more about Network Access

  • Ixia Security Fabric supports failsafe inline security inspection.

    SECURITY RESILIENCE

    You need failsafe security solutions to maximize your defenses and protect network availability. Whether you experience a hardware or software failure, or just need to take a tool offline for maintenance, Ixia bypass switches can route traffic around any security tool that is unavailable or route traffic to an alternate device. With the industry's fastest near-instant recovery, Ixia Security Fabric ensures your security solutions operate continuously.

    Learn more about Inline Security Resilience.

  • Ixia Security Fabric has a powerful engine that recognizes metadata and can isolate Netflow information.

    CONTEXT-AWARE DATA PROCESSING

    Ixia Security Fabric uses a powerful, hardware-based processing engine to send the right data to the right tools, at line rate speed. NetStack and PacketStack functionality enable the engine to isolate and filter traffic based on metadata; generate NetFlow data; and provide deduplication, packet trimming, and data masking. AppStack functionality supports filtering based on application, geolocation, browser, device, or any other user-defined parameter.  

    Learn more about Context-Aware Data Processing.

  • Ixia Security Fabric offloads SSL for faster security inspection.

    SECURITY INTELLIGENCE PROCESSING

    Ixia Security Fabric helps keep your defenses strong with unique security features. SecureStack functionality provides passive SSL decryption to offload your security tools and help them work more efficiently. PacketStack functionality supports compliance by masking sensitive information like credit card and social security numbers. In addition, Ixia offers a hardware-based threat intelligence solution that blocks traffic from IP addresses associated with malware, viruses, and other attacks, so it never even enters your network.

    Learn more about Threat Intelligence

Security Fabric Resources

Security Fabric Infographic

INFOGRAPHIC

Discover the four things secure networks have in common

Security Fabric Webinar

On-Demand webinar

See how to facilitate better security with visibility, context, performance, and resilience

University of Texas at Austin Case Study

CASE STUDY

Read the University of Texas at Austin’s story on securing their network

Connect with a Security Specialist to learn more about how Ixia Security Fabric can transform your security infrastructure.