Ixia introduced its Application and Threat Intelligence (ATI) Processor, which enhances the network, application and security insights IT organizations get from their existing monitoring tools.
This product provides Ixia’s Visibility Architecture with the ability to provide real-time information about users and applications in any format needed – raw packets, filtered packets or metadata. With the number of valid and malicious applications rapidly increasing, this unprecedented visibility intelligence helps IT organizations within large enterprises and service providers to identify, locate and track network applications – including proprietary, mobile and malicious traffic.
Ixia’s new ATI Processor for the NTO 7300 brings a new level of intelligence to the network packet broker. Distinct Application Fingerprints and a patent pending dynamic identification capability for unknown applications give network managers a complete view of their networks, including application success and failure tracking. By combining rich contextual information such as geo-location of application usage, handset or device type, operating system and browser type, the ATI Processor helps to identify suspicious activity such as unauthorized BYOD usage or business connections from untrusted locations.
Ixia customers can now leverage their monitoring tools in conjunction with the enhanced information provided by the ATI Processor to spot trends in application usage, user behavior and quality of service with more speed and accuracy. This unique insight can also resolve security concerns such as rapidly spotting Command and Control (CnC) traffic from infected systems and policy infractions from BYOD usage. Previously, IT administrators would have to piece together many independent streams of information in a tedious and error-prone process.
The ATI Processor is backed by the same ATI program that fuels Ixia’s test equipment, which includes more than 245 applications and 35,000 malicious attacks and combines frequent Application Fingerprint updates with support of user-defined applications. The specialized hardware employed in the ATI Processor optimizes visibility performance by offloading DPI and metadata extraction, improving tool performance and delivering richer insight into network usage, problems and trends. This functionality delivers greater overall value to our customers.
ATI Processor features include:
- Dynamic application intelligence capabilities to identify known, proprietary, and even unknown network applications.
- Enhanced insight including geo-location, handset type, operating system, browser and other key user data.
- Empirical data generation to identify bandwidth usage, trends and growth needs delivered via API or Ixia’s IxFlow extensions to NetFlow.
“The importance of understanding application performance, service quality and security integrity from the network perspective has been steadily rising in both enterprise and service provider settings,” said Jim Frey, EMA’s VP of Research, Network Management. “Such visibility is essential for timely assurance and protection of complex applications despite growing traffic volumes and increasing diversity in how end users and subscribers access applications and services. Options for DPI processing and identification at the packet access layer, such as Ixia’s new ATI Processor offering, means valuable flexibility for establishing and sustaining effective visibility."
The Latest
Leaders in the financial services sector are bullish on AI, with 95% of business and IT decision makers saying that AI is a top C-Suite priority, and 96% of respondents believing it provides their business a competitive advantage, according to Riverbed's Global AI and Digital Experience Survey ...
SLOs have long been a staple for DevOps teams to monitor the health of their applications and infrastructure ... Now, as digital trends have shifted, more and more teams are looking to adapt this model for the mobile environment. This, however, is not without its challenges ...
Modernizing IT infrastructure has become essential for organizations striving to remain competitive. This modernization extends beyond merely upgrading hardware or software; it involves strategically leveraging new technologies like AI and cloud computing to enhance operational efficiency, increase data accessibility, and improve the end-user experience ...
AI sure grew fast in popularity, but are AI apps any good? ... If companies are going to keep integrating AI applications into their tech stack at the rate they are, then they need to be aware of AI's limitations. More importantly, they need to evolve their testing regiment ...
If you were lucky, you found out about the massive CrowdStrike/Microsoft outage last July by reading about it over coffee. Those less fortunate were awoken hours earlier by frantic calls from work ... Whether you were directly affected or not, there's an important lesson: all organizations should be conducting in-depth reviews of testing and change management ...
In MEAN TIME TO INSIGHT Episode 11, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses Secure Access Service Edge (SASE) ...
On average, only 48% of digital initiatives enterprise-wide meet or exceed their business outcome targets according to Gartner's annual global survey of CIOs and technology executives ...
Artificial intelligence (AI) is rapidly reshaping industries around the world. From optimizing business processes to unlocking new levels of innovation, AI is a critical driver of success for modern enterprises. As a result, business leaders — from DevOps engineers to CTOs — are under pressure to incorporate AI into their workflows to stay competitive. But the question isn't whether AI should be adopted — it's how ...
The mobile app industry continues to grow in size, complexity, and competition. Also not slowing down? Consumer expectations are rising exponentially along with the use of mobile apps. To meet these expectations, mobile teams need to take a comprehensive, holistic approach to their app experience ...
Users have become digital hoarders, saving everything they handle, including outdated reports, duplicate files and irrelevant documents that make it difficult to find critical information, slowing down systems and productivity. In digital terms, they have simply shoved the mess off their desks and into the virtual storage bins ...