Ixia Announces Vision ONE for End-to-End Network Visibility
February 2016 by Marc Jacob
Ixia launched Vision ONE, a turnkey device that rapidly collects, processes, and filters data and application flow to security and monitoring tool to increase network protection, and improve return on IT investment without sacrificing performance.
Ixia’s Vision ONE provides reliable inline connectivity for security tools such as intrusion prevention systems (IPS), data loss prevention (DLP), and firewalls. Its integrated intelligence features enable users to access encrypted traffic using SSL decryption, reduce analysis traffic using advanced packet processing, and precisely select traffic by application type, geography, and device criteria using deep packet inspection (DPI).
The rise of applications supporting Secure Socket Layer (SSL) encryption is expected to account for nearly two thirds of Internet traffic by the end of 2016**, exposing enterprises to new vulnerabilities they need to uncover to remain secure. Vision ONE’s unique SSL decryption feature extends a security teams’ ability to look into encrypted traffic revealing anomalies and intrusions through Ixia’s Application and Threat Intelligence Program (ATIP).
In addition, the new 10GbE version of ThreatARMOR is now available offering line-rate blocking of known-bad sites and unwanted countries, as well as integrated fail-to-wire capability for maximum performance and availability.
Network Security without Sacrificing Performance
Overall, Vision ONE enables an enterprise to increase their security quickly and easily. Integrating Ixia’s most powerful network visibility and security solutions, Vision ONE offers a wide range of benefits including:
• Immediate time to value with an intuitive GUI — inline and out-of-band — that enables IT professionals to rapidly deploy Vision ONE, and be up and running quickly so they can focus on increasing security rather than configuration
• Zero-loss advanced packet processing improves security tool efficiency with deduplication and packet trimming
• Deep packet inspection optimizes investment in infrastructure by classifying traffic in real time, and directing it to the correct tool according to set parameters, such as application type, geolocation, or handset type
• Sophisticated load balancing maximizes up-time and ensures that no critical data is lost by distributing traffic across a number of monitoring tools