Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Ixia Streamlines Network Threat Intelligence

November 2016 by Marc Jacob

Ixia announced that the company’s threat intelligence gateway – ThreatARMOR™ – now includes centralized management and mobile access to essential security-related information, which improve IT operational efficiency and ensure rapid response to potential network breaches.

The primary challenges facing network operators and security teams today is the time needed to confront the avalanche of security alerts and events, operate multiple security consoles, and understand evolving security threats, such as zero-day malware mutations. This time crunch can result in missing critical security events that indicate active breaches, targeted attacks, and data theft. Network operators need to deploy security and analytics tools that improve efficiency as opposed to creating additional time demands.

Centralized Threat Intelligence Management

ThreatARMOR Central Management provides a convenient, secure portal for managing global deployments of ThreatARMOR devices. It provides scalable management, log collection, and centralized reporting of policy, inventory, licensing, device health, and synchronization status, as well as aggregated blocking data. ThreatARMOR Central Management requires zero setup by network operators, and hosting and data storage capabilities are provided by Ixia via the cloud. Central management is now available to all ThreatARMOR (1G or 10G) customers currently under subscription, at no additional cost.

Access to Threat Intelligence from Anywhere

The new ThreatARMOR Mobile Application offers a quick, portable method for checking ThreatARMOR statistics regardless of location, including blocked threats, traffic throughput, and geolocation of blocked connections. It provides users with at-a-glance insight into ThreatARMOR device status, the current Protection Score, which indicates recent blocking bursts, and overall network throughput, by geography. The initial release of the ThreatARMOR mobile application is available via Apple iOS devices.

Continuously Updated Threat Intelligence

ThreatARMOR threat intelligence is kept current with a feed from the company’s Application Threat Intelligence (ATI) Research Center, which is updated every five minutes, and provides access to 300 plus application protocols and over 36,000 security attacks. This real-time, cloud-based threat intelligence enables ThreatARMOR to deliver continuous protection, filtering out untrusted countries, malicious sites, and harmful IP addresses (malware distribution, phishing sites, botnet C&C sites, spam distribution, bogons, hijacked domains, and unassigned IPs). The ATI Research Center performs both manual and automated analysis of malware and techniques used by hackers to compromise networks, 24x7, 365 days a year.


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts