Ixia Streamlines Network Threat Intelligence
November 2016 by Marc Jacob
Ixia announced that the company’s threat intelligence gateway – ThreatARMOR™ – now includes centralized management and mobile access to essential security-related information, which improve IT operational efficiency and ensure rapid response to potential network breaches.
The primary challenges facing network operators and security teams today is the time needed to confront the avalanche of security alerts and events, operate multiple security consoles, and understand evolving security threats, such as zero-day malware mutations. This time crunch can result in missing critical security events that indicate active breaches, targeted attacks, and data theft. Network operators need to deploy security and analytics tools that improve efficiency as opposed to creating additional time demands.
Centralized Threat Intelligence Management
ThreatARMOR Central Management provides a convenient, secure portal for managing global deployments of ThreatARMOR devices. It provides scalable management, log collection, and centralized reporting of policy, inventory, licensing, device health, and synchronization status, as well as aggregated blocking data. ThreatARMOR Central Management requires zero setup by network operators, and hosting and data storage capabilities are provided by Ixia via the cloud. Central management is now available to all ThreatARMOR (1G or 10G) customers currently under subscription, at no additional cost.
Access to Threat Intelligence from Anywhere
The new ThreatARMOR Mobile Application offers a quick, portable method for checking ThreatARMOR statistics regardless of location, including blocked threats, traffic throughput, and geolocation of blocked connections. It provides users with at-a-glance insight into ThreatARMOR device status, the current Protection Score, which indicates recent blocking bursts, and overall network throughput, by geography. The initial release of the ThreatARMOR mobile application is available via Apple iOS devices.
Continuously Updated Threat Intelligence
ThreatARMOR threat intelligence is kept current with a feed from the company’s Application Threat Intelligence (ATI) Research Center, which is updated every five minutes, and provides access to 300 plus application protocols and over 36,000 security attacks. This real-time, cloud-based threat intelligence enables ThreatARMOR to deliver continuous protection, filtering out untrusted countries, malicious sites, and harmful IP addresses (malware distribution, phishing sites, botnet C&C sites, spam distribution, bogons, hijacked domains, and unassigned IPs). The ATI Research Center performs both manual and automated analysis of malware and techniques used by hackers to compromise networks, 24x7, 365 days a year.