Tuesday, 26 September 2017

Ixia accelerates cyberattack detection, response times

Ixia
Wednesday 09 November 16

Ixia has enhanced its Application and Threat Intelligence Processor (ATIP), which enables network operators to rapidly extract security metadata, including Indicators of Compromise, and fast-track that information to reporting tools to speed identification and response to security threats and malicious behaviour. New enhancements to ATIP now enable security and network professionals to rapidly extract metadata from their network connections…

Ixia has enhanced its Application and Threat Intelligence Processor (ATIP), which enables network operators to rapidly extract security metadata, including Indicators of Compromise, and fast-track that information to reporting tools to speed identification and response to security threats and malicious behaviour.

New enhancements to ATIP now enable security and network professionals to rapidly extract metadata from their network connections, including IOC, spanning URLs, Uniform Resource Identifiers, Session Initiation and Cisco Discovery Protocols, Domain Name System Text, and User Agent. This deeper context aware metadata enables existing reporting tools to deliver analysis results quickly and effectively, resulting in significant improvements in response to threats and suspicious activity.

In March 2016, the Ponemon Institute reported that it takes on average, 170 days to detect an advanced attack, 39 days to contain it and 43 days to remediate it. In addition, as the amount of traffic on a network surges, it becomes increasingly important to rapidly analyze large volumes of data, or metadata, both unencrypted and encrypted. This analysis enables identification of malware infections known as Indicators of Compromise (data that identifies potentially malicious activity on a network).

“Reducing the time to identify and respond to cyberattacks is critical to today’s business,” said Jim Duffy, senior analyst, 451 Research. “Ixia’s ability to quickly analyze context-aware metadata in a network can be a valuable tool in gaining visibility into anomalies and ultimately resolving security breaches.”

“Ixia is committed to leveraging and extending our decade-plus experience in advanced malware research to solve the key challenges facing network operators today,” said Scott Register, vice president of product management at Ixia. “We make significant investments in research that helps our customers to quickly identify inevitable security breaches with minimal investment of time and money."

Ixia’s ATIP is a key component of the company’s Security Fabric, a context-aware, self-healing, data distribution engine that powers Ixia’s network packet brokers (NPBs). Using ATIP, Ixia’s Security Fabric provides rich context such as geolocation, browser, and device on each packet for optimal distribution to security tools. ATIP works in conjunction with advanced reporting solutions from leading vendors including Plixer, LiveAction, Splunk, and Dynatrace, to provide key insights that accelerate detection of data breaches without the added cost of a specialized forensic monitor.


View more of the latest press releases from across the industry or post your company's news.

Please enable JavaScript to view the comments powered by Disqus.

Newsletter signup

Quickly get on board and up to date with the telecoms industry