TMCnet News
Ixia Launches ThreatARMOR to Strengthen Enterprise Defenses against Cyber-AttacksIxia (Nasdaq: XXIA), a leading provider of application performance and security resilience solutions, today launched a new front line of defense for enterprise networks. Ixia's ThreatARMOR represents another innovation for the company's Visibility Architecture, enabling enterprises to reduce the ever-increasing size of their global network attack surface. ThreatARMOR is a natural complement to an existing security infrastructure, decreasing the volume of security alerts generated and freeing resources to focus on critical issues.
ThreatARMOR Shrinks the Network Attack Surface ThreatARMOR enables enterprise customers to:
"What's killing security is not technology, it's operations," stated Jon Oltsik, ESG senior principal analyst and the founder of the firm's cybersecurity service. "Companies are looking for ways to reduce their overall operations requirements and need easy to use, high performance solutions, like ThreatARMOR, to help them do that."
ThreatARMOR Reduces Security Alert Fatigue Enterprises spend approximately 21,000 hours per year on average dealing with false positive cyber security alerts per a Ponemon Institute report published January 2015(1). ThreatARMOR eliminates unwanted traffic before it can impact an existing enterprise security infrastructure. This saves customers time and the cost of reviewing the flood of unnecessary notifications generated by powerful security systems, which can create alert fatigue for enterprise security teams. ThreatARMOR enables IT security personnel and resources to focus on key business issues and reduces the risk of critical alerts being missed. "As many recent breaches demonstrate, indications of intrusions and data exfiltration attempts are usually flagged through internal security alerts long before the intrusion is actually discovered. But determining the critical alerts is like trying to find a needle in a haystack, given the sheer number of security alerts that must be analyzed daily," said Dennis Cox (News - Alert), Chief Product Officer at Ixia. "ThreatARMOR delivers a new level of visibility and security by blocking unwanted traffic before many of these unnecessary security events are ever generated. And its protection is always up to date thanks to our Application and Threat Intelligence program."
ThreatARMOR is backed by Ixia's Application and Threat Intelligence
Research Center Ixia's professional-grade Application and Threat Intelligence (ATI) program has over a decade of experience providing threat intelligence to the world's largest service providers and security equipment manufacturers for testing the efficacy of their cyber security products and systems. The ATI program develops the threat intelligence for ThreatARMOR and a detailed "Rap Sheet" that documents the malicious activity of each included IP address. Rap Sheets provide proof of malicious activity for all blocked sites, supported with on-screen evidence of the activity such as malware distribution or phishing, including date of the most recent confirmation and screen shots. With this clear reporting on blocking actions, customers can easily support IT compliance audits. Threat intelligence and Rap Sheet updates are pushed continuously to all ThreatARMOR devices for ongoing and consistent threat protection.
Competitive Advantage for Channel Partners, Business Advantage for
Customers "ThreatARMOR allows organizations of all sizes to elegantly deflect potential threats on a global scale and basis," says Christian Pfalz, Sales Manager at Dimension Data (News - Alert). "By using ongoing threat intelligence to deflect unwanted traffic before it accesses the network, this new element stands to reduce the strain and improve ROI on businesses' existing security resources quite dramatically."
Pricing and Availability
About Ixia
Connect with Ixia Ixia, ThreatARMOR and the Ixia logo are trademarks or registered trademarks of Ixia in the United States and other jurisdictions. All other trademarks used herein are the property of their respective owners.
1. The Cost of Malware Containment, issued by The Ponemon Institute (News - Alert),
January 2015
View source version on businesswire.com: http://www.businesswire.com/news/home/20151012005282/en/ |