Skip to content

Network security visibility is a hot topic here at RSA. Doug Hurd, technology alliances, Sourcefire (a Cisco company), spoke to our audience about how the company is improving customer security through extensibility and collaboration. Its Open Security Framework drives integration, resulting in faster time to resolution, smarter and faster policy management, and overall better security.

Ixia’s Net Optics Bypass Switch and xBalancer are part of this Sourcefire open framework. With the Sourcefire NG IPS, visibility is everything: you need to see all the traffic and understand the network you are protecting. But security gear competes for real estate in the data center. Ixia/Net Optics solutions offer a centralized on-demand access infrastructure for extending visibility into your network.

The Ixia/Net Optics solutions allow filtering of traffic prior to inspection, so customers can avoid having to oversize appliances. Additionally, the Net Optics Bypass Switch allows removal and reinstallation of the IPS without network interruption.

 

 

Thanks to Net Optics for the article.

Related Posts

What Is a Master Clock and Why Does It Matter?

What Is a Master Clock and Why Does It Matter?

Modern organizations rely on precise time synchronization to keep operations running smoothly and consistently. Critical systems across industries such as…
Understanding Keysight Threat Simulator & Adding Value in the First 24 Hours

Understanding Keysight Threat Simulator & Adding Value in the First 24 Hours

In 2026, assuming your network is secure because you bought the “best” tools is no longer a viable strategy. The…
Everything Network Engineers Need to Know about PTP

Everything Network Engineers Need to Know about PTP

Everything Network Engineers Need to Know about PTP Precision Time Protocol (PTP), standardized as IEEE 1588 in 2002, is a…
Beyond the "Perfect" Lab: Simulating Real-World Network Chaos Before Deployment

Beyond the "Perfect" Lab: Simulating Real-World Network Chaos Before Deployment

It is the classic IT paradox: your application performed flawlessly in the staging lab, but the moment it was deployed…
UNDERSTANDING ZERO TRUST -- WHY VISIBILITY IS THE BEDROCK OF “NEVER TRUST, ALWAYS VERIFY”

UNDERSTANDING ZERO TRUST -- WHY VISIBILITY IS THE BEDROCK OF “NEVER TRUST, ALWAYS VERIFY”

In our first post, we demystified the core philosophy of Zero Trust—shifting from the outdated “castle-and-moat” perimeter to a model…