Skip to content

Network security visibility is a hot topic here at RSA. Doug Hurd, technology alliances, Sourcefire (a Cisco company), spoke to our audience about how the company is improving customer security through extensibility and collaboration. Its Open Security Framework drives integration, resulting in faster time to resolution, smarter and faster policy management, and overall better security.

Ixia’s Net Optics Bypass Switch and xBalancer are part of this Sourcefire open framework. With the Sourcefire NG IPS, visibility is everything: you need to see all the traffic and understand the network you are protecting. But security gear competes for real estate in the data center. Ixia/Net Optics solutions offer a centralized on-demand access infrastructure for extending visibility into your network.

The Ixia/Net Optics solutions allow filtering of traffic prior to inspection, so customers can avoid having to oversize appliances. Additionally, the Net Optics Bypass Switch allows removal and reinstallation of the IPS without network interruption.

 

 

Thanks to Net Optics for the article.

Related Posts

The Advantages of IP & PoE Clocks

The Advantages of IP & PoE Clocks

Accurate time isn’t just a convenience – it is a critical factor in maintaining compliance, productivity, and safety across modern…
Bypass Switches: Ensuring Network Uptime and Security in High-Stakes Environments

Bypass Switches: Ensuring Network Uptime and Security in High-Stakes Environments

Modern Bypass Switches also offer granular control and flexible configurations, allowing administrators to choose whether the device should fail open…
Traceable Time as a Service - The Evolution of Precision Time

Traceable Time as a Service - The Evolution of Precision Time

Time is more than just a measure of seconds. It underpins the financial markets, telecommunications, cybersecurity, and every sector that…
Back in time packet capture and forensics with VIAVI Obeserver as a key component in a Zero Trust Network implementation

Back in time packet capture and forensics with VIAVI Obeserver as a key component in a Zero Trust Network implementation

Explore how packet capture and forensic analysis empower Zero Trust security implementations, ensuring network visibility and compliance.
TCXO, OCXO and Rubidium -- understanding oscillators and the role they play in precision time keeping

TCXO, OCXO and Rubidium -- understanding oscillators and the role they play in precision time keeping

Explore the differences between TCXO, OCXO, and Rubidium oscillators in precision timekeeping for telecommunications and industrial applications.