YOU CAN'T SECURE WHAT YOU CAN'T SEE

오늘날 대부분의 조직은 어떤 방식 또는 어떤 형태로든 클라우드를 사용합니다. 비교할 수 없는 유연성, 민첩성 및 확장성 제공 등의 좋은 점이 있는 반면 문제점도 존재합니다. 네트워크 상의 양방향 트래픽을 모니터링 하는 데 있어서 사각 지대가 발생하고 있습니다. 네트워크 경계가 사라지고 공격자의 기술은 나날이 정교해짐에 따라 클라우드 가시성이 부족하면 네트워크 보안, 규정 준수 및 성능을 모니터링하는 데 악영향을 주며, 데이터 유출 및 기타 비용이 많이 드는 보안 취약점에 노출될 수 있습니다.

가시성 부문에 있어서, 전 세계 많은 기업 및 조직은 퍼블릭, 프라이빗 및 하이브리드 클라우드를 모니터링하고 보호 할 수 있도록 익시아 클라우드렌즈(CloudLens)를 신뢰하고 있습니다. 플랫폼에 구애 받지 않는 아키텍처, 컨테이너/ Kubernetes호환성 및 주요 보안, 애플리케이션 성능관리(Application Performance Management) 네트워크 성능 관리(Network Performance Management) 툴과의 Turnky 통합 기능을 갖춘 클라우드 렌즈(CloudLens)를 통해 취약점을 안전하게 보호할 수 있습니다.

차별화된 설계를 통해 최대 유연성 제공

  • Software-as-a-Service
  • Self-Hosted
  • CloudLens SaaS Overview

    cloudlens saas

    퍼블릭, 프라이빗 또는 하이브리드 클라우드 환경에 이상적인 솔루션인 CloudLens SaaS는 네트워크의 발전 따라 확장 가능한 유연한 클라우드 기반 가시성 플랫폼을 제공합니다.

    CloudLens SaaS는 사용자에게 필요한 비용만 지불할 수 있는 사용자 오류 및 가입 기반 청구를 최소화하는 사용자 친화적인 관리 플랫폼입니다. 패킷 데이터를 지능적으로 액세스, 필터링 및 툴에 직접 전달하여 비용이 많이 드는 아키텍처 변경이나 보안 및 성능 모니터링에 대한 타협이 없이, 보안 위험을 줄여주는 솔루션입니다.

    보다 자세히

  • CloudLens Self-Hosted Overview

    cloudlens self-hosted

    자체 데이터 센터에 데이터 보관이 필요할 경우 클라우드렌즈( CloudLens) 자체 호스팅을 통해 가상머신(VM)간의 트래픽을 포괄적으로 파악할 수 있도록 지원

    NetStack, PacketStack, 및 AppStack을 포함한 고급 패킷 처리 기능은 데이터 관리를 위한 옵션으로 부족함이 없습니다. CloudLens Self-Hosted를 사용하여 패킷 데이터를 가상으로 처리하거나, 물리적으로 네트워크 패킷 브로커(NPB)로 트래픽을 직접 백홀 처리할 때에도, 유연성과 효율성을 극대화할 수 있습니다.

    보다 자세히

What You Get
Secure

리스크 감소 & 효율성 향상

소스에서 패킷 데이터를 필터링 및 로드 밸런싱하여 사각지대를 제거함으로, 보안 강화 및 모니터링 툴의 효율성 향상

CloudLens - Multi-Platform Compatible

멀티 플랫폼 기능

플랫폼에 구애받지 않는 아키텍처를 통해 거의 모든 퍼블릭, 프라이빗 또는 하이브리드 클라우드 환경을 쉽게 파악

Cost-effective

낮은 충격, 턴키 스타트 업

업계 최고의 보안, APM 및 NPM 툴과의 일대일 호환성을 통해 비용이 많이 드는 인프라 투자와 긴 지연 시간을 피할 수 있도록 지원

Public Cloud. Private Cloud. Hybrid Cloud. Monitor Any Cloud.

  • Public Cloud
  • Private Cloud
  • Hybrid Cloud
  • CloudLens - Public Cloud Visibility

    CLOUDLENS SAAS를 사용하여 퍼블릭 클라우드 환경에 완벽한 패킷 수준 사용자 경험 제공

    퍼블릭 클라우드는 향상된 탄력성, 확장성 및 비용 효율성을 제공하지만 보안 문제는 귀하와 클라우드 서비스 공급자 간의 공유 책임임을 쉽게 잊어서는 안 됩니다. 패킷 수준 클라우드 가시성이 없으면 성능 문제를 방지하거나 취약한 사각지대를 보호하는 데 있어 보안 툴이 제 역할을 하지 못합니다

    가시성이 가장 중요한 경우 CloudLens SaaS를 통해 퍼블릭 클라우드의 패킷 데이터에 완벽하게 액세스할 수 있습니다. 또한 모든 주요 서비스 공급업체와 호환되므로 툴이 클라우드를 보호하는 데 필요한 데이터를 보유하고 있습니다

    DISCOVER CLOUDLENS SAAS

  • CloudLens - Private Cloud Visibility

    LOUDLENS SELF-HOSTED 또는 CLOUDLENS SAAS를 통한 프라이빗 클라우드 모니터링의 최대 유연성 확보

    프라이빗 클라우드를 통해 애플리케이션 및 서비스에 보다 빠르게 액세스할 수 있으나 VM 간 트래픽 위험에 대한 액세스 부족은 취약한 사각지대를 가진 보안, APM 및 NPM 툴에 방해가 됩니다.

    Hypervisor에 관계없이 CloudLens는 프라이빗 클라우드를 모니터링할 때 최고의 유연성을 제공합니다. 페이고 ( Pay-As-You-Go) 서비스 용도를 위한 CloudLens SaaS 또는 자체 데이터 센터에 영구 라이센스가 부여된 솔루션을 제공하는 CloudLens Self-Hosted 중 하나를 선택하십시오.

    DISCOVER CLOUDLENS SAAS

    DISCOVER CLOUDLENS SELF-HOSTED

  • CloudLens - Hybrid Cloud Visibility

    CLAUDLENS SAAS로 하이브리드 클라우드를 통한 모니터 트래픽

    퍼블릭 클라우드와 프라이빗 클라우드 모두 장점이 있기에, 많은 조직들이 이 두 가지를 모두 활용하고 있습니다. 이러한 하이브리드 클라우드 구현은 다기능성을 극대화하지만, 복잡성과 고 비용에 대한 해결책이 없이는 퍼블릭 클라우드와 프라이빗 클라우드 모두에서 패킷을 캡처할 수 없습니다.

    하이브리드 클라우드는 스트레스 없는 원활한 가시성 솔루션을 필요로 합니다. CloudLens SaaS를 사용하면 번거로움 없이 중요한 패킷 데이터에 액세스할 수 있습니다. 대부분의 주요 퍼블릭 및 프라이빗 클라우드와 호환되는 간편한 관리 플랫폼은 패킷 캡처를 단순화하고, 시간을 절감해 줍니다.

    DISCOVER CLOUDLENS SAAS

‘‘

Uplevel Systems delivers managed IT services to small businesses. Our solution combines customer premise security and networking equipment with AWS cloud based services and a management platform that allows IT consultants to deliver compelling and comprehensive IT services optimized for small business.

Monitoring our AWS based VPN hubs and application servers is key to provide our customers a great experience. Ixia's CloudLens enables us to get the packet level access we need to monitor our application. CloudLens's auto-scaling capability provides us the scale and elasticity to help our business grow.

 

Tom Alexander, CEO, Uplevel Systems
‘‘

“FireEye is excited to partner with Ixia on its new CloudLens platform to extend our industry-leading visibility and response speed into AWS, Azure, and other public cloud.  With our focus on simplifying, integrating, and automating security operations for customers with FireEye Helix, having scalable, native visibility into all cloud services, networks, endpoints, third-party security products enables us to stay ahead of our customer needs."

Martin Holste, CTO, Cloud, FireEye
‘‘

“Ixia CloudLens was designed and built for the cloud and as a result, it is inherently elastic and scalable. CloudLens provides CA’s network monitoring solutions the visibility needed to monitor end-to-end response times to track and optimize the end user experience, no matter where an application is deployed.”

Sushil Kumar - SVP of Product Management and Strategy, Agile Operations, CA Technologies
‘‘

“CloudLens' full-packet visibility in AWS enables Dynatrace DC RUM customers to monitor and improve the experience of business-critical applications such as SAP, Citrix, and Oracle.”

Steve Tack, Senior VP, Product Management, Dynatrace
‘‘

 “Moving enterprise workloads to the cloud can create stumbling blocks for security teams, as they no longer have the network packet visibility needed to be effective. Ixia's CloudLens solves this problem by providing full, easy, and highly-scalable visibility in the public cloud. The joint Ixia and ProtectWise solution provides automated threat detection and unlimited forensic exploration.”

Ramon Peypoch, Chief Product Officer, ProtectWise
‘‘

“As a provider of large scale SaaS-based performance management solutions hosted in AWS, AppNeta is very familiar with the challenges associated with obtaining actionable packet-level visibility in the public cloud. We found CloudLens met the elastic demands of public cloud customers in a multi-tenant, self-serve model like ours—and, unlike other solutions we've examined, performed well with minimal overhead. With CloudLens, deploying monitoring solutions in the public cloud occurs in a matter of minutes, not hours or days.”

Sean Armstrong, VP of Products, AppNeta
‘‘

“The NetFort LANGuardian software download ensures users can get granular, real-time visibility of network and user activity on any remote site or data center in minutes. Now, using Ixia CloudLens, this has been expanded to ensure the cloud is no longer a blind spot. The combination of Ixia and NetFort ensures organizations always have a unified view of their environment from a single console that provides real visibility, metadata, and context for faster detection and response across their virtual, physical, and cloud networks.”

Morgan Doyle, CTO, NetFort
‘‘

“Extending actionable network forensics into the cloud is both difficult and important. With Ixia CloudLens, Savvius is able to bring cloud capabilities to Omnipeek and Omnipliance in a manner that is scalable, elastic, and reliable.”

Nadeem Zahid, Sr Director of Business Development at Savvius
‘‘

“The adoption of public cloud solutions is continuing to grow at a rapid pace. With this comes unique and significant challenges around how organizations ensure the security and integrity of their data and applications. Ixia’s CloudLens solution solves the critically-important problem of providing access to network traffic within and across cloud environments to enable solutions like LogRhythm’s Network Monitor to perform deep packet inspection, rich metadata extraction, analytics, and full-packet capture around cloud-based workloads. Together, LogRhythm and CloudLens give our customers the necessary visibility and threat detection capabilities to instill confidence as they migrate to the cloud.”

Matt Winter, VP Business Development, LogRhythm
‘‘

 “As organizations move applications to the cloud, it has become more and more difficult to efficiently obtain the packets required for deep analytics on the usage and integrity of those applications. Ixia’s CloudLens provides a scalable and flexible way to efficiently collect packets from cloud hosted instances. This solution has been validated to work with our ntopng traffic analysis tool.”

Luca Deri, Founder, NTOP
Cloud Visibility Ecosystem

보안 및 성능 모니터링은 대부분의 기업 네트워크 운영의 필수입니다. 애매 모호한 가시성 솔루션을 사용하여, 복잡한 운용방법으로 필요한 패킷을 삭제하거나, 사각지대를 제거하지 않음으로써 보안 및 모니터링 툴의 효율성에 문제가 발생합니다.

그래서 Ixia는 선도적인 보안, APM 및 NPM 툴 공급자(오픈 소스 공급자 포함)와 협력하여, CloudLens와의 일대일 호환성을 실현합니다. 턴키 통합을 통해 모니터링 효율성을 극대화하며, 일상적인 운영에 미치는 영향을 최소화합니다.

익시아의 기술 파트너 리스트를 확인하십시오.

Amazon Web Services

For 11 years, Amazon Web Services has been the world's most comprehensive and broadly adopted cloud platform. AWS offers over 90 fully featured services for compute, storage, networking, database, analytics, application services, deployment, management, developer, mobile, Internet of Things (IoT), Artificial Intelligence (AI), security, hybrid, and enterprise applications, from 44 Availability Zones (AZs) across 16 geographic regions in the U.S., Australia, Brazil, Canada, China, Germany, India, Ireland, Japan, Korea, Singapore, and the UK. AWS services are trusted by millions of active customers around the world -- including the fastest growing startups, largest enterprises, and leading government agencies -- to power their infrastructure, make them more agile, and lower costs.

Learn More about Amazon Web Services
AppNeta Logo

Appneta's award-winning suite of application performance management tools ensure optimized web app, SaaS app and end-user monitoring

Learn More about AppNeta
Bricata Logo

Detect. Hunt. Prevent Threats.

Help your organization achieve complete network security visibility of threats with Bricata, and reduce complexity, dwell time, and time to containment.

Learn More about Bricata
Bro Logo

Bro is an open source network security platform that illuminates your network's activity in detail, with the stability and flexibility for production deployment at scale.

Learn More about Bro
CA technologies

CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate – across mobile, private and public cloud, distributed and mainframe environments.

Learn More about CA Technologies
Corelight

Corelight is the most powerful network visibility solution for information security professionals. We provide real-time data that organizations use to understand, detect, and prevent cyber attacks. Our solution is built on Bro, the powerful and widely-used open source monitoring framework created by our founders.

Learn More about Corelight
Dynatrace

Dynatrace is the innovator behind the industry's premier Digital Performance Platform, making real-time information about digital performance visible and actionable for everyone across business and IT. We help customers of all sizes see their applications and digital channels through the lens of their end users. More than 7,500 organizations use these insights to master complexity, gain operational agility and grow revenue by delivering amazing customer experiences.

Learn More about Dynatrace
Empirix Logo

Empirix is the Leader in End-to-End Network Visibility and Test Automation for Telecommunications Service Providers and Contact Center Operations, DevOps and QA Professionals We provide testing software and services for regression, load testing and monitoring of Enterprise and call center technologies

Learn More about Empirix
endace logo

For more than 15 years, Endace has provided high-speed, network recording and visibility solutions to monitor and protect some of the world’s largest, most complex networks. Customers include global banks, telcos and service providers, media and broadcast companies, health organizations, retailers, e-commerce and web giants, governments and large enterprises. Customers choose Endace technology because it can monitor and capture network traffic with 100% accuracy regardless of network speeds or loads. It can scale to meet the needs of the fastest networks and is built on an open architecture that enables integration with a wide variety of custom, open source and commercial solutions.

Learn More about Endace
Esentire Logo

eSentire Managed Detection and Response™ leads the industry in Managed Detection and Response services. We detect and mitigate cyber threats for mid-sized enterprise that existing security technology will miss, 24 hours a day, 7 days a week.

Learn More about Esentire
Fireeye

FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 4,700 customers across 67 countries, including more than 730 of the Forbes Global 2000.

Security – joint with FireEye

Learn More about Fireeye
Flowmon

Flowmon Networks empowers businesses to manage and secure their computer networks confidently. Through our high performance network monitoring technology and lean-forward behavior analytics, IT pros worldwide benefit from absolute network traffic visibility to enhance network & application performance and deal with modern cyber threats. Driven by a passion for technology, we are leading the way of NetFlow/IPFIX network monitoring that is high performing, scalable and easy to use. The world’s largest businesses, internet service providers, government entities or even small and midsize companies rely on our solutions to take control over their networks, keep order and overcome uncertainty.

Learn More about Flowmon
Jask

JASK is purpose-built to accelerate security operations

Attack surfaces are expanding. The perimeters of growing companies continuously shift. And the pace of new weaponization is unrelenting. In this environment, efficacy depends on speed. But traditional security operations technology is a speed barrier. Heavy and difficult to change, it delivers more noise than signal, overwhelming analyst resources and clogging security operations. Enter JASK.

Learn More about Jask
LogRhythm

LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.

Learn More about LogRhythm
Microsoft Azure

Microsoft Azure is an ever-expanding set of cloud services to help your organization meet your business challenges. It’s the freedom to build, manage, and deploy applications on a massive, global network using your favorite tools and frameworks.

Learn More about Microsoft Azure
Moloch Logo

Moloch is a large scale, open source, full packet capturing, indexing, and database system.

Moloch augments your current security infrastructure by storing and indexing network traffic in standard PCAP format, while also providing fast indexed access. Moloch is not meant to replace Intrusion Detection Systems (IDS), instead it provides more visibility. Moloch is built with an intuitive UI/UX which reduces the analysis time of suspected incidents.

Learn More about Moloch
Netfort Logo

NetFort LANGuardian is the industry's leading deep packet inspection software for monitoring, troubleshooting, and reporting on user and network activity.

Learn More about Netfort
NTOP Logo

ntopng is the next generation version of the original ntop, a network traffic probe that shows the network usage, similar to what the popular top Unix command does.

Learn More about NTOP
Perch Security

Perch Security is the first Community Defense Platform. Perch makes threat intelligence accessible and affordable for the "everyone else" – organizations who don't have dedicated threat analyst teams. Now small and mid-size businesses can mount a cyber defense with curated community intelligence and participate with the sharing community; all without a SIEM, a TIP, or increasing staff. Perch is headquartered in Tampa, Florida. 

Learn More about Perch Security
Protectwise

ProtectWise shifts network security to the cloud to provide complete visibility and detection of enterprise threats and accelerated incident response. By harnessing the power of the cloud, the ProtectWise Grid™ has the unique ability to create an unlimited retention window with full-fidelity forensics, automated retrospection and advanced visualization — all with the ease and cost-savings of an on-demand deployment model. Security professionals can see threats in real-time and continuously goes back in time to discover previously unknown threats automatically.

Learn More about Protectwise
Riverbed

In today’s world, digital performance defines business success. But performance in the digital age is about more than speed. That’s why Riverbed provides a fully unified and integrated platform that eliminates tradeoffs and helps customers rethink possible. We help enhance digital performance across every aspect of a customer’s business—whether that’s gaining insight into new customers and industries, improving time to market, increasing productivity, or simply delivering fast, secure digital experiences today’s users demand. The Riverbed Digital Performance Platform helps transform the way customers run the powerful network- and cloud-based apps that connect people, businesses, and experiences in our digital world.

Troubleshooting – joint with Riverbed

Learn More about Riverbed
RSA Security

RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats.  With RSA’s award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime.

Learn More about RSA
Savvius

Savvius offers a range of powerful software and hardware products that automate the collection of critical network data for network forensics in security investigations and for network and application performance diagnostics. Savvius and Ixia have partnered to bring full visibility, performance, scalability, and decryption to our enterprise customers with high-speed networks. The joint solution provides accurate time-stamping, SSL decryption, de-duplication, filtering, and load-balancing across multiple Savvius appliances.

Learn More about Savvius
Sinefa

Sinefa provides visibility and control for data networks. It allows network managers to see all the applications, users, devices, and links on the network, and to easily redirect bandwidth to critical applications. Increased network performance boosts productivity, eases user frustration and reduces network management costs. Sinefa is the simplest solution on the market, providing immediate total visibility and control that saves users and managers time.

Learn More about Sinefa
Suricata Logo

Suricata is a free and open source, mature, fast and robust network threat detection engine. The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline packet capture (pcap) processing.

Learn More about Suricata
Symantec

Symantec™ and Ixia have teamed to deliver the complete, ongoing visibility and insight needed to hone cyber security processes and shrink your company’s attack surface. The joint solution makes your hybrid network and security infrastructures more intelligent, integrated, and automated — saving you time and effort and reducing your organization’s cyber risk.

Webinar: Breached! Next Generation Network Forensics for the Cloud

Learn More about Symantec
Vectra Logo

Vectra® Networks is the leader in automated threat management solutions for real-time detection of in-progress cyber attacks. The company’s solution automatically correlates threats against hosts that are under attack and provides unique context about what attackers are doing so organizations can quickly prevent or mitigate loss. Vectra prioritizes attacks that pose the greatest business risk, enabling organizations to make rapid decisions on where to focus time and resources.

Learn More about Vectra Networks
Viavi Solutions

Viavi (NASDAQ: VIAV) software and hardware platforms and instruments deliver end-to-end visibility across physical, virtual and hybrid networks. Precise intelligence and actionable insight from across the network ecosystem optimizes the service experience for increased customer loyalty, greater profitability and quicker transitions to next-generation technologies. Viavi is also a leader in anti-counterfeiting solutions for currency authentication and high-value optical components and instruments for diverse government and commercial applications.

Learn More about Viavi Solutions
VoIP Monitor

VoIPmonitor is an open source network packet sniffer with commercial frontend for SIP RTP RTCP and SKINNY(SCCP) VoIP protocols running on linux. VoIPmonitor is designed to analyze quality of VoIP call based on network parameters - delay variation and packet loss according to ITU-T G.107 E-model which predicts quality on MOS scale.

Learn More about VoIP Monitor
Wireshark

Wireshark is the world's foremost network protocol analyzer. It lets you see what's happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions.  Wireshark development thrives thanks to the contributions of networking experts across the globe. It is the continuation of a project that started in 1998.

Learn More about Wireshark
Awards and Accomplishments