By navigating our site, you agree to allow us to use cookies, in accordance with our Privacy Policy.

Keysight’s Ixia Joins IBM Security App Exchange Community

Keysight Technologies has recently announced that the company’s enriched NetFlow metadata — IxFlow from Ixia, a Keysight Business — integrates with IBM security intelligence technology to help customers stay ahead of evolving security threats.

keysight technologiesIxia’s Vision network packet brokers (NPBs) with AppStack features generate enriched NetFlow metadata called IxFlow from network traffic. IxFlow provides detailed data about applications, devices, known threats, and geolocation that can be analyzed in IBM QRadar, the company’s security intelligence platform, which analyzes data across an organization’s IT infrastructure in real-time to identify potential security threats.

Leveraging QRadar’s open application programming interface (API), the IxFlow App for QRadar allows Ixia and IBM customers to stream IxFlow metadata, which identifies hosts affected by malware, botnets and exploits, into QRadar for analysis. Ixia NPBs also provide QRadar packet-level data for a detailed look at anomalies and alerts.

The Ixia IxFlow App for QRadar is freely available to the security community through IBM Security App Exchange, a platform where developers across the industry can share applications based on IBM Security technologies. As threats are evolving faster than ever, collaborative development amongst the security community will help organizations adapt quickly and speed innovation in the fight against cybercrime.

“With increasing risk of cyberattacks, incident response teams need full visibility across their hybrid networks to stay a step ahead of hackers,” said Scott Westlake, vice president of alliances at Keysight’s Network Applications & Security Group (formerly Ixia Solutions Group). “Ixia provides QRadar with full visibility in the form of enriched IxFlow metadata, enabling security teams to accurately detect and prioritize threats, as well as accelerate security operations processes to reduce the impact of incidents.”

For more info, click here

Tags

Nitisha Dubey

A diligent writer, who has been working from last five years in the same field. She has covered lots of event and expo for travel & judiciary, now covering technology. Book reading, exploring different destinations and varieties of cuisine are some hobbies. Love to watch biographies and historical movies.

Related Articles