NETWORK TAPS AND BYPASS SWITCHES

Eliminate dangerous blind spots with end-to-end visibility into physical, virtual, and SDN networks.

High-performance, plug-and-play solutions that provide permanent access to network traffic for optimal network monitoring and security – without introducing costly bottlenecks or points of failure

PHANTOM VTAPS

Get visibility into the traffic between virtual machines in virtualized environments.

Phantom vTap™ helps you achieve breakthrough visibility and control of traffic flowing between virtual machines for greater security, compliance, and performance. In addition to providing integrated management and filtering capabilities for virtualized monitoring layers, these software devices send monitored traffic in encapsulated tunnels to physical or virtual monitoring tools.

NETWORK PACKET BROKERS

Easy-to-use, intelligent filtering and distribution of traffic, including Layer 7 application flows and encrypted secure sockets layer (SSL), at line rate with zero loss of packets

Ixia’s NPBs (Network Packet Brokers) deliver an innovative approach to handling and manipulating network packets, offering end-to-end network visibility, and providing line rate, zero-loss traffic distribution to monitoring devices and security tools. The result:  enabling efficient and effective network troubleshooting and threat detection with a compelling ROI.

VISIBILITY INTELLIGENCE

An intelligent and contextual visibility framework to ensure high performance and secure application delivery

BETTER NETWORK VISIBILITY FOR BETTER DECISION MAKING

Ixia’s Application and Threat Intelligence Processor (ATIP) delivers actionable application-level insight into a wide array of network activities. By providing rich data on application behavior and the location of users, ATIP easily identifies unknown network applications, mitigates security threats, and identifies trends in application usage.

Hawkeye

Automate network performance checks and improve the application delivery experience

Proactive network performance monitoring for ongoing application reliability. Hawkeye quickly and effectively validates network performance, isolates problems, and proactively detects issues by running scheduled verification tests on any site using wireline or wireless connections. Using a combination of hardware and software agents called Performance Endpoints, Hawkeye simulates application traffic and sends key performance metrics to a central console for fast action.