NP-Channel - Network Visibility & Test Solutions for Security, Network and Application Performance

SEARCH

Products > Security Products and Solutions

With the evolution of Internet threat complexity and intensity, comes the rapidly increasing range of security technologies needed to secure the network. New layers have been added to the perimeter to deal with emerging threats, fortifying the existing firewalls and IPS/IDS systems with threat detection, malware inspection, content security, DLP, DDoS mitigation, and more - at increasing expense. Constant probes and automated attacks flood SIEMs and overwhelm security teams with false negatives and positives that must be tracked down.


 - Product Photo - ThreatARMOR - Your New Front Line of Defense
NEW / NEU / NEUVE / NUEVO
ThreatARMOR - Your New Front Line of Defense

Click to enlarge -  - Product Photo - ThreatARMOR - Your New Front Line of Defense
With the evolution of Internet threat complexity and intensity, comes the rapidly increasing range of security technologies needed to secure the network. New layers have been added to the perimeter to deal with emerging threats, fortifying the existing firewalls and IPS/IDS systems with threat detection, malware inspection, content security, DLP, DDoS mitigation, and more - at increasing expense. Constant probes and automated attacks flood SIEMs and overwhelm security teams with false negatives and positives that must be tracked down.

ThreatARMOR enhances security performance across your network, removing known bad IP addresses and traffic from untrusted countries. By eliminating unwanted traffic, ThreatARMOR boosts the performance of your network security infrastructure. It also enables network firewalls and intrusion prevention systems to more efficiently focus on blocking malware and identifying threats from all other IP addresses. A single ThreatARMOR security appliance can be deployed on both the inside and outside of your perimeter, blocking communication with botnet controllers while reducing load from known bad sites and countries you don´t do business with. Even encrypted connections from those sites are automatically banned.

ThreatARMOR doesn´t use signatures and there are no false positives. All blocked sites are supported with clear on-screen proof of malicious activity such as malware distribution or phishing, including date of most recent confirmation and even screen shots. The site list is kept constantly up to date by Ixia´s Application and Threat Intelligence (ATI) Research Center that individually validates every site and provides a cloud-based update every five minutes.

Since network availability is critical to your business, ThreatARMOR is built for resilient and failsafe operation. Features such as dual-redundant power supplies and Ethernet interfaces with built-in bypass modes ensure network availability on both the 1GbE copper and 10GbE fiber interfaces. The ThreatARMOR security appliance:

  • Enhance security performance by eliminating traffic from unwanted geographies and known bad IP address sites
  • Blocks outbound Botnet communication from infected internal systems
  • Improves the ROI and boosts the performance of your network security infrastructure
Additional Downloads:
- Video - ThreatARMOR Sales Deck, Aug 2016 (Extended)
- Case Study - Financial Investment firm reduces risk
- Case Study - Hyper Box tackles Attack Traffic with Ixia ThreatARMOR
- Use Case: Leveraging the full power of Next-Generation Firewalls (NGFWS)
- Use Case: Optimizing Security Operations
- ThreatARMOR 15x or better ROI
- ThreatARMOR - PCAP in a Snap


SYS-THREATARMOR-10G
 
ThreatARMOR 10G Security Appliance. ThreatARMOR 10GbE Security Appliance with 4 10Gb SR fiber ports. Requires active ATI Subscription License (THREATARMOR-10G-ESSENTIAL OR THREATARMOR-10G-ENTERP-24X7) for full functionality.

THREATARMOR-10G-ESSENTIAL
 
Annual Subscription for Application and Threat Intelligence (ATI) License for 10G ThreatARMOR. Required for full ThreatARMOR functionality. Includes Essential Support: Advanced Hardware Replacement (RMA). Unlimited software updates, Access to Customer Web Portal and Technical Support during normal business hours with a committed initial response time of 4 business hours

THREATARMOR-10G-ENTERP-24X7
 
Annual Subscription for Application and Threat Intelligence (ATI) License for 10G ThreatARMOR. Required for full ThreatARMOR functionality. Includes Enterprise 24X7 Support: Advanced Hardware Replacement (RMA). Unlimited software updates, Access to Customer Web Portal and 24x7x365 Technical Support with a committed initial response time of 4 hours. Dedicated Support account manager with quarterly review.

SYS-THREATARMOR-1G
 
ThreatARMOR 1G Security Appliance. ThreatARMOR 1GbE Security Appliance with 4 1Gb Copper Ethernet ports. Requires active ATI Subscription License (THREATARMOR-1G-ESSENTIAL OR THREATARMOR-1G-ENTERPRISE-24X7) for full functionality.

THREATARMOR-1G-ESSENTIAL
 
Annual Subscription for Application and Threat Intelligence (ATI) License for 1G ThreatARMOR. Required for full ThreatARMOR functionality. Includes Essential Support: Advanced Hardware Replacement (RMA). Unlimited software updates, Access to Customer Web Portal and Technical Support during normal business hours with a committed initial response time of 4 business hours

THREATARMOR-1G-ENTERPRISE-24X7
 
Annual Subscription for Application and Threat Intelligence (ATI) License for 1G ThreatARMOR. Required for full ThreatARMOR functionality. Includes Enterprise 24X7 Support: Advanced Hardware Replacement (RMA). Unlimited software updates, Access to Customer Web Portal and 24x7x365 Technical Support with a committed initial response time of 4 hours. Dedicated Support account manager with quarterly review.

Key Features
  • 1U Security Appliance
  • Inline blocking, inline monitor-only, out-of-band monitor-only modes
  • Full line rate across all ports with blocking enabled
  • Reporting, blocking, or fail-safe bypass operation
  • Always-on ATI cloud security service
Highlights
  • Enhance security performance by eliminating traffic from known bad IP address sites
  • Stop traffic from unwanted countries
  • Quickly find compromised internal systems
  • Stop connections, both inbound and outbound, from known bad IP addresses containing malware, botnets, and phishing attacks
  • No false positives - clear proof of criminal behavior for all blocked sites
  • Always-on cloud update service from Ixia´s ATI Research Center
  • Dual redundant power supplies and integrated bypass for maximum reliability


PRICE REQUEST





*:
3+6=
* MANDATORY INFO.
NOTE:Your data will only be used for internal purposes or - if required - for forwarding to your responsible reseller. It will never be given to any other third party under any circumstances.
+49 6102 7487-0   |       |    Disclaimer   |    General Terms & Conditions   |    Sitemap   |    Imprint
Last updated: 30th of June 2016 - © 2017 by Pierer Industrie AG
PRODUCT SEARCH:              SEARCH