Ixia’s strategy starts with an elite team of dedicated cybersecurity professionals that form the Ixia ATI Research Center. This globally distributed team works around the world and around the clock from locations like Singapore, California, Texas, Massachusetts, France, Romania, and India. They monitor and analyze the ever-evolving indicators that could threaten the security of IT networks. The team distills that knowledge into research and rule sets. We incorporate these insights into Ixia solutions to maximize your ability to detect and combat the latest threats.
The ATI team also contributes to the larger security community. The Ixia ATI team shares what it learns with vendors that have been hacked, private agencies (e.g., www.mitre.org), government agencies (e.g., NIST and DARPA), and at global security conferences such as Black Hat and RSA. Ixia also promotes a summer security school in Bucharest, Romania, to help train new security engineers.
The ATI team assesses and validates products that are meant to secure the enterprise. The team serves as a front line of defense, monitoring internet-connected products and analyzing observed behavior to discover exploitable weaknesses in any vendors’ product. Security alerts and incidents happen all hours of the day and night, so the team takes a follow-the-sun approach. Dozens of engineers combine to form a single global team that can create and disseminate the latest security intelligence.
In many cases, the team can go from discovery to an Ixia product update within a 24-hour period. Input to the research process comes from many sources:
• International exploit databases
• The Dark Web
• Scan of security news alerts and crowdsourcing
• Twitter handles of other security researchers
• Partner feeds
• Honeypots actively looking for attacks in the wild
• Independent research (testing and reverse engineering) by the ATI team
Members of the team constantly poll multiple sources to get insights into vulnerabilities. They normalize, correlate, and organize the data to get a clear direction on the threats and how to prioritize them. Team members then investigate the threats and either validate or dismiss them. They research everything to make sure that the threat detection and prevention content deployed in our products is 100 percent correct. This deep research also gives them the utmost confidence in our data and predictions.
The BreakingPoint company established the ATI team in 2005. Ixia acquired BreakingPoint in 2012. The BreakingPoint solution is a security attack and traffic generator that network equipment manufacturers, service providers, governments, and enterprises use to validate network and security resiliency while under load and attacks. Generating traffic using threats based on real-world research is just one way that Ixia and Keysight help harden solutions for applications as diverse as automotive and Internet of Things (IoT) solutions.
Ixia’s ATI threat intelligence feed incorporates data in a way no other provider offers. While others in the industry create automated intelligence platforms or open source feeds, those solutions are generally tailored to provide insights related to specific products in a vendor’s portfolio. For example, a feed from Microsoft may focus on vulnerabilities related to products and threats relative to the Microsoft portfolio. Ixia threat feeds look at the internet on a global scale, and provide actionable intelligence based on internet-wide telemetry.
ATI intelligence takes the form of a “rap sheet.” A rap sheet captures threat intelligence via a proprietary database of known bad actors or offenders. The database is constantly updated, providing real-time actionable threat intelligence. The team validates blacklisted sites continuously, updating the database to ensure new threats are tracked and false positives are removed. Automated rap sheets provide updates as often as every five minutes, delivering the data in real time to Ixia visibility solutions.
ABOUT KEYSIGHT TECHNOLOGIES
Keysight Technologies, Inc. (NYSE: KEYS) is a leading technology company that helps enterprises, service providers, and governments accelerate innovation to connect and secure the world. Keysight’s solutions optimize networks and bring electronic products to market faster and at a lower cost with offerings from design simulation, to prototype validation, to manufacturing test, to optimization in networks and cloud environments. Customers span the worldwide communications ecosystem, aerospace and defense, automotive, energy, semiconductor and general electronics end markets. Keysight generated revenues of $3.2B in fiscal year 2017. In April 2017, Keysight acquired Ixia, a leader in network test, visibility, and security. For more information contact us at firstname.lastname@example.org