keeping your network vigilant...

Home>Products

Ensuring fast diagnostics for network performance and security investigations

Complete network insight through sophisticated packet analytics. Omnipeek is more than an impressive collection of packet data, stats, and analysis. Its tools and workflows are at your engineer's fingertips, making it easy to drill down, look across, compare, discover, and decide. Omnipeek empowers engineers with rapid-fire analytics and insights so they can make the best decisions, quickly, about your network's speed, application performance, and security.

Learn More

Complex networks have complex problems. Omnipliance doesn't just capture packets. It finds answers. The right answers. Fast. Savvius Omnipliances, industry-leading intelligent packet capture and analysis appliances, enable real-time and post-event analytics on distributed networks at up to 25Gbps. Built on years of Savvius packet intelligence, Omnipliance gives IT engineers the power to resolve issues with network performance and connectivity, multi-segment latency, application performance, data and VoIP quality, and much, much more. Savvius provide powerful, precise, and affordable capture and analytics solutions for 1G, 10G, and 40G wired networks, and WLAN networks from 802.11a through ac.

Learn More

Mini appliance. Mini price. Maximum network visibility. Real-time enterprise-class network management for smaller networks Savvius Insight is the newest and smallest addition to the Omnipliance family of network monitoring appliances. Savvius Insight has no moving parts, connects inline to the network with two bypass ports, and has three extra ports for span port captures.

Learn More

Savvius Vigil is the first network forensics appliance dedicated to security investigations. Network data is critical in every security investigation. Savvius Vigil automates the collection of network traffic needed for security investigations into both alerts, reducing the likelihood of a breach, and into breaches, minimizing their impact. Even breaches not discovered for months can be effectively investigated using Vigil. Savvius Vigil, which integrates with all leading IDS/IPS systems, includes Omnipeek, award-winning network forensics software.

Learn More

deliver END-to-END Visibility INTO PHYSICAL, VIRTUAL and SDN networks

NTO features an easy-to-use drag-and-drop control panel accommodates complete system re-configurations and aggregates and filters traffic as needed to critical monitoring tools, increasing efficiency and keeping expenses low. With Ixia NPBs, you can easily modify your configuration and filters as needed without altering physical connections or conducting detailed research to ensure that your changes will not adversely affect other tools or impede network traffic.

View IXIA NTO 5236 Datasheet

View IXIA NTO 7300 Datasheet

Simplify Your Network Packet Broker Configuration

Easy-to-use, intelligent filtering and distribution of traffic, including Layer 7 application flows and encrypted secure sockets layer (SSL), at line rate with zero loss of packets. A new approach to network packets. An NPB (also called packet broker, or monitoring switch) can be extremely useful. These devices filter traffic to send only the right data to the right tool. Packets are aggregated and filtered from Layer 2 through to the application layer. Duplicate packets can also be removed and sensitive content stripped before the data is sent to the monitoring tools if that is required. This provides a better solution to improve the efficiency and utility of your monitoring tools.

Learn More

View IXIA xStream 40 NPB Datasheet

100% VISIBILITY WITH NETWORK TAPS The Ixia tap family of products provides complete visibility into network traffic to facilitate optimal performance and security. Network taps, installed directly to the network, are plug-and-play, and do not require costly hands-on management. Regardless of interface or network location, Ixia high-performance taps support both copper and multimode and single-mode fiber at speeds of up to 100Gbps. The best part: Taps can provide permanent access to network traffic and allow total traffic visibility for network monitoring and security devices—without introducing costly bottlenecks or points of failure.

Learn More

View IXIA Flex Tap Datasheet

View IXIA Gig Zero Delay Tap Datasheet

Network Taps VS Span Ports

Ixia’s Phantom vTap™ helps you achieve breakthrough visibility and control of traffic flowing between virtual machines for greater security, compliance, and performance. In addition to providing integrated management and filtering capabilities for virtualized monitoring layers, these software devices send monitored traffic in encapsulated tunnels to physical or virtual monitoring tools. This allows you to use existing security and monitoring tools and infrastructure to monitor virtual environments—delivering significant cost savings without increasing your management burden.

Learn More

View IXIA Phantom vTap Datasheet

Ixia Bypass Switches provide fail-safe, inline protection designed to fit networks of any size. These switches safeguard a network with automated failover protection, preventing temporary tool outages from escalating into costly network outages. Ixia Bypass Switches are deployed between inline network devices and in front of security tools, providing a reliable separation point between the network and security layers. The result: allowing your network and security tools to support and protect your business—without the risk of network interruptions. Better yet, these bypass switches allow multiple security tools to process traffic from a single network link and offer many unique capabilities like pre-configured heartbeats, centralized management, and support for redundant or serial active tools using a single bypass.

Learn More

View IXIA iBypass Switch Datasheet

Collection, Threat detection, and Reporting of ALL Flow Technologies On A Single Platform

Scrutinizer™ is at the foundation of the Plixer incident response and behavior analysis architecture. It is available as a physical or virtual appliance. Scrutinizer performs the collection, threat detection, and reporting of all flow technologies on a single platform. It delivers real-time situational awareness into the applications and their historical behaviors on the network.

Learn More

The award-winning network usage reports provide insight into users, applications, and network devices. With the deepest insight available in the market, Scrutinizer allows administrators to peer deep into the network to see where threats are originating and how the network is being used, reducing the Mean Time to Know (MTTK) and streamlining IT’s Mean Time to Repair (MTTR) the issue. Scrutinizer is the most flexible and scalable NetFlow Analyzer on the market for deep application insight and network incident response.

Learn More

Proven correlation techniques evaluate all of the indicators of compromise to positively identify the behavioral characteristics that are uncharacteristic of the baseline. If a device starts communicating in ways outside of the baseline or behaving outside of expected tolerances, Flow Analytics™ will alert security teams or automatically remediate the traffic based on policy controls. Flow Analytics™ provides unmatched traffic visibility into the malware’s origin and the systems that may have been impacted. It gives security teams the level of deep visibility needed to quickly uncover malware, scope a compromise, and contain the infection before it spreads and causes further damage.

Learn More

AGGREGATING TAPS PROVIDE SAFE, RELIABLE ACCESS FOR NETWORK VISIBILITY

View entire full-duplex conversations using single-interface monitoring tools. Decrease reliance on switch resources for network management visibility. Eliminate SPAN port contention, oversubscription, and configuration errors. Deploy tools immediately without impacting your production network. Easily share Test Access Points without maintenance windows or approval.Single point of deployment and remote management minimizes management expenses and MTTR. Keep your monitoring tool plugged in while troubleshooting the same link.

Learn More

Our Data Access Switches also known as Network Packet Brokers or Matrix Switches allow network traffic to be aggregated, copied or directed to specific ports for use by monitoring tools. Load Balancing and Packet Filtering for Cost Effective Data Capture and Monitoring Applications. Consolidate network monitoring tools, reduce network management expenses and lower tool costs. Aggregation/Regeneration - Combine multiple network links or channels into one stream or send copies to multiple connected tools to share data sources. Single point of deployment and remote management minimizes network management expenses and reduces MTTR. Deploy tools right away without impacting your production network.

Learn More

Monitors SNMP devices, WAN Links, Servers and Applications

SNMPc Enterprise is a secure distributed Network Management System which delivers proactive real-time monitoring for your entire network infrastructure. Advanced product features and legendary ease of use have led to over 120,000 network managers trusting SNMPc to monitor their mission critical networks.

Learn More