S-0167
IXIA ThreatARMOR
Help Protect from Zero Day Malware Mutations
ThreatARMOR™ cuts straight to the core of the problem by automatically blocking much of the network communication that malware needs to download instructions or transmit sensitive data. It prevents network probes, phishing clicks, and all traffic to and from untrusted countries. This reduces the risk from attacks such as zero-day ransomware mutations along with up to 80% of the malicious connections that threaten the network and generate floods of security alerts. Ixia’s ATI Research Center provides an always-on stream of geolocation and threat intelligence for ThreatARMOR—individually validating every single blocked IP address, every single day. Detailed Rap Sheets provide clear, on-screen proof of malicious activity for all blocked sites to mitigate the risk of false positives.
Broadcasting
City Management
Climate and Weather
Commerce and Industry
Development
Education
Employment and Labour
Environment
Finance
Food
Health
Housing
Infrastructure
Law and Security
Population
Recreation and Culture
Social Welfare
Transport
Artificial Intelligence (AI)
Data Analytics
Machine Learning
Predictive Analytics
ThreatARMOR is unique
Next-gen firewalls are great at DPI and threat detection, but they are not optimized for massive-scale blocking of malicious, hijacked, and untrusted IP addresses. Even if they can import a threat intelligence feed, their performance suffers dramatically when trying to block the tens of millions of IP addresses in the Rap Sheet database. ThreatARMOR complements next-gen firewalls by offloading massive-scale blocking so that they can allocate more resources to content inspection, user policies, VPN termination, and other features while generating fewer security alerts.
Key Features
1 Provides full line-rate performance
2 Eliminates 30% of alert-generating connection attempts, and yields a 15x return on investment in a single year
3 Updates threat data every 5 minutes with cloud-based Application Threat Intelligence (ATI) feed
4 Delivers clear on-screen proof of malicious activity for any blocked sites
5 Offers on-box and off-box logging of blocked connections and system events
6 Features easy 30-minute setup, with no ongoing tuning or maintenance required
7 Provides an intuitive, on-screen dashboard displaying blocked sites, countries of origin, and statistics
8 Combine with Ixia Bypass switches to provide additional resiliancy of ThreatARMOR and other security infrastructure
UDS Data Systems Limited
95020980
Room 2101-2102, Technology Plaza, 651 King's Road, Hong Kong.
If any government department would like to conduct PoC trial or technology testing on the I&T solution, please contact Smart LAB.