I&T Solution

Reference No.

S-0167

Solution Name

IXIA ThreatARMOR

Solution Description

Help Protect from Zero Day Malware Mutations


ThreatARMOR™ cuts straight to the core of the problem by automatically blocking much of the network communication that malware needs to download instructions or transmit sensitive data. It prevents network probes, phishing clicks, and all traffic to and from untrusted countries. This reduces the risk from attacks such as zero-day ransomware mutations along with up to 80% of the malicious connections that threaten the network and generate floods of security alerts. Ixia’s ATI Research Center provides an always-on stream of geolocation and threat intelligence for ThreatARMOR—individually validating every single blocked IP address, every single day. Detailed Rap Sheets provide clear, on-screen proof of malicious activity for all blocked sites to mitigate the risk of false positives.

Application Areas

Broadcasting

City Management

Climate and Weather

Commerce and Industry

Development

Education

Employment and Labour

Environment

Finance

Food

Health

Housing

Infrastructure

Law and Security

Population

Recreation and Culture

Social Welfare

Transport

Technologies Used

Artificial Intelligence (AI)

Data Analytics

Machine Learning

Predictive Analytics

Use Case

ThreatARMOR is unique


Next-gen firewalls are great at DPI and threat detection, but they are not optimized for massive-scale blocking of malicious, hijacked, and untrusted IP addresses. Even if they can import a threat intelligence feed, their performance suffers dramatically when trying to block the tens of millions of IP addresses in the Rap Sheet database. ThreatARMOR complements next-gen firewalls by offloading massive-scale blocking so that they can allocate more resources to content inspection, user policies, VPN termination, and other features while generating fewer security alerts.


Key Features

1 Provides full line-rate performance

2 Eliminates 30% of alert-generating connection attempts, and yields a 15x return on investment in a single year

3 Updates threat data every 5 minutes with cloud-based Application Threat Intelligence (ATI) feed

4 Delivers clear on-screen proof of malicious activity for any blocked sites

5 Offers on-box and off-box logging of blocked connections and system events

6 Features easy 30-minute setup, with no ongoing tuning or maintenance required

7 Provides an intuitive, on-screen dashboard displaying blocked sites, countries of origin, and statistics

8 Combine with Ixia Bypass switches to provide additional resiliancy of ThreatARMOR and other security infrastructure

If any government department would like to conduct PoC trial or technology testing on the I&T solution, please contact Smart LAB.