
Ixia and LiveAction announced a combined solution for innovative real-time big data collection, analysis and visualization. The joint solution arms IT with the reliable and accurate information it needs to quickly isolate and correct dangerous application performance issues and cyber security threats.
The combined solution gives administrators the ability to quickly identify the users, device types, operating systems and applications that generate excessive traffic or security threats and to isolate the data based on geographic domain. Armed with reliable and accurate real-time big data analytics, IT can quickly isolate and correct threatening issues. The solution can also share data so that the customer can get more return from their investment in legacy tools, in addition to leveraging the capabilities of LiveAction.
Benefits of the joint solution include:
- Deep packet inspection for rich application classification, geo-location and device details.
- Efficient access to all enterprise traffic needed for analysis.
- Reporting on which users, applications and device types generate excessive traffic.
- Innovative visualization and real-time big data analytics for faster troubleshooting of application performance and cyber security threats.
- ATI Processor shares data with LiveAction, as well as other tools, to protect customers’ legacy tool investments.
“Applications that are unknown to the network tools are blind spots, which can cause a broad range of performance and security issues, and the traditional piecemeal solutions don’t provide the insight needed,” said John K. Smith, CTO of LiveAction. “With the addition of Ixia’s IxFlow data to our Application Aware Network Performance Management solution, our customers now have the effective visibility and smart analysis that meets the challenges they face daily.”
Ixia’s Application and Threat Intelligence (ATI) Processor uses deep packet inspection to identify the unknown applications, as well as the geographic details and operating systems being used by the network devices. Using Ixia’s IxFlow, an enhanced NetFlow data feed, the detailed data is exported through the IPFIX protocol to LiveAction for analysis, which then reports the unique details in a rich variety of visualization formats.
The Latest
For many B2B and B2C enterprise brands, technology isn't a core strength. Relying on overly complex architectures (like those that follow a pure MACH doctrine) has been flagged by industry leaders as a source of operational slowdown, creating bottlenecks that limit agility in volatile market conditions ...
FinOps champions crucial cross-departmental collaboration, uniting business, finance, technology and engineering leaders to demystify cloud expenses. Yet, too often, critical cost issues are softened into mere "recommendations" or "insights" — easy to ignore. But what if we adopted security's battle-tested strategy and reframed these as the urgent risks they truly are, demanding immediate action? ...
Two in three IT professionals now cite growing complexity as their top challenge — an urgent signal that the modernization curve may be getting too steep, according to the Rising to the Challenge survey from Checkmk ...
While IT leaders are becoming more comfortable and adept at balancing workloads across on-premises, colocation data centers and the public cloud, there's a key component missing: connectivity, according to the 2025 State of the Data Center Report from CoreSite ...
A perfect storm is brewing in cybersecurity — certificate lifespans shrinking to just 47 days while quantum computing threatens today's encryption. Organizations must embrace ephemeral trust and crypto-agility to survive this dual challenge ...
In MEAN TIME TO INSIGHT Episode 14, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud network observability...
While companies adopt AI at a record pace, they also face the challenge of finding a smart and scalable way to manage its rapidly growing costs. This requires balancing the massive possibilities inherent in AI with the need to control cloud costs, aim for long-term profitability and optimize spending ...
Telecommunications is expanding at an unprecedented pace ... But progress brings complexity. As WanAware's 2025 Telecom Observability Benchmark Report reveals, many operators are discovering that modernization requires more than physical build outs and CapEx — it also demands the tools and insights to manage, secure, and optimize this fast-growing infrastructure in real time ...
As businesses increasingly rely on high-performance applications to deliver seamless user experiences, the demand for fast, reliable, and scalable data storage systems has never been greater. Redis — an open-source, in-memory data structure store — has emerged as a popular choice for use cases ranging from caching to real-time analytics. But with great performance comes the need for vigilant monitoring ...
Kubernetes was not initially designed with AI's vast resource variability in mind, and the rapid rise of AI has exposed Kubernetes limitations, particularly when it comes to cost and resource efficiency. Indeed, AI workloads differ from traditional applications in that they require a staggering amount and variety of compute resources, and their consumption is far less consistent than traditional workloads ... Considering the speed of AI innovation, teams cannot afford to be bogged down by these constant infrastructure concerns. A solution is needed ...