
Ixia announced the integration of its Application and Threat Intelligence (ATI) Processor with the Plixer International Scrutinizer cyber threat incident response solution. The joint solution improves forensic incident response and application optimization capabilities that help IT professionals prepare for the next cyber attack or application performance issue.
Scrutinizer provides a behavior analysis system for cyber threat detection and forensic analysis that uncovers unwanted communication by leveraging flow data. The Ixia ATI Processor complements the Plixer Scrutinizer by generating an expanded NetFlow data feed called IxFlow from all points in the data center and then sends it to Scrutinizer for analysis. The combined solution gives administrators the ability to identify users, device types, operating systems and applications that generate excessive traffic or security threats, which then enables them to isolate malware and remove unwanted behaviors.
The Ixia ATI Processor performs the raw packet processing and deep packet inspection providing full layer 2 – 7 insight including application classification, application behavior, geo-location, user device details and other flow data to Plixer for analysis. The ATI Processor is a key component of the Intelligence layer of Ixia’s Visibility Architecture and provides rich contextual metadata to security and performance analysis tools, to make existing tools even more effective and scalable.
The joint solution provides:
- High-speed deep packet inspection for rich application identification (e.g. Facebook, Google and Amazon) with additional detail provided on geo-location and device OS.
- Insight into the network where existing routers and switches cannot provide sufficient communication context and details.
- Isolation and removal of unwanted network behaviors and security breaches.
- Compliance reporting that includes a complete audit trail of all communications.
Additionally, Ixia offers several components that can be combined with Plixer's Scrutinizer - Incident Response System to help ensure that customers can obtain an always-on low latency user experience. From physical and virtual network taps that enable customized feeds of monitoring data to analysis tools to the network packet broker that aggregates and filters monitoring tool data, Ixia’s Visibility Architecture delivers the comprehensive monitoring solution enterprises and service providers need to maintain network quality.
“Today’s reality is that IT environments are under constant threat of malicious attacks, and organizations must be prepared to combat these threats with advanced and fool-proof solutions to protect intellectual property,” said Mike Patterson, Founder & Product Manager at Plixer. “With the combination of Ixia’s ATI Processor’s application intelligence and Plixer’s Scrutinizer solution with integrated behavior analysis, enterprises are able to detect issues in real-time and prevent sophisticated attacks from stealing sensitive data.”
The Latest
According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...
In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...
In 2025, enterprise workflows are undergoing a seismic shift. Propelled by breakthroughs in generative AI (GenAI), large language models (LLMs), and natural language processing (NLP), a new paradigm is emerging — agentic AI. This technology is not just automating tasks; it's reimagining how organizations make decisions, engage customers, and operate at scale ...
In the early days of the cloud revolution, business leaders perceived cloud services as a means of sidelining IT organizations. IT was too slow, too expensive, or incapable of supporting new technologies. With a team of developers, line of business managers could deploy new applications and services in the cloud. IT has been fighting to retake control ever since. Today, IT is back in the driver's seat, according to new research by Enterprise Management Associates (EMA) ...
In today's fast-paced and increasingly complex network environments, Network Operations Centers (NOCs) are the backbone of ensuring continuous uptime, smooth service delivery, and rapid issue resolution. However, the challenges faced by NOC teams are only growing. In a recent study, 78% state network complexity has grown significantly over the last few years while 84% regularly learn about network issues from users. It is imperative we adopt a new approach to managing today's network experiences ...

From growing reliance on FinOps teams to the increasing attention on artificial intelligence (AI), and software licensing, the Flexera 2025 State of the Cloud Report digs into how organizations are improving cloud spend efficiency, while tackling the complexities of emerging technologies ...