Ixia Fabric Controller (IFC) Centralized Manager Introduced
January 31, 2019
Share this

Keysight Technologies announced that Ixia, a Keysight Business, has launched a new software solution for centralized management of a wide range of wired, wireless, and/or virtual visibility solutions.

The new Ixia Fabric Controller (IFC) Centralized Manager supports network packet brokers, taps, bypass switches, and cloud visibility solutions via a single graphical user interface (GUI).

“Serious gaps in device management can lead to performance issues, visibility blind spots and security vulnerabilities,” stated Recep Ozdag, VP of Product Management for Keysight’s Ixia Solutions Group. “Professionals responsible for managing enterprise networks need a resource that can provide a comprehensive view of their monitoring devices at any time, despite location. Ixia’s new IFC Centralized Manager delivers the centralized network platform needed to address those gaps, improve performance and reduce blind spots.”

IFC Centralized Manager eases configuration and monitoring of taps, virtual taps, data monitoring switches, and network packet brokers, including third-party devices, through a single pane of glass. IFC Centralized Manager includes:

- a dynamic network topology map that shows the “up” or “down” status of supported devices and custom status providing visualization of monitoring resources for improved security, performance, capacity planning and compliance

- real-time data acquisition from auto-discovered devices that is archived and presented in rich graphical formats for snapshot viewing and historical trend analysis

- an enhanced high availability feature that supports primary and secondary units (in physical, virtual or combination) in sync with one floating IP address, allowing instant take-over when the master fails

- automated task execution across devices for comprehensive configuration and fault management to simplify script and policy execution and software upgrades

- security and user management features for role-based access, user authentication and external authentication based on global policies

Share this

The Latest

February 27, 2020

The Cloud Performance Benchmark from ThousandEyes compares global network performance and connectivity differences between the five major public cloud providers — Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, Alibaba Cloud and IBM Cloud — proving that, when it comes to performance, not all clouds are created equal ...

February 26, 2020

For the past 10 years, the majority of CIOs have had a transformational focus (currently 42%), however, this year, there is strong momentum in CIOs taking on more strategic responsibilities (40%), according to the 2020 State of the CIO research from IDG's CIO ...

February 25, 2020
A widening gap between IT resources and the demands of managing the increasing scale and complexity of enterprise cloud ecosystems is evident, according to <span style="font-style: italic;">Top challenges for CIOs on the road to the AI-driven autonomous cloud</span>, a new report based on a global survey of 800 CIOs conducted by Vanson Bourne and commissioned by Dynatrace ...
February 24, 2020

The tech world may be falling in love with artificial intelligence and automation, but when it comes to managing critical assets, old school tools like spreadsheets are still in common use. A new survey by Ivanti illustrates how these legacy tools are forcing IT to waste valuable time analyzing assets due to incomplete data ...

February 20, 2020

Over 70% of C-Suite decision makers believe business innovation and staff retention are driven by improved visibility into network and application performance, according to Rethink Possible: Visibility and Network Performance – The Pillars of Business Success, a survey
conducted by Riverbed ...

February 19, 2020

Modern enterprises rely upon their IT departments to deliver a seamless digital customer experience. Performance and availability are the foundational stepping stones to delivering that customer experience. Along those lines, this month we released a new research study titled the IT Downtime Detection and Mitigation Report that contains recommendations on how to best prevent, detect or mitigate brownouts and outages, given the context of today’s IT transformation trends ...

February 18, 2020

While Application Performance Management (APM) has become mainstream, with a majority of tech pros using APM tools regularly, there's work to be done to move beyond troubleshooting ...

February 13, 2020

Over the last few decades, IT departments have decreased budgets in part because of recession. As a result, they have are being asked to do more with less. The increase in work has amplified the need for automation ...

February 12, 2020

Many variables must align for optimum APM, and security is certainly among them. I offer the following APM predictions for 2020, which revolve around the reality that we will definitely begin to see much deeper integration of WAN technology on the security front. Look for this integration to take shape in the following ways ...

February 11, 2020

When it comes to growing a successful company, research shows it isn't about getting the most out of employees, but delivering an experience that empowers them to be and do their best. And according to Priming a New Era of Digital Wellness, a new study conducted by Quartz Insights in partnership with Citrix Systems, technology is the secret to doing so ...