Keysight’s Ixia launches ‘Vision Edge 1S’ to ehance network visibility

Must Read

Why cybersecurity threats have increased during Covid-19 pandemic

Cybersecurity industry has never had more significant task to carry out than guarding strategic associations and businesses from digital assaults during the coronavirus pandemic

How to choose an effective DDoS mitigation plan

There are several flavours from which to choose when selecting an effective DDoS mitigation strategy. Most enterprises opt for one of the cloud protection flavours (always-on or on-demand)

Ensuring brand protection against cyber attacks

Companies across all industries and sizes must make sure that they are protected and safeguarded against all forms of cyberattacks today

Keysight Technologies business Ixia has released Vision Edge 1S (E1S) visibility solution. This new solution combines packet broker functionality with application and synthetic monitoring in a single appliance which company claim will deliver network visibility to remote sites and edge computing.

Citing Gartner report, the company said that processing of data is rapidly moving to the edge. According to research firm, by 2022, more than 50% of enterprise-generated data will be created and processed outside the or . Computing assets at the edge of an enterprise need to be monitored for performance as well as security vulnerabilities.

“The growth of edge computing places a new burden on enterprises to understand what is happening at remote sites,” said Recep Ozdag, vice president, product management in Keysight’s Ixia Solutions Group.

“While edge computing puts resources where they are needed, gaps can emerge in a company’s monitoring and security infrastructure. Vision Edge 1S fills those gaps with an impressively cost-effective, yet powerful combination of a network packet broker and application performance monitoring solution,” said Ozdag.

Subscribe to receive the day's headlines from Tech Observer straight in your inbox

Leave a Reply

*The moderation of comments is automated and not cleared manually by Embedding of any link and use of abusive or unparliamentary language are prohibited.
- Advertisement -

Latest in TECH

Related Articles