Showing posts with label ThreatArmor. Show all posts
Showing posts with label ThreatArmor. Show all posts

Sunday, 27 March 2016

IXIA ThreatArmor: how does it work

No advertisement (unfortunately, vendor doesn't pay me for it :) ) but for technology review only: one more IXIA solution analysis.

There is some device provided for enterprise network implementation. It's' topological place may be external side of the network between corporate and the Internet, and the internal one behind the enterprise information security infrastructure. ThreatArmor protection is based on IP-addresses traffic filtering by source from the Internet and by destination from internal hosts.

It is a picture of TreatArmor-protected corporate network architecture.



Enterprise is on the left side and Internet is on the right one.