- An organization mistakenly connects a passive fiber tap to an output port on a monitoring tool causing data to be injected back into a live network.
- A government entity in a lawful intercept application is using a fiber tap to monitor a communications link, however the monitoring tool is erroneously configured or connected sending traffic via a tap back into the live network. As a result, it may be possible for a third party being monitored to detect this traffic and reveal the existence of the intercept.
- A third party with access to an organization's unsecure data center uses a conventional fiber tap to disrupt a live network.
Richard Favier, Company Sales Manager at Phoenix Datacom, a leading Ixia value added reseller in the UK supporting enterprise and government organizations, commented; "The Ixia Flex Tap Secure+ allows customers to prevent any accidental or deliberate insertion of traffic back into a live network link via the tap monitor ports. We anticipate that our customers, who need to ensure the security of their networks, will be very interested in this innovative new product from Ixia to further harden their cyber-security infrastructure."About Ixia Ixia (Nasdaq: XXIA) provides testing, visibility, and security solutions, strengthening applications across physical and virtual networks for enterprises, service providers, and network equipment manufacturers. Ixia offers companies trusted environments in which to develop, deploy, and operate. Customers worldwide rely on Ixia to verify their designs, optimize their performance, and ensure protection of their networks to make their applications stronger. Learn more at www.ixiacom.com. Ixia, the Ixia logo, Flex Tap, and Flex Tap Secure+ are trademarks or registered trademarks of Ixia in the United States and other jurisdictions. All other trademarks used herein are the property of their respective owners. Connect with Ixia LinkedIn Twitter Ixia Blog YouTube