Comdate is a leading supplier of solutions to the Telecommunications and Information Technology industries.

Ixia Vision ONE

Vision ONE


All-in-one tool that provides high-performance, lossless visibility 

A single platform for a granular view of network security and troubleshooting

Problem: The fight against invisible threats

What network managers cannot see, they cannot fight. Threats carefully hidden in encrypted traffic can easily bypass security controls and the watchful eye of IT teams. Application bandwidth explosions with the sudden and rapid expansion of a new or unknown application can go undetected until they threaten the availability and health of the network. There are ways to amplify these issues, but they often require a complicated mix of tools to gain complete visibility into all the traffic and applications on a network. And managing a myriad of security and performance monitoring solutions can compromise network performance.


Solution: Visibility intelligence strengthens network security and optimizes performance

Ixia Vision ONE™ is a turnkey device that enables organizations to maintain security as well as identify and resolve performance problems across physical and virtual infrastructures from a single platform. Whether fighting against threats hidden in encrypted traffic, or feeding the right data to the right forensic solution, Vision ONE boosts network protection without negatively impacting performance. Build a layered defense with a combination of best-of-breed inline security and out-of-band analysis tools, or create a strong foundation that helps you understand what is happening in an enterprise network. Either way, Vision ONE is a crucial step toward complete network security.

Aided by the dynamic application intelligence from the integrated Application Threat and Intelligence Processor (ATIP), the Vision ONE network packet broker (NPB) enables you to filter and visualize not only Level 2-4 traffic, but also Layer 7 application traffic, so that suspicious applications can be tagged and watched. This provides security advantages as users can quickly spot rogue applications or unusual activity, including traffic or packets coming or going from unauthorized geographies, or questionable file transfer protocol (FTP) transfers conducted on sensitive data in the middle of the night.

This capability alone would have short-circuited some of the most notorious data breaches suffered by enterprises and agencies in the past three years.

The integrated ATIP also offers performance advantages as customers can view real-time application level traffic and metadata through a web application program interface (API), or it can be filtered, decrypted, and sent onto forensic or application monitors for further inspection.

Vision ONE is the most critical piece of network infrastructure you never realized you needed.

Key features

  • Provides immediate time to value with an intuitive graphical user interface (GUI), enabling rapid deployment and minimal configuration
  • Delivers zero-loss advanced packet processing with deduplication and packet trimming
  • Ensures deep packet inspection to optimize investments in infrastructure by classifying traffic in real time
  • Provides sophisticated load balancing to maximize uptime and protect against the loss of critical data by distributing traffic across a number of monitoring tools
  • With the integration of ATIP, enables visualization of real-time application level traffic and metadata through a web API

Click HERE to contact us for more information